Abstract
Cloud computing has been targeted as the future on demand architecture of IT enterprise. Cloud Computing can be used with trustworthy mechanism to provide greater data resources in comparison to the traditional limited resource computing. But the security challenges can stop the feasibility in the use of IT enterprises. In this paper, our aim is to provide a trustworthy solution for the cloud computing. Our proposed methodology provides secure centralized control and alert system. We are applying the same token with distributed verification with the centralized data scheme. Our approach achieves the integration of storage correctness insurance and data error localization, i.e., the identification of misbehaving clients and it can be control by the servers. It can support data updating, deletion and visualization on demand with the restrictive tokenization. Extensive security and performance analysis shows that the proposed scheme is highly efficient and resilient against Byzantine failure, malicious data modification attack, and even colluding attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R.H., Konwinski, A., Lee, G., Patterson, D.A., Rabkin, A., Stoica, I., Zaharia, M.: Above the clouds: A berkeley view of cloud computing. University of California, Berkeley, Tech. Rep. UCB-EECS-2009-28 (February 2009)
Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Lee, G., Patterson, D.A., Rabkin, A., Stoica, I., Zaharia, M.: Above the clouds: A berkeley view of cloud computing (February 2009)
Brahman, S.K., Patel, B.: Java Based Resource Sharing with Secure Transaction in User Cloud Environment. International Journal of Advanced Computer Research (IJACR) 2(3(5)) (September 2012)
Guha, V., Shrivastava, M.: Review of Information Authentication in Mobile Cloud over SaaS & PaaS Layers. International Journal of Advanced Computer Research (IJACR) 3(1(9)) (March 2013)
Dubey, A.K., Dubey, A.K., Namdev, M., Shrivastava, S.S.: Cloud-User Security Based on RSA and MD5 Algorithm for Resource Attestation and Sharing in Java Environment. In: CONSEG 2012 (2012)
Singh, A., Shrivastava, M.: Overview of Security issues in Cloud Computing. International Journal of Advanced Computer Research (IJACR) 2(1) (March 2012)
Ruiz-Agundez, I., Penya, Y.K., Bringas, P.G.: Cloud Computing Services Accounting. International Journal of Advanced Computer Research (IJACR) 2(2) (June 2012)
Prakash, A.K.A.V.: Implement Security using smart card on Cloud. International Journal of Advanced Computer Research (IJACR) 3(1(9)) (March 2013)
So, K.: Cloud computing security issues and challenges. International Journal of Computer Networks (2011)
Gonzalez, et al.: A quantitative analysis of current security concerns and solutions for cloud computing. Journal of Cloud Computing: Advances, Systems and Applications 1, 11 (2012)
Lee, K.: Security Threats in Cloud Computing Environments. International Journal of Security & Its Applications 6(4) (2012)
Shaikh, F.B., Haider, S.: Security threats in cloud computing. In: 2011 International Conference for Internet Technology and Secured Transactions (ICITST), December 11-14, pp. 214–219 (2011)
Popović, K., Hocenski, Z.: Cloud computing security issues and challenges. In: 2010 Proceedings of the 33rd International Convention on MIPRO, May 24-28, pp. 344–349 (2010)
Li, M., Yu, S., Cao, N., Lou, W.: Authorized Private Keyword Search over Encrypted Data in Cloud Computing. In: 31st International Conference on Distributed Computing Systems (2011)
Yang, Y.: Towards multi-user private keyword search for cloud computing. In: 2011 IEEE International Conference on Cloud Computing (CLOUD), pp. 758–759. IEEE (2011)
Waqar, A., Raza, A., Abbas, H.: User Privacy Issues in Eucalyptus: A Private Cloud Computing Environment. In: International Joint Conference of IEEE TrustCom 2011/IEEE ICESS 2011/FCST 2011 (2011)
Liao, W.-H., Su, S.-C.: A Dynamic VPN Architecture for Private Cloud Computing. In: Fourth IEEE International Conference on Utility and Cloud Computing (2011)
Niyato, D.: Optimization-Based Virtual Machine Manager for Private Cloud Computing. In: Third IEEE International Conference on Coud Computing Technology and Science (2011)
Brun, Y., Medvidovic, N.: Keeping Data Private while Computing in the Cloud. In: IEEE Fifth International Conference on Cloud Computing (2012)
Liu, X., Qiu, X., Xie, X., Chen, B., Huang, K.: Implement of a Light-Weight Integrated Virtualized Environment Manager for Private Cloud Computing. In: International Conference on Computer Science and Service System (2012)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Rathi, A., Parmar, N. (2015). Secure Cloud Data Computing with Third Party Auditor Control. In: Satapathy, S., Biswal, B., Udgata, S., Mandal, J. (eds) Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014. Advances in Intelligent Systems and Computing, vol 328. Springer, Cham. https://doi.org/10.1007/978-3-319-12012-6_17
Download citation
DOI: https://doi.org/10.1007/978-3-319-12012-6_17
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-12011-9
Online ISBN: 978-3-319-12012-6
eBook Packages: EngineeringEngineering (R0)