Cloud computing is an emerging computing model in which resources of the computing communications are provided as services over the Internet. This paper proposed some services for data security and access control when users outsource sensitive data for sharing on cloud servers. This paper addresses this challenging open issue by, on one hand, defining and enforcing access policies based on data attributes, and, on the other hand, allowing the data owner to assign most of the computation tasks involved in fine grained data access control to un-trusted cloud servers without disclosing the underlying data contents. Extensive analysis shows that our proposed scheme is highly efficient and provably secures under existing security models. In Order to address this new problem and further achieve a secure and dependable cloud storage service, we propose in this paper a flexible distributed storage integrity auditing mechanism, utilizing the homomorphic token and distributed coded data. By third party auditing in this system, improves the availability and reliability of users data. This paper effectively supports dynamic data operations. As system is distributed, it is very essential to locate the misbehaving server so as that the user can access his sensitive information without any changes in it. This system also works against server attack and data crashes effectively.
[1]
Reza Curtmola,et al.
MR-PDP: Multiple-Replica Provable Data Possession
,
2008,
2008 The 28th International Conference on Distributed Computing Systems.
[2]
Mihir Bellare,et al.
Incremental Cryptography: The Case of Hashing and Signing
,
1994,
CRYPTO.
[3]
Hovav Shacham,et al.
Compact Proofs of Retrievability
,
2008,
Journal of Cryptology.
[4]
Ari Juels,et al.
Pors: proofs of retrievability for large files
,
2007,
CCS '07.
[5]
Cong Wang,et al.
Toward publicly auditable secure cloud data storage services
,
2010,
IEEE Network.
[6]
刘义颖,et al.
Amazon Web Services(AWS)云平台可靠性技术研究
,
2014
.
[7]
Prakash Raj,et al.
Data Storage Security in Cloud
,
2011
.
[8]
Roberto Di Pietro,et al.
Scalable and efficient provable data possession
,
2008,
IACR Cryptol. ePrint Arch..
[9]
Cong Wang,et al.
Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing
,
2009,
ESORICS.
[10]
Sawan Kumar,et al.
Ensuring data storage security in Cloud Computing
,
2009,
2009 17th International Workshop on Quality of Service.