FADE: A SECURE OVERLAY CLOUD STORAGE SYSTEM
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Research Paper | Computer Science & Engineering | India | Volume 2 Issue 6, June 2013

FADE: A SECURE OVERLAY CLOUD STORAGE SYSTEM

G. Gayatri, B. Sowmya

Cloud storage offers an ion of infinite storage space for clients to outsource data storage in a pay-as-you-go manner. Third party cloud storage will be provides guaranteed security and reduces the management cost. FADE provides policy access control and assured deletion. Assured deletion aims to provide cloud client on option of reliably destroying their data backups upon request. Fade built on cryptographic file system on a laptop may need only protection from one time data loss (theft or missing laptop) but when the encrypted is stored in third party storage.For example, Smug Mug a photo sharing website, chose to host terabyte. Cloud storage is an emerging service model that enables Individuals and enterprises to outsource the storage of data backups to remote cloud providers at a low cost test of photos on Amazon S3 in 2006. The increasing popularity of cloud storage is leading organizations to consider moving data out of their own data centers and into the cloud. The increasing popularity of cloud storage is leading organizations to consider moving data out of their own data centers and into the cloud.

Keywords: privacy-preserving, public audit ability, cloud computing

Edition: Volume 2 Issue 6, June 2013

Pages: 148 - 151

Share this Article

How to Cite this Article?

G. Gayatri, B. Sowmya, "FADE: A SECURE OVERLAY CLOUD STORAGE SYSTEM", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=IJSRON12013131, Volume 2 Issue 6, June 2013, 148 - 151

55 PDF Views | 42 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'privacy-preserving'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1028 - 1031

Secure and Efficient Item Information Retrieval in Cloud Computing

Dr. Shameem Akther, Tahseen Begum

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 2058 - 2061

Privacy Preserved Public Auditing for Distributed Data

Anes P. A., Neethu Francis

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1724 - 1727

Privacy Preserving Authenticity Framework for Shared Data Cloud Network

P. Vanitha Sree, K. Narayana Rao

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1204 - 1208

Privacy-Preserving Public Auditing for Secure Cloud Storage using ElGamal Public Key Encryption Algorithm

Rahul Vijay Badhe, Shriniwas Gadage

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 709 - 711

Survey on K-Nearest Neighbor Categorization over Semantically Protected Encrypted Relational Information

Pranali D. Desai, Vinod S. Wadne

Share this Article

Similar Articles with Keyword 'public audit ability'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2557 - 2560

Privacy Preserving Auditing For Cloud Storage

Nandini P. Wasnik, Mahip M.Bartere

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 6, June 2013

Pages: 148 - 151

FADE: A SECURE OVERLAY CLOUD STORAGE SYSTEM

G. Gayatri, B. Sowmya

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 116 - 119

Privacy Conservation and Public Inspection for Secure Cloud Storage

Sahar Jasim Hussein, Hemant Mahajan

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 39 - 42

A Survey on Cloud Storage Privacy Preserving Public Auditing for Regenerating Code

Sonali Bhausaheb Chemate, Mansi Bhonsle

Share this Article

Similar Articles with Keyword 'cloud computing'

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment ? A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1028 - 1031

Secure and Efficient Item Information Retrieval in Cloud Computing

Dr. Shameem Akther, Tahseen Begum

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 735 - 737

Survey Paper on Alleviation of Cloud Internal Denial of Service Attacks

Nikhita Nerkar, Vina M Lomte

Share this Article

Masters Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 130 - 134

Implementation of Client-Side Deduplication on Encrypted Data with Public Auditing in Cloud Storage

Lekhashree N R, Shashidhara M S, Santhosh S

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1548 - 1550

Survey on Distributed Mobile Cloud Computing Services: Signature Scheme for a Privacy-Aware Authentication

Chaitali P. Kathar, Vidya Dhamdhere

Share this Article
Top