Check De-duplication on Dependable Data Outsourcing with Three Error Detecting Techniques on Cloud Computing

2020 ◽  
Author(s):  
Vishal Satish Walunj ◽  
Ninad More ◽  
Thaksen J. Parvat
Author(s):  
Kayalvili S ◽  
Sowmitha V

Cloud computing enables users to accumulate their sensitive data into cloud service providers to achieve scalable services on-demand. Outstanding security requirements arising from this means of data storage and management include data security and privacy. Attribute-based Encryption (ABE) is an efficient encryption system with fine-grained access control for encrypting out-sourced data in cloud computing. Since data outsourcing systems require flexible access control approach Problems arises when sharing confidential corporate data in cloud computing. User-Identity needs to be managed globally and access policies can be defined by several authorities. Data is dual encrypted for more security and to maintain De-Centralization in Multi-Authority environment.


2018 ◽  
Vol 19 (4) ◽  
pp. 351-360
Author(s):  
Prabu S ◽  
Gpinath Ganapathy ◽  
Ranjan Goyal

Cloud computing is an evolving computing technology that provides many services such as software and storage. With the introduction of cloud storage, the security of outsourced data has become a major issue in cloud computing. Data storage in cloud computing environment needs to be secured in order to provide a safe and foolproof security for data outsourcing of the cloud service users. This paper presents a model for security of data in public cloud storage environment which successfully detects the unauthenticated access or any anomaly in the data. The proposed authentication model along with the data security model presented in this paper shows that this model is the best model suitable for securing the data in cloud computing environment


2020 ◽  
Vol 10 (1) ◽  
pp. 64-84 ◽  
Author(s):  
Shweta Kaushik ◽  
Charu Gandhi

Cloud computing has introduced a paradigm which support data outsourcing to third parties for processing using commodity clusters. It allows the owner to outsource sensitive data and share it with the authorized user while reducing the computation and management cost. Since owners store sensitive data over the cloud, the requirements of access control and data security have also been increasing. To alleviate all the problem requirements, the need has arisen for providing a safe, secure, and sound model. The existing solutions for these problems use pure cryptographic techniques, which increases the computation cost. In this article, the security problems are solved by using a trusted third party and a quorum of key managers. A service provider is responsible for capability-based access control to ensure that only authorized users will be able to access the data. Whenever any data revocation is required, the data owner simply updates this information to the master key manager to revoke a specific number of shares. The model for the proposed work has been presented and its analysis shows how it introduces security features.


2019 ◽  
Vol 8 (2) ◽  
pp. 3405-3412 ◽  

Mobile Cloud computing is define as the new paradigm, and in this new paradigm computational power is on demand service and accessible through mobiles and tablets. When user decides to go towards cloud computing, there is a risk of losing control on his own data. So providing security of the data during transmission and when saved on the cloud storage is a major issue. Any application relying upon an emerging technology should consider the different possible threats. The principal reason why people are afraid of using Cloud technology is that data security and integrity among all other issues involved in Cloud technology constitute a great challenge. As data security issues, access control as well as key management are also a reason why Cloud technology is not widely adopted. In mobile cloud computing, the security related to data involving data integrity, confidentiality, availability and traceability is the most critical concern of cloud users. As now mobile cloud is changing how users used to work over the network, by helping them in terms of cost and reduction of tasks complexity. Hence, it is very important for the user to be ensured that the transmission of the data is secure, that the consistency as well as the storage of the data on the cloud provider side is secured. Hence the necessity for developing trust security model is demanding.


Author(s):  
Shaurya Gupta ◽  
Ramesh Chandra Poonia ◽  
Vijander Singh ◽  
Linesh Raja

The need for data outsourcing or database as a service (DaaS) is extremely important for any organization. In addition, data storage or data retrieval cost high especially for small companies. This chapter aims to study the various challenges in cloud computing communication issue. The chapter on multi-tiering a cloud emphasizes security enhancement due to the application of tiers in the cloud such that services availability is also improved. Cloud computing is a recent network trend for advanced communication systems. A lot of research led to the advancements in the areas of newer modes but multi-tiering a cloud is still an embarking issue for the researchers.


Sign in / Sign up

Export Citation Format

Share Document