Skip to main content
Top

2015 | OriginalPaper | Chapter

Enhanced Security Framework for Data Integrity Using Third-party Auditing in the Cloud System

Authors : Balamurugan Balusamy, P. Venkatakrishna, Abinaya Vaidhyanathan, Meenakshi Ravikumar, Nirmala Devi Munisamy

Published in: Artificial Intelligence and Evolutionary Algorithms in Engineering Systems

Publisher: Springer India

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Cloud computing is an evolving paradigm that has been resulted as an adoption of available technologies. Although cloud technology allows users to take more benefits from available infrastructures, and virtualization, which is an enabling technology provided by the cloud allows users to manage and use the resources in an efficient and easiest manner, it does not guarantee data integrity and security over the resources stored in the cloud. Though many security frameworks have been developed for the cloud, still there may be loss of data or loss of control over data uploaded into the cloud. And also, many solutions for data integrity by third-party auditor are available but they are semi-trustable, if third-party auditors (TPA) compromise unauthorized access over the resource in the cloud. Hence, our proposed scheme focuses on extended framework that guarantees data integrity by involving data owner to perform auditing on the outsourced data in the cloud. And so, our proposed scheme achieves data integrity and guarantees security to the data owners for their resource in the cloud to major extent. Therefore, this type of TPA approach creates awareness to the data owner of their resource and thereby guarantees data integrity for every resources stored in the cloud.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference G. Roopa, S. Manjunath, Secure way of storing data in cloud using third party auditor. IOSR J. Comput. Eng. (IOSR-JCE) 12(4), 69–74 (2013) G. Roopa, S. Manjunath, Secure way of storing data in cloud using third party auditor. IOSR J. Comput. Eng. (IOSR-JCE) 12(4), 69–74 (2013)
2.
go back to reference L. Li, L. Xu, J. Li, C. Zhang, Study on the third-party audit in cloud storage service, in International Conference on Cloud and Service Computing (2011) L. Li, L. Xu, J. Li, C. Zhang, Study on the third-party audit in cloud storage service, in International Conference on Cloud and Service Computing (2011)
3.
go back to reference C. Wang, S.S.M. Chow, Q. Wang, K. Ren, W. Lou, Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362–375 (2013) C. Wang, S.S.M. Chow, Q. Wang, K. Ren, W. Lou, Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362–375 (2013)
4.
go back to reference G. Delong, Use of Third Party Audit to Verify Sources from Farm to Supplier G. Delong, Use of Third Party Audit to Verify Sources from Farm to Supplier
5.
go back to reference U. Vijayaraghavan, R.M. Arieth, K. Geethanjali, Proof of retrievability: a third party auditor using cloud computing. Int. J.␣Emerg. Technol. Adv. Eng. ISO 9001:2008 Certified J. 3(7) (2013) U. Vijayaraghavan, R.M. Arieth, K. Geethanjali, Proof of retrievability: a third party auditor using cloud computing. Int. J.␣Emerg. Technol. Adv. Eng. ISO 9001:2008 Certified J. 3(7) (2013)
6.
go back to reference S.V. Marshal, Secure audit service by using TPA for data integrity in cloud system. Int. J.␣Innovative Technol. Exploring Eng. (IJITEE) 3(4) (2013) S.V. Marshal, Secure audit service by using TPA for data integrity in cloud system. Int. J.␣Innovative Technol. Exploring Eng. (IJITEE) 3(4) (2013)
7.
go back to reference S. Han, J. Xing, Ensuring data storage security through a novel third party auditor scheme in cloud computing, in Proceedings of IEEE CCIS (2011) S. Han, J. Xing, Ensuring data storage security through a novel third party auditor scheme in cloud computing, in Proceedings of IEEE CCIS (2011)
8.
go back to reference M. Hussain, H. Abdulsalam, SECaaS: security as a service for cloud-based applications M. Hussain, H. Abdulsalam, SECaaS: security as a service for cloud-based applications
9.
go back to reference V. Vinaya, P. Sumathi, Implementation of effective third party auditing for data security in cloud. Int. J.␣Adv. Res. Comput. Sci. Softw. Eng. 3(5) (2013) V. Vinaya, P. Sumathi, Implementation of effective third party auditing for data security in cloud. Int. J.␣Adv. Res. Comput. Sci. Softw. Eng. 3(5) (2013)
10.
go back to reference T.J. Salma, A flexible distributed storage integrity auditing mechanism in cloud computing T.J. Salma, A flexible distributed storage integrity auditing mechanism in cloud computing
11.
go back to reference J. Xu, Auditing the Auditor: Secure Delegation of Auditing Operation Over Cloud Storage (National University of Singapore, Singapore) J. Xu, Auditing the Auditor: Secure Delegation of Auditing Operation Over Cloud Storage (National University of Singapore, Singapore)
12.
go back to reference L.D. Dhinesh Babu, P. Venkata Krishna, Versatile time-cost algorithm (VTCA) for scheduling non-preemptive tasks of time critical workflows in cloud computing systems. Int. J.␣Commun. Netw. Distrib. Syst. 11(4), 390–411 (2013) L.D. Dhinesh Babu, P. Venkata Krishna, Versatile time-cost algorithm (VTCA) for scheduling non-preemptive tasks of time critical workflows in cloud computing systems. Int. J.␣Commun. Netw. Distrib. Syst. 11(4), 390–411 (2013)
Metadata
Title
Enhanced Security Framework for Data Integrity Using Third-party Auditing in the Cloud System
Authors
Balamurugan Balusamy
P. Venkatakrishna
Abinaya Vaidhyanathan
Meenakshi Ravikumar
Nirmala Devi Munisamy
Copyright Year
2015
Publisher
Springer India
DOI
https://doi.org/10.1007/978-81-322-2135-7_4

Premium Partner