Open Access   Article Go Back

Facilitating Security Using Third Party Auditing Based on Fragmentation

K. Sekar1 , G.V. Ramesh Babu2 , Sasidhar Sake3

Section:Research Paper, Product Type: Journal Paper
Volume-07 , Issue-06 , Page no. 91-94, Mar-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7si6.9194

Online published on Mar 20, 2019

Copyright © K. Sekar, G.V. Ramesh Babu, Sasidhar Sake . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: K. Sekar, G.V. Ramesh Babu, Sasidhar Sake, “Facilitating Security Using Third Party Auditing Based on Fragmentation,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.06, pp.91-94, 2019.

MLA Style Citation: K. Sekar, G.V. Ramesh Babu, Sasidhar Sake "Facilitating Security Using Third Party Auditing Based on Fragmentation." International Journal of Computer Sciences and Engineering 07.06 (2019): 91-94.

APA Style Citation: K. Sekar, G.V. Ramesh Babu, Sasidhar Sake, (2019). Facilitating Security Using Third Party Auditing Based on Fragmentation. International Journal of Computer Sciences and Engineering, 07(06), 91-94.

BibTex Style Citation:
@article{Sekar_2019,
author = {K. Sekar, G.V. Ramesh Babu, Sasidhar Sake},
title = {Facilitating Security Using Third Party Auditing Based on Fragmentation},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2019},
volume = {07},
Issue = {06},
month = {3},
year = {2019},
issn = {2347-2693},
pages = {91-94},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=874},
doi = {https://doi.org/10.26438/ijcse/v7i6.9194}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i6.9194}
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=874
TI - Facilitating Security Using Third Party Auditing Based on Fragmentation
T2 - International Journal of Computer Sciences and Engineering
AU - K. Sekar, G.V. Ramesh Babu, Sasidhar Sake
PY - 2019
DA - 2019/03/20
PB - IJCSE, Indore, INDIA
SP - 91-94
IS - 06
VL - 07
SN - 2347-2693
ER -

           

Abstract

In Cloud computing, which is a evolving technology, security requirement is very essentials when the services are provided by the third party venders.This paper concentrates on a well-connected association between secure cloud storage and network coding. To overcome the problem of old cryptography encoding and to provide cloud surroundings with a reliable third party. This can prevent the possibility of all information about getting hacked at one time and additionally provides access management and safe removal file. Homomorphic digital signature makes use of better technology to facilitate access to authorized users only. The proposed protocol is highly economical and provides a reasonable intrusion from an anonymous party. Hence, the overall outcome expected from these tasks is to provide information access to cloud environments. The proposed systems reduce the time required to secure the new systematic structure of the Cloud Storage Protocol and provide security in uploading and downloading files.

Key-Words / Index Term

Cloud storage auditing, network coding, security, fragmentation, user anonymity, third-party public auditing

References

[1] Fei Chen, Tao Xiang, Yuan Yang, Sherman S. M. Chow “Secure Cloud Storage Meets with Secure Network Coding” IEEE INFOCOM 2014- IEEE Conference on Computer Communications, 978-1-4799-3360-0/14/.
[2] Mazhar Ali, Saif U. R. Malik, Samee U. Khan,” DaSCE: Data Security for Cloud Environment with Semi-Trusted Third Party,” IEEE Transaction on journal name, manuscript ID IN 2015.
[3] Arjun Kumar, Byung Gook Lee, HoonJae Lee”, Secure Storage and Access of Data in Cloud Computing” 978-1- 4673-4828- 7/12/$31.00 ©2012 IEEE.
[4] Seung-Hyun Seo, Mohamed Nabeel, Xiaoyu Ding, and Elisa Bertino,” An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds,” IEEE Transaction on knowledge and data engineering VOL. 26, NO. 9, SEPTEMBER 2014.
[5] A. Juels and B. Kaliski Jr, "PORs: Proofs of retrievability for large files," Proc. ACM Conf. Comput.Commune. Security, pp. 584-597, 2007.
[6] Ning Cao, Cong Wang, Ming Li, Kui Ren and Wenjing Lou,” Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data,” IEEE Transaction onparallel and distributed system, VOL. 25, NO. 1, JANUARY 2014.
[7] International Journal of Scientific & Engineering Research, Volume 4, Issue 8, August-2013 128 ISSN 2229-5518 IJSER © 2013 http://www.ijser.org “The impact of different MAC protocols for Network Coding in Adhoc Network.”
[8] C. Wang, S. S. M. Chow, Q. Wang, K. Ren, and W. Lou, “Privacy-preserving public auditing for secure cloud storage,” IEEE Transactions on Computers, vol. 62, no. 2, pp. 362–375, 2013.
[9] K. Yang and X. Jia, “An efficient and secure dynamic auditing protocol for data storage in cloud computing,” IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 9, pp. 1717–1726, 2013.
[10] R. Ahlswede, N. Cai, S.-Y. Li, and R. W. Yeung, “Network information flow,” IEEE Transactions on Information Theory, vol. 46, no. 4, pp. 1204–1216, 2000