Secure Data Storage and Retrieval Using Adaptive Integrity Protocol Model in Cloud Environment
S.Sujitha 1 , S. J. Mohana2
Section:Research Paper, Product Type: Journal Paper
Volume-3 ,
Issue-9 , Page no. 181-184, Sep-2015
Online published on Oct 01, 2015
Copyright © S.Sujitha , S. J. Mohana . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Citation
IEEE Style Citation: S.Sujitha , S. J. Mohana, “Secure Data Storage and Retrieval Using Adaptive Integrity Protocol Model in Cloud Environment,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.9, pp.181-184, 2015.
MLA Citation
MLA Style Citation: S.Sujitha , S. J. Mohana "Secure Data Storage and Retrieval Using Adaptive Integrity Protocol Model in Cloud Environment." International Journal of Computer Sciences and Engineering 3.9 (2015): 181-184.
APA Citation
APA Style Citation: S.Sujitha , S. J. Mohana, (2015). Secure Data Storage and Retrieval Using Adaptive Integrity Protocol Model in Cloud Environment. International Journal of Computer Sciences and Engineering, 3(9), 181-184.
BibTex Citation
BibTex Style Citation:
@article{Mohana_2015,
author = {S.Sujitha , S. J. Mohana},
title = {Secure Data Storage and Retrieval Using Adaptive Integrity Protocol Model in Cloud Environment},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {9 2015},
volume = {3},
Issue = {9},
month = {9},
year = {2015},
issn = {2347-2693},
pages = {181-184},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=664},
publisher = {IJCSE, Indore, INDIA},
}
RIS Citation
RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=664
TI - Secure Data Storage and Retrieval Using Adaptive Integrity Protocol Model in Cloud Environment
T2 - International Journal of Computer Sciences and Engineering
AU - S.Sujitha , S. J. Mohana
PY - 2015
DA - 2015/10/01
PB - IJCSE, Indore, INDIA
SP - 181-184
IS - 9
VL - 3
SN - 2347-2693
ER -
![]() |
![]() |
![]() |
2390 | 2391 downloads | 2429 downloads |




Abstract
Cloud computing is provide a dynamically scalable resources provisioned as a service over the webpage. The third-party, on-demand, self-service, pay-per-use, and seamlessly scalable computing resources and services offered by the cloud environment promise to reduce capital as well as operational expenditures for hardware and software. Various distinct architectures are introduced and discussed according to their security and privacy capabilities and prospects. It provides four distinct models in form of abstracted multi-cloud architectures. These developed multi cloud architectures allow to categorize the available schemes and to analyze them according to their security reimbursement. An assessment of the different methods replication of applications, partition of application system into tiers, partition of application logic into fragments and partition of application data into fragments is given in particular. In addition, enabling public audit ability for cloud storage is of critical importance so that users can resort to an Integrity third party auditor (ITPA) to check the integrity of outsourced data and be worry-free. This paper proposes a secure cloud storage system supporting Isolation-preserving public auditing. It further extends the result to enable the ITPA to perform audits for multiple cloud users simultaneously and efficiently.
Key-Words / Index Term
Cloud Computing, Multi-cloud, Integrity, Isolation Preserving Auditing, ITPA
References
[1] S. Bugiel, S. Nurnberger, T. Poppelmann, A.-R. Sadeghi, and T.Schneider, ―AmazonIA: When Elasticity Snaps Back,‖ Proc. 18th ACM Conf. Computer and Comm. Security (CCS ’11), pp. 389-400, 2011.
[2] Amazon Elastic Compute Cloud (Amazon EC2).http://aws.amazon.com/ec2/.
[3] D. Catteddu (Ed.): Security & Resilience in Governmental Clouds – Making an informed decision. ENISA Report, January 2011.
[4] J. Somorovsky, M. Heiderich, M. Jensen, J. Schwenk, N. Gruschka, and L. Lo Iacono, ―All Your Clouds Are Belong to Us: Security Analysis of Cloud Management Interfaces,‖ Proc. Third ACM Workshop Cloud Computing Security Workshop (CCSW ’11), pp. 3-14, 2011.
[5] P. Mell and T. Grance: The NIST Definition of Cloud Computing (Draft). Recommendations of the National Institute of Standards and Technology (NIST), Special Publication 800—145 (Draft), available at http://csrc.nist.gov/publications/drafts/800-145/Draft-SP-800-145_cloud-definition.pdf, January 2011.
[6] G. Danezis and B. Livshits, ―Towards Ensuring Client-Side Computational Integrity (Position Paper),‖ Proc. ACM Cloud Computing Security Workshop (CCSW ’11), pp. 125-130, 2011.