Data Storage Security Model for Cloud Computing

Data security is one of the biggest concerns in adopting Cloud computing. In Cloud environment, users remotely store their data and relieve themselves from the hassle of local storage and maintenance. However, in this process, they lose control over their data. Existing approaches do not take all the facets into consideration viz. dynamic nature of Cloud, computation & communication overhead etc. In this paper, we propose a Data Storage Security Model to achieve storage correctness incorporating Cloud’s dynamic nature while maintaining low computation and communication cost.

[1]  Rafail Ostrovsky,et al.  Attribute-based encryption with non-monotonic access structures , 2007, CCS '07.

[2]  C Praveen Ram,et al.  Security as a Service (SasS): Securing user data by coprocessor and distributing the data , 2010, Trendz in Information Sciences & Computing(TISC2010).

[3]  Muttukrishnan Rajarajan,et al.  Secure data access in cloud computing , 2010, 2010 IEEE 4th International Conference on Internet Multimedia Services Architecture and Application.

[4]  Russ Housley,et al.  Internet X.509 Public Key Infrastructure Certificate and CRL Profile , 1999, RFC.

[5]  Ayman I. Kayssi,et al.  Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.

[6]  Cong Wang,et al.  Enabling Efficient Fuzzy Keyword Search over Encrypted Data in Cloud Computing , 2009, IACR Cryptol. ePrint Arch..

[7]  Reza Curtmola,et al.  Provable data possession at untrusted stores , 2007, CCS '07.

[8]  Siani Pearson,et al.  A Privacy Manager for Cloud Computing , 2009, CloudCom.

[9]  Alasdair McAndrew Data Encryption Standard (DES) for Sage , 2009 .

[10]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[11]  Geng Yang,et al.  Secure Document Service for Cloud Computing , 2009, CloudCom.

[12]  Ronald L. Rivest,et al.  The MD5 Message-Digest Algorithm , 1992, RFC.

[13]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[14]  Ge Cheng,et al.  Sealed storage for trusted cloud computing , 2010, 2010 International Conference On Computer Design and Applications.

[15]  Eric Rescorla,et al.  Diffie-Hellman Key Agreement Method , 1999, RFC.

[16]  Qiaoyan Wen,et al.  A View about Cloud Data Security from Data Life Cycle , 2010, 2010 International Conference on Computational Intelligence and Software Engineering.

[17]  Mary Baker,et al.  Auditing to Keep Online Storage Services Honest , 2007, HotOS.

[18]  Brian Hayes,et al.  What Is Cloud Computing? , 2019, Cloud Technologies.

[19]  Athanasios V. Vasilakos,et al.  SecCloud: Bridging Secure Storage and Computation in Cloud , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems Workshops.

[20]  Cong Wang,et al.  Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.

[21]  Lingdi Ping,et al.  Trust Model to Enhance Security and Interoperability of Cloud Environment , 2009, CloudCom.

[22]  Ari Juels,et al.  Pors: proofs of retrievability for large files , 2007, CCS '07.

[23]  M.R. Tribhuwan,et al.  Ensuring Data Storage Security in Cloud Computing through Two-Way Handshake Based on Token Management , 2010, 2010 International Conference on Advances in Recent Technologies in Communication and Computing.

[24]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[25]  Kristin E. Lauter,et al.  Cryptographic Cloud Storage , 2010, Financial Cryptography Workshops.

[26]  M. Roberts Masillamani,et al.  Design and auditing of Cloud computing security , 2010, 2010 Fifth International Conference on Information and Automation for Sustainability.

[27]  Yau-Hwang Kuo,et al.  An effective privacy protection scheme for cloud computing , 2011, 13th International Conference on Advanced Communication Technology (ICACT2011).

[28]  Jerome H. Saltzer,et al.  Section E.2.1 Kerberos Authentication and Authorization System , 1988 .

[29]  Cong Wang,et al.  Ensuring data storage security in Cloud Computing , 2009, 2009 17th International Workshop on Quality of Service.