134 research outputs found

    Crypto-analyses on “secure and efficient privacy-preserving public auditing scheme for cloud storage”

    Get PDF
    Recently, Worku et al. pointed out that the work “privacy-preserving public auditing for data storage security in cloud computing” proposed by Wang et al. is insecure and their second work “privacy- preserving public auditing for secure cloud the storage” is inefficient. Thus, they offered a secure and efficient-privacy public auditing scheme for cloud storage. They claimed that their system is provably secure in the random oracle model and the operation is effective. However, after crypto-analysis, we found that the scheme cannot reach the security goal, it has the existential forgery attack. We, therefore, alter it to incorporate the desired privacy preserving requirement, which is very significant in a privacy-preserving public auditing protocol for cloud storage

    Social Internet of Things and New Generation Computing -- A Survey

    Full text link
    Social Internet of Things (SIoT) tries to overcome the challenges of Internet of Things (IoT) such as scalability, trust and discovery of resources, by inspiration from social computing. This survey aims to investigate the research done on SIoT from two perspectives including application domain and the integration to the new computing models. For this, a two-dimensional framework is proposed and the projects are investigated, accordingly. The first dimension considers and classifies available research from the application domain perspective and the second dimension performs the same from the integration to new computing models standpoint. The aim is to technically describe SIoT, to classify related research, to foster the dissemination of state-of-the-art, and to discuss open research directions in this field.Comment: IoT, Social computing, Surve

    A Framework for Protecting Cloud Users from Third Party Auditors

    Get PDF
    Cloud computing has merged to be a now computing paradigm that lets public to access shared pool of resources without capital investment. The users of cloud need to access resources through Internet in pay per use fashion. Thus there is increased use of storage services of cloud in the real world. This service is known as Infrastructure as a Service (IaaS). However, there are security concerns as this service runs in entrusted environment. To ensure data integrity many public verification or auditing schemes came into existence. Nevertheless, there is a concern when the so called Third Party Auditor (TPA) has malicious intentions. In such cases, protection is required against malicious TPAs. Towards this end, recently, Huang et al. proposed a scheme in which users can directly check the integrity of stored data using a feedback based audit scheme. TPA takes process proof from cloud server and gives feedback to cloud user. The feedback is unforgivable and the TPA cannot make any malicious attacks. Based on this scheme, in this paper, we implemented a prototype application that demonstrates the proof of concept. The empirical results are encouraging. DOI: 10.17762/ijritcc2321-8169.15065

    Secure management of logs in internet of things

    Full text link
    Ever since the advent of computing, managing data has been of extreme importance. With innumerable devices getting added to network infrastructure, there has been a proportionate increase in the data which needs to be stored. With the advent of Internet of Things (IOT) it is anticipated that billions of devices will be a part of the internet in another decade. Since those devices will be communicating with each other on a regular basis with little or no human intervention, plethora of real time data will be generated in quick time which will result in large number of log files. Apart from complexity pertaining to storage, it will be mandatory to maintain confidentiality and integrity of these logs in IOT enabled devices. This paper will provide a brief overview about how logs can be efficiently and securely stored in IOT devices.Comment: 6 pages, 1 tabl

    Optimizing IT Modernization through Cloud Migration: Strategies for a Secure, Efficient and Cost-Effective Transition

    Get PDF
    Application migration to the cloud has become increasingly popular due to the numerous opportunities offered by cloud computing. It is a complex process that requires careful planning and execution to ensure a successful outcome. This research aims to provide an overview of the challenges and strategies involved in application migration to the cloud. The findings suggest that main challenges include compatibility, data migration, security and compliance, cost management, performance, and staffing and skills. To mitigate these challenges and ensure a smooth migration process, organizations must implement effective strategies. This research also discussed the effective strategies for cloud migration. These strategies include planning and preparation, assessment and prioritization, testing and validation, data management, security and compliance, cost management, and staffing and skills. The results of the research indicate that a well-defined migration plan, thorough testing, proper data management, strong security controls, cost optimization, and a skilled team are essential for a successful migration process. Organizations must carefully consider these challenges and strategies to ensure that their migration to the cloud is smooth, secure, and cost-effective. By addressing these challenges and implementing effective strategies, organizations can take advantage of the many benefits offered by cloud computing and modernize their IT infrastructure for the future

    Review On Preserving Privacy Identity Of Shared Data In Cloud

    Get PDF
    Cloud computing contains groups of remote servers and software networks that involve in allowing storage of data and accessing of online computer resources. Cloud contains data storage to the huge amount of data. Cloud user should be concerned with the correctness and protection of data. When user outsources remote data from storage of data as a cloud, There are Several auditing mechanism to verify the Integrity of Data. Public auditing mechanism enables the user to verify integrity of data with the help of Third Party Auditor (TPA). Public auditing mechanism start auditing task by not downloading whole file. This helps in Preserving privacy of Data. Public auditing will won’t reveal identity of any user. In the paper contains various privacy preserving public auditing mechanism. It also shows comparative study among them. DOI: 10.17762/ijritcc2321-8169.15031

    Review on Cloud Computing Security Challenges

    Get PDF
    In this paper, security issues associated with cloud computing are reviewed. Additionally, the types of cloud and service models have also been pointed out. Cloud computing has ruled the data innovation industry as of late. Giant data centersthat provide cloud services are been set up due to the global approval of cloud and virtualization innovations. Cloud computing is characterized as a web-based software service since Information Technology (IT) resources like network, server, storage, and so on are based on the Web. Along these lines, cloud computing services can be utilized at any place and whenever on the Personal Computer (PC) or smart mobile phones. In light of the on-demand, adaptable and versatile administration it can give, a considerable measure of companies that beforehand deployed locally has moved their organizations to the cloud. Although cloud computing brings a whole lot of advantages, many security challenges have been brought up to both cloud providers and clients

    Privacy issues and protection in secure data outsourcing

    Get PDF
    Utilizing database encryption to safeguard data in several conditions where access control is not sufficient is unavoidable. Database encryption offers an extra layer of security to traditional access control methods. It stops users that are unauthorized, such as hackers breaking into a system, and observing private data. Consequently, data is safe even when the database is stolen or attacked. Nevertheless, the process of data decryption and encryption causes degradation in the database performance. In conditions where the entire information is kept in an encrypted format, it is not possible to choose the database content any longer. The data must be first decrypted, and as such, the unwilling and forced tradeoff occurs between the function and the security. The suitable methods to improve the function are techniques that directly deal with the data that is encrypted without having to decrypt them first. In this study, we determined privacy protection and issues that each organization should consider when it decides to outsource own data
    corecore