基于云的两层安全方案,用于将数据存储、共享和审计到云中

Priya Kharmate, Ranjeetsingh S. Suryawanshi
{"title":"基于云的两层安全方案,用于将数据存储、共享和审计到云中","authors":"Priya Kharmate, Ranjeetsingh S. Suryawanshi","doi":"10.1109/ICAECCT.2016.7942566","DOIUrl":null,"url":null,"abstract":"Cloud computing is rising as a powerful computing tool which utilizes advanced computational power with its improving data sharing and data securing limits have great contribution to Green IT. The security aspect plays crucial role in cloud, as the decision of shifting to cloud from customer's perspective mainly depends upon privacy of the data vis-à-vis the other benefits they would attain by shifting on cloud storage. The overall emphasis of this project is to conquer security issues as in the existing system remote verification technique used to audit cloud data by the third party or private auditing and it requires the presence of data owners to manage the authentication. In the proposed system we are using the own auditing based on the token generation. The regeneration problem of failed authorized users in the absence of data owners is solved through a proxy, which is used to regenerate the authorized users into the traditional public auditing system. To set up an effective Third party auditor, the auditing process should give user data privacy and user should free from online burden ultimately minimize the computational overhead. We propose a secure cloud-based storage system that supports public auditing and preserve privacy and that allows the Third party auditor to perform simultaneously and efficiently audits for multiple users.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"30 1","pages":"116-121"},"PeriodicalIF":0.0000,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Cloud Based Two Tier Security Scheme for Store, Share and Audit Our Data into Cloud\",\"authors\":\"Priya Kharmate, Ranjeetsingh S. Suryawanshi\",\"doi\":\"10.1109/ICAECCT.2016.7942566\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cloud computing is rising as a powerful computing tool which utilizes advanced computational power with its improving data sharing and data securing limits have great contribution to Green IT. The security aspect plays crucial role in cloud, as the decision of shifting to cloud from customer's perspective mainly depends upon privacy of the data vis-à-vis the other benefits they would attain by shifting on cloud storage. The overall emphasis of this project is to conquer security issues as in the existing system remote verification technique used to audit cloud data by the third party or private auditing and it requires the presence of data owners to manage the authentication. In the proposed system we are using the own auditing based on the token generation. The regeneration problem of failed authorized users in the absence of data owners is solved through a proxy, which is used to regenerate the authorized users into the traditional public auditing system. To set up an effective Third party auditor, the auditing process should give user data privacy and user should free from online burden ultimately minimize the computational overhead. We propose a secure cloud-based storage system that supports public auditing and preserve privacy and that allows the Third party auditor to perform simultaneously and efficiently audits for multiple users.\",\"PeriodicalId\":6629,\"journal\":{\"name\":\"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)\",\"volume\":\"30 1\",\"pages\":\"116-121\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICAECCT.2016.7942566\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAECCT.2016.7942566","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

云计算作为一种强大的计算工具正在崛起,它利用先进的计算能力,以其不断提高的数据共享和数据安全限制为绿色IT做出了巨大贡献。安全方面在云计算中起着至关重要的作用,因为从客户的角度来看,转移到云计算的决定主要取决于数据的隐私性,而-à-vis他们通过转移到云存储将获得的其他好处。该项目的总体重点是克服现有系统远程验证技术中存在的安全问题,该技术用于第三方或私有审计云数据,并且需要数据所有者在场来管理身份验证。在提议的系统中,我们使用基于令牌生成的自己的审计。通过代理来解决在没有数据所有者的情况下失败授权用户的再生问题,通过代理将授权用户再生到传统的公共审计系统中。为了建立一个有效的第三方审计员,审计过程应该给予用户数据隐私,用户应该免于在线负担,最终最大限度地减少计算开销。我们提出了一个安全的基于云的存储系统,支持公共审计和保护隐私,并允许第三方审计人员同时高效地对多个用户进行审计。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Cloud Based Two Tier Security Scheme for Store, Share and Audit Our Data into Cloud
Cloud computing is rising as a powerful computing tool which utilizes advanced computational power with its improving data sharing and data securing limits have great contribution to Green IT. The security aspect plays crucial role in cloud, as the decision of shifting to cloud from customer's perspective mainly depends upon privacy of the data vis-à-vis the other benefits they would attain by shifting on cloud storage. The overall emphasis of this project is to conquer security issues as in the existing system remote verification technique used to audit cloud data by the third party or private auditing and it requires the presence of data owners to manage the authentication. In the proposed system we are using the own auditing based on the token generation. The regeneration problem of failed authorized users in the absence of data owners is solved through a proxy, which is used to regenerate the authorized users into the traditional public auditing system. To set up an effective Third party auditor, the auditing process should give user data privacy and user should free from online burden ultimately minimize the computational overhead. We propose a secure cloud-based storage system that supports public auditing and preserve privacy and that allows the Third party auditor to perform simultaneously and efficiently audits for multiple users.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Keynote speakers Emotweet: Sentiment Analysis tool for twitter Design of faster & power efficient sense amplifier using VLSI technology A comparative study on distance measuring approches for permutation representations An embedded system of dedicated and real-time fire detector and locator technology as an interactive response mechanism in fire occurrences
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1