An Approach for Storage Security in Cloud Computing- A Survey
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 1
Abstract
The many advantages of cloud computing are increasingly attracting individuals and organizations to outsource their data from local to remote cloud servers. In addition to cloud infrastructure and platform providers, such as Amazon, Google, and Microsoft, more and more cloud application providers are emerging which are dedicated to offering more accessible and user friendly data storage services to cloud customers. Storing data in a third party’s cloud system causes serious concern over data confidentiality. General encryption schemes protect data confidentiality, but also limit the functionality of the storage system. We propose a threshold proxy re-encryption scheme and integrate it with decentralized erasure code such that a secure distributed storage system is formulated. The distributed storage system not only supports secure and robust data storage and retrieval, but also lets a user forward his data in the storage servers to another user without retrieving the data back
Authors and Affiliations
W. Sharon Inbaran , G. Shenbaga Moorthy , C. Kumar Charlie Paul
BBO Comparison with other Nature Inspired Algorithms to Resolve Mixels
Remote sensing is defined as a technique for acquiring the information about an object without making physical contact with that image via remote sensors. But the major problem of remotely sensed images is mixed...
Behavior of mixture of Sulfamic Acid and Sodium Chloride
A mono crystal known as single crystal of sulfamic acid (H2NSO3H) and sodium chloride (NaCl) is an inorganic non-linear optical material was grown by slow evaporation solution growth technique. In this work, we a...
Identification of diabetic retinopathy stages in human retinal image
A novel method to identify the Diabetic retinopathy stages in human retinal image is proposed. Diabetic retinopathy is the dangerous eye disease cause the blindness in worldwide. The first manifestation of diabetic...
Role of Artificial intelligence in MANET
An adhoc network consists of wireless mobile nodes forming a temporary network without any infrastructure or centralized administration. Mobile Adhoc Networks (MANET) are self-organizing and self-configuring multihop w...
A Novel BIST based Diagnosis Technique to Detect Faults in FPGA
Testing is considered as the major factor for many applications because of the high level fault detection and the fast hardware and software implementations, many of which are power and resource constrained and req...