Enterprise Cloud Storage and Computation Security

نویسندگان

  • Rajeev Yadav
  • Shreya Sharma
  • Avinash Sharma
  • E. S. Al-Shaer
  • T. E. Uribe
  • Z. Su
  • H. Chen
  • C. Chuah
چکیده

Cloud computing acts as a computing paradigm that aims to provide huge amount of computing in a fully virtualized manner by aggregating resources and thus offering a single system view. Cloud Computing is also delivered as utility assuring customized and quality of service guaranteed computation environments for cloud users. While an enterprise organization is composed of different departments like finance, admin etc these departments are segregated as sub network zone which are thus interconnected via network. Securities are essential for authorization of storage and computing. In this paper we have proposed a privacy cheating discouragement and computation auditing approach that bridging secure storage and computation auditing in cloud. Privacy cheating discouragement is designated by verifier signature, batch verification and probabilistic sampling techniques.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Case for Enterprise-Ready Virtual Private Clouds

Cloud computing platforms such as Amazon EC2 provide customers with flexible, on demand resources at low cost. However, while existing offerings are useful for providing basic computation and storage resources, they fail to provide the security and network controls that many customers would like. In this work we argue that cloud computing has a great potential to change how enterprises run and ...

متن کامل

Enterprise-Ready Virtual Cloud Pools: Vision, Opportunities and Challenges

Cloud computing platforms such as Amazon EC2 provide customers with flexible, on-demand resources at low cost. However, while existing offerings are useful for providing basic computation and storage resources, they have not provided the transparency, security and network controls that many enterprise customers would like. While cloud computing has a great potential to change how enterprises ru...

متن کامل

A Literature Review on Cloud Computing Security Issues

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

متن کامل

Design and Implementation of Access Control as a Service for IaaS Cloud

Organizations and enterprises have been outsourcing their computation, storage, and workflows to Infrastructure-as-a-Service (IaaS) based cloud platforms. The heterogeneity and high diversity of IaaS cloud environment demand a comprehensive and finegrained access control mechanism, in order to meet dynamic, extensible, and highly configurable security requirements of these cloud consumers. Howe...

متن کامل

A Literature Review on Cloud Computing Security Issues

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015