Facilitating Security Using Third Party Auditing Based on Fragmentation
Keywords:
Cloud storage auditing, network coding, security, fragmentation, user anonymity, third-party public auditingAbstract
In Cloud computing, which is a evolving technology, security requirement is very essentials when the services are provided by the third party venders.This paper concentrates on a well-connected association between secure cloud storage and network coding. To overcome the problem of old cryptography encoding and to provide cloud surroundings with a reliable third party. This can prevent the possibility of all information about getting hacked at one time and additionally provides access management and safe removal file. Homomorphic digital signature makes use of better technology to facilitate access to authorized users only. The proposed protocol is highly economical and provides a reasonable intrusion from an anonymous party. Hence, the overall outcome expected from these tasks is to provide information access to cloud environments. The proposed systems reduce the time required to secure the new systematic structure of the Cloud Storage Protocol and provide security in uploading and downloading files.
References
[1] Fei Chen, Tao Xiang, Yuan Yang, Sherman S. M. Chow “Secure Cloud Storage Meets with Secure Network Coding” IEEE INFOCOM 2014- IEEE Conference on Computer Communications, 978-1-4799-3360-0/14/.
[2] Mazhar Ali, Saif U. R. Malik, Samee U. Khan,” DaSCE: Data Security for Cloud Environment with Semi-Trusted Third Party,” IEEE Transaction on journal name, manuscript ID IN 2015.
[3] Arjun Kumar, Byung Gook Lee, HoonJae Lee”, Secure Storage and Access of Data in Cloud Computing” 978-1- 4673-4828- 7/12/$31.00 ©2012 IEEE.
[4] Seung-Hyun Seo, Mohamed Nabeel, Xiaoyu Ding, and Elisa Bertino,” An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds,” IEEE Transaction on knowledge and data engineering VOL. 26, NO. 9, SEPTEMBER 2014.
[5] A. Juels and B. Kaliski Jr, "PORs: Proofs of retrievability for large files," Proc. ACM Conf. Comput.Commune. Security, pp. 584-597, 2007.
[6] Ning Cao, Cong Wang, Ming Li, Kui Ren and Wenjing Lou,” Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data,” IEEE Transaction onparallel and distributed system, VOL. 25, NO. 1, JANUARY 2014.
[7] International Journal of Scientific & Engineering Research, Volume 4, Issue 8, August-2013 128 ISSN 2229-5518 IJSER © 2013 http://www.ijser.org “The impact of different MAC protocols for Network Coding in Adhoc Network.”
[8] C. Wang, S. S. M. Chow, Q. Wang, K. Ren, and W. Lou, “Privacy-preserving public auditing for secure cloud storage,” IEEE Transactions on Computers, vol. 62, no. 2, pp. 362–375, 2013.
[9] K. Yang and X. Jia, “An efficient and secure dynamic auditing protocol for data storage in cloud computing,” IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 9, pp. 1717–1726, 2013.
[10] R. Ahlswede, N. Cai, S.-Y. Li, and R. W. Yeung, “Network information flow,” IEEE Transactions on Information Theory, vol. 46, no. 4, pp. 1204–1216, 2000
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
