The cloud computing distributed resources are shared via network in open environment. Hence user can easily access their data from anywhere. At the same time there exist privacy and security issues due to many reasons. First one is dramatic development in network technologies. Another is increased demand for computing resources, which make many organizations to outsource their data storage. So there is a need for secure cloud storage service in public cloud environment where the provider is not a trusted one. This paper addresses different data security and privacy protection issues in a cloud computing environment and proposes a method for providing different security services like authentication, authorization and confidentiality along with monitoring in delay. 128 bit Advanced Encryption Standard (AES) is used for increase data security and confidentiality. The hosted services are offered to limited number of peoples, this minimizes the security concern. In public cloud, the infrastructure is owned and managed by cloud provider itself. Hence security and confidentiality of data is an important concern. In this proposed approach data is encrypted using AES and then uploaded on a cloud. The proposed model uses Short Message Service (SMS) alert mechanism for avoiding unauthorized access to user data.
[1]
Roberto Di Pietro,et al.
Scalable and efficient provable data possession
,
2008,
IACR Cryptol. ePrint Arch..
[2]
Hovav Shacham,et al.
Compact Proofs of Retrievability
,
2008,
Journal of Cryptology.
[3]
Ari Juels,et al.
Pors: proofs of retrievability for large files
,
2007,
CCS '07.
[4]
G. B. Jethava,et al.
Improving dynamic data integrity verification in cloud computing
,
2013,
2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT).
[5]
Cong Wang,et al.
Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
,
2011,
IEEE Transactions on Parallel and Distributed Systems.
[6]
Reza Curtmola,et al.
Provable data possession at untrusted stores
,
2007,
CCS '07.
[7]
Zoe L. Jiang,et al.
Privacy-Preserving Public Auditing for Secure Cloud Storage
,
2013,
IEEE Transactions on Computers.
[8]
Sawan V. Baghel,et al.
A survey for secure communication of cloud third party authenticator
,
2015,
2015 2nd International Conference on Electronics and Communication Systems (ICECS).