Renaissance System Model Improving Security and Third Party Auditing in Cloud Computing

Abstract Cloud computing is the developing design of IT enterprise. Applications and the services that are present over the Internet are referred by the cloud computing. Critical issues on security and trust based are often a major problem in cloud computing. Different levels of security enforcement are offered by both public and private clouds. Auditing plays a vital role in evaluating an individual, process, system, product or an enterprise. A renaissance system model has been proposed for secure data storage in cloud. The proposed model involves four entities: Data owners, the cloud, cloud service provider and third party auditor (TPA). The TPA has the ability to create the awareness in order to bring out the public audits in the cloud having the coded data. The outcome seems to be trusted and is impartial for both the cloud servers and the data owners. The proposed model is a semi trusted proxy agent that performances instead of the data owner in order to reinstate the data blocks that are obtained during the repair process. Renaissance system model is proposed and implemented into the test bed.

[1]  Kai Hwang,et al.  Cloud Security with Virtualized Defense and Reputation-Based Trust Mangement , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.

[2]  Daniele Catteddu and Giles Hogben Cloud Computing. Benefits, risks and recommendations for information security , 2009 .

[3]  Yunnan Wu,et al.  A Survey on Network Codes for Distributed Storage , 2010, Proceedings of the IEEE.

[4]  M. M. A. Hashem,et al.  A Newer User Authentication, File encryption and Distributed Server Based Cloud Computing Security Architecture , 2013, ArXiv.

[5]  M. Phil,et al.  PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING , 2015 .

[6]  S. O. Kuyoro,et al.  Cloud computing security issues and challenges , 2011 .

[7]  Jing Li,et al.  Study on the third-party audit in cloud storage service , 2011, 2011 International Conference on Cloud and Service Computing.

[8]  Salve Bhagyashri Salve Bhagyashri,et al.  Privacy-Preserving Public Auditing For Secure Cloud Storage , 2014 .

[9]  Pritee Parwekar,et al.  Public auditing: Cloud data storage , 2014, 2014 5th International Conference - Confluence The Next Generation Information Technology Summit (Confluence).

[10]  Dirk Westhoff,et al.  Privacy-friendly cloud audits with Somewhat Homomorphic and Searchable Encryption , 2014, 2014 14th International Conference on Innovations for Community Services (I4CS).

[11]  Ahmad-Reza Sadeghi,et al.  Twin Clouds: Secure Cloud Computing with Low Latency - (Full Version) , 2011, Communications and Multimedia Security.

[12]  V. Goutham,et al.  Enabling Cloud Storage Auditing with Key Exposure Resistance , 2016 .

[13]  Hovav Shacham,et al.  Compact Proofs of Retrievability , 2008, Journal of Cryptology.

[14]  Patrick P. C. Lee,et al.  Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage: Theory and Implementation , 2014, IEEE Transactions on Parallel and Distributed Systems.

[15]  Reza Curtmola,et al.  Remote data checking for network coding-based distributed storage systems , 2010, CCSW '10.

[16]  Xiaohua Jia,et al.  An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing , 2013, IEEE Transactions on Parallel and Distributed Systems.

[17]  Ming Li,et al.  Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings , 2010, SecureComm.

[18]  Ahmad-Reza Sadeghi,et al.  Twin Clouds: Secure Cloud Computing with , 2011 .

[19]  Roberto Di Pietro,et al.  Scalable and efficient provable data possession , 2008, IACR Cryptol. ePrint Arch..

[20]  K. Popovic,et al.  Cloud computing security issues and challenges , 2010, The 33rd International Convention MIPRO.

[21]  Xinxian Li,et al.  Enterprise private cloud file encryption system based on tripartite secret key protocol , 2015 .