{"title":"基于云的两层安全方案,用于将数据存储、共享和审计到云中","authors":"Priya Kharmate, Ranjeetsingh S. Suryawanshi","doi":"10.1109/ICAECCT.2016.7942566","DOIUrl":null,"url":null,"abstract":"Cloud computing is rising as a powerful computing tool which utilizes advanced computational power with its improving data sharing and data securing limits have great contribution to Green IT. The security aspect plays crucial role in cloud, as the decision of shifting to cloud from customer's perspective mainly depends upon privacy of the data vis-à-vis the other benefits they would attain by shifting on cloud storage. The overall emphasis of this project is to conquer security issues as in the existing system remote verification technique used to audit cloud data by the third party or private auditing and it requires the presence of data owners to manage the authentication. In the proposed system we are using the own auditing based on the token generation. The regeneration problem of failed authorized users in the absence of data owners is solved through a proxy, which is used to regenerate the authorized users into the traditional public auditing system. To set up an effective Third party auditor, the auditing process should give user data privacy and user should free from online burden ultimately minimize the computational overhead. We propose a secure cloud-based storage system that supports public auditing and preserve privacy and that allows the Third party auditor to perform simultaneously and efficiently audits for multiple users.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"30 1","pages":"116-121"},"PeriodicalIF":0.0000,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Cloud Based Two Tier Security Scheme for Store, Share and Audit Our Data into Cloud\",\"authors\":\"Priya Kharmate, Ranjeetsingh S. Suryawanshi\",\"doi\":\"10.1109/ICAECCT.2016.7942566\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cloud computing is rising as a powerful computing tool which utilizes advanced computational power with its improving data sharing and data securing limits have great contribution to Green IT. The security aspect plays crucial role in cloud, as the decision of shifting to cloud from customer's perspective mainly depends upon privacy of the data vis-à-vis the other benefits they would attain by shifting on cloud storage. The overall emphasis of this project is to conquer security issues as in the existing system remote verification technique used to audit cloud data by the third party or private auditing and it requires the presence of data owners to manage the authentication. In the proposed system we are using the own auditing based on the token generation. The regeneration problem of failed authorized users in the absence of data owners is solved through a proxy, which is used to regenerate the authorized users into the traditional public auditing system. To set up an effective Third party auditor, the auditing process should give user data privacy and user should free from online burden ultimately minimize the computational overhead. We propose a secure cloud-based storage system that supports public auditing and preserve privacy and that allows the Third party auditor to perform simultaneously and efficiently audits for multiple users.\",\"PeriodicalId\":6629,\"journal\":{\"name\":\"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)\",\"volume\":\"30 1\",\"pages\":\"116-121\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICAECCT.2016.7942566\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAECCT.2016.7942566","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Cloud Based Two Tier Security Scheme for Store, Share and Audit Our Data into Cloud
Cloud computing is rising as a powerful computing tool which utilizes advanced computational power with its improving data sharing and data securing limits have great contribution to Green IT. The security aspect plays crucial role in cloud, as the decision of shifting to cloud from customer's perspective mainly depends upon privacy of the data vis-à-vis the other benefits they would attain by shifting on cloud storage. The overall emphasis of this project is to conquer security issues as in the existing system remote verification technique used to audit cloud data by the third party or private auditing and it requires the presence of data owners to manage the authentication. In the proposed system we are using the own auditing based on the token generation. The regeneration problem of failed authorized users in the absence of data owners is solved through a proxy, which is used to regenerate the authorized users into the traditional public auditing system. To set up an effective Third party auditor, the auditing process should give user data privacy and user should free from online burden ultimately minimize the computational overhead. We propose a secure cloud-based storage system that supports public auditing and preserve privacy and that allows the Third party auditor to perform simultaneously and efficiently audits for multiple users.