Loading

A Serial Based Encryption for Enhanced Access Control in Cloud Computing
N.Pandeeswari1, P.Ganesh Kumar2, P.C.Rubini3
1N.Pandeeswari, Assistant Professor, Dept. of  IT, PSNA College of  Engineering and Technology Dindigul, (Tamil Nadu), India.
2P. Ganesh Kumar, Professor,  Dept. of IT, PSNA College of Engineering and Technology Dindigul, (Tamil Nadu), India.
3P.C. Rubini,  Dept. of  IT, PSNA College of Engineering and Technology Dindigul, (Tamil Nadu), India.
Manuscript received on March 20, 2013. | Revised Manuscript received on April 11, 2013. | Manuscript published on April 30, 2013. | PP: 209-211 | Volume-2, Issue-4, April 2013. | Retrieval Number: D1366042413/2013©BEIESP

Open Access | Ethics and Policies | Cite
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Cloud storage allows us to enjoy the on demand cloud application without any hardware implementation. Cloud provides the service a required by the cloud user in a rental basis. Even though the cloud issues the cloud application without any physical implementation results in a security risk since the cloud data can be accessed by everyone. To avoid security issue in the outsourced data a prevention measure is needed to secure the data from unauthenticated users or intruders. A flexible distributed storage integrity mechanism utilising homomorphic tokens and is proposed in this paper to provide security in the outsourced cloud data. This mechanism include the techniques such In order to address security for outsourced data and secure cloud storage, we propose in this paper a flexible distributed storage integrity checking mechanism, utilizing the homomorphism token and distributed erasure-coded data. The proposed design allows users to audit the cloud storage with very low computation cost and lightweight communication. The auditing result not only guarantees strong cloud storage correctness, but also simultaneously identifies fast data error localization, i.e., the identification of misbehaving server. Considering the cloud data are dynamic in nature, the proposed design further supports secure and efficient dynamic operations on outsourced data, including block modification, deletion, and append. Analysis shows the proposed scheme is highly efficient and resilient against Byzantine failure, malicious data modification attack.
Keywords: Cloud provides the security risk since the cloud data can be accessed by everyone.