Book Details

An Efficient and Secure Data Storage Using Two Different Cloud Storage Technique

International Journal of Computer Science (IJCS) Published by SK Research Group of Companies (SKRGC)

Download this PDF format

Abstract

Distributed storage empowers clients to remotely store their information and appreciate the on-request excellent cloud applications without the weight of nearby equipment and programming administration. In spite of the fact that the advantages are clear, such an administration is additionally giving up clients' physical ownership of their outsourced information, which definitely postures new security dangers toward the rightness of the information in cloud. Sensitive data is stored in the cloud, the corresponding private information may be exposed to cloud servers. Beside data privacy, client frequent queries will certainly and gradually reveal any private information on data statistic properties. Thus, data and queries of the outsourced database should be protected against the cloud service provider. In this research enhanced Shared-Ownership file access control Model. Our proposed secure database system includes a database administrator, and two non-colluding clouds. In this model, the database administrator can be implemented on a client side from the perspective of cloud service. The two clouds, as the server side, provide the storage and the computation service. The mechanism guarantees that knowing either of these two parts cannot obtain any useful privacy information, to conduct a secure database, data are encrypted and outsourced to be stored in one cloud, and the private keys are stored in the other one cloud. In our scheme, the knowledge of stored database and queries is partitioned into two parts, respectively stored in one cloud. Security analysis demonstrates that the protection of numerical data is unambiguously ensured against cloud suppliers in our proposed system.

References

[1] G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, ?Scalable and efficient provable data possession,? in Proc. 4th Int. Conf. Secur. Privacy Commun. Netw. (SecureComm), New York, NY, USA, 2006, Art. ID 9.

[2] M. A. Shah, R. Swaminathan, and M. Baker, ?Privacy-preserving audit and extraction of digital contents,? IACR Cryptology ePrint Archive, Tech. Rep. 2006/186, 2006.

[3] F. Sebé, J. Domingo-Ferrer, A. Martinez-Balleste, Y. Deswarte, and J.-J. Quisquater, ?Efficient remote data possession checking in critical information infrastructures,? IEEE Trans. Knowl. Data Eng., vol. 20, no. 8, pp. 1034–1038, Aug. 2005.

[4] K. Zeng, ?Publicly verifiable remote data integrity,? in Proc. 10th Int. Conf. Inf. Commun. Secur. (ICICS), 2005, pp. 419–434.

[5] G. Ateniese et al., ?Provable data possession at untrusted stores,? in Proc. 14th ACM Conf. Comput. Commun. Secur. (CCS), New York, NY, USA, 2005, pp. 598–609.

[6] M. A. Shah, M. Baker, J. C. Mogul, and R. Swaminathan, ?Auditing to keep online storage services honest,? in Proc. 11th USENIX Workshop Hot Topics Oper. Syst. (HOTOS), Berkeley, CA, USA, 2004, pp. 1–6.

[7] E. Mykletun, M. Narasimha, and G. Tsudik, ?Authentication and integrity in outsourced databases,? ACM Trans. Storage, vol. 2, no. 2, pp. 107–138, 2004.

[8] D. L. G. Filho and P. S. L. M. Barreto, ?Demonstrating data possession and uncheatable data transfer,? IACR (International Association for Cryptologic Research) ePrint Archive, Tech. Rep. 2006/150, 2004.

[9] Y. Deswarte, J.-J. Quisquater, and A. Saïdane, ?Remote integrity checking,? in Proc. 6th Working Conf. Integr. Internal Control Inf. Syst. (IICIS), 2003, pp. 1–11.

[10] P. Golle, S. Jarecki, and I. Mironov, ?Cryptographic primitives enforcing communication and storage complexity,? in Proc. 6th Int. Conf. Financial Cryptograph. (FC), Berlin, Germany, 2003, pp. 120–135.

[11] Yong Jian Chin; Thian Song Ong; Michael K. O. Goh; Bee Yan Hiew, ?Integrating Palmprint and Fingerprint for Identity Verification?, Network and System Security, 2009. NSS '09. Third International Conference on Year: 2009.

[12] Ahmed Elnakib; Ayman El-Baz; Manuel F. Casanova; Georgy Gimel'farb; Andrew E. Switala, ?Image-based detection of Corpus Callosum variability for more accuratediscrimination between autistic and normal brains?, 2010 IEEE International Conference on Image Processing Year: 2010.

[13] V. D. Mhaske; A. J. Patankar, ?Multimodal biometrics by integrating fingerprint and palmprint for security?, Computational Intelligence and Computing Research (ICCIC), 2013 IEEE International Conference on Year: 2013.

[14] Lei Zhang; D. Zhang, ?Characterization of palmprints by wavelet signatures via directional context modeling?, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics) Year: 2004.

Keywords

Dual cloud, Security analysis, Shared-Ownership file access control

Image
  • Format Volume 6, Issue 1, No 2, 2018
  • Copyright All Rights Reserved ©2018
  • Year of Publication 2018
  • Author V.Geetha, Dr.M.V.Srinath, K.Kanchikamatchi
  • Reference IJCS-331
  • Page No 2196-2202

Copyright 2024 SK Research Group of Companies. All Rights Reserved.