ANALYSIS OF DATA SECURITY IN CLOUD USING THIRD PARTY AUDITOR: REVIEW

  • Ms. Vijayshree C Tambe University of Pune
  • Prof. Chandrakant M Jadhav
Keywords: Cloud computing, Third party auditor, Data Integrity, Encryption, Cloud Service Provider

Abstract

Cloud is kind of centralized database where many organizations/clients store their data, retrieve data and possibly modify data. Data stored and retrieved in such a way may not be fully trustworthy so here concept of TPA(Third Party Auditor) is used. TPA makes task of client easy by verifying integrity of data stored on behalf of client. In cloud, there is support for data dynamics means clients can insert, delete or can update data so there should be security mechanism which ensure integrity for the same. Here TPA can not only see the data but he can access data or can modify also so there should be some security mechanism against this. Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centres, where the management of the data and services may not be fully trustworthy. This unique paradigm brings about many new security challenges, which have not been well understood. The introduction of effective TPA eliminates the involvement of the client through the auditing of whether his data stored in the cloud is indeed intact, which can be important in achieving economies of scale for Cloud Computing.

References

[1] C. Wang, Q. S.M. Chow, Kui Ren and Qian Wang, “Ensuring data storage security in cloud computing,” in December 2011. [2] Sun Microsystems, Inc., “Building customer trust in cloud computing with transparent security,” Online https://www.sun.com/offers/details/sun transparency.xml, November 2009. [3] M. Arrington, “Gmail disaster: Reports of mass email deletions,”2006 Online at http://www.techcrunch.com/2006/12/28/gmail-disasterreportsof-mass-aildeletions/December. [4] Q. Wang, K. Ren, W. Lou, and Y. Zhang, “Dependable and secure sensor data storage with dynamic integrity assurance,” in Proc. Of IEEE INFOCOM’09, Rio de Janeiro, Brazil, Appril 2009, pp. 954–962. [5] J. Kincaid, “MediaMax/TheLinkup Closes Its Doors,”at http://www.techcrunch.com/2008/07/10/ mediamaxthelinkup-closes-itsdoors/, July 2008. [6] M. Naor and G. N. Rothblum, “The complexity of online memory checking,” in Proc. of FOCS’05, Pittsburgh, PA, USA, 2005, pp. 573– 584
[7] E.-C. Chang and J. Xu, “Remote integrity check with dishonest storage server,” in Proc. of ESORICS’08. Berlin, Heidelberg: Springer-Verlag, 2008, pp. 223–237. [8] M. A. Shah, R. Swaminathan, and M. Baker, “Privacy-preserving audit and extraction of digital contents,” Cryptology ePrint Archive, Report 2008/186, 2008. [9] A. Oprea, M. K. Reiter, and K. Yang, “Space-efficient block storage integrity,” in Proc. of NDSS’05, San Diego, CA, USA, 2005. [10] T. Schwarz and E. L. Miller, “Store, forget, and check: Using algebraic signatures to check remotely administered storage,” in Proc. of ICDCS’06, Lisboa, Portugal, 2006, pp. 12–12. [11] Xiang Tan and Bo Ai “The Issue of Cloud Computing Security in HighSpeed Railway” international confer. on electronic and mechanical engi. And information technology, 2011. Beijing p.r china [12] Farzad Sabahi,“Cloud Computing Security Threats and Responses”,IEEE confer. 2011, 978-1-61284-486-2/111 [13] Ravi Kant Sahu and Abhishek Mohta, L.K. Awasthi ”Robust Data Integration While Using Third Party Auditor For Cloud Data Storage Services”, conf. IJARCSSE, 2012, Volume 2, Issue 2,ISSN: 2277 128X. [14] Govinda V, and Gurunathaprasad, H Sathshkumar,”Third Party Auditing For Security Data Storage in cloud through digital signature using RSA” IJASATR, 2012, issue 2,vol-4, Issn 2249-9954.
Published
2017-12-17
How to Cite
Tambe, M. V., & Jadhav, P. C. (2017). ANALYSIS OF DATA SECURITY IN CLOUD USING THIRD PARTY AUDITOR: REVIEW. Asian Journal For Convergence In Technology (AJCT) ISSN -2350-1146, 1(1). Retrieved from http://asianssr.org/index.php/ajct/article/view/105
Section
Article

Most read articles by the same author(s)

Obs.: This plugin requires at least one statistics/report plugin to be enabled. If your statistics plugins provide more than one metric then please also select a main metric on the admin's site settings page and/or on the journal manager's settings pages.