Secure Multi-owner Data Sharing For Dynamic Group In Cloud

Authors

  • C. Kayalvizhi  Computer Science and Engineering, Dhanalakshmi College of Engineering, Chennai, Tamilnadu, India
  • S. Arun Prasath  Computer Science and Engineering, Dhanalakshmi College of Engineering, Chennai, Tamilnadu, India
  • S. ArunKumar  Computer Science and Engineering, Dhanalakshmi College of Engineering, Chennai, Tamilnadu, India
  • C. Broons Gandhi  Computer Science and Engineering, Dhanalakshmi College of Engineering, Chennai, Tamilnadu, India

Keywords:

Cloud Computing, Auditing, Load Balancing, Third Party Auditor

Abstract

Security is a major issue in cloud computing environment as the resources are dynamic, virtualized, scalable and elastic in nature. Data Integrity is ensured. Auditing plays a vital role in providing solution to the data integrity in cloud. Highly distributed and non-transparent nature of cloud increases the complexity of Auditing process. Auditing deals with monitoring and compliance. A third party auditor is essential to perform auditing to ensure data integrity on cloud services. In this paper, a Dynamic Third Party Auditing System is proposed in which a third party entity dynamically provides auditing services on cloud computing environment. TPA makes task of Client by verifying the integrity of data stored in cloud. The Dynamic third party auditing system does auditing using public key based homomorphic authentication.

References

[1] Y. Deswarte, J. Quisquater, and A. Saidane, “Remote integrity checking”, In Proc. of Conference on Integrity and Internal Control in Information Systems (IICIS’03), November 2003.
[2] T. Schwarz and E.L. Miller, “Store, forget, and check: Using algebraic signatures to check remotely  administered storage”, In Proceedings of ICDCS ’06. IEEE Computer Society, 2006.
[3] C. Wang, S.S.M. Chow, Q. Wang, K. Ren, and W. Lou,“Privacy-Preserving Public Auditing for Secure Cloud Storage,” IEEE Trans.Computers, vol. 62, no. 2, pp. 362-375, Feb. 2013.
[4] M. Venkatesh, “Improving Public Auditability, Data Possession in Data Storage Security for Cloud Computing”, ICRTIT-IEEE 2012.
[5] Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, “Enabling Public Auditability and Data Dynamics for Storage Security in CloudComputing,” IEEE Trans. Parallel and Distributed Systems vol. 22,no. 5, pp. 847-859, May 2011.
[6] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z.Peterson, and D. Song, “Provable Data Possession at Untrusted Stores,” Proc. 14th ACM Conf. Computer and Comm. Security (CCS ’07), pp. 598-609, 2007.
[7] M.A. Shah, R. Swaminathan, and M. Baker, “PrivacyPreserving Audit and Extraction of Digital Contents,” Cryptology ePrint Archive, Report 2008/186, 2008.
[8] P. Golle, S. Jarecki, and I. Mironov “Cryptographic primitives enforcing communication and storage complexity”. In Financial Cryptography, pages 120-135, 2002.


Downloads

Published

2015-04-25

Issue

Section

Research Articles

How to Cite

[1]
C. Kayalvizhi, S. Arun Prasath, S. ArunKumar, C. Broons Gandhi, " Secure Multi-owner Data Sharing For Dynamic Group In Cloud, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 1, Issue 2, pp.189-194, March-April-2015.