Cloud computing is a new computational paradigm that offers an innovative business model for organization to adopt IT without upfront investments. Despite the potential gain achieved from the cloud computing. The security is an important aspect of quality of services. To ensures the correctness of user data in cloud. In the cloud many services are provided to the client by cloud. Data store is main future that cloud service provides to the companies to store huge amount of storage capacity. But still many companies are not ready to implement cloud computing technology due to lack of proper security control policy and weakness in protection which lead to many challenge in cloud computing. The main objectives of this paper are, 1) To prevent Data access from unauthorized access, it propose a distributed scheme to provide security of the data in cloud .This could be achieved by using homomorphism token with distributed verification of erasure-coded data. 2) Proposed scheme perfectly stores the data and identifies the any tamper at the cloud server. 3) And also performs some of the tasks like data updating, deleting, appending.
Loheswaran. K, Deepan. R
Cloud Computing, Internet Computing, Homomorphism, Data Storage Security, TPA,CSP
- S.Sajithabanu and Dr.E.George Prakash Raj, "Data Storage Security in Cloud" IJCST Vol. 2, Issue 4, Oct. - Dec. 2011
- A. Jules and J. Burton S. Kaliski, "Pors: Proofs of retrievability for large files," in Proc. of CCS’07, Alexandria, VA, October 2007, pp.584–597.
- H. Shacham and B. Waters, "Compact proofs of retrievability," in Proc. of Asiacrypt’08, volume 5350 of LNCS, 2008, pp. 90–107.
- G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, "Scalable and efficient provable data possession," in Proc. of Secure Comm’08,2008, pp. 1–10.
- Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, "Enabling public verifiability and data dynamics for storage security in cloud computing,"in Proc. of ESORICS’09, volume 5789 of LNCS. Springer-Verlag, Sep.2009, pp. 355–370.
- C. Erway, A. Kupcu, C. Papamanthou, and R. Tamassia, "Dynamic provable data possession," in Proc. of CCS’09, 2009, pp. 213–222.
- C. Wang, Q. Wang, K. Ren, and W. Lou, "Ensuring data storage security in cloud computing," in Proc. of IWQoS’09, July 2009, pp. 1–9.
- C. Wang, K. Ren, W. Lou, and J. Li, "Towards publicly auditable secure cloud data storage services," IEEE Network Magazine, vol. 24,no. 4, pp. 19–24, 2010.
- R. Curtmola, O. Khan, R. Burns, and G. Ateniese, "Mr-pdp:Multiple-replica provable data possession," in Proc. of ICDCS’08. IEEE Computer Society, 2008, pp. 411–420.
- M. Bellare, O. Goldreich, and S. Goldwasser, "Incremental cryptography: The case of hashing and signing," in Proc. Of CRYPTO’ 94, volume 839 of LNCS. Springer-Verlag, 1994, pp. 216–233.
- Amazon.com, "Amazon Web Services (AWS)," Online at http://aws.amazon.com, 2008.
|Published in :
||Volume 2 | Issue 2 | March-April - 2016
|Date of Publication
Cite This Article
Loheswaran. K, Deepan. R, "Ensuring Data Storage Security in Cloud Computing Using Homomorphism Token", International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 2, Issue 2, pp.222-227, March-April-2016.
URL : http://ijsrset.com/IJSRSET162263.php