Secure Multi-owner Data Sharing For Dynamic Group In Cloud
Keywords:
Cloud Computing, Auditing, Load Balancing, Third Party AuditorAbstract
Security is a major issue in cloud computing environment as the resources are dynamic, virtualized, scalable and elastic in nature. Data Integrity is ensured. Auditing plays a vital role in providing solution to the data integrity in cloud. Highly distributed and non-transparent nature of cloud increases the complexity of Auditing process. Auditing deals with monitoring and compliance. A third party auditor is essential to perform auditing to ensure data integrity on cloud services. In this paper, a Dynamic Third Party Auditing System is proposed in which a third party entity dynamically provides auditing services on cloud computing environment. TPA makes task of Client by verifying the integrity of data stored in cloud. The Dynamic third party auditing system does auditing using public key based homomorphic authentication.
References
[1] Y. Deswarte, J. Quisquater, and A. Saidane, “Remote integrity checkingâ€, In Proc. of Conference on Integrity and Internal Control in Information Systems (IICIS’03), November 2003.
[2] T. Schwarz and E.L. Miller, “Store, forget, and check: Using algebraic signatures to check remotely administered storageâ€, In Proceedings of ICDCS ’06. IEEE Computer Society, 2006.
[3] C. Wang, S.S.M. Chow, Q. Wang, K. Ren, and W. Lou,“Privacy-Preserving Public Auditing for Secure Cloud Storage,†IEEE Trans.Computers, vol. 62, no. 2, pp. 362-375, Feb. 2013.
[4] M. Venkatesh, “Improving Public Auditability, Data Possession in Data Storage Security for Cloud Computingâ€, ICRTIT-IEEE 2012.
[5] Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, “Enabling Public Auditability and Data Dynamics for Storage Security in CloudComputing,†IEEE Trans. Parallel and Distributed Systems vol. 22,no. 5, pp. 847-859, May 2011.
[6] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z.Peterson, and D. Song, “Provable Data Possession at Untrusted Stores,†Proc. 14th ACM Conf. Computer and Comm. Security (CCS ’07), pp. 598-609, 2007.
[7] M.A. Shah, R. Swaminathan, and M. Baker, “PrivacyPreserving Audit and Extraction of Digital Contents,†Cryptology ePrint Archive, Report 2008/186, 2008.
[8] P. Golle, S. Jarecki, and I. Mironov “Cryptographic primitives enforcing communication and storage complexityâ€. In Financial Cryptography, pages 120-135, 2002.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRSET

This work is licensed under a Creative Commons Attribution 4.0 International License.