Research Article | Open Access | Download PDF
Volume 4 | Issue 4 | Year 2013 | Article Id. IJCTT-V4I4P153 | DOI : https://doi.org/10.14445/22312803/IJCTT-V4I4P153
Data invulnerability and data integrity verification of multi cloud storage
N.Janardhan, Y.Rajasree, R .Himaja
Citation :
N.Janardhan, Y.Rajasree, R .Himaja, "Data invulnerability and data integrity verification of multi cloud storage," International Journal of Computer Trends and Technology (IJCTT), vol. 4, no. 4, pp. 707-709, 2013. Crossref, https://doi.org/10.14445/22312803/IJCTT-V4I4P153
Abstract
Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that users’ data are usually processed remotely in unknown machines that users do not own or operate. Offering strong data protection to cloud users while enabling rich applications is a challenging task. We explore a new cloud platform architecture called Data Protection as a Service, which dramatically reduces the per-application development effort required to offer data protection, while still allowing rapid development and maintenance.
Keywords
Cloud computing, DPaaS, Security
References
[1]C. Dwork, “The Differential Privacy Frontier Extended Abstract,” Proc. 6th Theory of Cryptography Conf.(TCC 09), LNCS 5444, Springer, 2009, pp. 496-502.
[2] C. Gentry, “Fully Homomorphic Encryption Using Ideal Lattices,” Proc. 41st Ann. ACM Symp. Theory Computing (STOC 09), ACM, 2009, pp. 169178.
[3]E. Naone, “The Slow-Motion Internet,” Technology Rev., Mar./Apr.2011; www.technologyreview.com/files/54902/ GoogleSpeed_charts.pdf.
[4] A. Greenberg, “IBM’s Blindfolded Calculator,” Forbes, 13 July 2009; www.forbes.com/forbes/2009/0713/breakthroughs-privacy-super-secretencryption.html.
[5] P. Maniatis et al., “Do You Know Where Your Data Are? Secure Data Capsules for Deployable Data Protection,” Proc. 13th Usenix Conf. Hot Topics in OperatingSystems(HotOS11),Usenix,2011; www.usenix.org/events/hotos11/tech/final_files/ManiatisAkhawe.pdf.
[6] S. McCamant and M.D. Ernst, “Quantitative Information Flow as Network Flow Capacity,” Proc. 2008 ACM SIGPLAN Conf. Programming Language Design and Implementation (PLDI 08), ACM, 2008, pp. 193-205.