Proceedings ArticleDOI
Data security frameworks in cloud
T. Devi,R Gane San +1 more
- pp 1-6
TLDR
A new hybrid model for data security in cloud targets encrypting data and ensures that the proper policies are enforced and speed of processing and computational efficiency of encrypted data should also be considered since the cloud environment involves large amount of data transfer, storage and usage.Abstract:
Cloud computing provides a wide range of services to consumers with lesser investment which are delivered over Internet Security is considered to be a significant problem in the development of cloud computing which is actually an obstacle to the growth of cloud is computing The most challenging task in a shared environment like cloud is data security Cloud enables the clients to store data on remote servers thereby preventing direct control over this data Data in cloud is not controlled by the data owner So, proper data security mechanism must be maintained A new hybrid model for data security in cloud targets encrypting data and ensures that the proper policies are enforced The major objective is to transmit, store and retrieve data in a secure manner The main focus of this paper is to highlight the various encryption techniques and data integrity proofs Speed of processing and computational efficiency of encrypting data should also be considered since the cloud environment involves large amount of data transfer, storage and usage This paper presents the survey about data security in cloud computingread more
Citations
More filters
Journal ArticleDOI
Encrypting security for virtualized environments in big data storage with generalized anonymization strategies
TL;DR: Data encryption and data anonymization is indeed the method of making modifications to the information to be utilised or used in a method which will avoid pertinent data from being identified.
References
More filters
ReportDOI
The NIST Definition of Cloud Computing
Peter Mell,Timothy Grance +1 more
TL;DR: This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models.
Journal ArticleDOI
Review: A survey on security issues in service delivery models of cloud computing
S. Subashini,V. Kavitha +1 more
TL;DR: A survey of the different security risks that pose a threat to the cloud is presented and a new model targeting at improving features of an existing model must not risk or threaten other important features of the current model.
Proceedings ArticleDOI
Provable data possession at untrusted stores
Giuseppe Ateniese,Randal Burns,Reza Curtmola,Joseph Herring,Lea Kissner,Zachary N. J. Peterson,Dawn Song +6 more
TL;DR: The provable data possession (PDP) model as discussed by the authors allows a client that has stored data at an untrusted server to verify that the server possesses the original data without retrieving it.
Posted Content
Provable Data Possession at Untrusted Stores.
Giuseppe Ateniese,Randal Burns,Reza Curtmola,Joseph Herring,Lea Kissner,Zachary N. J. Peterson,Dawn Song +6 more
TL;DR: Ateniese et al. as discussed by the authors introduced the provable data possession (PDP) model, which allows a client that has stored data at an untrusted server to verify that the server possesses the original data without retrieving it.
Posted Content
PORs: Proofs of Retrievability for Large Files
Ari Juels,Burton S. Kaliski +1 more
TL;DR: This paper defines and explores proofs of retrievability (PORs), a POR scheme that enables an archive or back-up service to produce a concise proof that a user can retrieve a target file F, that is, that the archive retains and reliably transmits file data sufficient for the user to recover F in its entirety.