Open Access   Article Go Back

Multiple Auditing Schemes with Integrity and Reliability in Cloud Computing

MS. Sulthana1 , T. Samatha2 , V. Sravani3 , A. Mahendra4

  1. Dept. of Computer Science and Engineering, IIIT- RGUKT, Kadapa, India.
  2. Dept. of Computer Science and Engineering, IIIT- RGUKT, Kadapa, India.
  3. Dept. of Computer Science and Engineering, IIIT- RGUKT, Kadapa, India.
  4. Dept. of Computer Science and Engineering, IIIT- RGUKT, Kadapa, India.

Correspondence should be addressed to: m.s.sulthana2012@gmail.com.

Section:Research Paper, Product Type: Journal Paper
Volume-5 , Issue-5 , Page no. 1-6, May-2017

Online published on May 30, 2017

Copyright © MS. Sulthana, T. Samatha, V. Sravani, A. Mahendra . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: MS. Sulthana, T. Samatha, V. Sravani, A. Mahendra , “Multiple Auditing Schemes with Integrity and Reliability in Cloud Computing,” International Journal of Computer Sciences and Engineering, Vol.5, Issue.5, pp.1-6, 2017.

MLA Style Citation: MS. Sulthana, T. Samatha, V. Sravani, A. Mahendra "Multiple Auditing Schemes with Integrity and Reliability in Cloud Computing." International Journal of Computer Sciences and Engineering 5.5 (2017): 1-6.

APA Style Citation: MS. Sulthana, T. Samatha, V. Sravani, A. Mahendra , (2017). Multiple Auditing Schemes with Integrity and Reliability in Cloud Computing. International Journal of Computer Sciences and Engineering, 5(5), 1-6.

BibTex Style Citation:
@article{Sulthana_2017,
author = {MS. Sulthana, T. Samatha, V. Sravani, A. Mahendra },
title = {Multiple Auditing Schemes with Integrity and Reliability in Cloud Computing},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2017},
volume = {5},
Issue = {5},
month = {5},
year = {2017},
issn = {2347-2693},
pages = {1-6},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1257},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1257
TI - Multiple Auditing Schemes with Integrity and Reliability in Cloud Computing
T2 - International Journal of Computer Sciences and Engineering
AU - MS. Sulthana, T. Samatha, V. Sravani, A. Mahendra
PY - 2017
DA - 2017/05/30
PB - IJCSE, Indore, INDIA
SP - 1-6
IS - 5
VL - 5
SN - 2347-2693
ER -

VIEWS PDF XML
967 645 downloads 568 downloads
  
  
           

Abstract

Many users store their data in the cloud storage and benefit from high quality applications and services from a common group of configurable computing resources like networks, servers, storage, applications, and services, by these users can avoid the load of local data storage and protection. However, the fact that users no longer have physical control of the large size of data makes data reliability protection in Cloud computing a challenging task, especially for users with constrained computing resources. Cloud computing is used by many software industries nowadays, since security is not provided in cloud, many companies adopt their unique security structure. To avoid this problem, users can route data to a third party auditor (TPA) he can check the integrity of rooted data.TPA can be securely introduced such that the auditing process should not create any problems towards user data privacy, and should not bring in no added load to user. In this paper, we are securing the user data and providing privacy. We further expand the TPA to carry out multiple auditing tasks concurrently and powerfully. Wide-range of security and performance investigation shows the proposed schemes are provably secure and highly efficient.

Key-Words / Index Term

Data Storage, Privacy-Preserving, Public Review Ability, Cryptographic Protocols, Cloud Computing

References

[1] P. Mell, T. Grance, “The NIST Definion of Cloud Computing”, National Institute of Standards and Technology, Vol.53, Issue.6, pp.1-50, 2009.
Google Scholar

[2] M. Armbrust, A. Fox, R. Griffith, AD. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, M. Zaharia, “ A view of cloud computing”, Communications of the ACM, Vol.53, Issue.4, pp.50-58, 2010.
Google Scholar

[3] M. Bellare, P. Rogaway, “Random oracles are practical: A paradigm for designing efficient protocols”, In First Conference on Computer and Communications Security, USA, pp. 62-73, 1993.
Google Scholar

[4] A. Hirne, S. Namdev, H.S. Tomar, "Secure Data Distribution in Cloud Environment Using Key Aggregation Cryptic", International Journal of Scientific Research in Computer Science and Engineering, Vol.4, Issue.2, pp.15-19, 2016.
Google Scholar

[5] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable data possession at untrusted stores”, Proceedings of the 14th ACM conference on Computer and communications security, Alexandria, pp. 598-609, 2007.
Google Scholar

[6] C Wang, SSM Chow, Q Wang, K Ren, W. Lou, “Privacy-preserving public auditing for secure cloud storage”, IEEE transactions on computers, Vol.62, Issue.2, pp.362-75, 2013.
Google Scholar

[7] Q. Wang, C. Wang, J. Li, K. Ren, W. Lou, “Enabling public verifiability and data dynamics for storage security in cloud computing,” in Proc. of ESORICS’09 (volume 5789 of LNCS Springer-Verlag), Berlin, pp. 355-370, 2009.
Google Scholar