scholarly journals PRIVACY PRESERVING ADVANCED SECURITY ON UNTRUSTED CLOUD WITH SELF BACKUP PROCESS

2017 ◽  
Vol 5 (4) ◽  
pp. 176-181
Author(s):  
Sadeer Dheyaa Abdulameer

Cloud Storage service are frequently required for many corporate and government organizations. Most of cloud storage service providers are un-trusted, so it is not safe to keep the data in cloud for long period. Many are using cloud storage for data sharing that means it is not possible to send a big file in email, maximum 25 GB are allowed, for big files, files are uploaded in cloud storage and link is given to the data consumer. After Data consumer download the file, Data owner has to delete the file from the cloud for the security reasons, but most of time Data Owner forget to delete the file. To overcome this problem data self-destruction is proposed in many papers and now proposed system has Self-Destruction cum Self-Backup Process, which help the file to stay in the public cloud for certain period of times and it will be removed from the cloud storage and securely stored in another storage.  To verify the integrity of the file HMAC is created while file is uploaded and Data Consumer can able to download the file and generate the HMAC, check the integrity of the file.

2018 ◽  
Vol 2018 ◽  
pp. 1-16 ◽  
Author(s):  
Cheolhee Park ◽  
Hyunil Kim ◽  
Dowon Hong ◽  
Changho Seo

Over the recent years, cloud storage services have become increasingly popular, where users can outsource data and access the outsourced data anywhere, anytime. Accordingly, the data in the cloud is growing explosively. Among the outsourced data, most of them are duplicated. Cloud storage service providers can save huge amounts of resources via client-side deduplication. On the other hand, for safe outsourcing, clients who use the cloud storage service desire data integrity and confidentiality of the outsourced data. However, ensuring confidentiality and integrity in the cloud storage environment can be difficult. Recently, in order to achieve integrity with deduplication, the notion of deduplicatable proof of storage has emerged, and various schemes have been proposed. However, previous schemes are still inefficient and insecure. In this paper, we propose a symmetric key based deduplicatable proof of storage scheme, which ensures confidentiality with dictionary attack resilience and supports integrity auditing based on symmetric key cryptography. In our proposal, we introduce a bit-level challenge in a deduplicatable proof of storage protocol to minimize data access. In addition, we prove the security of our proposal in the random oracle model with information theory. Implementation results show that our scheme has the best performance.


2017 ◽  
Vol 26 (05) ◽  
pp. 1750072 ◽  
Author(s):  
Min-Shiang Hwang ◽  
Tsuei-Hung Sun ◽  
Cheng-Chi Lee

Recently, storage as a service of cloud computing becomes a new trend to access or share files. Once files are stored in cloud, owner can access files seamlessly by personal computer or mobile device. However, owner may worry about confidentiality and integrity of owner's files stored in cloud because cloud service providers are not always trustworthy. Therefore, there are many kinds of data correctness verification methods proposed to prevent cloud service providers from cheating data owners. Among these models for auditing, bilinear pairing can achieve the most efficient way to verify data correctness and batch auditing. Although auditing methods can ensure whether data is stored properly, it is not considered that the data may be a secret data or a data owner does not want to be known by both auditors and cloud service providers. Another important issue is providing dynamic data of auditing in cloud. Wang et al.13 proposed a scheme that can provide public auditing and dynamic data, but it still cannot guarantee whether cloud has updated data honestly. For this reason, we propose a dynamic data guarantee and data confidentiality scheme for public auditing in cloud storage service.


Author(s):  
Neha Thakur ◽  
Aman Kumar Sharma

Cloud computing has been envisioned as the definite and concerning solution to the rising storage costs of IT Enterprises. There are many cloud computing initiatives from IT giants such as Google, Amazon, Microsoft, IBM. Integrity monitoring is essential in cloud storage for the same reasons that data integrity is critical for any data centre. Data integrity is defined as the accuracy and consistency of stored data, in absence of any alteration to the data between two updates of a file or record.  In order to ensure the integrity and availability of data in Cloud and enforce the quality of cloud storage service, efficient methods that enable on-demand data correctness verification on behalf of cloud users have to be designed. To overcome data integrity problem, many techniques are proposed under different systems and security models. This paper will focus on some of the integrity proving techniques in detail along with their advantages and disadvantages.


2016 ◽  
Vol 24 (2) ◽  
pp. 57-74 ◽  
Author(s):  
Chen-Shu Wang ◽  
Cheng-Yu Lai ◽  
Shiang-Lin Lin

In recent year, mobile devices have become an indispensable product in our daily life. Extensive amount of mobile applications (Apps) have been developed and used on these devices. Restated, in terms of the Apps future development and popularization, to understand why people have willingness to pay for use certain Apps has apparently became an important issue. However, there are various homogeneity Apps, which people can easily find some free succedaneum for use. Consequently, it would be an interesting issue to realize individual's intention to pay for use the Apps. In this study, the authors conducted a survey in Taiwan to realize individuals' willingness to pay for Cloud Storage Service (CSS), since CSS is one of the frequently adopted App for most mobile device users. The results show that both the perceived service quality and conformity positively affect the perceived value and then increases the user's willingness to pay indirectly. In addition, the findings also support that the users' product knowledge about CSS produce negative moderating effects on the perceived value and the willingness of pay.


2017 ◽  
pp. 197-219 ◽  
Author(s):  
Surya Nepal ◽  
Shiping Chen ◽  
Jinhui Yao

Sign in / Sign up

Export Citation Format

Share Document