Integrity Verification for Cloud Storage

2014 ◽  
Vol 687-691 ◽  
pp. 3015-3018
Author(s):  
Zhi Yi Shao ◽  
Bo Yang

In cloud computing, customers outsource their data to the cloud storage, as they no long physically possess the data, how to perform the integrity verification becomes more difficult. Our protocol follows Shacham and Waters’s ideas (2013). We solve the problem of customer’s privacy against both the cloud and the third-party verifier and formally prove that the complex bilinear operations can be removed under the customer’s help. Every step of our improvements is based on rigorous proofs.

2016 ◽  
Vol 5 (1) ◽  
Author(s):  
Sinta Dewi

<p align="center"><strong><em>Abstract</em></strong></p><p><em>The increasing use of internet technology has spawned new challenges to the protection of privacy and personal data, especially with the increasing practice of collection, use and dissemination of personal data of a person. The lack of specific instruments and regulations will cause of the weakness of the privacy and data personal protection mechanism, especially in the use of cloud computing technology. Cloud computing is a technology that uses the internet and central remote servers to maintain or manage user data. It allows users to use applications without installation so that personal files can be accessed anywhere and anytime through internet access. This technology enables efficiencies by centralizing storage, processing and data memory. However, on the other hand, cloud computing has raised a new legal issue is how could the personal data of the user of cloud computing be protected from a wide range of abuses by the provider of cloud computing and the third party. This legal issue become very significant because if a personal data of the user of cloud computing is misused by the provider or the third party, then it is contrary to human rights, namely the protection of privacy and personal data which has been protected by international, regional, and national instruments. So far, Indonesia has not been having regulation that specifically protect its citizens from the personal data abuse whether committed by governments, private companies or  individuals. Therefore, this study aims to create the concept of adequate regulation in order to provide protection for user of cloud computing services in Indonesia.</em></p><p><strong><em>Keywords</em></strong><em>: protection, privacy, personal data, cloud computing.</em></p><p align="center"><strong>Abstrak</strong></p><p>Meningkatnya pemanfaatan teknologi internet melahirkan tantangan baru dalam perlindungan atas privasi dan data pribadi, terutama dengan semakin meningkatnya praktik pengumpulan, pemanfaatan dan penyebaran data pribadi seseorang. Ketertinggalan instrumen dan regulasi menjadi salah satu pemicu lemahnya mekanisme proteksi terhadap privasi dan data pribadi khususnya dalam penggunaan teknologi <em>cloud computing</em>. <em>Cloud computing </em>adalah teknologi yang menggunakan internet dan server pusat yang jauh untuk menjaga atau mengelola data pengguna. <em>Cloud computing </em>membantu pengguna untuk menggunakan aplikasi tanpa melakukan instalasi sehingga file pribadi dapat diakses di manapun dan kapanpun melalui akses internet. Teknologi ini memungkinkan efisiensi dengan memusatkan penyimpanan, pemrosesan dan memori data. Namun demikian, di sisi lain, <em>cloud computing </em>telah menimbulkan permasalahan hukum baru yaitu bagaimana data pribadi pengguna cloud computing terlindungi dari berbagai macam pengungkapan dan pendistribusian oleh penyedia jasa cloud computing terhadap pihak ketiga. Permasalahan hukum ini menjadi sangat signifikan karena jika data pribadi seseorang disalahgunakan oleh pihak penyedia data atau pihak ketiga, maka hal ini bertentangan dengan hak dasar manusia yaitu perlindungan terhadap privasi dan data pribadi seseorang yang telah dilindungi oleh instrumen internasional, regional dan nasional. Indonesia hingga saat ini belum memiliki regulasi yang secara khusus melindungi warga negara dari praktik pemanfatan data pribadi yang sewenang wenang, baik yang dilakukan oleh pemerintah, perusahaan swasta maupun individu. Oleh sebab itu, penelitian ini bertujuan untuk menciptakan konsep pengaturan yang memadai dalam rangka memberikan perlindungan bagi pengguna jasa cloud computing di Indonesia.</p><p><strong>Kata kunci</strong>: perlindungan, privasi, data pribadi, <em>cloud computing</em>.</p>


Author(s):  
Sinta Dewi ,

<p>Abstract<br />The increasing use of internet technology has spawned new challenges to the protection of privacy and personal data, especially with the increasing practice of collection, use and dissemination of personal data of a person. The lack of specific instruments and regulations will cause of the weakness of the privacy and data personal protection mechanism, especially in the use of cloud computing technology. Cloud computing is a technology that uses the internet and central remote servers to maintain or manage user data. It allows users to use applications without installation so that personal files can be accessed anywhere and anytime through internet access. This technology enables efficiencies by centralizing storage, processing and data memory. However, on the other hand, cloud computing has raised a new legal issue is how could the personal data of the user of cloud computing be protected from a wide range of abuses by the provider of cloud computing and the third party. This legal issue become very significant because if a personal data of the user of cloud computing is misused by the provider or the third party, then it is contrary to human rights, namely the protection of privacy and personal data which has been protected by international, regional, and national instruments. So far, Indonesia has not been having regulation that specifically protect its citizens from the personal data abuse whether committed by governments, private companies or individuals. Therefore, this study aims to create the concept of adequate regulation in order to provide protection for user of cloud computing services in Indonesia.<br /><em>Keywords: protection, privacy, personal data, cloud computing.</em></p><p>Abstrak<br />Meningkatnya pemanfaatan teknologi internet melahirkan tantangan baru dalam perlindungan atas privasi dan data pribadi, terutama dengan semakin meningkatnya praktik pengumpulan, pemanfaatan dan penyebaran data pribadi seseorang. Ketertinggalan instrumen dan regulasi menjadi salah satu pemicu lemahnya mekanisme proteksi terhadap privasi dan data pribadi khususnya dalam penggunaan teknologi cloud computing. Cloud computing adalah teknologi yang menggunakan internet dan server pusat yang jauh untuk menjaga atau mengelola data pengguna. Cloud computing membantu pengguna untuk menggunakan aplikasi tanpa melakukan instalasi sehingga file pribadi dapat diakses di manapun dan kapanpun melalui akses internet. Teknologi ini memungkinkan efisiensi dengan memusatkan penyimpanan, pemrosesan dan memori data. Namun demikian, di sisi lain, cloud computing telah menimbulkan permasalahan hukum baru yaitu bagaimana data pribadi pengguna cloud computing terlindungi dari berbagai macam pengungkapan dan pendistribusian oleh penyedia jasa cloud computing terhadap pihak ketiga. Permasalahan hukum ini menjadi sangat signifikan karena jika data pribadi seseorang disalahgunakan oleh pihak penyedia data atau pihak ketiga, maka hal ini bertentangan dengan hak dasar manusia yaitu perlindungan terhadap privasi dan data pribadi seseorang yang telah dilindungi oleh instrumen internasional, regional dan nasional. Indonesia hingga saat ini belum memiliki regulasi yang secara khusus melindungi warga negara dari praktik pemanfatan data pribadi yang sewenang wenang, baik yang dilakukan oleh pemerintah, perusahaan swasta maupun individu. Oleh sebab itu, penelitian ini bertujuan untuk menciptakan konsep pengaturan yang memadai dalam rangka memberikan perlindungan bagi pengguna jasa cloud computing di Indonesia.<br /><em>Kata kunci: perlindungan, privasi, data pribadi, cloud computing.</em></p>


Author(s):  
Prathap R. ◽  
Mohanasundaram R.

In the information technology sector, cloud computing plays an important role. Information was externalized in the cloud in the IT sector and part of data as a software. These offer utilities such as storage, software as a service, and application as a service and some web models, such as the deployment models, in four forms. The third-party wanted the data to be outsourced. In this chapter, the authors research and analyze technologies and frameworks for cloud computing. In cloud services, security problems are important. Therefore, the authors discuss safety problems and the concerns found in this chapter.


2014 ◽  
Author(s):  
Jaclyn M. Moloney ◽  
Chelsea A. Reid ◽  
Jody L. Davis ◽  
Jeni L. Burnette ◽  
Jeffrey D. Green

Author(s):  
Shaveta Bhatia

 The epoch of the big data presents many opportunities for the development in the range of data science, biomedical research cyber security, and cloud computing. Nowadays the big data gained popularity.  It also invites many provocations and upshot in the security and privacy of the big data. There are various type of threats, attacks such as leakage of data, the third party tries to access, viruses and vulnerability that stand against the security of the big data. This paper will discuss about the security threats and their approximate method in the field of biomedical research, cyber security and cloud computing.


Sign in / Sign up

Export Citation Format

Share Document