A Secure Framework for User Data Storage in Public Cloud Systems using Symmetric Cryptography
نویسندگان
چکیده
Cloud computing is a paradigm shift over the Internet which provides instant access to software, hardware and computing information resources for use when they needed. Cloud Computing is the access of data, software applications and computer processing power through a “cloud” of online resources. Cloud computing involves storage of user data in the cloud. Cloud architectures will constitute cost efficient mechanism that will support the storage, transmission and processing of the user application contents. A user can access cloud service as a utility service. The diversity of the services delivered through the cloud and sharing the distributed resources via network in the open environment results in a challenge to ensure that only authorized users can gain access to it. Thus, there is a critical need to have a secure framework for ensuring confidentiality and integrity of stored data in cloud. To ensure the data security, we proposed a method for efficiently storing and data in a cloud infrastructure by building secure channels for data communication.
منابع مشابه
Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems
Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...
متن کاملCloud Computing 1. Attribute Based Encryption with Privacy Preserving In Clouds
Security and privacy are very important issues in cloud computing. In existing system access control in clouds are centralize d in nature. The scheme uses a symmetric key approach and does not support authentication. Symmetric key algorithm uses same key for both encryption and decryption. The authors take a centralized approach where a single key distribution center (KDC) distributes secret ke...
متن کاملFuzzy retrieval of encrypted data by multi-purpose data-structures
The growing amount of information that has arisen from emerging technologies has caused organizations to face challenges in maintaining and managing their information. Expanding hardware, human resources, outsourcing data management, and maintenance an external organization in the form of cloud storage services, are two common approaches to overcome these challenges; The first approach costs of...
متن کاملComparative Study of Public Auditing and Replica for Secure Cloud Storage
Using Cloud computing user can store their data secure without load of local user computer. And this feature additionally should be cable enough to provide user to maintain the cloud storage, as it is if same is maintained in the local, where no consideration required verifying the data integrity. On top by enabling and having public audit for cloud storage, which cab check the integrity of dat...
متن کاملEncryption Based Security Model for Cloud Environment
In recent day, the enormous usage of cloud services leads to much concerned on cloud security. This paper primarily considers the important aspect of cloud security based on encryption. The users perform secure search on cloud environment using this method. Data stored in cloud are encrypted which ensure the privacy of the user; the files are encrypted before uploading. At the time of searching...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013