Efficient Implementation of Proof of Retrievability (OPOR) In Cloud Computing With Resource Constrained Devices
نویسنده
چکیده
Cloud computing has become an integral part of IT services, storing the application softwares and databases in large centralized shared data servers. Since it’s a shared platform, the data and services may not be fully trust worthy. In this work, we have implemented an efficient security model that ensures the data integrity of stored data in cloud servers. The computational load of data verification linearly grows with the complexity of the security model and this poses a serious problem at the resource constrained user’s end. Therefore to tackle this problem we have implemented a new cloud storage scheme which ensures proof of retrivebility (OPoR) at a third party cloud audit server to pre-process data before uploading into cloud storage server.
منابع مشابه
DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation
Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...
متن کاملA review of methods for resource allocation and operational framework in cloud computing
The issue of management and allocation of resources in cloud computing environments, according to the breadth of scale and modern technology implementation, is a complicated issue. Issues such as: the heterogeneity of resources, resource dependencies to each other, the dynamics of the environment, virtualization, workload diversity as well as a wide range of management objectives of cloud servi...
متن کاملPublic Proof of Retrievability Scheme against Active Attack in Cloud Storage
Data integrity is one of the major concerns with cloud data storage for cloud user. Besides, the cloud user’s constrained computing capabilities make the task of data integrity auditing expensive and even formidable. In recent years, many public data integrity verification schemes have been proposed, however, most of them are vulnerable to an efficient active attack, which means that the active...
متن کاملIntegrated modeling and solving the resource allocation problem and task scheduling in the cloud computing environment
Cloud computing is considered to be a new service provider technology for users and businesses. However, the cloud environment is facing a number of challenges. Resource allocation in a way that is optimum for users and cloud providers is difficult because of lack of data sharing between them. On the other hand, job scheduling is a basic issue and at the same time a big challenge in reaching hi...
متن کاملA Model based on Cloud Computing for the implementation and management IT services in Banks
In recent years, the banking industry has made significant changes in technology and communications. The expansion of electronic communications and a large number of people around the world access to the Internet, appropriate to establish trade and economic exchanges provided but high costs, lack of flexibility and agility in existing systems because of the large volume of information, confiden...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016