Ensuring Data Storage Security in Cloud Computing Using Homomorphism Token

Authors(2) :-Loheswaran. K, Deepan. R

Cloud computing is a new computational paradigm that offers an innovative business model for organization to adopt IT without upfront investments. Despite the potential gain achieved from the cloud computing. The security is an important aspect of quality of services. To ensures the correctness of user data in cloud. In the cloud many services are provided to the client by cloud. Data store is main future that cloud service provides to the companies to store huge amount of storage capacity. But still many companies are not ready to implement cloud computing technology due to lack of proper security control policy and weakness in protection which lead to many challenge in cloud computing. The main objectives of this paper are, 1) To prevent Data access from unauthorized access, it propose a distributed scheme to provide security of the data in cloud .This could be achieved by using homomorphism token with distributed verification of erasure-coded data. 2) Proposed scheme perfectly stores the data and identifies the any tamper at the cloud server. 3) And also performs some of the tasks like data updating, deleting, appending.

Authors and Affiliations

Loheswaran. K
Department of Coputer Science and Technology, Sasurie College of Engineering, Vijayamangalam, Tamil Nadu
Deepan. R
Department of Coputer Science and Technology, Sasurie College of Engineering, Vijayamangalam, Tamil Nadu

Cloud Computing, Internet Computing, Homomorphism, Data Storage Security, TPA,CSP

  1. S.Sajithabanu and Dr.E.George Prakash Raj, "Data Storage Security in Cloud" IJCST Vol. 2, Issue 4, Oct. - Dec. 2011
  2. A. Jules and J. Burton S. Kaliski, "Pors: Proofs of retrievability for large files," in Proc. of CCS’07, Alexandria, VA, October 2007, pp.584–597.
  3. H. Shacham and B. Waters, "Compact proofs of retrievability," in Proc. of Asiacrypt’08, volume 5350 of LNCS, 2008, pp. 90–107.
  4. G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, "Scalable and efficient provable data possession," in Proc. of Secure Comm’08,2008, pp. 1–10.
  5. Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, "Enabling public verifiability and data dynamics for storage security in cloud computing,"in Proc. of ESORICS’09, volume 5789 of LNCS. Springer-Verlag, Sep.2009, pp. 355–370.
  6. C. Erway, A. Kupcu, C. Papamanthou, and R. Tamassia, "Dynamic provable data possession," in Proc. of CCS’09, 2009, pp. 213–222.
  7. C. Wang, Q. Wang, K. Ren, and W. Lou, "Ensuring data storage security in cloud computing," in Proc. of IWQoS’09, July 2009, pp. 1–9.
  8. C. Wang, K. Ren, W. Lou, and J. Li, "Towards publicly auditable secure cloud data storage services," IEEE Network Magazine, vol. 24,no. 4, pp. 19–24, 2010.
  9. R. Curtmola, O. Khan, R. Burns, and G. Ateniese, "Mr-pdp:Multiple-replica provable data possession," in Proc. of ICDCS’08. IEEE Computer Society, 2008, pp. 411–420.
  10. M. Bellare, O. Goldreich, and S. Goldwasser, "Incremental cryptography: The case of hashing and signing," in Proc. Of CRYPTO’ 94, volume 839 of LNCS. Springer-Verlag, 1994, pp. 216–233.
  11. Amazon.com, "Amazon Web Services (AWS)," Online at http://aws.amazon.com, 2008.

Publication Details

Published in : Volume 2 | Issue 2 | March-April 2016
Date of Publication : 2017-12-31
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 222-227
Manuscript Number : IJSRSET162263
Publisher : Technoscience Academy

Print ISSN : 2395-1990, Online ISSN : 2394-4099

Cite This Article :

Loheswaran. K, Deepan. R, " Ensuring Data Storage Security in Cloud Computing Using Homomorphism Token, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 2, Issue 2, pp.222-227, March-April.2016
URL : http://ijsrset.com/IJSRSET162263

Follow Us

Contact Us