A Review of Approaches to Achieve Data Storage Correctness in Cloud Computing Using Trusted Third Party Auditor

Author(s):  
Hiren Patel ◽  
Dhiren Patel
2014 ◽  
Vol 13 (7) ◽  
pp. 4625-4632
Author(s):  
Jyh-Shyan Lin ◽  
Kuo-Hsiung Liao ◽  
Chao-Hsing Hsu

Cloud computing and cloud data storage have become important applications on the Internet. An important trend in cloud computing and cloud data storage is group collaboration since it is a great inducement for an entity to use a cloud service, especially for an international enterprise. In this paper we propose a cloud data storage scheme with some protocols to support group collaboration. A group of users can operate on a set of data collaboratively with dynamic data update supported. Every member of the group can access, update and verify the data independently. The verification can also be authorized to a third-party auditor for convenience.


2018 ◽  
Vol 8 (2) ◽  
pp. 66-95 ◽  
Author(s):  
Adil Maarouf ◽  
Youssef Mifrah ◽  
Abderrahim Marzouk ◽  
Abdelkrim Haqiq

This article describes how currently, service level agreements (SLAs) assurance forms one of the major challenges for cloud computing (CC) in order to guarantee quality of service (QoS) in real-time and control SLA violations. However, due to the highly dynamic nature of this open environment, it is important to have a binding agreement between all the service parties for ensuring trust while fulfilling the expected QoS. To properly operate and manage such complex situations, an effective and efficient monitoring is crucial. The participation of a trusted third party (TTP) is necessary in order to resolve conflicts between involved parties. This article proposes an autonomic SLA monitoring framework managed by TTP composed of two modules: the first one SLA establishment module, which aims at providing support for automated SLA generation and management. The second one, a service monitoring module to dynamically monitor QoS metrics by detecting SLA violations at runtime to verify compliances for the respective SLAs, and to propose a mechanism for an adaptive remedy rectification, as a contribution at the third maturity level of the autonomic computing paradigm as defined by IBM. The framework is validated with scenarios on response time and availability, the results obtained are promising. They confirm that this framework manages SLAs in an efficient way as it detects all violations to be communicated to concerned parties, and identifies particular penalty clauses that can be used to modify the reputation of a provider over time. The TTP framework equipped with such reputation module can provide real-time assessment for consumers informed decision making to continue using a service or to migrate to another service provider in the case of service degradation. This creates a fair competitiveness between providers and hence improves service performance and the reliability in the cloud.


Author(s):  
Rohit Ranchal ◽  
Bharat Bhargava ◽  
Lotfi Ben Othmane ◽  
Leszek Lilien ◽  
Anya Kim ◽  
...  

Author(s):  
R.Santha Maria Rani ◽  
Dr.Lata Ragha

Cloud computing provides elastic computing and storage resource to users. Because of the characteristic the data is not under user’s control, data security in cloud computing is becoming one of the most concerns in using cloud computing resources. To improve data reliability and availability, Public data auditing schemes is used to verify the outsourced data storage without retrieving the whole data. However, users may not fully trust the cloud service providers (CSPs) because sometimes they might be dishonest. Therefore, to maintain the integrity of cloud data, many auditing schemes have been proposed. In this paper, analysis of various existing auditing schemes with their consequences is discussed.  Keywords: — Third Party Auditor (TPA), Cloud Service Provider (CSP), Merkle-Hash Tree (MHT), Provable data Possession (PDP), Dynamic Hash Table (DHT).


Author(s):  
Indu Malik ◽  
Sandhya Tarar

The cloud-based smart city is a way to provide resources and data on demand. Two technologies used to build cloud-based smart city, IoT, and cloud computing are explored. Using smart sensors can capture the movement of the environment, humans, and city infrastructure like building maintenance, traffic control, transportation, pollution monitoring. This is possible through IoT. Future movement could be predicted based on present and past data. Cloud computing is used for cloud storage. Using cloud, users can access resources in virtual mode at any time or anywhere. It can be accessed at different locations at the same time through high speed internet. Cloud is managed by a third party. Users don't have any knowledge regarding resource location and data, such as where user data is stored. Users use cloud service in virtual mode. Basically, cloud is a service provider platform that provides resources and data storage facility in a virtual way; users don't need to purchase resources.


2019 ◽  
Vol 16 (10) ◽  
pp. 4345-4349
Author(s):  
Latika Kakkar ◽  
Deepali Gupta ◽  
Sapna Saxena ◽  
Sarvesh Tanwar

The Internet of Things (IoT) comprises of various smart devices which are networked together to detect, accumulate, process, improve and interchange significant data over the Internet. IoT has improved our lifestyle by offering various applications such as intelligent home, smart healthcare, traffic monitoring and smart city devices. The IoT devices have restriction of power, battery life, memory and network constraints, so cloud can be used for accumulating and analyzing the IoT data. Due to the considerable increase in data transfer over Internet and other devices, the confidential information from the IoT sources required to be secure from any third party access. Cloud computing (CC) on the other side provides a protected, abrupt and advantageous data storage and computing services all over the internet. The integration of both these technologies can prove to be beneficial for each other. Therefore, we need an efficient and authentic method for secure communication in the IoT and cloud based big data environment. This paper provides a review of amalgamation of the IoT and cloud by featuring the implementation challenges and integration benefits.


Author(s):  
Kamlesh Sharma* ◽  
Nidhi Garg

Exercising a collection of similar numerous easy to get sources and resources over the internet is termed as Cloud Computing A Cloud storage system is basically a storage system over a large scale that consist of many independent storage servers. During recent years a huge changes and adoption is seen in cloud computing so security has become one of the major concerns in it. As Cloud computing works on third party system so security concern is there not only for customers but also for service providers. In this paper we have discussed about Cryptography i.e., encrypting messages into certain forms, it’s algorithms including symmetric and asymmetric algorithm and hashing, its architecture, and advantages of cryptography.


Sign in / Sign up

Export Citation Format

Share Document