Survey on: Fade Architecture for Secured Access and Assured Deletion in Cloud Storage
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 7, July 2015

Survey on: Fade Architecture for Secured Access and Assured Deletion in Cloud Storage

Nilam Musale, Vilas Gaikwad

In order to reduce data management cost, we can outsource data backups off-site to third party cloud storage services. Third parties provide security guarantees for the outsourced data. FADE provides policy access control and assured deletion. Assured deletion aims to provide cloud client on option of reliably destroying their data backups upon request. FADE is built upon a set of cryptographic key operations that are self-maintained by a quorum of key managers that are independent of third-party clouds. In particular, FADE acts as an overlay system that works seamlessly atop todays cloud storage services. FADE is built upon a set of cryptographic key operations that are self-maintained by a quorum of key managers that are independent of third-party clouds. In particular, FADE acts as an overlay system that works seamlessly atop todays cloud storage services. A proof-of-concept prototype of FADE is implemented on atop Amazon S3, one of todays cloud storage services. Extensive empirical studies, and demonstration proves that FADE provides security protection for outsourced data, while introducing only minimal performance and monetary cost overhead.

Keywords: access control, assured deletion, backup/recovery, cloud storage

Edition: Volume 4 Issue 7, July 2015

Pages: 1973 - 1976

Share this Article

How to Cite this Article?

Nilam Musale, Vilas Gaikwad, "Survey on: Fade Architecture for Secured Access and Assured Deletion in Cloud Storage", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB156828, Volume 4 Issue 7, July 2015, 1973 - 1976

41 PDF Views | 44 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'access control'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1087 - 1088

A Survey on the Various Techniques of Data Leakage Detection

Saranya S. Devan, Minu Lalitha Madhavu

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1590 - 1593

Secure Data Retrieval Using CP-ABE Approach For Decentralized Disruption-Tolerant Military Networks

Karpe Navanath R. Patil Kalyani S. Panchabuddhe Priyanka P.

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1122 - 1125

Improving Security of Traceable White-Box CPABE with TTP Access Control

Dilu Anil

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1436 - 1439

Secure Transmission in Ad-hoc Network: Using Combined Cryptography

Nilesh T Patil

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1737 - 1740

Enabling Data Dynamics and Achieving Access Control and Assured Deletion in Cloud

Nilam Musale, Vilas Gaikwad

Share this Article

Similar Articles with Keyword 'assured deletion'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1737 - 1740

Enabling Data Dynamics and Achieving Access Control and Assured Deletion in Cloud

Nilam Musale, Vilas Gaikwad

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 2579 - 2581

Decentralized Access Control of Data Stored In Cloud Using Attribute Based Encryption and Hidden Attributes

Sumedha Tathavadekar, Vikas Maral

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 6, June 2013

Pages: 148 - 151

FADE: A SECURE OVERLAY CLOUD STORAGE SYSTEM

G. Gayatri, B. Sowmya

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1973 - 1976

Survey on: Fade Architecture for Secured Access and Assured Deletion in Cloud Storage

Nilam Musale, Vilas Gaikwad

Share this Article

Similar Articles with Keyword 'backup/recovery'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1737 - 1740

Enabling Data Dynamics and Achieving Access Control and Assured Deletion in Cloud

Nilam Musale, Vilas Gaikwad

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1973 - 1976

Survey on: Fade Architecture for Secured Access and Assured Deletion in Cloud Storage

Nilam Musale, Vilas Gaikwad

Share this Article

Similar Articles with Keyword 'cloud storage'

Masters Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 130 - 134

Implementation of Client-Side Deduplication on Encrypted Data with Public Auditing in Cloud Storage

Lekhashree N R, Shashidhara M S, Santhosh S

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 598 - 602

Dynamic Key Generation Algorithm for User Authentication at Mobile Cloud Enviroinment

Deepak G, Dr. Pradeep. B. S, Shreyas Srinath

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2369 - 2374

Cryptoshare: Cryptosystem for Scalable Data Sharing in Cloud Storage

Ghilby Varghese Jaison

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 2, February 2016

Pages: 2217 - 2219

A Hybrid Cloud Approach for Secure Authorized Deduplication

Sunita S. Velapure, S. S. Barde

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2133 - 2135

Private Secure, Trusted, Flexible Personal Storage System in Cloud Computing

Nilesh G. Gawande, Dr. Rakesh Pandit

Share this Article
Top