安全云存储中基于哈希函数的云计算数据分区

Parisha Parisha, P. Khanna, Puneet Sharma, S. Rizvi
{"title":"安全云存储中基于哈希函数的云计算数据分区","authors":"Parisha Parisha, P. Khanna, Puneet Sharma, S. Rizvi","doi":"10.9790/9622-0707100106","DOIUrl":null,"url":null,"abstract":"There is a necessity to firmly manage, store, and examine enormous quantity of complex data i.e. semi-structure and unstructured to regulate configurations and developments in order to expand the feature and excellence. It is very essential that clouds be secure and protected because of the critical environment of the applications. The foremost security task using cloud is that the holder of the data possibly will not have control of where the data is located. If anyone who desires to exploit the advantages of using cloud computing, one must also use the resource sharing and scheduling delivered by clouds. The data stored on cloud may be possible altered or modified without the knowledge of client. There should be a mechanism that verifies the stored and the data being retrieved is same.Thus we need protection of the data.This paper examines some significant security services including verification, encryption and decryption are provided in cloud computing system. In this paper data partitioning technique is used for privacy conserving and security of data, using third party auditor (TPA) and concept of hash function. A hash function takes a data of variable size and generates a data of fixed length, which is unique for each data. when data is encoded the hash value of encrypted data is also created and it is stored by third party auditor .For retrieval of data, third party auditor decodes the data by random key and creates the hash of the encrypted file attained from cloud then the hash value is matched and compared with one generated by it and the hash value at data holder, this verifies the data exactness. The objective of this work is designing, an effective flexible storage structure to confirm the accessibility of data and data exactness in cloud.","PeriodicalId":13972,"journal":{"name":"International Journal of Engineering Research and Applications","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Hash Function based Data Partitioning in Cloud Computing for Secured Cloud Storage\",\"authors\":\"Parisha Parisha, P. Khanna, Puneet Sharma, S. Rizvi\",\"doi\":\"10.9790/9622-0707100106\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"There is a necessity to firmly manage, store, and examine enormous quantity of complex data i.e. semi-structure and unstructured to regulate configurations and developments in order to expand the feature and excellence. It is very essential that clouds be secure and protected because of the critical environment of the applications. The foremost security task using cloud is that the holder of the data possibly will not have control of where the data is located. If anyone who desires to exploit the advantages of using cloud computing, one must also use the resource sharing and scheduling delivered by clouds. The data stored on cloud may be possible altered or modified without the knowledge of client. There should be a mechanism that verifies the stored and the data being retrieved is same.Thus we need protection of the data.This paper examines some significant security services including verification, encryption and decryption are provided in cloud computing system. In this paper data partitioning technique is used for privacy conserving and security of data, using third party auditor (TPA) and concept of hash function. A hash function takes a data of variable size and generates a data of fixed length, which is unique for each data. when data is encoded the hash value of encrypted data is also created and it is stored by third party auditor .For retrieval of data, third party auditor decodes the data by random key and creates the hash of the encrypted file attained from cloud then the hash value is matched and compared with one generated by it and the hash value at data holder, this verifies the data exactness. The objective of this work is designing, an effective flexible storage structure to confirm the accessibility of data and data exactness in cloud.\",\"PeriodicalId\":13972,\"journal\":{\"name\":\"International Journal of Engineering Research and Applications\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Engineering Research and Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.9790/9622-0707100106\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Engineering Research and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.9790/9622-0707100106","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

摘要

有必要对海量的复杂数据,即半结构化和非结构化数据进行牢固的管理、存储和检查,以规范配置和发展,以扩大功能和卓越性。由于应用程序的关键环境,云的安全性和保护是非常重要的。使用云的首要安全任务是数据的持有者可能无法控制数据的位置。如果任何人希望利用使用云计算的优势,还必须使用云提供的资源共享和调度。存储在云上的数据可能在客户不知情的情况下被更改或修改。应该有一种机制来验证存储的数据和被检索的数据是否相同。因此,我们需要保护数据。本文研究了云计算系统中提供的一些重要的安全服务,包括验证、加密和解密。本文利用第三方审计(TPA)和哈希函数的概念,采用数据分区技术来保护数据的隐私和安全性。哈希函数接受一个可变大小的数据,并生成一个固定长度的数据,每个数据的长度是唯一的。当数据被编码时,加密数据的哈希值也被创建,并由第三方审计员存储。对于数据的检索,第三方审计员通过随机密钥对数据进行解码,并创建从云端获得的加密文件的哈希值,然后将哈希值与其生成的哈希值进行匹配并与数据持有人的哈希值进行比较,从而验证数据的准确性。本文的目的是设计一种有效的、灵活的存储结构,以保证数据在云环境中的可访问性和准确性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Hash Function based Data Partitioning in Cloud Computing for Secured Cloud Storage
There is a necessity to firmly manage, store, and examine enormous quantity of complex data i.e. semi-structure and unstructured to regulate configurations and developments in order to expand the feature and excellence. It is very essential that clouds be secure and protected because of the critical environment of the applications. The foremost security task using cloud is that the holder of the data possibly will not have control of where the data is located. If anyone who desires to exploit the advantages of using cloud computing, one must also use the resource sharing and scheduling delivered by clouds. The data stored on cloud may be possible altered or modified without the knowledge of client. There should be a mechanism that verifies the stored and the data being retrieved is same.Thus we need protection of the data.This paper examines some significant security services including verification, encryption and decryption are provided in cloud computing system. In this paper data partitioning technique is used for privacy conserving and security of data, using third party auditor (TPA) and concept of hash function. A hash function takes a data of variable size and generates a data of fixed length, which is unique for each data. when data is encoded the hash value of encrypted data is also created and it is stored by third party auditor .For retrieval of data, third party auditor decodes the data by random key and creates the hash of the encrypted file attained from cloud then the hash value is matched and compared with one generated by it and the hash value at data holder, this verifies the data exactness. The objective of this work is designing, an effective flexible storage structure to confirm the accessibility of data and data exactness in cloud.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Nonlinear analysis of buckling behavior and ultimate strength of a corroded pipeline under hydrostatic pressure (with ANSYS) Green synthesis of silver nanoparticles from Endophytic fungus Aspergillus niger isolated from Simarouba glauca leaf and its Antibacterial and Antioxidant activity Spectral Efficiency and Bit Error Rate Analysis of WiMAX Using Diverse Modulation Techniques over Rayleigh Channel How toExplore Golden Ratio in Architecture and Designing City Experimental Analysis on Properties of Concrete with Partial Replacement of Cement with Stone Dust
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1