Cloud computing is a popular technology which permits storing and accessing data over Internet instead of storing it on local machines’ hard drive. Cloud users can enable to store their data on cloud without any anxiety about its accuracy and reliability. However storing data on cloud imposes certain security challenges. Outsourcing data in cloud result may lose physical control over their data. Certain Cloud Service Providers (CSPs) may operate dishonestly with the cloud users’ data, they may sneak the data from cloud and sell it to third parties in order to earn profit. Even though outsourcing data on cloud is inexpensive and reduces long duration storage and maintenance complexity, there is least assurance of data integrity, privacy, security and availability on cloud servers. A number of solutions have been recommended to solve the security issues in cloud. This paper mainly focuses on the integrity verification strategy for outsourced data. The proposed scheme combines the encrypting mechanism.
Published in | Internet of Things and Cloud Computing (Volume 6, Issue 1) |
DOI | 10.11648/j.iotcc.20180601.14 |
Page(s) | 25-35 |
Creative Commons |
This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited. |
Copyright |
Copyright © The Author(s), 2018. Published by Science Publishing Group |
Cloud Computing, Data Encryption, Security, Cloud Audit, Cloud Service Provider
[1] | Sarah sheikh and Deepali vora, “Secure cloud auditing over encrypted data”, IEEE transactions on information forensics and security, Vol. 11, No. 6, Mar 2017, PP: 1-5. |
[2] | Kalyani sonaware and Rahul dagade, “A survey on multi-key word ranked search over encrypted cloud data with multiple data owners”, International journal of computer applications, Vol. 162, No. 11, Mar 2017, PP:9-12. |
[3] | Swapnali and Snagita chaudhari, “Third party public auditing scheme for cloud storage”, 7th International conference on communication, computing and virtualized 2016, PP: 69-76. |
[4] | Nitin nagar and Ugrasen suman, “Reliable & enhanced third party auditing in cloud server data storage”, International journal of security and its applications, Vol. 11, No. 7, 2017, PP: 59-71. |
[5] | Mahesh kumar, “Encrypted bigdata using AES deduplication in cloud storage”, International journal of engineering and computer science, Vol. 6, No. 7, July2017, PP: 21889-21894. |
[6] | Sweta k. parmer and K. C. Dave “Implementation of data encryption & decryption algorithm for information security”, International journal of advanced in science engineering and technology, Vol. 1, No. 2, Oct2013, PP: 7-10. |
[7] | Pitchaiah, Philemon Daniel & Praveen, “Implementation of advanced encryption standard algorithm”, International journal of engineering research, Vol. 3, No. 3, 2012, PP: 1-6. |
[8] | Vaishali Patil & Archana Lomte, “Implementation of privacy –preserving public auditing and secure searchable data cloud storage”, Vol. 3, No. 7, 2017, PP: 65-72. |
[9] | Karthika priya dharshini, Viji & Saravanan, “Seclusion search over encrypted data in cloud storage services”, Vol. 4, No. 3, Mar 2015, PP: 27-34. |
[10] | Evgeny Milanov, “The RSA Algorithm”, 3, June 2007, PP:1-11. |
APA Style
Yesu Ragavi Kannadasan, Rajagopal Devarajan. (2018). Secure Cloud Auditing Over Encrypted Data. Internet of Things and Cloud Computing, 6(1), 25-35. https://doi.org/10.11648/j.iotcc.20180601.14
ACS Style
Yesu Ragavi Kannadasan; Rajagopal Devarajan. Secure Cloud Auditing Over Encrypted Data. Internet Things Cloud Comput. 2018, 6(1), 25-35. doi: 10.11648/j.iotcc.20180601.14
AMA Style
Yesu Ragavi Kannadasan, Rajagopal Devarajan. Secure Cloud Auditing Over Encrypted Data. Internet Things Cloud Comput. 2018;6(1):25-35. doi: 10.11648/j.iotcc.20180601.14
@article{10.11648/j.iotcc.20180601.14, author = {Yesu Ragavi Kannadasan and Rajagopal Devarajan}, title = {Secure Cloud Auditing Over Encrypted Data}, journal = {Internet of Things and Cloud Computing}, volume = {6}, number = {1}, pages = {25-35}, doi = {10.11648/j.iotcc.20180601.14}, url = {https://doi.org/10.11648/j.iotcc.20180601.14}, eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.iotcc.20180601.14}, abstract = {Cloud computing is a popular technology which permits storing and accessing data over Internet instead of storing it on local machines’ hard drive. Cloud users can enable to store their data on cloud without any anxiety about its accuracy and reliability. However storing data on cloud imposes certain security challenges. Outsourcing data in cloud result may lose physical control over their data. Certain Cloud Service Providers (CSPs) may operate dishonestly with the cloud users’ data, they may sneak the data from cloud and sell it to third parties in order to earn profit. Even though outsourcing data on cloud is inexpensive and reduces long duration storage and maintenance complexity, there is least assurance of data integrity, privacy, security and availability on cloud servers. A number of solutions have been recommended to solve the security issues in cloud. This paper mainly focuses on the integrity verification strategy for outsourced data. The proposed scheme combines the encrypting mechanism.}, year = {2018} }
TY - JOUR T1 - Secure Cloud Auditing Over Encrypted Data AU - Yesu Ragavi Kannadasan AU - Rajagopal Devarajan Y1 - 2018/04/13 PY - 2018 N1 - https://doi.org/10.11648/j.iotcc.20180601.14 DO - 10.11648/j.iotcc.20180601.14 T2 - Internet of Things and Cloud Computing JF - Internet of Things and Cloud Computing JO - Internet of Things and Cloud Computing SP - 25 EP - 35 PB - Science Publishing Group SN - 2376-7731 UR - https://doi.org/10.11648/j.iotcc.20180601.14 AB - Cloud computing is a popular technology which permits storing and accessing data over Internet instead of storing it on local machines’ hard drive. Cloud users can enable to store their data on cloud without any anxiety about its accuracy and reliability. However storing data on cloud imposes certain security challenges. Outsourcing data in cloud result may lose physical control over their data. Certain Cloud Service Providers (CSPs) may operate dishonestly with the cloud users’ data, they may sneak the data from cloud and sell it to third parties in order to earn profit. Even though outsourcing data on cloud is inexpensive and reduces long duration storage and maintenance complexity, there is least assurance of data integrity, privacy, security and availability on cloud servers. A number of solutions have been recommended to solve the security issues in cloud. This paper mainly focuses on the integrity verification strategy for outsourced data. The proposed scheme combines the encrypting mechanism. VL - 6 IS - 1 ER -