Home
Call For Papers
Submission
Author
Registration
Publications
About
Contact Us

  Authentication and Integrity for Outsourced Enterprise Storage Environments  
  Authors : ch.Sravan Kumar; srinivas Kolli; Dr P.Chenna Reddy
  Cite as:

 

In data publishing cloud computing is going to be play a vital role. Cloud storage offers the users to store their data on cloud in cloud computing to reduce the online burden and maintenance. The user physically deletes the data from his local storage after outsourcing the data to the cloud so providing security for outsourced data is considered as an important task. So this paper proposes privacy preserving and public auditing for secure storage. In this technique the users delegates their work to third party auditors (TPA) to check the integrity of the out sourced data when needed is called auditing process so that the users do not worry about their data possession and the data towards TPA should be protected using some encryption mechanisms to provide privacy. Efficient and secure access for large amount of data stored in cloud server an important task. for efficient access of large amount of outsourced data they proposes to encrypt every block with different encryption keys, they uses key derivation methods to reduce the no of keys used. In this paper they also proposes lazy revocation and over encryption where revoked users cannot access the updated information from the cloud server.

 

Published In : IJCSN Journal Volume 3, Issue 3

Date of Publication : 01 June 2014

Pages : 144 - 147

Figures : 02

Tables : --

Publication Link :

 

 

 

ch.Sravan Kumar : Asst Professor,Vardhaman College Of Engineering(Cse Dept)

srinivas Kolli : Asst Professor, Vardhaman College Of Engineering(Cse Dept)

Dr P.Chenna Reddy : Professor, Jntua College Of Engineering, Cse Dept

 

 

 

 

 

 

 

online cloud storage

dynamic data

third party auditor

broadcast encryption

Outsourcing data to remote servers has become a growing trend for many organizations to alleviate the burden of local data storage and maintenance. In this work we have studied different aspects of outsourcing data storage: block-level data dynamic, newness, mutual trust, and access control. We have proposed a cloud-based storage scheme which supports outsourcing of dynamic data, where the owner is capable of not only archiving and accessing the data stored by the CSP, but also updating and scaling this data on the remote servers. The proposed scheme enables the authorized users to ensure that they are receiving the most recent version of the outsourced data. Moreover, in case of dispute regarding data integrity/newness.

 

 

 

 

 

 

 

 

 

[1] A. Singh and L. Liu, “Sharoes: A data sharing platform for outsourced enterprise storage environments,” in Proceedings of the 24th International Conference on Data Engineering, ICDE. IEEE, 2008, pp. 993–1002.

[2] 104th United States Congress, “Health Insurance Portability and Accountability Act of 1996 (HIPAA),” Online at http://aspe. hhs.gov/admnsimp/pl104191.htm, 1996.

[3] D. L. G. Filho and P. S. L. M. Barreto, “Demonstrating data possession and uncheatable data transfer,” Cryptology ePrint Archive, Report 2006/150, 2006.

[4] M. A. Shah, M. Baker, J. C. Mogul, and R. Swaminathan, “Auditing to keep online storage services honest,” in HOTOS’07: Proceedings of the 11th USENIX workshop on Hot topics in operating systems, Berkeley, CA, USA, 2007, pp. 1–6.