Dependable and Secure Storage Services in Cloud Computing

  IJCOT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© - April Issue 2013 by IJCTT Journal
Volume-4 Issue-4                           
Year of Publication : 2013
Authors :D.Veena Sanjitha, M.Himaswanthi, T.V.N.Sai Sindhura, K.V.V. Satyanarayana

MLA

D.Veena Sanjitha, M.Himaswanthi, T.V.N.Sai Sindhura, K.V.V. Satyanarayana"Dependable and Secure Storage Services in Cloud Computing"International Journal of Computer Trends and Technology (IJCTT),V4(4):608-612 April Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract: -Cloud storage allows users to remotely store their information and revel in the on-demand prime quality cloud applications while not the burden of native hardware and software system management although the advantages are clear, such a service is additionally relinquishing users’ physical possession of their outsourced information, that inevitably poses new security risks towards the correctness of the info in cloud. In order to handle this new downside and any deliver the goods a secure and dependable cloud storage service, we tend to propose during this paper a flexible distributed storage integrity auditing mechanism, utilizing the homomorphic token and distributed erasure-coded information. The proposed style permits users to audit the cloud storage with terribly light-weight communication and computation price. The auditing result not solely ensures robust cloud storage correctness guarantee, however additionally at the same time achieves quick information error localization, i.e., the identification of misbehaving server. Considering the cloud information are dynamic in nature, the projected style any supports secure and economical dynamic operations on outsourced information, as well as block modification, deletion, and append. Analysis shows the projected scheme is extremely economical and resilient against Byzantine failure, malicious information modification attack, and even server colluding attacks

 

References-
[1] C. Wang, Q. Wang, K. Ren, and W. Lou, “Ensuring data storage security in cloud computing,” in Proc. of IWQoS’09, July 2009, pp. 1–9.
[2] Amazon.com, “Amazon web services (aws),” Online at http:// aws.amazon.com/, 2009.
[3] Sun Microsystems, Inc., “Building customer trust in cloud computing with transparent security,” Online at https://www.sun. com/offers/details/sun transparency.xml, November 2009.
[4] M. Arrington, “Gmail disaster: Reports of mass email deletions,” Online at http://www.techcrunch.com/2006/12/ 28/gmail-disasterreports-of-mass-email-deletions/, December 2006.
[5] J. Kincaid, “MediaMax/TheLinkup Closes Its Doors,” Online at http://www.techcrunch.com/2008/07/10/ mediamaxthelinkup-closes-its-doors/, July 2008.
[6] Amazon.com, “Amazon s3 availability event: July 20, 2008,” Online at http://status.aws.amazon.com/s3- 20080720.html, July 2008.
[7] S. Wilson, “Appengine outage,” Online at http://www. cio-weblog.com/50226711/appengine outage.php, June 2008.
[8] B. Krebs, “Payment Processor Breach May Be Largest Ever,” Online at http://voices.washingtonpost.com/securityfix/2009/01/ payment processor breach may b.html, Jan. 2009

Keywords — Data integrity, dependable distributed storage, error localization, data dynamics, Cloud Computing .