Home            Contact us            FAQs
    
      Journal Home      |      Aim & Scope     |     Author(s) Information      |      Editorial Board      |      MSP Download Statistics

     Research Journal of Applied Sciences, Engineering and Technology


Enhancing Security in Cloud Computing for Third Party Auditor by Self-destruction Mechanism

Muzammil H. Mohammed
Department of Information Technology, College of Computers and Information Technology, Taif University, Taif, Saudi Arabia
Research Journal of Applied Sciences, Engineering and Technology  2014  3:354-357
http://dx.doi.org/10.19026/rjaset.8.980  |  © The Author(s) 2014
Received: February 22, 2014  |  Accepted: May ‎19, ‎2014  |  Published: July 15, 2014

Abstract

The main aim study in cloud computing system, large amount of data can be maintained in the cloud storage system and it can be used for application based services for client. The bulk amount of data privacy will not be properly maintained by the cloud service provider. Without knowledge of authorized client, data can be viewed by another user with the permission of Cloud Service Provider (CSP). Many cryptography technique can be used for data privacy in the TPA (Third Party Auditor) which is the trusted authority to audit and verify the integrity in cloud. The cloud loaded data can be viewed by authorized user and copy of data can be in tag based data placed in TPA and data privacy can be affected in TPA system. In the proposed system, data privacy can be maintained in the TPA view by using self destruction mechanism to destroy the data after the view point of data for particular time and then the viewed data copy can be destruction in TPA. The cloud service provider can be securely loading the data in cloud via TPA Server. The main advantage of the self destruction mechanism security for the data in cloud via TPA server without the permission of the particular authenticated client other user cannot viewed the individual client data. Then data privacy can be perfectly maintained in the cloud service.

Keywords:

Cloud service provider , self-destructing data , trusted third party auditor,


References

  1. Devulapalli, A., I.T. Murugandi, D. Xu and P. Wyckoff, 2009. Design of an Intelligent Object-Based Storage Device [Online].
    Direct Link
  2. Geambasu, R., T. Kohno, A.A. Levy and H.M. Levy, 2009. Vanish: Increasing data privacy with self-destructing data. Proceeding of the 18th Conference on USENIX Security Symposium, pp: 299-316.
  3. John, T.M., A.T. Ramani and J.A. Chandy, 2008. Active storage using object-based devices. Proceeding of IEEE International Conference on Cluster Computing, pp: 472-478.
    CrossRef    
  4. Shamir, A., 1979. How to share a secret. Commun. ACM, 22(11): 612-613.
    CrossRef    
  5. Son, S.W., S. Lang, P. Carns, R. Ross, R. Thakur, B. Ozisikyilmaz, W.K. Liao and A. Choudhary, 2013. Enabling active storage on parallel I/O software stacks. Proceeding of IEEE 26th Symposium on Mass Storage Systems and Technologies (MSST'2010), pp: 1-12.
  6. Wolchok, S., O.S. Hofmann, N. Heninger, E.W. Felten, J.A. Halderman, C.J. Rossbach, B. Waters and E. Witchel, 2010. Defeating Vanish with Low-Cost Sybil Attacks against Large DHEs.
    Direct Link
  7. Zeng, L., Z. Shi, S. Xu and D. Feng, 2010. Safe vanish: An improved data self-destruction for protecting data privacy. Proceeding of 2nd International Conference on Cloud Computing Technology and Science (CloudCom). Indianapolis, IN, USA, pp: 521-528.
  8. Zhang, Y. and D. Feng, 2008. An active storage system for high performance computing. Proceeding of 22nd International Conference on Advanced Information Networking and Applications (AINA, 2008), pp: 644-651.
    CrossRef    

Competing interests

The authors have no competing interests.

Open Access Policy

This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

Copyright

The authors have no competing interests.

ISSN (Online):  2040-7467
ISSN (Print):   2040-7459
Submit Manuscript
   Information
   Sales & Services
Home   |  Contact us   |  About us   |  Privacy Policy
Copyright © 2024. MAXWELL Scientific Publication Corp., All rights reserved