Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 328))

Abstract

Cloud computing has been targeted as the future on demand architecture of IT enterprise. Cloud Computing can be used with trustworthy mechanism to provide greater data resources in comparison to the traditional limited resource computing. But the security challenges can stop the feasibility in the use of IT enterprises. In this paper, our aim is to provide a trustworthy solution for the cloud computing. Our proposed methodology provides secure centralized control and alert system. We are applying the same token with distributed verification with the centralized data scheme. Our approach achieves the integration of storage correctness insurance and data error localization, i.e., the identification of misbehaving clients and it can be control by the servers. It can support data updating, deletion and visualization on demand with the restrictive tokenization. Extensive security and performance analysis shows that the proposed scheme is highly efficient and resilient against Byzantine failure, malicious data modification attack, and even colluding attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R.H., Konwinski, A., Lee, G., Patterson, D.A., Rabkin, A., Stoica, I., Zaharia, M.: Above the clouds: A berkeley view of cloud computing. University of California, Berkeley, Tech. Rep. UCB-EECS-2009-28 (February 2009)

    Google Scholar 

  2. Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Lee, G., Patterson, D.A., Rabkin, A., Stoica, I., Zaharia, M.: Above the clouds: A berkeley view of cloud computing (February 2009)

    Google Scholar 

  3. Brahman, S.K., Patel, B.: Java Based Resource Sharing with Secure Transaction in User Cloud Environment. International Journal of Advanced Computer Research (IJACR) 2(3(5)) (September 2012)

    Google Scholar 

  4. Guha, V., Shrivastava, M.: Review of Information Authentication in Mobile Cloud over SaaS & PaaS Layers. International Journal of Advanced Computer Research (IJACR) 3(1(9)) (March 2013)

    Google Scholar 

  5. Dubey, A.K., Dubey, A.K., Namdev, M., Shrivastava, S.S.: Cloud-User Security Based on RSA and MD5 Algorithm for Resource Attestation and Sharing in Java Environment. In: CONSEG 2012 (2012)

    Google Scholar 

  6. Singh, A., Shrivastava, M.: Overview of Security issues in Cloud Computing. International Journal of Advanced Computer Research (IJACR) 2(1) (March 2012)

    Google Scholar 

  7. Ruiz-Agundez, I., Penya, Y.K., Bringas, P.G.: Cloud Computing Services Accounting. International Journal of Advanced Computer Research (IJACR) 2(2) (June 2012)

    Google Scholar 

  8. Prakash, A.K.A.V.: Implement Security using smart card on Cloud. International Journal of Advanced Computer Research (IJACR) 3(1(9)) (March 2013)

    Google Scholar 

  9. So, K.: Cloud computing security issues and challenges. International Journal of Computer Networks (2011)

    Google Scholar 

  10. Gonzalez, et al.: A quantitative analysis of current security concerns and solutions for cloud computing. Journal of Cloud Computing: Advances, Systems and Applications 1, 11 (2012)

    Google Scholar 

  11. Lee, K.: Security Threats in Cloud Computing Environments. International Journal of Security & Its Applications 6(4) (2012)

    Google Scholar 

  12. Shaikh, F.B., Haider, S.: Security threats in cloud computing. In: 2011 International Conference for Internet Technology and Secured Transactions (ICITST), December 11-14, pp. 214–219 (2011)

    Google Scholar 

  13. Popović, K., Hocenski, Z.: Cloud computing security issues and challenges. In: 2010 Proceedings of the 33rd International Convention on MIPRO, May 24-28, pp. 344–349 (2010)

    Google Scholar 

  14. Li, M., Yu, S., Cao, N., Lou, W.: Authorized Private Keyword Search over Encrypted Data in Cloud Computing. In: 31st International Conference on Distributed Computing Systems (2011)

    Google Scholar 

  15. Yang, Y.: Towards multi-user private keyword search for cloud computing. In: 2011 IEEE International Conference on Cloud Computing (CLOUD), pp. 758–759. IEEE (2011)

    Google Scholar 

  16. Waqar, A., Raza, A., Abbas, H.: User Privacy Issues in Eucalyptus: A Private Cloud Computing Environment. In: International Joint Conference of IEEE TrustCom 2011/IEEE ICESS 2011/FCST 2011 (2011)

    Google Scholar 

  17. Liao, W.-H., Su, S.-C.: A Dynamic VPN Architecture for Private Cloud Computing. In: Fourth IEEE International Conference on Utility and Cloud Computing (2011)

    Google Scholar 

  18. Niyato, D.: Optimization-Based Virtual Machine Manager for Private Cloud Computing. In: Third IEEE International Conference on Coud Computing Technology and Science (2011)

    Google Scholar 

  19. Brun, Y., Medvidovic, N.: Keeping Data Private while Computing in the Cloud. In: IEEE Fifth International Conference on Cloud Computing (2012)

    Google Scholar 

  20. Liu, X., Qiu, X., Xie, X., Chen, B., Huang, K.: Implement of a Light-Weight Integrated Virtualized Environment Manager for Private Cloud Computing. In: International Conference on Computer Science and Service System (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Rathi, A., Parmar, N. (2015). Secure Cloud Data Computing with Third Party Auditor Control. In: Satapathy, S., Biswal, B., Udgata, S., Mandal, J. (eds) Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014. Advances in Intelligent Systems and Computing, vol 328. Springer, Cham. https://doi.org/10.1007/978-3-319-12012-6_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-12012-6_17

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-12011-9

  • Online ISBN: 978-3-319-12012-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics