Open Access   Article Go Back

Secure Data Storage and Retrieval Using Adaptive Integrity Protocol Model in Cloud Environment

S.Sujitha 1 , S. J. Mohana2

Section:Research Paper, Product Type: Journal Paper
Volume-3 , Issue-9 , Page no. 181-184, Sep-2015

Online published on Oct 01, 2015

Copyright © S.Sujitha , S. J. Mohana . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: S.Sujitha , S. J. Mohana, “Secure Data Storage and Retrieval Using Adaptive Integrity Protocol Model in Cloud Environment,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.9, pp.181-184, 2015.

MLA Style Citation: S.Sujitha , S. J. Mohana "Secure Data Storage and Retrieval Using Adaptive Integrity Protocol Model in Cloud Environment." International Journal of Computer Sciences and Engineering 3.9 (2015): 181-184.

APA Style Citation: S.Sujitha , S. J. Mohana, (2015). Secure Data Storage and Retrieval Using Adaptive Integrity Protocol Model in Cloud Environment. International Journal of Computer Sciences and Engineering, 3(9), 181-184.

BibTex Style Citation:
@article{Mohana_2015,
author = {S.Sujitha , S. J. Mohana},
title = {Secure Data Storage and Retrieval Using Adaptive Integrity Protocol Model in Cloud Environment},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {9 2015},
volume = {3},
Issue = {9},
month = {9},
year = {2015},
issn = {2347-2693},
pages = {181-184},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=664},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=664
TI - Secure Data Storage and Retrieval Using Adaptive Integrity Protocol Model in Cloud Environment
T2 - International Journal of Computer Sciences and Engineering
AU - S.Sujitha , S. J. Mohana
PY - 2015
DA - 2015/10/01
PB - IJCSE, Indore, INDIA
SP - 181-184
IS - 9
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2232 2321 downloads 2336 downloads
  
  
           

Abstract

Cloud computing is provide a dynamically scalable resources provisioned as a service over the webpage. The third-party, on-demand, self-service, pay-per-use, and seamlessly scalable computing resources and services offered by the cloud environment promise to reduce capital as well as operational expenditures for hardware and software. Various distinct architectures are introduced and discussed according to their security and privacy capabilities and prospects. It provides four distinct models in form of abstracted multi-cloud architectures. These developed multi cloud architectures allow to categorize the available schemes and to analyze them according to their security reimbursement. An assessment of the different methods replication of applications, partition of application system into tiers, partition of application logic into fragments and partition of application data into fragments is given in particular. In addition, enabling public audit ability for cloud storage is of critical importance so that users can resort to an Integrity third party auditor (ITPA) to check the integrity of outsourced data and be worry-free. This paper proposes a secure cloud storage system supporting Isolation-preserving public auditing. It further extends the result to enable the ITPA to perform audits for multiple cloud users simultaneously and efficiently.

Key-Words / Index Term

Cloud Computing, Multi-cloud, Integrity, Isolation Preserving Auditing, ITPA

References

[1] S. Bugiel, S. Nurnberger, T. Poppelmann, A.-R. Sadeghi, and T.Schneider, ―AmazonIA: When Elasticity Snaps Back,‖ Proc. 18th ACM Conf. Computer and Comm. Security (CCS ’11), pp. 389-400, 2011.
[2] Amazon Elastic Compute Cloud (Amazon EC2).http://aws.amazon.com/ec2/.
[3] D. Catteddu (Ed.): Security & Resilience in Governmental Clouds – Making an informed decision. ENISA Report, January 2011.
[4] J. Somorovsky, M. Heiderich, M. Jensen, J. Schwenk, N. Gruschka, and L. Lo Iacono, ―All Your Clouds Are Belong to Us: Security Analysis of Cloud Management Interfaces,‖ Proc. Third ACM Workshop Cloud Computing Security Workshop (CCSW ’11), pp. 3-14, 2011.
[5] P. Mell and T. Grance: The NIST Definition of Cloud Computing (Draft). Recommendations of the National Institute of Standards and Technology (NIST), Special Publication 800—145 (Draft), available at http://csrc.nist.gov/publications/drafts/800-145/Draft-SP-800-145_cloud-definition.pdf, January 2011.
[6] G. Danezis and B. Livshits, ―Towards Ensuring Client-Side Computational Integrity (Position Paper),‖ Proc. ACM Cloud Computing Security Workshop (CCSW ’11), pp. 125-130, 2011.