Volume- 2
Issue- 3
Year- 2014
Article Tools: Print the Abstract | Indexing metadata | How to cite item | Email this article | Post a Comment
Saurabh Rajput, , Swaroop Kotme, , Ashish Singh, , Prof.Saba Siraj,
As in this paper we have proposed a cloud data storage redefines the security issues and targeted on customer’s outsourced data (data that is not stored/retrieved from the costumers own servers). In this project we came to know, from a customer’s point of view, relying upon a solo Service Provider (SP) for his outsourced data is not very promising. In this we have proposed security as well as availability in this there are data divided into parts store on different providers the data which is divided is also store on backup servers so if the data could not get retrieve from main server can be retrieved from the backup server so it ensures availability and as data is divided into parts it is secured and whole data could not be changed or retrieved by someone else.
[1] Yashaswi Singh, Farah Kandah, Weiyi Zhang “Secured cost effective multi-cloud data storage in cloud computing”, IEEE INFOCOM WORKSHOP ON CLOUD COMPUTINGDartment of Computer Science, North Dakota State University, Fargo, ND 58105 ,2011 , NO.05
[2] Rafael Moreno-Vozmediano, Ruben S. Montero, and Ignacio M. Llorente, ,” Multicloud Deployment of Computing Clusters for Loosely Coupled MTC Applications”, IEEEComputer Society, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 22, JUNE 2011, NO. 6.
[3] P. S. Browne, “Dataprivacy and integrity: an overview”, In Proceeding of SIGFIDET ’71 Proceedings of the ACM SIGFIDET (now SIGMOD), 1971.
[4] A. Cavoukian, “Privacy in clouds”, Identity in the Information Society, Dec 2008.
[5] J. Du, W. Wei, X. Gu, T. Yu, “RunTest: assuring integrity of dataflowprocessing in cloud computing infrastructures”, In Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS ’10), ACM, New York, NY, USA, 293-304,2010.
[6]S. H. Shin, K. Kobara, “Towards secure cloud storage”, Demo for CloudCom2010,VOL 02, Dec 2010. [8] N. Gruschka, M. Jensen, “Attack surfaces: A taxonomy for attacks on cloud services”, Cloud Computing (CLOUD), 2010 IEEE 3rd International Conference on, 5-10 July 2010.
[9] R. Gellman, “Privacy in the clouds: Risks to privacy and confidentiality from cloud computing”, Prepared for the World Privacy Forum, online at http://www.worldprivacyforum.org/pdf/WPF Cloud Privacy Report.pdf,Feb 2009.
[10] W. Itani, A. Kayssi, A. Chehab, “Privacy as a Service:Privacy-Aware Data Storage and Processing in Cloud Computing Architectures,” 8 th IEEE International Conference on Dependable, Autonomic and Secure Computing, Dec 2009
B.E Computer Engineering, Institute of Knowledge-College Of Engineering, Pune,India
No. of Downloads: 4 | No. of Views: 1042
Anu Sharma, Vivek Kumar.
May 2023 - Vol 11, Issue 3
Venkateswaran Radhakrishnan.
May 2023 - Vol 11, Issue 3
Heemakshi Sharma, Khushboo Tripathi.
May 2023 - Vol 11, Issue 3