Open Access   Article Go Back

Privacy Preserving Public Auditing with Data Storage Security in Cloud Computing : An Overview

R. Manimegalai1 , .A. Priyadharshini2

  1. Department of Computer Science,Rathinam College of Arts and Science,Coimbatore-21.
  2. Department of Computer Science,Rathinam College of Arts and Science,Coimbatore-21.

Section:Review Paper, Product Type: Journal Paper
Volume-6 , Issue-5 , Page no. 532-534, May-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i5.532534

Online published on May 31, 2018

Copyright © R. Manimegalai, .A. Priyadharshini . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: R. Manimegalai, .A. Priyadharshini, “Privacy Preserving Public Auditing with Data Storage Security in Cloud Computing : An Overview,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.532-534, 2018.

MLA Style Citation: R. Manimegalai, .A. Priyadharshini "Privacy Preserving Public Auditing with Data Storage Security in Cloud Computing : An Overview." International Journal of Computer Sciences and Engineering 6.5 (2018): 532-534.

APA Style Citation: R. Manimegalai, .A. Priyadharshini, (2018). Privacy Preserving Public Auditing with Data Storage Security in Cloud Computing : An Overview. International Journal of Computer Sciences and Engineering, 6(5), 532-534.

BibTex Style Citation:
@article{Manimegalai_2018,
author = {R. Manimegalai, .A. Priyadharshini},
title = {Privacy Preserving Public Auditing with Data Storage Security in Cloud Computing : An Overview},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2018},
volume = {6},
Issue = {5},
month = {5},
year = {2018},
issn = {2347-2693},
pages = {532-534},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2016},
doi = {https://doi.org/10.26438/ijcse/v6i5.532534}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i5.532534}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2016
TI - Privacy Preserving Public Auditing with Data Storage Security in Cloud Computing : An Overview
T2 - International Journal of Computer Sciences and Engineering
AU - R. Manimegalai, .A. Priyadharshini
PY - 2018
DA - 2018/05/31
PB - IJCSE, Indore, INDIA
SP - 532-534
IS - 5
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
534 278 downloads 137 downloads
  
  
           

Abstract

Cloud computing is an Internet-based computing pattern through which shared resources are provided to devices on demand. In order to provide safe and secure operation propose a hierarchical attribute based access control scheme by extending cipher text-policy attribute-based encryption (CP-ABE) with a hierarchical structure of multi authorities and exploiting attribute-based signature (ABS). The proposed scheme not only achieves scalability due to its hierarchical structure, but also inherits fine-grained access control with authentication in supporting write privilege on outsourced data in cloud computing. In addition, we decouple the task of policy management from security enforcement by using the extensible access control markup language (XACML) framework. Extensive analysis shows that our scheme is both efficient and scalable in dealing with access control for out- sourced data in cloud computing.

Key-Words / Index Term

CP-ABE,ABS,XACML

References

[1] https://apprenda.com/library/cloud/introduction-to-cloud-computing/
[2] https://www.hindawi.com/journals/scn/2017/2713595/
[3] https://eprint.iacr.org/2014/612.pdf
[4] R. Nallakumar, N. Sengottaiyan, S. Nithya, “A Survey of Task Scheduling Methods in Cloud Computing”, International Journal of Computer Sciences and Engineering, Vol.2, Issue.10, pp.9-13, 2014. https://www.hindawi.com/journals/scn/2017/2713595/
[5] S. Roschke, et aI., "Intrusion Detection in the Cloud," presented at the Eighth IEEE International Conference on Dependable, AutonomIc and Secure Computing, Chengdu, China, 2009.
[6] B.P. Rimal, Choi Eunmi, I. Lumb, “A Taxonomy and Survey of Cloud Computing Systems”, Intl. Joint Conference on INC, IMS and IDC, 2009, pp. 44-51,Seoul, Aug, 2009. DOI: 10.1109/NCM.2009.218
[7] B. R. Kandukuri, R. Paturi V, A. Rakshit, “Cloud Security Issues”, In Proceedings of IEEE International Conference on Services Computing, pp. 517-520, 2009. K. Elissa, “Title of paper if known,” unpublished.
[8] Cloud Computing. Wikipdia. Available at http://en.wikipedia.org/wiki/Cloud_computing
[9] Cong Wang, Qian Wang, KuiRen, and Wenjing Lou, “Ensuring Data Storage Security in Cloud Computing,” 17th International workshop on Quality of Service, USA, pp.1-9, July 13-15, 2009, ISBN: 978-1-4244-3875-4
[10] C. Weinhardt, A. Anandasivam, B. Blau, and J. Stosser.”Business Models in the Service World.”IT Professional, vol. 11, pp. 28-33, 2009.
[11] B. Patel, S. Patel, “Various Load Balancing Algorithms in cloud computing”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol¬.1, Issue.¬2 pp.23-29, 2015.