Protection in Cloud Storage: Exploration of the Projected Contract Signing Protocol

International Journal of Computer Trends and Technology (IJCTT)          
© 2015 by IJCTT Journal
Volume-23 Number-1
Year of Publication : 2015
Authors : Siva Prasad Reddy K V, Mahendra Reddy D, Hareesh Kumar G, Chandra Sekhar K


Siva Prasad Reddy K V, Mahendra Reddy D, Hareesh Kumar G, Chandra Sekhar K "Protection in Cloud Storage: Exploration of the Projected Contract Signing Protocol". International Journal of Computer Trends and Technology (IJCTT) V23(1):1-6, May 2015. ISSN:2231-2803. Published by Seventh Sense Research Group.

Abstract -
Numerous tendencies are usually aperture up the cycle of cloud computing, that is an Internet-based building and utilize of computer technology. The extremely economical and a assortment additional controlling processors, collectively by signifies of the SaaS processing architecture, are modifying information facilities within pools of processing versions on an massive scale. The growing association bandwidth and trustworthy yet the network associations build it still likely that users might currently assurance huge performance services beginning information and software that inhabit entirely on distant data centers. In manage to accomplish the guarantee of cloud data dependability and accessibility encourage the excellence of cloud storage service, we consider the difficulty of build a protected cloud storage overhaul on foremost of a community cloud transportation where the assess support is not subsequently trusted by the customer. We demonstrate, at a extreme level contract signing protocol (CSP) that connect modern and non-standard cryptographic primitives in prescribe to attain our objective.

[1] Cong Wang, Qian WangKui Ren, Ning Cao, and Wenjing Lou, Toward Secure and Dependable Storage Services in Cloud Computing, IEEE transactions on services computing, vol. 5, no. 2, april-june 2012
[2] Qian Wang,Cong Wang, Kui Ren, Wenjing Lou Jin Li, EnablingPublicAuditability and Data Dynamics for Storage Security in Cloud Computing, IEEE transactions on parallel and distributed systems, vol. 22, no. 5, may 2011
[3] Boris Tomas1and Bojan Vuksic2, Peer to Peer Distributed Storage and Computing Cloud System, International conference on information technology interfaces, june 25- 28, 2012, cavtat, Croatia
[4] Security and Privacy Challenges in Cloud Computing Environments, co-published by the IEEE computer and reliability ieee november/december 2010
[5] Subashini S, Kavitha V., A survey on security issues in service delivery models of cloud computing, Journal of Network and Computer Applications (2011) vol. 34 Issue 1, January 2011 pp. 1- 11.
[6] Balachander R.K, Ramakrishna P, A. Rakshit, Cloud Security Issues, IEEE International Conference on Services Computing (2010), pp. 517-520.
[7] Kresimir Popovic, Željko Hocenski, Cloud computing security issues and challenges, MIPRO 2010, pp. 344-349.
[8], Amazon Web Services (AWS), Online at http://aws., 2008.
[9] Luis M. Vaquero, Luis Rodero-Merino, Juan Caceres1, Maik Lindner, A Break in Clouds: Towards a cloud Definition, ACM SIGCOMM Computer Communication Review, vol. 39, Number 1, January 2009, pp. 50-55.
[10] Patrick McDaniel, Sean W. Smith, Outlook: Cloudy with a chance of security challenges and improvements, IEEE Computer and reliability societies (2010), pp. 77-80.
[11] Sameera Abdulrahman Almulla, Chan Yeob Yeun, Cloud Computing Security Management, Engineering systems management and its applications (2010), pp. 1-7.
[12] Steve Mansfield-Devine, Danger in Clouds, Network Security (2008), 12, pp. 9-11.
[13] Anthony T. Velte, Toby J.Velte, Robert Elsenpeter, Cloud Computing: A Practical Approach, Tata Mc GrawHill 2010.
[14] Gary Anthes, Security in the cloud, In ACM Communications (2010), vol.53, Issue11, pp. 16-18.
[15] Lombardi F, Di Pietro R., Secure virtualization for cloud computing, Journal of Network Computer Applications (2010), doi:10.1016/j.jnca.2010.06.

Cloud computing, Controlling processors, Cloud storage, Contract signing protocol(CSP).