Advertisement

Enhanced Security Framework for Data Integrity Using Third-party Auditing in the Cloud System

  • Balamurugan Balusamy
  • P. Venkatakrishna
  • Abinaya Vaidhyanathan
  • Meenakshi Ravikumar
  • Nirmala Devi Munisamy
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 325)

Abstract

Cloud computing is an evolving paradigm that has been resulted as an adoption of available technologies. Although cloud technology allows users to take more benefits from available infrastructures, and virtualization, which is an enabling technology provided by the cloud allows users to manage and use the resources in an efficient and easiest manner, it does not guarantee data integrity and security over the resources stored in the cloud. Though many security frameworks have been developed for the cloud, still there may be loss of data or loss of control over data uploaded into the cloud. And also, many solutions for data integrity by third-party auditor are available but they are semi-trustable, if third-party auditors (TPA) compromise unauthorized access over the resource in the cloud. Hence, our proposed scheme focuses on extended framework that guarantees data integrity by involving data owner to perform auditing on the outsourced data in the cloud. And so, our proposed scheme achieves data integrity and guarantees security to the data owners for their resource in the cloud to major extent. Therefore, this type of TPA approach creates awareness to the data owner of their resource and thereby guarantees data integrity for every resources stored in the cloud.

Keywords

Cloud service provider Data integrity Third-party auditor 

References

  1. 1.
    G. Roopa, S. Manjunath, Secure way of storing data in cloud using third party auditor. IOSR J. Comput. Eng. (IOSR-JCE) 12(4), 69–74 (2013)Google Scholar
  2. 2.
    L. Li, L. Xu, J. Li, C. Zhang, Study on the third-party audit in cloud storage service, in International Conference on Cloud and Service Computing (2011)Google Scholar
  3. 3.
    C. Wang, S.S.M. Chow, Q. Wang, K. Ren, W. Lou, Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362–375 (2013)Google Scholar
  4. 4.
    G. Delong, Use of Third Party Audit to Verify Sources from Farm to SupplierGoogle Scholar
  5. 5.
    U. Vijayaraghavan, R.M. Arieth, K. Geethanjali, Proof of retrievability: a third party auditor using cloud computing. Int. J.␣Emerg. Technol. Adv. Eng. ISO 9001:2008 Certified J. 3(7) (2013)Google Scholar
  6. 6.
    S.V. Marshal, Secure audit service by using TPA for data integrity in cloud system. Int. J.␣Innovative Technol. Exploring Eng. (IJITEE) 3(4) (2013)Google Scholar
  7. 7.
    S. Han, J. Xing, Ensuring data storage security through a novel third party auditor scheme in cloud computing, in Proceedings of IEEE CCIS (2011)Google Scholar
  8. 8.
    M. Hussain, H. Abdulsalam, SECaaS: security as a service for cloud-based applicationsGoogle Scholar
  9. 9.
    V. Vinaya, P. Sumathi, Implementation of effective third party auditing for data security in cloud. Int. J.␣Adv. Res. Comput. Sci. Softw. Eng. 3(5) (2013)Google Scholar
  10. 10.
    T.J. Salma, A flexible distributed storage integrity auditing mechanism in cloud computingGoogle Scholar
  11. 11.
    J. Xu, Auditing the Auditor: Secure Delegation of Auditing Operation Over Cloud Storage (National University of Singapore, Singapore)Google Scholar
  12. 12.
    L.D. Dhinesh Babu, P. Venkata Krishna, Versatile time-cost algorithm (VTCA) for scheduling non-preemptive tasks of time critical workflows in cloud computing systems. Int. J.␣Commun. Netw. Distrib. Syst. 11(4), 390–411 (2013)Google Scholar

Copyright information

© Springer India 2015

Authors and Affiliations

  • Balamurugan Balusamy
    • 1
  • P. Venkatakrishna
    • 1
  • Abinaya Vaidhyanathan
    • 1
  • Meenakshi Ravikumar
    • 1
  • Nirmala Devi Munisamy
    • 1
  1. 1.VIT UniversityVelloreIndia

Personalised recommendations