Loading web-font TeX/Math/Italic
Securing cloud database by Data Fusing Technique (DFT) using Cloud Storage Controller (CSC) | IEEE Conference Publication | IEEE Xplore

Securing cloud database by Data Fusing Technique (DFT) using Cloud Storage Controller (CSC)


Abstract:

In the field of cloud computing the approach for sharing of data and storage between a group of people requires efficient approach with cost cutting and low maintenance p...Show More

Abstract:

In the field of cloud computing the approach for sharing of data and storage between a group of people requires efficient approach with cost cutting and low maintenance procedure. Sharing of outsourced files assures security and ensures data veracity according to the frequent changes in shared data files. Issues like preserving privacy of data among the group stored data shared in common cloud storage. Prominent attacks within the cloud requires scheme of defense mechanisms use key distribution mechanism in secured communication channels. Some of the existing system use fine grain access control with revoked user that protects prominent attacks for original data achieving security. In our proposed paper we inculcate a Cloud Storage Controller (CSC) that manages the allocation of group of data stored and it can only referenced and cannot download any database from cloud. The data will be blended together into one of two sets for example if two users storing data of 2 megabyte and 3 megabyte each then that will be merged together as two datasets with 1 megabyte of first user and 1 megabyte of second user. In the second data set it merges 1 megabyte of first user and 2 megabyte of second user using Fusing Data Technique (FDT). Every dataset will be bookmarked which symbolizes the user that dataset belongs to and that will be indexed in the Cloud Storage controller (CSC). It helps in fast and highly secured datasets storage management in cloud storage system. It achieves efficient database privacy and revokes user data swiftly and securely.
Date of Conference: 24-24 October 2016
Date Added to IEEE Xplore: 30 March 2017
ISBN Information:
Conference Location: Coimbatore, India
References is not available for this document.

I. Introduction

While estimating the cloud data sharing of essential data sharing in storage system with low maintenance cost that provide maintenance for utilizing the resources [1]. It provides abstract of cloud service providers with abstract and infinite data storage space that offers clients for data group. It helps in cutting down the costs and database management over various locations of cloud servers [2]. The control for security concerns made to outsource data with big data storage that has very reactive and responsive cloud database providers. The database preserving data privacy that encrypts cloud stored data that is uploaded by the users [3]. It has secured and efficient data sharing for special dynamic cloud data group. Cloud based multiuser services with worldwide web services in cloud storage accessing and managing the cloud services [4]. It reduces costs with set of rules which has secure and fast operations. They normally have rule based order of information that has regulations for sending and receiving information stored in cloud data [5]. They have redundant values causing security by protecting the problems with redundant database storage. The efficient mechanism for controlling the open source for hindering system process has computation speed [6]. They improvise their processing speed along with packet travelling methods in core system using hashing functions.

Select All
1.
M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, et al., "A view of cloud computing", Commun. ACM, vol. 53, no. 4, pp. 50-58, Apr. 2010.
2.
S. Kamara and K. Lauter, "Cryptographic cloud storage", Proc. Int. Conf. Financial Cryptography Data Security, pp. 136-149, Jan. 2010.
3.
M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang and K. Fu, "Plutus: Scalable secure file sharing on untrusted storage", Proc. USENIX Conf. File Storage Technol., pp. 29-42, 2003.
4.
E. Goh, H. Shacham, N. Modadugu and D. Boneh, "Sirius: Securing remote untrusted storage", Proc. Netw. Distrib. Syst. Security Symp., pp. 131-145, 2003.
5.
G. Ateniese, K. Fu, M. Green and S. Hohenberger, "Improved proxy re-encryption schemes with applications to secure distributed storage", Proc. Netw. Distrib. Syst. Security Symp., pp. 29-43, 2005.
6.
S. Yu, C. Wang, K. Ren and W. Lou, "Achieving secure scalable and fine-grained data access control in cloud computing", Proc. ACM Symp. Inf. Comput. Commun. Security, pp. 282-292, 2010.
7.
V. Goyal, O. Pandey, A. Sahai and B. Waters, "Attribute-based encryption for fine-grained access control of encrypted data", Proc. ACM Conf. Comput. Commun. Security, pp. 89-98, 2006.
8.
R. Lu, X. Lin, X. Liang and X. Shen, "Secure provenance: The essential of bread and butter of data forensics in cloud computing", Proc. ACM Symp. Inf. Comput. Commun. Security, pp. 282-292, 2010.
9.
B. Waters, "Ciphertext-policy attribute-based encryption: An expressive efficient and provably secure realization", Proc. Int. Conf. Practice Theory Public Key Cryptography Conf. Public Key Cryptography, pp. 53-70, 2008.
10.
X. Liu, Y. Zhang, B. Wang and J. Yang, "Mona: Secure multiowner data sharing for dynamic groups in the cloud", IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 6, pp. 1182-1191, Jun. 2013.
11.
D. Boneh, X. Boyen and E. Goh, "Hierarchical identity based encryption with constant size ciphertext", Proc. Annu. Int. Conf. Theory Appl. Cryptographic Techn., pp. 440-456, 2005.
12.
C. Delerablee, P. Paillier and D. Pointcheval, "Fully collusion secure dynamic broadcast encryption with constant-size Ci-phertexts or decryption keys", Proc. 1st Int. Conf. Pairing-Based Cryptography, pp. 39-59, 2007.
13.
Z. Zhu, Z. Jiang and R. Jiang, "The attack on mona: Secure multiowner data sharing for dynamic groups in the cloud", Proc. Int. Conf. Inf. Sci. Cloud Comput., pp. 185-189, Dec. 7, 2013.
14.
L. Zhou, V. Varadharajan and M. Hitchens, "Achieving secure role-based access control on encrypted data in cloud storage", IEEE Trans. Inf. Forensics Security, vol. 8, no. 12, pp. 1947-1960, Dec. 2013.
15.
X. Zou, Y.-S. Dai and E. Bertino, "A practical and flexible key management mechanism for trusted collaborative computing", Proc. IEEE Conf. Comput. Commun., pp. 1211-1219, 2008.
16.
M. Nabeel, N. Shang and E. Bertino, "Privacy preserving policy based content sharing in public clouds", IEEE Trans. Know. Data Eng., vol. 25, no. 11, pp. 2602-2614, Nov. 2013.
17.
D. Dolev and A. C. Yao, "On the security of public key protocols", IEEE Trans. Inf. Theory, vol. IT-29, no. 2, pp. 198-208, Mar. 1983.
18.
B. Dan and F. Matt, "Identity-based encryption from the weil pairing", Proc. 21st Annu. Int. Cryptol. Conf. Adv. Cryptol., vol. 2139, pp. 213-229, 2001.
19.
B. Den Boer, "Diffie-Hellman is as strong as discrete log for certain primes", Proc. Adv. Cryptol., pp. 530, 1988.
20.
D. Boneh, X. Boyen and H. Shacham, "Short group signature", Proc. Int. Cryptology Conf. Adv. Cryptology, pp. 41-55, 2004.

Contact IEEE to Subscribe

References

References is not available for this document.