Provable Data Possession in Cloud Computing

2014 ◽  
Vol 513-517 ◽  
pp. 1406-1413
Author(s):  
Tan Shuang ◽  
Jian Feng Zhang ◽  
Zhi Kun Chen

Several trends are opening up the era of cloud computing. It moves the application software and databases to the centralized large data centers, where the management of the data and services may not be fully trustworthy. This work studies the problem of ensuring the integrity of data storage in cloud computing. We use RSAs homomorphic property to construct the protocol of provable data possession. In our protocol, we can aggregate multiple Provable Data possession into one, and reduce the overhead of communication. While prior work on ensuring remote data integrity often lacks the specific implementations, this paper achieves an effective proof of storage protocol. Extensive security and performance analysis show that the proposed scheme is highly efficient and provably secure.

2010 ◽  
Vol 44-47 ◽  
pp. 3726-3730
Author(s):  
Jian Hong Zhang ◽  
Xue Liu ◽  
Cheng Lian Liu

At present, Cloud computing is becoming a hot topic in the field of research and applications. It moves the application software and databases to the centralized large data centers, where the management of the data and services may not be fully trustworthy. However,this unique paradigm brings about many new security challenges, which have not been well understood. As such, it has become crucial for an archive service to be capable of providing evidence to demonstrate the integrity of data stored in it. This work studies the problem of ensuring the integrity of data storage in Cloud Computing.


2014 ◽  
Vol 989-994 ◽  
pp. 5000-5003
Author(s):  
Yi Huang ◽  
Xin Qiang Ma ◽  
You Yuan Liu ◽  
Dan Ning Li

Cloud computing represents one of the most significant shifts in information technology many of us are likely to see in our lifetimes. It offers an innovative business model for organizations to adopt IT services without upfront investment. Cloud computing moves the application software and databases to large data centers, where the management of the data and services may not be fully trustworthy. Security is one of the major issues which hamper the growth of cloud. The security for cloud computing is emerging area for study and this paper provide technical components of cloud computing and security idea in terms of cloud computing based on analysis of cloud security treats.


2018 ◽  
Vol 7 (4.6) ◽  
pp. 13
Author(s):  
Mekala Sandhya ◽  
Ashish Ladda ◽  
Dr. Uma N Dulhare ◽  
. . ◽  
. .

In this generation of Internet, information and data are growing continuously. Even though various Internet services and applications. The amount of information is increasing rapidly. Hundred billions even trillions of web indexes exist. Such large data brings people a mass of information and more difficulty discovering useful knowledge in these huge amounts of data at the same time. Cloud computing can provide infrastructure for large data. Cloud computing has two significant characteristics of distributed computing i.e. scalability, high availability. The scalability can seamlessly extend to large-scale clusters. Availability says that cloud computing can bear node errors. Node failures will not affect the program to run correctly. Cloud computing with data mining does significant data processing through high-performance machine. Mass data storage and distributed computing provide a new method for mass data mining and become an effective solution to the distributed storage and efficient computing in data mining. 


2013 ◽  
Vol 278-280 ◽  
pp. 1767-1770 ◽  
Author(s):  
Guo You Chen ◽  
Jia Jia Miao ◽  
Feng Xie ◽  
Han Dong Mao

Cloud computing has been a hot researching area of computer network technology, since it was proposed in 2007. Cloud computing also has been envisioned as the next-generation architecture of IT Enterprise [1]. Cloud computing infrastructures enable companies to cut costs by outsourcing computations on-demand. It moves the application software and database to the large data centers, where the management of the data and services may not be fully trustworthy [2]. This poses many new security challenges. In this paper, we just focus on data storage security in the cloud, which has been the most important aspect of quality of service. To ensure the confidentiality and integrity of user’s data in the cloud, and support of data dynamic operations, such as modification, insertion and deletion, we propose a framework for storage security, which includes cryptographic storage scheme and data structure. With our framework, the untrusted server cannot learn anything about the plaintext, and the dynamic operation can be finished in short time. The encryption algorithm and data storage structure is simple, and it’s easy to maintain. Hence, our framework is practical to use today.


Author(s):  
Paul T. Jaeger ◽  
Jimmy Lin ◽  
Justin M. Grimes ◽  
Shannon N. Simmons

Cloud computing – the creation of large data centers that can be dynamically provisioned, configured, and reconfigured to deliver services in a scalable manner – places enormous capacity and power in the hands of users. As an emerging new technology, however, cloud computing also raises significant questions about resources, economics, the environment, and the law. Many of these questions relate to geographical considerations related to the data centers that underlie the clouds: physical location, available resources, and jurisdiction. While the metaphor of the cloud evokes images of dispersion, cloud computing actually represents centralization of information and computing resources in data centers, raising the specter of the potential for corporate or government control over information if there is insufficient consideration of these geographical issues, especially jurisdiction. This paper explores the interrelationships between the geography of cloud computing, its users, its providers, and governments.


2017 ◽  
Vol 27 (4) ◽  
Author(s):  
Hassan Hadi Saleh

The security of data storage in “cloud” is big challenge because the data keep within resources that may be accessed by particular machines. The managing of these data and services may not be high reliable. Therefore, the security of data is highly challenging. To increase the security of data in data center of cloud, we have introduced good method to ensure data security in “cloud computing” by methods of data hiding using color images which is called steganography. The fundamental objective of this paper is to prevent "Data Access” by unauthorized or opponent users. This scheme stores data at data centers within edges of color images and retrieves data from it when it is wanted.


2010 ◽  
Vol 44-47 ◽  
pp. 3299-3303 ◽  
Author(s):  
Ming Ye ◽  
Jun Zhou ◽  
Da Fei Xia ◽  
Wei Yao Jia

Cloud computing, which refers to an emerging computing model where machines in large data centers can be used to deliver services in a scalable manner, has become popular for corporations in need of inexpensive, large scale computing. Recently, However, the study of integrated solving strategy is rare. In this paper, we propose a novel integrated solving strategy for cloud computing. For this purpose, we present cloud computing architectures , platforms, and applications to deliver services and meet the needs of their constituents and information and services supported by this integrated solving strategy. At the same time ,this paper also argues that we focused on cloud computing integrated solving stratrgy is an essential part of the government IT environment.


Sign in / Sign up

Export Citation Format

Share Document