scholarly journals Deduplication for Cloud based on AES Algorithm

This paper provides and analyses a new scheme to address the issue of everlasting cloud storage access systems by providing AES Algorithm based solution. Addressing the issue of Data storage in the recent times is the aim of the paper and is being done using the recent AES Algorithm. Data security and time constraint for data retrival from the cloud server is also taken into account while implementing the scheme

2014 ◽  
Vol 556-562 ◽  
pp. 5395-5399
Author(s):  
Jian Hong Zhang ◽  
Wen Jing Tang

Data integrity is one of the biggest concerns with cloud data storage for cloud user. Besides, the cloud user’s constrained computing capabilities make the task of data integrity auditing expensive and even formidable. Recently, a proof-of-retrievability scheme proposed by Yuan et al. has addressed the issue, and security proof of the scheme was provided. Unfortunately, in this work we show that the scheme is insecure. Namely, the cloud server who maliciously modifies the data file can pass the verification, and the client who executes the cloud storage auditing can recover the whole data file through the interactive process. Furthermore, we also show that the protocol is vulnerable to an efficient active attack, which means that the active attacker is able to arbitrarily modify the cloud data without being detected by the auditor in the auditing process. After giving the corresponding attacks to Yuan et al.’s scheme, we suggest a solution to fix the problems.


In the cryptocurrency era, Blockchain is one of the expeditiously growing information technologies that help in providing security to the data. Data tampering and authentication problems generally occur in centralized servers while sharing and storing the data. Blockchain provides the platform for big data and cloud storage in enhancing the security by evading from pernicious users. In this paper, we have discussed the exhaustive description of blockchain and its need, features and applications. Analysis of blockchain is done for different domains such as big data, cloud, internet of things and mobile cloud where the differences V’s are compared with big data and blockchain. SWOT (Strength Weakness Opportunities Threats) analysis is performed to address the merits and limitations in blockchain technology. The survey in aspects of data security, data storage, data sharing and data authentication through blockchain technology is done and the challenges are discussed to overcome the problem that leads in big data and cloud storage. The detailed comparative analysis proves that the blockchain technology overcomes the problems in big data storage and data security in cloud.


Author(s):  
Taufik Hidayat ◽  
Rahutomo Mahardiko

Cloud computing is one revolution in information technology (IT) that can share resources, services and data through a network among users. Because users have same rights on the network to transfer data, data are vulnerable to be attacked by unauthorized person. Lately, data security in a system only concentrates on data storage on cloud by utilizing internet security, but a little concentration is found during data transfer. By considering security as a serious problem, an encryption-based proposed system is presented to secure during data transfer. Authors propose an approach to boost system security during data transfer in order to prevent data theft by unauthorized person. To prevent an attack by unauthorized person, Advanced Encryption Standard (AES) will be proposed to secure data transfer and storage in cloud computing. For better future, authors will propose Systematic Literature Review (SLR) to generate suggestions and opportunities in AES cloud computing.


2018 ◽  
Vol 19 (4) ◽  
pp. 351-360
Author(s):  
Prabu S ◽  
Gpinath Ganapathy ◽  
Ranjan Goyal

Cloud computing is an evolving computing technology that provides many services such as software and storage. With the introduction of cloud storage, the security of outsourced data has become a major issue in cloud computing. Data storage in cloud computing environment needs to be secured in order to provide a safe and foolproof security for data outsourcing of the cloud service users. This paper presents a model for security of data in public cloud storage environment which successfully detects the unauthenticated access or any anomaly in the data. The proposed authentication model along with the data security model presented in this paper shows that this model is the best model suitable for securing the data in cloud computing environment


2018 ◽  
Vol 7 (2.21) ◽  
pp. 331
Author(s):  
R Anandan ◽  
S Phani Kumar ◽  
K Kalaivani ◽  
P Swaminathan

Cloud based data storage has become a common activity these days. Because cloud storage offers more advantages than normal storage methods those are dynamic access and unlimited storage capabilities for pay and use. But the security of the data outsourced to the cloud is still challenging. The data owner should be capable of performing integrity verification as well as to perform data dynamics of his data stored in the cloud server. Various approaches like cryptographic techniques, proxy based solutions, code based analysis, homomorphic approaches and challenge response algorithms have been proposed. This survey depicts the limitations of the existing approaches and the requirements for a novel and enhanced approach that ensures integrity of the data stored in cloud enabling better performance with reduced complexity.  


2014 ◽  
Vol 912-914 ◽  
pp. 1160-1163
Author(s):  
Ning Wang

Cloud computer technology is one of current hot areas of the development of the information technology, and the data storage service based on the cloud is developing rapidly, which makes more and more enterprises and individuals enjoy the efficiency, convenience as well as low cost supplied by cloud storage. However, at the same time, the security problem of cloud storage arouses users' attention. This paper firstly expounds the basic information and system of cloud storage, then analyses the status quo of the development of cloud storage, and finally offers some preventive strategies based on cloud storage security.


2021 ◽  
Vol 309 ◽  
pp. 01189
Author(s):  
Srinu Banothu ◽  
A Govardhan ◽  
Karnam Madhavi

Cloud computing is a group of servers providing the on demand computing services to the users on rental basis. One of the services providing by the cloud is Data Storage as a Service. In Data Storage as a Service user will outsource their sensitive data to cloud storage environment, where the users data will be stored and whenever user needs data, they will access from the cloud storage from anywhere and anytime using any device connected to the internet. One of the critical issues in this is data security. When user outsources their sensitive data to cloud vendor, the cloud vendor may leak the user’s sensitive data to third persons because vendor is not a trusted party. To overcome these problems there are many authors suggested different security algorithms. In this research we studied and evaluating the performances of those security algorithms and proposing a better solution, which provides best security to data stored in cloud databases.


Author(s):  
Dr. Nikhat Akhtar ◽  
Dr. Bedine Kerim ◽  
Dr. Yusuf Perwej ◽  
Dr. Anurag Tiwari ◽  
Dr. Sheeba Praveen

People used to carry their documents about on CDs only a few years ago. Many people have recently turned to memory sticks. Cloud computing, in this case, refers to the capacity to access and edit data stored on remote servers from any Internet-connected platform. Cloud computing is a self-service Internet infrastructure that allows people to access computing resources at any location worldwide. The world has altered as a result of cloud computing. Cloud computing can be thought of as a new computing typology that can provide on-demand services at a low cost. By increasing the capacity and flexibility of data storage and providing scalable compute and processing power that fits the dynamic data requirements, cloud computing has aided the advancement of IT to higher heights. In the field of information technology, privacy and data security have long been a serious concern. It becomes more severe in the cloud computing environment because data is stored in multiple locations, often across the globe. Users' primary challenges regarding the cloud technology revolve around data security and privacy. We conduct a thorough assessment of the literature on data security and privacy issues, data encryption technologies, and related countermeasures in cloud storage systems in this study. Ubiquitous network connectivity, location-independent resource pooling, quick resource flexibility, usage-based pricing, and risk transference are all features of cloud computing.


The cloud storage with user facilities like great data storage quality, higher computing, scalable and flexible has been one of the major application of cloud computing. Large number of data holders is subcontracting the files to the cloud. The cloud server being a public domain is not very reliable thus the data holders are required to find a reliable and trustworthy way to check the ownership of the data files that they subcontract on the cloud server which is present in a remote location. To tackle this drawback number of Distant Data Integrity Checking (DDIC) protocols is in the literature but these protocols have liabilities with respect to the data dynamics and the efficiency. This work recommends a novel DDIC protocol built across homomorphic-hash-function. This system gives a resistance against number of attacks like replay, replaces and falsifications. This work introduces the Operation-record-table(ORT) which is an optimized table resulting in keeping the constant cost for supporting the data variations and keep tracks of blocking the file operations.


Symmetry ◽  
2021 ◽  
Vol 13 (11) ◽  
pp. 1990
Author(s):  
Khalil Ahmad Alsulbi ◽  
Maher Ali Khemakhem ◽  
Abdullah Ahamd Basuhail ◽  
Fathy Eassa Eassa ◽  
Kamal Mansur Jambi ◽  
...  

The sum of Big Data generated from different sources is increasing significantly with each passing day to extent that it is becoming challenging for traditional storage methods to store this massive amount of data. For this reason, most organizations have resolved to use third-party cloud storage to store data. Cloud storage has advanced in recent times, but it still faces numerous challenges with regard to security and privacy. This paper discusses Big Data security and privacy challenges and the minimum requirements that must be provided by future solutions. The main objective of this paper is to propose a new technical framework to control and manage Big Data security and privacy risks. A design science research methodology is used to carry out this project. The proposed framework takes advantage of Blockchain technology to provide secure storage of Big Data by managing its metadata and policies and eliminating external parties to maintain data security and privacy. Additionally, it uses mobile agent technology to take advantage of the benefits related to system performance in general. We present a prototype implementation for our proposed framework using the Ethereum Blockchain in a real data storage scenario. The empirical results and framework evaluation show that our proposed framework provides an effective solution for secure data storage in a Big Data environment.


Sign in / Sign up

Export Citation Format

Share Document