Internet of Things and Cloud Computing

| Peer-Reviewed |

Secure Cloud Auditing Over Encrypted Data

Received: 08 February 2018    Accepted: 08 March 2018    Published: 13 April 2018
Views:       Downloads:

Share This Article

Abstract

Cloud computing is a popular technology which permits storing and accessing data over Internet instead of storing it on local machines’ hard drive. Cloud users can enable to store their data on cloud without any anxiety about its accuracy and reliability. However storing data on cloud imposes certain security challenges. Outsourcing data in cloud result may lose physical control over their data. Certain Cloud Service Providers (CSPs) may operate dishonestly with the cloud users’ data, they may sneak the data from cloud and sell it to third parties in order to earn profit. Even though outsourcing data on cloud is inexpensive and reduces long duration storage and maintenance complexity, there is least assurance of data integrity, privacy, security and availability on cloud servers. A number of solutions have been recommended to solve the security issues in cloud. This paper mainly focuses on the integrity verification strategy for outsourced data. The proposed scheme combines the encrypting mechanism.

DOI 10.11648/j.iotcc.20180601.14
Published in Internet of Things and Cloud Computing (Volume 6, Issue 1, March 2018)
Page(s) 25-35
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2024. Published by Science Publishing Group

Keywords

Cloud Computing, Data Encryption, Security, Cloud Audit, Cloud Service Provider

References
[1] Sarah sheikh and Deepali vora, “Secure cloud auditing over encrypted data”, IEEE transactions on information forensics and security, Vol. 11, No. 6, Mar 2017, PP: 1-5.
[2] Kalyani sonaware and Rahul dagade, “A survey on multi-key word ranked search over encrypted cloud data with multiple data owners”, International journal of computer applications, Vol. 162, No. 11, Mar 2017, PP:9-12.
[3] Swapnali and Snagita chaudhari, “Third party public auditing scheme for cloud storage”, 7th International conference on communication, computing and virtualized 2016, PP: 69-76.
[4] Nitin nagar and Ugrasen suman, “Reliable & enhanced third party auditing in cloud server data storage”, International journal of security and its applications, Vol. 11, No. 7, 2017, PP: 59-71.
[5] Mahesh kumar, “Encrypted bigdata using AES deduplication in cloud storage”, International journal of engineering and computer science, Vol. 6, No. 7, July2017, PP: 21889-21894.
[6] Sweta k. parmer and K. C. Dave “Implementation of data encryption & decryption algorithm for information security”, International journal of advanced in science engineering and technology, Vol. 1, No. 2, Oct2013, PP: 7-10.
[7] Pitchaiah, Philemon Daniel & Praveen, “Implementation of advanced encryption standard algorithm”, International journal of engineering research, Vol. 3, No. 3, 2012, PP: 1-6.
[8] Vaishali Patil & Archana Lomte, “Implementation of privacy –preserving public auditing and secure searchable data cloud storage”, Vol. 3, No. 7, 2017, PP: 65-72.
[9] Karthika priya dharshini, Viji & Saravanan, “Seclusion search over encrypted data in cloud storage services”, Vol. 4, No. 3, Mar 2015, PP: 27-34.
[10] Evgeny Milanov, “The RSA Algorithm”, 3, June 2007, PP:1-11.
Author Information
  • Department of Master of Computer Applications, Vivekanandha College of Arts and Sciences for Women, Tiruchengode, India

  • Department of Master of Computer Applications, Vivekanandha College of Arts and Sciences for Women, Tiruchengode, India

Cite This Article
  • APA Style

    Yesu Ragavi Kannadasan, Rajagopal Devarajan. (2018). Secure Cloud Auditing Over Encrypted Data. Internet of Things and Cloud Computing, 6(1), 25-35. https://doi.org/10.11648/j.iotcc.20180601.14

    Copy | Download

    ACS Style

    Yesu Ragavi Kannadasan; Rajagopal Devarajan. Secure Cloud Auditing Over Encrypted Data. Internet Things Cloud Comput. 2018, 6(1), 25-35. doi: 10.11648/j.iotcc.20180601.14

    Copy | Download

    AMA Style

    Yesu Ragavi Kannadasan, Rajagopal Devarajan. Secure Cloud Auditing Over Encrypted Data. Internet Things Cloud Comput. 2018;6(1):25-35. doi: 10.11648/j.iotcc.20180601.14

    Copy | Download

  • @article{10.11648/j.iotcc.20180601.14,
      author = {Yesu Ragavi Kannadasan and Rajagopal Devarajan},
      title = {Secure Cloud Auditing Over Encrypted Data},
      journal = {Internet of Things and Cloud Computing},
      volume = {6},
      number = {1},
      pages = {25-35},
      doi = {10.11648/j.iotcc.20180601.14},
      url = {https://doi.org/10.11648/j.iotcc.20180601.14},
      eprint = {https://download.sciencepg.com/pdf/10.11648.j.iotcc.20180601.14},
      abstract = {Cloud computing is a popular technology which permits storing and accessing data over Internet instead of storing it on local machines’ hard drive. Cloud users can enable to store their data on cloud without any anxiety about its accuracy and reliability. However storing data on cloud imposes certain security challenges. Outsourcing data in cloud result may lose physical control over their data. Certain Cloud Service Providers (CSPs) may operate dishonestly with the cloud users’ data, they may sneak the data from cloud and sell it to third parties in order to earn profit. Even though outsourcing data on cloud is inexpensive and reduces long duration storage and maintenance complexity, there is least assurance of data integrity, privacy, security and availability on cloud servers. A number of solutions have been recommended to solve the security issues in cloud. This paper mainly focuses on the integrity verification strategy for outsourced data. The proposed scheme combines the encrypting mechanism.},
     year = {2018}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - Secure Cloud Auditing Over Encrypted Data
    AU  - Yesu Ragavi Kannadasan
    AU  - Rajagopal Devarajan
    Y1  - 2018/04/13
    PY  - 2018
    N1  - https://doi.org/10.11648/j.iotcc.20180601.14
    DO  - 10.11648/j.iotcc.20180601.14
    T2  - Internet of Things and Cloud Computing
    JF  - Internet of Things and Cloud Computing
    JO  - Internet of Things and Cloud Computing
    SP  - 25
    EP  - 35
    PB  - Science Publishing Group
    SN  - 2376-7731
    UR  - https://doi.org/10.11648/j.iotcc.20180601.14
    AB  - Cloud computing is a popular technology which permits storing and accessing data over Internet instead of storing it on local machines’ hard drive. Cloud users can enable to store their data on cloud without any anxiety about its accuracy and reliability. However storing data on cloud imposes certain security challenges. Outsourcing data in cloud result may lose physical control over their data. Certain Cloud Service Providers (CSPs) may operate dishonestly with the cloud users’ data, they may sneak the data from cloud and sell it to third parties in order to earn profit. Even though outsourcing data on cloud is inexpensive and reduces long duration storage and maintenance complexity, there is least assurance of data integrity, privacy, security and availability on cloud servers. A number of solutions have been recommended to solve the security issues in cloud. This paper mainly focuses on the integrity verification strategy for outsourced data. The proposed scheme combines the encrypting mechanism.
    VL  - 6
    IS  - 1
    ER  - 

    Copy | Download

  • Sections