Scheme for ensuring data security on cloud data storage in a semi-trusted third party auditor

ZA Hussien, H Jin, ZA Abduljabbar… - 2015 4th …, 2015 - ieeexplore.ieee.org
2015 4th International Conference on Computer Science and Network …, 2015ieeexplore.ieee.org
Cloud computing is a promising information technology service that allocates and
reallocates resources when a client requires virtual data storage and network facility at any
time and place. Cloud computing provides large data storage and management services at
the lowest cost. Thus, it is crucial for many organizations and clients who seek such services.
Data security and integrity are necessary and play important roles. However, these two
issues are facing significant challenges. Therefore, a robust scheme is required to ensure …
Cloud computing is a promising information technology service that allocates and reallocates resources when a client requires virtual data storage and network facility at any time and place. Cloud computing provides large data storage and management services at the lowest cost. Thus, it is crucial for many organizations and clients who seek such services. Data security and integrity are necessary and play important roles. However, these two issues are facing significant challenges. Therefore, a robust scheme is required to ensure security and privacy while transmitting or storing data in the cloud storage environment. We propose an efficient and robust scheme to ensure data security in a semi-trusted third party auditor. Our scheme adopts an advanced encryption standard to support data owner privacy, a cryptography hash function to maintain data owner integrity, and elliptic curve cryptography to ensure data confidentiality, correctness, and security when transmitting data over unsecure channels. A security analysis confirms that our scheme can withstand man-in-the-middle attack and provides data correctness.
ieeexplore.ieee.org
以上显示的是最相近的搜索结果。 查看全部搜索结果

Google学术搜索按钮

example.edu/paper.pdf
搜索
获取 PDF 文件
引用
References