Home| Contact Us| New Journals| Browse Journals| Journal Prices| For Authors|

Print ISSN: 0976-4143
Online ISSN:
0976-4151


  About JISR
  DLINE Portal Home
Home
Aims & Scope
Editorial Board
Current Issue
Next Issue
Previous Issue
Sample Issue
Upcoming Conferences
Self-archiving policy
Alert Services
Be a Reviewer
Publisher
Paper Submission
Subscription
Contact us
 
  How To Order
  Order Online
Price Information
Request for Complimentary
Print Copy
 
  For Authors
  Guidelines for Contributors
Online Submission
Call for Papers
Author Rights
 
 
RELATED JOURNALS
Journal of Digital Information Management (JDIM)
International Journal of Computational Linguistics Research (IJCL)
International Journal of Web Application (IJWA)

 

 
Journal of Information Security Research

Assurance on Data Integrity in Cloud Data Centre Using PKI Built RDIC Method
Arulkumar Venkatachalam, N Balaji
SSN College of Engineering Kalavakkam. India
Abstract: A great deal of advances in innovation has offered fame to Cloud computing. It has turned into the most every now and again use answer for undertakings that need to focus on their data transactions and bit less worry on their infrastructures. Yet at the same time a few enterprises are not utilizing cloud facilities. The studies delights that security threats are the motivation behind why cloud computing isn’t utilized as a specified goal. Cloud ventures questions security threats of the cloud. There are various kinds of security challenges for Cloud infrastructure. Such threats are identified as confidentiality, integrity, availability, accountability and privacy. In this work, we focus on the information integrity as characteristic of security. Since, in the wake of putting away information to cloud, client doesn’t have even an inkling where the information is put away. The client’s information should be put away in verified way. Hence, the proposed method PKI based RDIC concept to ensure the correctness of stored in cloud with the help of third party verifier.
Keywords: Cloud Security, Data Integrity, Public Key Infrastructure Assurance on Data Integrity in Cloud Data Centre Using PKI Built RDIC Method
DOI:https://doi.org/10.6025/jisr/2020/11/1/10-20
Full_Text   PDF 1.09 MB   Download:   206  times
References:

[1] Ateniese, G., Burns, R. C., Curtmola, R.J. Herring, L. Kissner,Z. N. J. Peterson, and D. X. Song, Provable data possession at untrusted stores, In: ACM Conference on Computer and Communications Security, P. Ning, S. D. C. di Vimercati, and P. F.Syverson, Eds. ACM, 2007, p. 598–609.
[2] Juels, A., Jr, B. S. K. (2007). Pors: proofs of retrievability for large files, in ACM Conference on Computer and Communications Security, P. Ning, S. D. C. di Vimercati, and P. F. Syverson, Eds. ACM, 2007, p. 584–597.
[3] Kan Yang and XiaohuaJia., TSAS: Third-Party Storage Auditing Service, In: Security for Cloud Storage Systems,SpringerBriefs in Computer Science 2014, p 7-37.
[4] Venkat Rao, K., AvalaAtchyutaRao. (2013). Data Integrity in Multi Cloud Storage, International Journal of Science Engineering and Advance Technology, 1 (7) 2013.
[5] Ateniese, G., Di Pietro, R., Mancini, L. V., Tsudik, G. (2008). Scalable and efficient provable data possession, in Secure Comm ’08: In: Proceedings of the 4th International Conference on Security and Privacy in Communication Netowrks, New York, NY, USA, 2008, p 1–10.
[6] Wang, Q., Wang, C., Li, J., Ren, K., Lou, W. (2009). Enabling public verifiability and data dynamics for storage security in cloud computing, In: ESORICS’09: Proceedings of the 14th European Conference on Research in Computer Security, Berlin, Heidelberg, 2009, 355–370.
[7] Cloud Security Alliance. (2010). Top Threats to Cloud Computing. [Online]. Available: http://www.cloudsecurityalliance.org


Home | Aim & Scope | Editorial Board | Author Guidelines | Publisher | Subscription | Previous Issue | Contact Us |Upcoming Conferences|Sample Issues|Library Recommendation Form|

 

Copyright © 2011 dline.info