Open Access   Article Go Back

Cloud Audit Server based verification for enhancing Information Security in cloud

Ramanjaiah Ganji1 , Suresh Babu Yalavarthi2

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-8 , Page no. 406-413, Aug-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i8.406413

Online published on Aug 31, 2018

Copyright © Ramanjaiah Ganji, Suresh Babu Yalavarthi . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Ramanjaiah Ganji, Suresh Babu Yalavarthi, “Cloud Audit Server based verification for enhancing Information Security in cloud,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.406-413, 2018.

MLA Style Citation: Ramanjaiah Ganji, Suresh Babu Yalavarthi "Cloud Audit Server based verification for enhancing Information Security in cloud." International Journal of Computer Sciences and Engineering 6.8 (2018): 406-413.

APA Style Citation: Ramanjaiah Ganji, Suresh Babu Yalavarthi, (2018). Cloud Audit Server based verification for enhancing Information Security in cloud. International Journal of Computer Sciences and Engineering, 6(8), 406-413.

BibTex Style Citation:
@article{Ganji_2018,
author = {Ramanjaiah Ganji, Suresh Babu Yalavarthi},
title = {Cloud Audit Server based verification for enhancing Information Security in cloud},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {8 2018},
volume = {6},
Issue = {8},
month = {8},
year = {2018},
issn = {2347-2693},
pages = {406-413},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2709},
doi = {https://doi.org/10.26438/ijcse/v6i8.406413}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i8.406413}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2709
TI - Cloud Audit Server based verification for enhancing Information Security in cloud
T2 - International Journal of Computer Sciences and Engineering
AU - Ramanjaiah Ganji, Suresh Babu Yalavarthi
PY - 2018
DA - 2018/08/31
PB - IJCSE, Indore, INDIA
SP - 406-413
IS - 8
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
572 378 downloads 220 downloads
  
  
           

Abstract

Cloud computing enables internet based data storage, accessing, portability and processing. The flexibility cloud endows comes with a few security challenges. Though plans like "Proofs of Retrievability" and "Provable Data Possession" has been created to ascertain security they can`t bolster dynamic information. By and large a significant number of the peril models accept that having a fair data owners are concentrating on the exploitative cloud authority organization. In certain scenarios the client might be untrustworthy for getting the advantages by means of pay from the supplier. This research work focuses on an open inspecting plan that endows information support and reasonable discretion in data safety issues. This paper primarily focuses on developing a signature based plan to configure reasonable discretion conventions that ensures data integrity and security. The security verification establishes that the proposed method is secure and the information flow and dispute arbitration are sensible.

Key-Words / Index Term

Cloud computing, thrid party auditor, Third party arbitrator, Data Verification, dispute arbitration

References

[1] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable data possession at untrusted stores,” in Proc. 14th ACM Conf. Computer and Comm. Security (CCS07), 2007, pp. 598–609.
[2] H. Shacham and B. Waters, “Compact proofs of retrievability,” in Proc. 14th Intl Conf. Theory and Application of Cryptology and Information Security: Advances in Cryptology (ASIACRYPT 08), 2008, pp. 90–107.
[3] Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, “Enabling publicverifiability and data dynamics for storage security in cloud computing,”in Proc. 14th European Conf. Research in Computer Security(ESORICS 08), 2009, pp. 355–370.
[4] A. Juels and B. S. Kaliski Jr, “Pors: Proofs of retrievability forlarge files,” in Proc. 14th ACM Conf. Computer and Comm. Security(CCS07), 2007, pp. 584–597.
[5] M. A. Shah, R. Swaminathan, and M. Baker, “Privacy-preservingaudit and extraction of digital contents.” IACR Cryptology ePrintArchive, Report 2008/186, 2008.
[6] Q. Zheng and S. Xu, “Fair and dynamic proofs of retrievability ” inProc. 1st ACM Conf. Data and Application Security and Privacy(CODASPY 11), 2011, pp. 237–248.
[7] A.Kupcu¸ “Official arbitration with secure cloud storage application”, The Computer Journal, pp. 138–169, 2013.
[8] Vishnu Patidar, Makhan Kumbhkar, “Analysis of Cloud Computing Security Issues in Software as a Service” International Journal of Scientifi International Journal of Scientific Research , Vol.2 , Issue.3, pp.1-4, 2014.