Secure Access control Technology towards Data Sharing and Storage in Cloud Computing
Abstract
Cloud computing is a type of appropriated computing wherein assets and application stages are disseminated over the Internet through on request and pay on use premise. Many cloud storage encryption schemes have been acquainted with shield data from the individuals who don't approach. We make utilization of many schemes which accepted that cloud storage providers are protected and secure. Be that as it may, by and by, a few specialists (i.e., coercers) may attempt to uncover data from the cloud without the authorization of the data proprietor. In this paper, we exhibit that the location of obscurity clients with the utilization of our productive deniable encryption conspire, while the phony clients tries to get data from the cloud they will be furnished with some phony files. With the goal that programmers can't hack the files from the cloud. Also, they are happy with their copy record by that way we can secure the proprietor mystery files or confidential files.
Keywords
References
P. Mell and T.Grance, “The NIST Definition of Cloud Computing”, Natinal Institute of Standards and Techology, vol. 53, no.6, pp. 1-3, 2009.
Leonard Heilig and Stefan Vob, “A Scientometric Analysis of Cloud Computing Literature”, IEEE Transactions on Cloud Comouting, vol. 2, no. 3, pp. 266- 278, July-September 2014.
Cohen, Reuven, Rebello and Jagdish, “The State of Cloud Storage: A Benchmark Comparison of Speed, Availability and Scalability”, White paper, Nausni, 2015.
J. J.Wylie, M. Bakkaloglu, V. Pandurangan, M.W. Bigrigg, S. Oguz, K. Tew, C. Williams, G. R. Ganger, and P. K. Khosla, “Selecting the Right Data Distribution Scheme for a Survivable Storage System”, Carnegie Mellon University, Technical Report, May 2001.
Linlin Wu, Saurabh Kumar Garg, Steve Versteeg, and Rajkumar Buyya, “SLA-Based Resource Provisioning for Hosted Software-as-a-Service Applications in Cloud Computing Environments”, IEEE Transactions on Services Computing, vol. 7, no. 3, pp. 465-485, JulySeptember 2014.
K. Hashizume, D. G. Rosado, E. Fernndez-Medina and E. B. Fernandez, “An Analysis of Security Issues for Cloud Computing”, Journal of Internet Services and Applications, vol. 4, no. 1, pp. 1-13, 2013.
G. Kappes, A. Hatzieleftheriou and S. V. Anastasiadis, “Dike: Virtualization-Aware Access Control for Multitenant Filesystems”, University of Ioannina, Greece, Technical Report No. DCS2013-1, 2013.
Srinivasa Rao Chintada, ChandraSekhar Chinta, “Dynamic Massive Data Storage Security Challenges in Cloud Computing Environments”, International Journal of Innovative Research in Computer and Communication Engineering, vol. 2, no. 3, pp. 3609-3616, March 2014.
Kevin D Bowers, Ari. Juels and Alina Oprea, “HAIL: A High Availability and Integrity Layer for Cloud Storage”, In the Proceedings of the 16th ACM Conference on Computer and Communications Security. ACM, pp. 187-198, 2009.
Spillner J, Mller J and Schill A, “Creating Optimal Cloud Storage Systems”, IEEE Transactions on Utility and Cloud Computing, vol. 29, issue. 4, pp. 1062-1072, June 2013.
Refbacks
- There are currently no refbacks.
Copyright © 2012 - 2023, All rights reserved.| ijitr.com
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.