Improving Zero Knowledge in Cloud Storage Auditing System

Authors

  • B. Subasri Department of Computer Science and Engineering, Anna University, Chennai- India
  • P. Vijayalakshmi Department of Computer Science and Engineering, Anna University, Chennai- India
  • P. Yurega Department of Computer Science and Engineering, Anna University, Chennai- India
  • E. Revathi Department of Computer Science and Engineering, Anna University, Chennai- India

Keywords:

Zero Knowledge, Data Storage, Public Auditing, Cloud Computing, Batch Auditing

Abstract

Usage of cloud storage user can store the data tenuously and have the benefit of on demand high quality applications and services from a shared pool of configurable computing resources without the burden of local data storage and maintenance. Utilize the random masking to guarantee that the EA would not learn any knowledge about the data content stored on the cloud server during the efficient auditing process, which not only eliminates the burden of cloud user from the tedious and possibly expensive auditing task, but also alleviates the users� fear of their outsourced data leakage

References

M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, A. Konwinski, G. Lee, D.A. Patterson, A. Rabkin, I. Stoica, and M.Zaharia, “A View of Cloud Computing,” Comm. ACM, vol. 53, no. 4,

YashpalKadam, “Security Issues in Cloud Computing A Transparent View”, International Journal of Computer Science Emerging Technology, Vol-2 No 5 October, 2011 , 316-322

K.S.Suresh M.Tech#1 Prof K.V. Prasad #2Asst. Professor Principal Department of CSE, MLRIT Security Issues and security algorithms in cloud computing

LIET, Hyderabad, India, Assoc. Professor, LIET, Hyderabad, India Linear programming in cloud computing for Practical outsourcing

RohitBhadauria, RituparnaChaki, NabenduChaki, SugataSanyal, “A Survey on Security Issues in Cloud Computing”, 2011

Cloud computing: benefits ,risks and recommendation for information security Nelson Gonzalez1*, Charles Miers1,4, Fernando Red´ıgolo1, Marcos Simpl´ıcio1, Tereza Carvalho1, Mats N¨aslund2 and MakanPourzandia

cloud computing security NGONGANG GUY MOLLET

YanZhua,b, HongxinHuc, Gail-JoonAhnc, Stephen S. Yauc.“Efficient audit service outsourcing for data integrity in clouds”.In “The Journal of Systems and Software 85 (2012) 1083– 1095”.

JoanDaemen, Vincent Rijmen, “Announcing the ADVANCED ENCRYPTION STANDARD (AES)”, Federal Information Processing Standards Publication 197, November 26, 2001

AbhishekMohta , Ravi Kant Sahu,Lalit Kumar Awasthi Robust Data Security for Cloud while using Third Party Auditor

Using Third Party Auditor for Cloud Data Security: A Review .AshishBhagat Ravi Kant Sahu

A Newer User Authentication, File encryption and Distributed Server Based Cloud Computing security architecture KawserWazed Nafi1,2, TonnyShekha Kar2, SayedAnisul Hoque3, Dr. M. M. A Hashem4

Mladen A. Vouk, “Cloud Computing – Issues, Research and Implementations”, Journal of Computing and Information Technology - CIT 16, 2008, 4, 235–246

Cloud Security Alliance, “Security guidance for critical areas of focus in cloud computing,” 2009, online at http://www.cloudsecurityalliance.org115.G. Ateniese et al., ―Scalable and Efficient Provable Data Possession, Proc. Secure Comm ‗08, Sept. 2008.

Downloads

Published

2014-03-31

How to Cite

[1]
B. Subasri, P. Vijayalakshmi, P. Yurega, and E. Revathi, “Improving Zero Knowledge in Cloud Storage Auditing System”, Int. J. Comp. Sci. Eng., vol. 2, no. 3, pp. 204–207, Mar. 2014.

Issue

Section

Research Article