Skip to main content
Erschienen in: Wireless Personal Communications 2/2016

01.09.2016

Renaissance System Model Improving Security and Third Party Auditing in Cloud Computing

verfasst von: K. Loheswaran, J. Premalatha

Erschienen in: Wireless Personal Communications | Ausgabe 2/2016

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cloud computing is the developing design of IT enterprise. Applications and the services that are present over the Internet are referred by the cloud computing. Critical issues on security and trust based are often a major problem in cloud computing. Different levels of security enforcement are offered by both public and private clouds. Auditing plays a vital role in evaluating an individual, process, system, product or an enterprise. A renaissance system model has been proposed for secure data storage in cloud. The proposed model involves four entities: Data owners, the cloud, cloud service provider and third party auditor (TPA). The TPA has the ability to create the awareness in order to bring out the public audits in the cloud having the coded data. The outcome seems to be trusted and is impartial for both the cloud servers and the data owners. The proposed model is a semi trusted proxy agent that performances instead of the data owner in order to reinstate the data blocks that are obtained during the repair process. Renaissance system model is proposed and implemented into the test bed.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Dimakis, A. G., Ramchandran, K., Wu, Y., & Suh, C. (2011). A survey on network codes for distributed storage. Proceedings of the IEEE, 99(3), 476–489.CrossRef Dimakis, A. G., Ramchandran, K., Wu, Y., & Suh, C. (2011). A survey on network codes for distributed storage. Proceedings of the IEEE, 99(3), 476–489.CrossRef
2.
Zurück zum Zitat Lopez, J. M., Ruebsamen, T., & Westhoff, D. (2014). Privacy-friendly cloud audits with somewhat homomorphic and searchable encryption. Hochschule Furtwangen University Furtwangen, Germany. Lopez, J. M., Ruebsamen, T., & Westhoff, D. (2014). Privacy-friendly cloud audits with somewhat homomorphic and searchable encryption. Hochschule Furtwangen University Furtwangen, Germany.
3.
Zurück zum Zitat Hwang, K., Fox, G., & Dongarra, J. (2010). Distributed systems and cloud computing: Clusters, Grids/P2P, and Internet Clouds. Burlington: Morgan Kaufmann. Hwang, K., Fox, G., & Dongarra, J. (2010). Distributed systems and cloud computing: Clusters, Grids/P2P, and Internet Clouds. Burlington: Morgan Kaufmann.
4.
Zurück zum Zitat Chen, B., Curtmola, R., Ateniese, G., & Burns, R. (2010). Remote data checking for network coding-based distributed storage systems. In Proceedings of the 2010 ACM workshop on cloud computing security workshop (pp. 31–42). ACM. Chen, B., Curtmola, R., Ateniese, G., & Burns, R. (2010). Remote data checking for network coding-based distributed storage systems. In Proceedings of the 2010 ACM workshop on cloud computing security workshop (pp. 31–42). ACM.
5.
Zurück zum Zitat Wang, C., Wang, Q., Ren, K., & Lou, W. (2010). Privacy preserving public auditing for data storage security in cloud computing. In INFOCOM, 2010 Proceedings IEEE (pp. 1–9). IEEE. Wang, C., Wang, Q., Ren, K., & Lou, W. (2010). Privacy preserving public auditing for data storage security in cloud computing. In INFOCOM, 2010 Proceedings IEEE (pp. 1–9). IEEE.
6.
Zurück zum Zitat Kuyoro, S. O., Ibikunle, F., & Awodele, O. (2011). Cloud Computing security issues and challenges. International Journal of Computer Networks, 3(5), 247–255. Kuyoro, S. O., Ibikunle, F., & Awodele, O. (2011). Cloud Computing security issues and challenges. International Journal of Computer Networks, 3(5), 247–255.
7.
Zurück zum Zitat Ateniese, G., Di Pietro, R., Mancini, L. V., & Tsudik, G. (2008). Scalable and efficient provable data possession. In Proceedings of the 4th international conference on Security and privacy in communication networks. ACM. Ateniese, G., Di Pietro, R., Mancini, L. V., & Tsudik, G. (2008). Scalable and efficient provable data possession. In Proceedings of the 4th international conference on Security and privacy in communication networks. ACM.
8.
Zurück zum Zitat Bugiel, S., Nurnberger, S., Sadeghi, A.-R., & Schneider, T. (2011). Twin clouds: Secure cloud computing with low latency. Germany: CASED. Bugiel, S., Nurnberger, S., Sadeghi, A.-R., & Schneider, T. (2011). Twin clouds: Secure cloud computing with low latency. Germany: CASED.
9.
Zurück zum Zitat Chen, H., & Lee, P. (2014). Enabling data integrity protection in regenerating-coding-based cloud storage: Theory and implementation. IEEE Transactions on Parallel and Distributed Systems, 25(2), 407–416.CrossRef Chen, H., & Lee, P. (2014). Enabling data integrity protection in regenerating-coding-based cloud storage: Theory and implementation. IEEE Transactions on Parallel and Distributed Systems, 25(2), 407–416.CrossRef
10.
Zurück zum Zitat Li, L., Xu, L., Li, J., & Zhang, C. (2011). Study on the third-party audit in cloud storage service. In International conference on cloud and service computing. Li, L., Xu, L., Li, J., & Zhang, C. (2011). Study on the third-party audit in cloud storage service. In International conference on cloud and service computing.
11.
Zurück zum Zitat Hwang, K., Kulkarni, S., & Hu, Y. (2009). Cloud security with virtualized defense and reputation-based trust management. In IEEE Int’l conference dependable, autonomic, and secure computing (DASC 09), IEEE CS Press. Hwang, K., Kulkarni, S., & Hu, Y. (2009). Cloud security with virtualized defense and reputation-based trust management. In IEEE Int’l conference dependable, autonomic, and secure computing (DASC 09), IEEE CS Press.
12.
Zurück zum Zitat Parwekar, P., Kumar, P., Saxena, M., & Saxena, S. (2014). Public auditing: Cloud data storage. In International conference on 5th 2014. Parwekar, P., Kumar, P., Saxena, M., & Saxena, S. (2014). Public auditing: Cloud data storage. In International conference on 5th 2014.
13.
Zurück zum Zitat Li, X., Li, W., & Shi, D. (2015). Enterprise private cloud file encryption system based on tripartite secret key protocol. In International industrial informatics and computer engineering conference (pp. 166–169). Atlantis Press. Li, X., Li, W., & Shi, D. (2015). Enterprise private cloud file encryption system based on tripartite secret key protocol. In International industrial informatics and computer engineering conference (pp. 166–169). Atlantis Press.
14.
Zurück zum Zitat Li, M., Yu, S., Ren, K., & Lou, W. (2010). Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings. In Security and privacy in communication networks, proceedings of 6th international. conference on security privacy communication network. Li, M., Yu, S., Ren, K., & Lou, W. (2010). Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings. In Security and privacy in communication networks, proceedings of 6th international. conference on security privacy communication network.
15.
Zurück zum Zitat Wang, C., Chow, S. S. M., Wang, Q., Ren, K., & Lou, W. (2013). Privacy preserving public auditing for secure cloud storage. IEEE Transactions on Computers, 62(2), 362–375.MathSciNetCrossRef Wang, C., Chow, S. S. M., Wang, Q., Ren, K., & Lou, W. (2013). Privacy preserving public auditing for secure cloud storage. IEEE Transactions on Computers, 62(2), 362–375.MathSciNetCrossRef
16.
Zurück zum Zitat Nick, J. (2010). Journey to the private cloud: Security and compliance. Tech. presentation, EMC, Tsinghua Univ., 25 May 2010. Nick, J. (2010). Journey to the private cloud: Security and compliance. Tech. presentation, EMC, Tsinghua Univ., 25 May 2010.
17.
Zurück zum Zitat Ye, C., & Reznik, A. (2007). Inter digital communications corporation King of Prussia. Group Secret Key Generation Algorithms 0701124v1 19 Jan 2007. Ye, C., & Reznik, A. (2007). Inter digital communications corporation King of Prussia. Group Secret Key Generation Algorithms 0701124v1 19 Jan 2007.
18.
Zurück zum Zitat Catteddu, D., & Hogben, G. (2009). Cloud computing: Benefits, risks and recommendations for information security. European Network and Information Security Agency (ENISA), Cete. Catteddu, D., & Hogben, G. (2009). Cloud computing: Benefits, risks and recommendations for information security. European Network and Information Security Agency (ENISA), Cete.
19.
Zurück zum Zitat Yang, K., & Jia, X. (2013). An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Transactions on Parallel and Distributed Systems, 24(9), 1717–1726.CrossRef Yang, K., & Jia, X. (2013). An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Transactions on Parallel and Distributed Systems, 24(9), 1717–1726.CrossRef
20.
Zurück zum Zitat Yu, J., Ren, K., Wang, C., & Varsdharajan, V. (2015). Enabling cloud storage auditing with key exposure resistance. IEEE Transaction on Information Forensics and Security, 10(6), 1167–1179. Yu, J., Ren, K., Wang, C., & Varsdharajan, V. (2015). Enabling cloud storage auditing with key exposure resistance. IEEE Transaction on Information Forensics and Security, 10(6), 1167–1179.
21.
Zurück zum Zitat Nafi, K. W., Kar, T. S., Hoque, S. A., & Hashem, M. M. A. (2012). A newer user authentication, file encryption and distributed server based cloud computing security architecture. International Journal of Advanced Computer Science and Applications, 3(10), 181–186. Nafi, K. W., Kar, T. S., Hoque, S. A., & Hashem, M. M. A. (2012). A newer user authentication, file encryption and distributed server based cloud computing security architecture. International Journal of Advanced Computer Science and Applications, 3(10), 181–186.
22.
Zurück zum Zitat Shacham, H., & Waters, B. (2008). Compact proofs of retrievability. In Proceedings of international conference on the theory and application of cryptology and information security (ASIACRYPT), 2008 (pp. 90–107). Shacham, H., & Waters, B. (2008). Compact proofs of retrievability. In Proceedings of international conference on the theory and application of cryptology and information security (ASIACRYPT), 2008 (pp. 90–107).
Metadaten
Titel
Renaissance System Model Improving Security and Third Party Auditing in Cloud Computing
verfasst von
K. Loheswaran
J. Premalatha
Publikationsdatum
01.09.2016
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 2/2016
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-016-3296-7

Weitere Artikel der Ausgabe 2/2016

Wireless Personal Communications 2/2016 Zur Ausgabe

Neuer Inhalt