Prevention of MITM Attacks in Cloud Computing by Lock Box Approach Using Digital Signature

Author(s):  
Suman Yadav ◽  
◽  
Anoop Jaysawal ◽  

Cloud computing is one of the important business models in the modern Information Technology. It provides various services (hardware, software) to the users with minimal interaction and low-cost. Storage service is one of the most useful services in cloud computing, which move data owners data from local computing system to the cloud. In this paradigm, once the data moves from the local computing system to the cloud, the data owner lost the physical control of the outsourced data on the cloud. So that, storage service creates data security challenges. Therefore, the integrity of the outsourced data has to be verified frequently using public or private verification method. In this paper we focus on two data security concern such as data confidentiality and remote data integrity on cloud storage system. In order to ensure the data integrity and reduce the data owners computational resources, in this work we have proposed a remote data integrity auditing methods such as Remote Data Audit using Protocol(RDAP) and Remote Data Audit using Digital Signature (RDADS) methods. To analyze the performance of the system, first, we define the single data owner on multiple servers and then multiple data owners on a single server for public data verification. Besides, these methods not only verify the integrity of data, but also detect the invalid data block during the verification process.


2013 ◽  
Vol 411-414 ◽  
pp. 1062-1066
Author(s):  
Yue Yue Yu ◽  
Su Quan Qin ◽  
Qiao Yan Wen

Cloud computing provides means of increasing the capacity or adding the capabilities which releases the heavy data user. It provides gigantic storage for data and faster computing to the customers on the internet. It transfers database and application software from the data owner to the cloud where management and maintenance of data take place. Security of data in cloud is one of the major issues which acts as an obstacle in the development of cloud computing. In this paper, an efficient model is proposed to protect the data in the process of transferring data to the cloud and get the data from the cloud. We take many precautions and measures to guarantee the security of data. To shield owners data from the malicious third party, RSA is used to encrypt data to cipher text. Because it is difficult to search data from the encrypted data, we take the technique of index the document by the keyword and then encrypt the index and send index with encrypted original data. To check the integrity of data, digital signature is taken to identify modifications of data. This article also introduces the concrete the underlying datacenter structure named Megastore and how Megastore functions seamlessly width owners while owners store data and retrieve data from the underlying datacenter. Megastore stores fine-gained partitions of data into different datacenters and the partitioning allows us to synchronously replicate each write to across wide area with reasonable latency and support seamless failover between different datacenters.


Author(s):  
Fati Larosa ◽  
◽  
Jimmy Naibaho ◽  
Romeo Tarigan

GBKP km 8 Padang Bulan Medan mempunyai kendala dalam memonitor, mengatur, dan mengelola data secara cepat, efektif dan efisien, yang selama ini masih bersifat konvensional sehingga mengakibatkan tingginya biaya operasional. Pembangunan aplikasi web storage berbasis private cloud, dimaksudkan untuk menjawab kesulitan di atas. Konsep private cloud computing harus mengedepankan faktor keamanan file-file yang disimpan pada server private cloud tersebut dengan menggunakan salah satu algoritma yakni SHA1. SHA1 digunakan sebagai autentikasi, integritas dan digital signature. Akses terhadap web storage melalui koneksi intranet secara Local Area Network.


Sign in / Sign up

Export Citation Format

Share Document