M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 3 Issue 3, March 2014
An Approach for Secure Data Storage Services in Cloud Computing
S. Srinivas, Martha Sheshikala, Duvvada Rajeswara Rao
A cloud storage system consists of a collection of storage servers over the internet. The main aim is to provide secure storage services in a cloud storage system. In this paper, we propose a Third Party auditing for data storage security in Cloud Computing. Encryption schemes are used to provide data confidentiality, data robustness and functionality. We use an encryption Data and Key verification for implementing for data secure storage. We guarantee that the TPA would not learn any knowledge about the data content stored on the cloud server during the efficient auditing process, Considering TPA may concurrently handle multiple audit sessions from different users for their outsourced data files for cloud operations such as update, delete and so on. Extensive analysis shows that our schemes are provably secure and highly efficient.
Keywords: Secure storage, TPA, Encryption, Data Confidentiality
Edition: Volume 3 Issue 3, March 2014
Pages: 815 - 819
How to Cite this Article?
S. Srinivas, Martha Sheshikala, Duvvada Rajeswara Rao, "An Approach for Secure Data Storage Services in Cloud Computing", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=25031403, Volume 3 Issue 3, March 2014, 815 - 819
117 PDF Views | 92 PDF Downloads
Similar Articles with Keyword 'Secure storage'
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 3, March 2014
Pages: 815 - 819An Approach for Secure Data Storage Services in Cloud Computing
S. Srinivas, Martha Sheshikala, Duvvada Rajeswara Rao
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015
Pages: 1387 - 1390System for Secure Storage and Auditing of Cloud Data
Pooja Jaywant Patil
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 4, April 2014
Pages: 665 - 669Secure Storage for the Data Extracted from the Wireless Sensor Network with Cloud
Athira.M.S, Madhu.N
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 3093 - 3098Privacy-Conserved Health Care Information System with Efficient Cloud Security
R. Pradeep, T. P. Dayana Peter
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015
Pages: 924 - 926An Optimised Key cryptography for Securing Cloud Data Sharing and Storage Environment
Viharika Sudanagunta, K. Narayana Rao
Similar Articles with Keyword 'TPA'
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1058 - 1060Data Integrity Proof in Cloud Computing using TPA with Privacy Preserving
Rushikesh P. Dhanokar
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1944 - 1949A Review of Privacy Protection of Cloud Storage and Steganography Techniques
Alok Ranjan, Mansi Bhonsle
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015
Pages: 2058 - 2061Privacy Preserved Public Auditing for Distributed Data
Anes P. A., Neethu Francis
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1709 - 1712A Business Framework for Securing Data Storage over Cloud Environment using ECC Crypto System
Nara Venkata Surendra Reddy, DLS Reddy
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 3, March 2014
Pages: 815 - 819An Approach for Secure Data Storage Services in Cloud Computing
S. Srinivas, Martha Sheshikala, Duvvada Rajeswara Rao
Similar Articles with Keyword 'Encryption'
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020
Pages: 470 - 478Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT
Aditya Tiwari, Ayush Pandey
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1069 - 1073Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN
Rucha Agrawal, Simran Khiani
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1200 - 1203Efficient Hardware Encryption Using Lightweight Process
Deeksha Bhardwaj, Rohit Pawar, Aman Jain
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1525 - 1529Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image
Maulik P. Chaudhari, Neha Parmar
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2025 - 2029Investigation of Security in Cloud Computing
Annu Devi
Similar Articles with Keyword 'Data Confidentiality'
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1812 - 1814A Survey on Deduplication Scheme in Cloud Storage
Deepa.D, Revathi.M
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 2457 - 2462Erection Trusted and Effective Request Services in the Cloud with RASP Data Perturbation
Rashmi Kadu, Sonali Patil
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 2457 - 2460Privacy Preserved Encrypted Cloud Data Access
Anes P. A., Neethu Francis
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016
Pages: 1258 - 1261Multilevel Cryptosystem for Authorized Deduplication in Hybrid Cloud
P. Narasimhulu, Jayavarthini.C
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 3, March 2014
Pages: 815 - 819An Approach for Secure Data Storage Services in Cloud Computing
S. Srinivas, Martha Sheshikala, Duvvada Rajeswara Rao