A Secured Cloud Data Storage with Access Privileges

Author(s):  
Naresh Vurukonda ◽  
B. Thirumala Rao ◽  
B. Tirapathi Reddy

<p>In proposed framework client source information reinforcements off-site to outsider distributed storage benefits to decrease information administration costs. In any case, client must get protection ensure for the outsourced information, which is currently safeguarded by outsiders. To accomplish such security objectives, FADE is based upon an arrangement of cryptographic key operations that are self-kept up by a majority of key supervisors that are free of outsider mists. In unmistakable, FADE goes about as an overlay framework that works flawlessly on today's distributed storage administrations. Actualize a proof-of-idea model of FADE on Amazon S3, one of today's distributed storage administrations. My work oversee, esteem included security highlights acclimatize were today's distributed storage administration. our research work proceeds in ensuring the file access control and assured deletion in multi cloud environment and reducing the meta data management, there by the cloud storage become more attractive and many users will adopt the cloud space in order to diminish the data storage cost.</p>

Author(s):  
Naresh Vurukonda ◽  
B. Thirumala Rao ◽  
B. Tirapathi Reddy

<p>In proposed framework client source information reinforcements off-site to outsider distributed storage benefits to decrease information administration costs. In any case, client must get protection ensure for the outsourced information, which is currently safeguarded by outsiders. To accomplish such security objectives, FADE is based upon an arrangement of cryptographic key operations that are self-kept up by a majority of key supervisors that are free of outsider mists. In unmistakable, FADE goes about as an overlay framework that works flawlessly on today's distributed storage administrations. Actualize a proof-of-idea model of FADE on Amazon S3, one of today's distributed storage administrations. My work oversee, esteem included security highlights acclimatize were today's distributed storage administration. our research work proceeds in ensuring the file access control and assured deletion in multi cloud environment and reducing the meta data management, there by the cloud storage become more attractive and many users will adopt the cloud space in order to diminish the data storage cost.</p>


Cloud storage service is one of the vital function of cloud computing that helps cloud users to outsource a massive volume of data without upgrading their devices. However, cloud data storage offered by Cloud Service Providers (CSPs) faces data redundancy problems. The data de-duplication technique aims to eliminate redundant data segments and keeps a single instance of the data set, even if similar data set is owned by any number of users. Since data blocks are distributed among the multiple individual servers, the user needs to download each block of the file before reconstructing the file, which reduces the system efficiency. We propose a server level data recover module in the cloud storage system to improve file access efficiency and reduce network bandwidth utilization time. In the proposed method, erasure coding is used to store blocks in distributed cloud storage and The MD5 (Message Digest 5) is used for data integrity. Executing recover algorithm helps user to directly fetch the file without downloading each block from the cloud servers. The proposed scheme improves the time efficiency of the system and quick access ability to the stored data. Thus consumes less network bandwidth and reduces user processing overhead while data file is downloading.


Author(s):  
T.Ravi Kiran ◽  
◽  
G. Roshini ◽  
K.Swetha Harshini ◽  
G.Aparna Gayathri

Development of The cloud computing technology establishes a huge paradigm shift in the functional process of the IT industry. Since this new handling technology needs clients to believe in their useful information to reasoning providers, there have been enhancing security and comfort problems on shortened details. A few strategies using quality based security (ABE) have been prescribed for access administration of abbreviated subtle elements in thinking processing; be that as it may, the greater part of them experience from resoluteness in actualizing complex accessibility administration rules. The significant ones are capable of summing up with each other to develop vital variables and it could develop as traditional self-contained key, however covering the substantial number of keys being accumulated. In different terms, the key proprietor can discharge consistent size of separate key with proceedings of data for flexible alternatives of data that is composed of content set residing within the distributed storage space; however more significant and secured data documents which stay outside the set however kept classified. The lightly loaded overall key set could be the appropriate global pass to users which could be associated with a smart card with extremely confined safeguarded storage room. In our experiments evaluation official security examinations will provide to official cloud data storage events.


2015 ◽  
Vol 126 (4) ◽  
pp. 27-31
Author(s):  
Mandar Kadam ◽  
Stewyn Chaudhary ◽  
Bony Carvalho

2019 ◽  
Vol 7 (2) ◽  
pp. 144-147
Author(s):  
Manoj V. Bramhe ◽  
Dr. Milind V. Sarode ◽  
Dr. Meenakshi S. Arya

Author(s):  
Mohammed A. AlZain ◽  
Alice S. Li ◽  
Ben Soh ◽  
Mehedi Masud

Cloud computing is considered a great paradigm that enables access to large scale, on demand, flexible computing infrastructure. Lower infrastructure cost and better application performance are some of the benefits of utilizing a cloud computing model. With the appearance of the new generation of multi-cloud computing, clients can benefit from a diversity of services. However, data security has become an important requirement for clients when dealing with clouds that may fail due to faults in the software or hardware, or attacks from malicious insiders. Hence, building a highly dependable and reliable cloud system has become a critical research problem. To that end, this chapter investigates and presents the results in relation to that how Byzantine fault tolerance (BFT) and secure cloud data storage and sharing techniques can be deployed to manage multi-cloud data dependability faults.


Author(s):  
Nagesh Rajendra Salunke

Abstract: The concept of cloud computing becomes more popular in latest years. Data storage is very important and valuable research field in cloud computing. Cloud based file sharing is a file sharing security in cloud. The required security from unauthorized access of the file in the cloud is provided by the encryption and decryption function. The admin can provide file access option to the authorized users. This facility limits the number and time of access of the shared files by the admin for the authorized user. Cloud data storage technology is the core area in cloud computing and solves the data storage mode of cloud environment. This project introduces the concept of cloud computing and cloud storage as well as the architecture of cloud storage firstly. Then we analyze the cloud data storage technology amazon web services, wasabi, Digital Ocean etc. We will improve the traditional file storage method and we will make a platform which will get more privileges. Keywords: Cloud, Storage, AWS, Wasabi, File Management, Files Storage, Files Sharing, DMS, CMS, Drive store, Private Cloud.


Sign in / Sign up

Export Citation Format

Share Document