A Review of Secure Cloud Storage-Based on Cloud Computing

Author(s):  
Piyush Aneja ◽  
Akhil Bhatia ◽  
Achyut Shankar

In cloud computing disseminated assets are shared by means of system in open condition. Subsequently client can without much of a stretch access their information from anyplace. Simultaneously exist protection and security problems because of numerous causes. Initial one is emotional improvement in system advances. Another is expanded interest for computing assets, which make numerous associations to reappropriate their information stockpiling. So there is a requirement for secure cloud stockpiling administration in open cloud condition where the supplier isn't a confided in one. Our research tends to various information security and protection assurance problems in a cloud computing condition and suggests a technique for giving diverse security administrations like validation, approval and classification alongside checking in postponement. 128 piece Advanced Cryptograph Standard (AES) is utilized to increment information security and classification. In this supported methodology information is encoded utilizing AES and afterward transferred on a cloud. The supported model uses Short Message Service (SMS) ready instrument with keeping away from unapproved access to client information.


2019 ◽  
Vol 8 (3) ◽  
pp. 2726-2730

Cloud computing has become a significant technology trend, and plenty of consultants expect that cloud computing can reshape data technology (IT) and also the IT marketplace. In this paper, we are suggesting a safety mechanism that provides open analysis on shared knowledge within the cloud. During this mechanism, the individual of the underwriter on every sq. in shared statistics are going to be hold on in private from open verifies, who can proficiently verify the shared records without improving the entire report. This mechanism can play out numerous comparing undertakings at the identical time instead of checking them separately. This framework provides a security saving options of open inspecting part for shared facts at intervals the cloud. we have a tendency to area unit mistreatment ring marks to make homomorphy authentication, so thereto, AN open verify will offer an summary on shared data while not obtaining the entire facts, but it cannot be understanding that who is the underwriter on every piece. To get the effectiveness of confirming numerous examining undertakings, we facilitate to increase our tool for better examining. Certainly, the tractability implies the capacity to gather administrator to find the person of the underwriter in the metadata of few great instances


Author(s):  
Neha Thakur ◽  
Aman Kumar Sharma

Cloud computing has been envisioned as the definite and concerning solution to the rising storage costs of IT Enterprises. There are many cloud computing initiatives from IT giants such as Google, Amazon, Microsoft, IBM. Integrity monitoring is essential in cloud storage for the same reasons that data integrity is critical for any data centre. Data integrity is defined as the accuracy and consistency of stored data, in absence of any alteration to the data between two updates of a file or record.  In order to ensure the integrity and availability of data in Cloud and enforce the quality of cloud storage service, efficient methods that enable on-demand data correctness verification on behalf of cloud users have to be designed. To overcome data integrity problem, many techniques are proposed under different systems and security models. This paper will focus on some of the integrity proving techniques in detail along with their advantages and disadvantages.


Author(s):  
Kirti A. Dongre ◽  
Roshan Singh Thakur ◽  
Allan Abraham

Author(s):  
M A Manazir Ahsan ◽  
Ihsan Ali ◽  
Muhammad Imran ◽  
Mohd. Yamani Idna Idris ◽  
Suleman Khan ◽  
...  

2017 ◽  
pp. 197-219 ◽  
Author(s):  
Surya Nepal ◽  
Shiping Chen ◽  
Jinhui Yao

Sign in / Sign up

Export Citation Format

Share Document