A High Level Authentication Management for the Storage Systems in Cloud Computing  
  Authors : Ramisetty Balaji; N. Anand Reddy

 

Cloud computing is an emerging technology, which provides services over internet such as software, hardware, network and storage. The key role for cloud computing is virtualization which reduces the total cost and gives reliable, flexible and secured services. However compute service are chosen between the providers located in multiple data centres. One of the major security concerns related to the virtualization and the Storage where the outside attackers can use the files in the storage and the data owners are not capable of knowing attacks. Currently, the amount of sensitive data produced by many organizations is out pacing their storage ability. The management of such huge amount of data is quite expensive due to the requirements of high storage capacity and qualified personnel. Storage-as-a-Service (SaaS) offered by cloud service providers (CSPs) is a paid facility that enables organizations to outsource their data to be stored on remote servers. Thus, SaaS reduces the maintenance cost and mitigates the burden of large local data storage at the organization’s end. A data owner pays for a desired level of security and must get some compensation in case of any misbehavior committed by the CSP.

 

Published In : IJCAT Journal Volume 1, Issue 9

Date of Publication : 31 October 2014

Pages : 461 - 466

Figures :02

Tables : --

Publication Link : A High Level Authentication Management for the Storage Systems in Cloud Computing

 

 

 

Ramisetty Balaji : M.Tech 2nd Year, Department of CSE, SEAT Tirupati, AP, India

N. Anand Reddy : M.Tech 2nd Year, Department of CSE, SEAT Tirupati, AP, India

 

 

 

 

 

 

 

Outsourcing Data Storage

Dynamic Environment

Mutual Trust

CSP

Cheating Detection Module

Access Control

TTP

The cloud based storage scheme is proposed that allows owner to benefit from facilities offered by the CSP and enables Detection of Dishonest entity (i.e. owner/CSP). It enables data owners to release their concerns regarding confidentiality, integrity, access control of the outsourced data. To resolve disputes that may occur regarding data integrity, a trusted third party is invoked to determine the dishonest party (owner or CSP). Also the security related issues are resolved they are:

 

 

 

 

 

 

 

 

 

[1] C. Erway, A. K¨upc¸ ¨ u, C. Papamanthou, and R. Tamassia, “Dynamic provable data possession,” in Proceedings of the 16th ACM Conference on Computer and Communications Security, 2009, pp. 213–222.

[2] Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, “Enabling public verifiability and data dynamics for storage security in cloud computing,” in Proceedings of the 14th European Conference on Research in Computer Security, 2009, pp. 355–370.

[3] A.Juels and B. S. Kaliski, “PORs: Proofs of Retrievability for large files,” in CCS’07: Proceedings of the 14th ACM conference on Computer and communications security. ACM, 2007, pp. 584–597.

[4] H. Shacham and B. Waters, “Compact proofs of retrievability,” Cryptology ePrint Archive, Report 2008/073, 2008, http:// eprint.iacr.org/.

[5] M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, “Plutus: Scalable secure file sharing on untrusted storage,” in Proceedings of the FAST 03 Conference on File and Storage Technologies. USENIX, 2003.

[6] E.-J. Goh, H. Shacham, N. Modadugu, and D. Boneh, “Sirius: Securing remote untrusted storage,” in Proceedings of the Network and Distributed System Security Symposium, NDSS. The Internet Society, 2003.

[7] G. Ateniese, K. Fu, M. Green, and S. Hohenberger, “Improved proxy re-encryption schemes with applications to secure distributed storage,” in Proceedings of the Network and Distributed System Security Symposium, NDSS. The Internet Society, 2005.