New Public Integrity Auditing Scheme for Cloud Data Storage Using Mac And Symmetric Key Cryptographic Algorithms

A. Emily Jenifer ◽  
S. Karthigaiveni
IEEE Network ◽  
2013 ◽  
Vol 27 (4) ◽  
pp. 56-62 ◽  
Ming Li ◽  
Shucheng Yu ◽  
Kui Ren ◽  
Wenjing Lou ◽  
Y. T. Hou

2016 ◽  
Vol 9 (19) ◽  
V. Krishna Reddy ◽  
Yerneni Sushmitha ◽  
K. Thirupathi Rao

2018 ◽  
Vol 7 (3.1) ◽  
pp. 128
Selvam L ◽  
Arokia Renjit J

Recent security incidents on public cloud data storage had raised concerns on cloud data security. Development in the hacking area has risen in the past few years. Due to this, Cyber Security is needed which plays an important role to cover the secret information. Currently, the attack of challenging channel is both the symmetric as well as the asymmetric encryption algorithm. Since, in both criteria the secret key has to be transmitting through a security challenging channel. For this many techniques have been put forward. The Main focus is on the vulnerabilities of the private keys while hoarded in different places for the fast utilization of the round key of the AES algorithm. In the view of the hackers, extracting the private key is nearly as same as obtaining the plain text itself. So, the honey encryption technique is used to futile the attacker by producing the fake key for each and every try of the Key puncher. An indication will be generated automatically to the storage manager when an attempt is made by the attacker. The Honey encryption is the best algorithm to overcome the drawbacks of the AES algorithm but it has some time constraints which are also eliminated here. Thus, eliminating the Brute Force Attack and providing a secure system for storing the secret key.  

L. A. Volodchenkova ◽  
D. V. Kozirev

In this article the programm interface (API) of the server side of the cloud data storage is created.

2014 ◽  
Vol 13 (7) ◽  
pp. 4625-4632
Jyh-Shyan Lin ◽  
Kuo-Hsiung Liao ◽  
Chao-Hsing Hsu

Cloud computing and cloud data storage have become important applications on the Internet. An important trend in cloud computing and cloud data storage is group collaboration since it is a great inducement for an entity to use a cloud service, especially for an international enterprise. In this paper we propose a cloud data storage scheme with some protocols to support group collaboration. A group of users can operate on a set of data collaboratively with dynamic data update supported. Every member of the group can access, update and verify the data independently. The verification can also be authorized to a third-party auditor for convenience.

2019 ◽  
Vol 14 (4) ◽  
pp. 357-382 ◽  
Oussama Arki ◽  
Abdelhafid Zitouni ◽  
Ahmed Taki Eddine Dib

Sign in / Sign up

Export Citation Format

Share Document