Cloud computing is an emerging technology, which
provides services over internet such as software, hardware,
network and storage. The key role for cloud computing is
virtualization which reduces the total cost and gives reliable,
flexible and secured services. However compute service are
chosen between the providers located in multiple data centres.
One of the major security concerns related to the virtualization
and the Storage where the outside attackers can use the files in
the storage and the data owners are not capable of knowing
attacks. Currently, the amount of sensitive data produced by
many organizations is out pacing their storage ability. The
management of such huge amount of data is quite expensive due
to the requirements of high storage capacity and qualified
personnel. Storage-as-a-Service (SaaS) offered by cloud service
providers (CSPs) is a paid facility that enables organizations to
outsource their data to be stored on remote servers. Thus, SaaS
reduces the maintenance cost and mitigates the burden of large
local data storage at the organization’s end. A data owner pays
for a desired level of security and must get some compensation
in case of any misbehavior committed by the CSP.
Published In : IJCAT Journal Volume 1, Issue 9
Date of Publication : 31 October 2014
Pages : 461 - 466
Figures :02
Tables : --
Publication Link : A High Level Authentication Management for the
Storage Systems in Cloud Computing
Ramisetty Balaji : M.Tech 2nd Year, Department of CSE, SEAT
Tirupati, AP, India
N. Anand Reddy : M.Tech 2nd Year, Department of CSE, SEAT
Tirupati, AP, India
[1] C. Erway, A. K¨upc¸ ¨ u, C. Papamanthou, and R.
Tamassia, “Dynamic provable data possession,” in
Proceedings of the 16th ACM Conference on
Computer and Communications Security, 2009, pp.
213–222.
[2] Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou,
“Enabling public verifiability and data dynamics for
storage security in cloud computing,” in Proceedings
of the 14th European Conference on Research in
Computer Security, 2009, pp. 355–370.
[3] A.Juels and B. S. Kaliski, “PORs: Proofs of
Retrievability for large files,” in CCS’07: Proceedings
of the 14th ACM conference on Computer and
communications security. ACM, 2007, pp. 584–597.
[4] H. Shacham and B. Waters, “Compact proofs of
retrievability,” Cryptology ePrint Archive, Report
2008/073, 2008, http:// eprint.iacr.org/.
[5] M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang,
and K. Fu, “Plutus: Scalable secure file sharing on
untrusted storage,” in Proceedings of the FAST 03
Conference on File and Storage Technologies.
USENIX, 2003.
[6] E.-J. Goh, H. Shacham, N. Modadugu, and D. Boneh,
“Sirius: Securing remote untrusted storage,” in
Proceedings of the Network and Distributed System
Security Symposium, NDSS. The Internet Society,
2003.
[7] G. Ateniese, K. Fu, M. Green, and S. Hohenberger,
“Improved proxy re-encryption schemes with
applications to secure distributed storage,” in
Proceedings of the Network and Distributed System
Security Symposium, NDSS. The Internet Society,
2005.