Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

An Effective Security Mechanism for on Demand File Storage in Cloud Computing


Affiliations
1 College of Engineering Roorkee, COER, Roorkee, Uttarakhand, India
2 Department of Computer Science, Gurukul Kangri Vishwavidyalaya, Haridwar, Uttarakhand,, India
3 Department of MCA, COER, Roorkee, Uttarakhand, India
     

   Subscribe/Renew Journal


Cloud Computing is one of the recent efforts in delivering computing utilities as a service feature. Cloud services include all the applications and utilities that are provided to the user through the system software which runs on the different datacentre. These data centres include multiple virtual machines and their associated hardware. It represents immigration from computing utility in the form of a service that is delivered to the customers over the Internet through Cloud environment. Cloud is a subscription based service pattern where one may obtain resources according to the requirements and a user can decide the sensitivity of the file before storing. This paper discusses the security layer provided to the file which is stored in the cloud.

Keywords

Cloud Computing, CSP, Data Security, Cryptography.
User
Subscription Login to verify subscription
Notifications
Font Size

  • J. Chen, Y. Wang, and X. Wang, “On-demand security architecture for cloud computing,” Computer, vol. 45, no. 7, pp. 73-78, July 2012.
  • D. Chen, and H. Zhao, “Data security and privacy protection issues in cloud computing,” International Conference on Computer Science and Electronics Engineering, ICCSEE, 23-25 March 2012.
  • B. Prince, “IBM discovers encryption scheme that could improve cloud security, spam filtering,” eWeek, June 2009. Available: http://www.eweek.com/security/ibm-discovers-encryption-scheme-that-could-improvecloudsecurity-spam-filtering
  • I. Roy, H. E. Ramadan, S. T. V. Setty, A. Kilzer, V. Shmatikov, and E. Witchel, “Airavat: Security and privacy for MapReduce,” In Proceedings of the 7th USENIX Symposium on Networked Systems Design and Implementation, USENIX Association, San Jose, pp. 297-312, April 2010.
  • T. Cox, S. Saha, and R. Lockhart, “OASIS Key Management Interoperability Protocol (KMIP) TC,”. Available: https://www.oasis-open.org/committees/tc_home.php?wg_abbrev=kmip
  • K. Zeng, “Publicly verifiable remote data integrity,” In Proceedings of the 10th International Conference on Information and Communication Security (ICICS), Springer, Berlin, Heidelberg, pp. 419-434, 20-22 October 2008.
  • C. Wang, Q. Wang, K. Ren, and W. Lou, “Ensuring Data Storage Security in Cloud Computing,” In 17th International Workshop on Quality of Service (IWQoS), pp. 1-9, 13-15 July 2009.
  • K. D. Bowers, A. Juels, and A. Oprea, “Proofs of retrievability: Theory and implementation,” In Proceedings of the 2009 ACM Workshop on Cloud Computing Security (CCSW), ACM, pp. 43-54, 2009.
  • V. M-Mulero, and J. Nin, “Privacy and anonymization for very large datasets,” In Proceedings of the 18th ACM Conference on Information and Knowledge Management (CIKM), pp. 2117-2118, November 2009.
  • R. Gajanayake, R. Iannella, and T. Sahama, “Sharing with care: An information accountability perspective,” IEEE Internet Computing, vol. 15, no. 4, pp. 31-38, July-August 2011.
  • National Industrial Security Program Operating Manual (NISPOM), February 2006.
  • R. Kissel, M. Scholl, S. Skolochenko, and X. Li, “Guidelines for Media Sanitization: Recommendations of the National Institute of Standards and Technology,” NIST Special Publication 800-88, September 2006.
  • A. Malik, and V. K. Jain, “Effective renewal and signing method to achieve secure storage and computation using Hybrid RSA-MABC algorithm,” International Journal of Intelligent Engineering and Systems, vol. 9, no. 3, pp. 11-20, 2006.

Abstract Views: 439

PDF Views: 5




  • An Effective Security Mechanism for on Demand File Storage in Cloud Computing

Abstract Views: 439  |  PDF Views: 5

Authors

Anurag Raii
College of Engineering Roorkee, COER, Roorkee, Uttarakhand, India
Mayank Aggarwal
Department of Computer Science, Gurukul Kangri Vishwavidyalaya, Haridwar, Uttarakhand,, India
Anju Malik
Department of MCA, COER, Roorkee, Uttarakhand, India

Abstract


Cloud Computing is one of the recent efforts in delivering computing utilities as a service feature. Cloud services include all the applications and utilities that are provided to the user through the system software which runs on the different datacentre. These data centres include multiple virtual machines and their associated hardware. It represents immigration from computing utility in the form of a service that is delivered to the customers over the Internet through Cloud environment. Cloud is a subscription based service pattern where one may obtain resources according to the requirements and a user can decide the sensitivity of the file before storing. This paper discusses the security layer provided to the file which is stored in the cloud.

Keywords


Cloud Computing, CSP, Data Security, Cryptography.

References