Open Access   Article Go Back

A Review On Cloud Data Security With MHT Based Integrity Authentication Framework

Sajjan R.S.1 , Vijay R. Ghorpade2 , Arkas B.D.3

Section:Review Paper, Product Type: Conference Paper
Volume-04 , Issue-04 , Page no. 47-50, Jun-2016

Online published on Jun 29, 2016

Copyright © Sajjan R.S., Vijay R. Ghorpade , Arkas B.D. . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Sajjan R.S., Vijay R. Ghorpade , Arkas B.D., “A Review On Cloud Data Security With MHT Based Integrity Authentication Framework,” International Journal of Computer Sciences and Engineering, Vol.04, Issue.04, pp.47-50, 2016.

MLA Style Citation: Sajjan R.S., Vijay R. Ghorpade , Arkas B.D. "A Review On Cloud Data Security With MHT Based Integrity Authentication Framework." International Journal of Computer Sciences and Engineering 04.04 (2016): 47-50.

APA Style Citation: Sajjan R.S., Vijay R. Ghorpade , Arkas B.D., (2016). A Review On Cloud Data Security With MHT Based Integrity Authentication Framework. International Journal of Computer Sciences and Engineering, 04(04), 47-50.

BibTex Style Citation:
@article{R.S._2016,
author = { Sajjan R.S., Vijay R. Ghorpade , Arkas B.D.},
title = {A Review On Cloud Data Security With MHT Based Integrity Authentication Framework},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {6 2016},
volume = {04},
Issue = {04},
month = {6},
year = {2016},
issn = {2347-2693},
pages = {47-50},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=101},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=101
TI - A Review On Cloud Data Security With MHT Based Integrity Authentication Framework
T2 - International Journal of Computer Sciences and Engineering
AU - Sajjan R.S., Vijay R. Ghorpade , Arkas B.D.
PY - 2016
DA - 2016/06/29
PB - IJCSE, Indore, INDIA
SP - 47-50
IS - 04
VL - 04
SN - 2347-2693
ER -

           

Abstract

Cloud computing that concern the latest trend in application development for Internet services, relying on clouds of servers to manage multiple tasks that used by individual machines. So without the Internet Cloud is not for the use. The developers initiates special services, such as email, calendars, and word processing, and host them entirely online, also processing of different applications proposed by the cloud of special servers with cloud computing. Cloud storage for storing and sharing data across multiple users become more popular. Cloud computing is innovative trend that supposed to do data storing at data centres. But the limitations of cloud data security don’t prescribe cloud better. To improve data reliability and availability, cloud service providers mature strategies such as storing multiple replicas along with original datasets. Public data auditing schemes enable the users to verify their outsourced data storage without retrieving the whole dataset. Due to the efficiency and security problems the system communication overhead (bandwidth) didn’t maintains data integrity, and public auditing. The on-demand service provision with utilization of limited resources of client system benefits the client. However, data outsourcing paradigm in cloud is one of the biggest security concerns. Frequent integrity checking is needed to keep an eye on data. The proposed scheme makes use of Merkle Hash Tree (MHT) and AES algorithm to ensure data integrity at the unsecured server.

Key-Words / Index Term

Cloud, Merkle Hash Tree, Thired Party Auditor, Public Auditing

References

[1] William stalling, A Handbook on “Cryptography & Network Security, Principles & Practices” Pearson Publisher, 5th edition-2011.
[2] C. Erway, A. C. Papamanthou, and R. Tamassia, “Dynamic provable data possession” in Proc.16th ACM Conf.Comput.Commun. Security, Chicago, USA, 2009, pp. 213–222.
[3] Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, “Enabling public audit ability and data dynamics for storage security in cloud computing,” IEEE Trans. Parallel Distrib. Syst., vol. 22, no. 5,pp. 847–859, May 2011.
[4] C. Liu, J. Chen, L. T. Yang, X. Zhang, C. Yang, R. Ranjan, and K. Ramamohanarao, “Authorized public auditing of dynamic big data storage on cloud with efficient verifiable fine-grained updates,” IEEE Trans. Parallel Distrib. Syst. 2014.
[5] Chang Liu, Rajiv Ranjan, Chi Yang, Xuyun Zhang, Lizhe Wang, Senior Member “ MuR-DPA: Top-Down Levelled Multi-Replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud ” IEEE Transactions On Computers, Vol. 64, No. 9, September 2015.
[6] Yubin Xia, Yutao Liu, Haibing Guan, Yunji Chen, Tianshi Chen, Binyu Zang, Haibo Chen, “Secure Outsourcing of Virtual Appliance” IEEE Transactions on Cloud Computing DOI. 2015
[7] Christina Delimitrou and Christos Kozyrakis Security Implications of Data Mining in Cloud Scheduling”, IEEE Computer Architecture Letters 2015.
[8] Jin Li, Xiaofeng Chen, Xinyi Huang, Shaohua Tang and Yang Xiang Senior Member, IEEE and Mohammad Mehedi Hassan Member, IEEE and Abdulhameed Alelaiwi Member, IEEE “Secure Distributed Deduplication Systems with Improved Reliability” IEEE Transactions on Computers 2015.
[9] Sumitra Samal, Barkha Agrawal, Richa Parija “A Study on Different Symmetric Key Cryptographic Algorithm” Vol. 8 No.4 Page no (1-5) Apr 2016.
[9] IEEE Explore Abstract, http://ieeexplore.ieee.org March 11 2016.
[10] Amazon Web Services, https://aws.amazon.com/, Feb 10 2016.
[11 Data security in cloud computing, https://www.youtube.com/ March 20 2016.
[12] Open Stack Open Source Cloud Software, http://openstack.org/
Feb 15 2016.