Friday 26th of April 2024
 

An Approach for Data Storage Security in Cloud Computing


Deepanchakaravarthi Purushothaman and Sunitha Abburu

Cloud computing is now days emerging field because of its performance, high availability, low cost. In the cloud many services are provided to the client by cloud. Data store is main future that cloud service provides to the companies to store huge amount of storage capacity. But still many companies are not ready to implement cloud computing technology due to lack of proper security control policy and weakness in protection which lead to many challenge in cloud computing. The main objectives of this paper are, 1) To prevent Data access from unauthorized access, it propose a distributed scheme to provide security of the data in cloud .This could be achieved by using homomorphism token with distributed verification of erasure-coded data. 2) Proposed scheme perfectly stores the data and identifies the any tamper at the cloud server.3) And also performs some of the tasks like data updating, deleting, appending. This paper also provides a process to avoid Collusion attacks of server modification by unauthorized users. The proposed techniques is been implementation and results are shown at the below.

Keywords: cloud computing, Authentication, homomorphism token, Collusion attacks.

Download Full-Text


ABOUT THE AUTHORS

Deepanchakaravarthi Purushothaman
Master of Computer Application ,Adhiyamaan College of Engineering Hosur, Tamilnadu-635109, India.

Sunitha Abburu
Professor and Director, Master of Computer Application,Adhiyamaan College of Engineering Hosur, Tamilnadu-635109, India.


IJCSI Published Papers Indexed By:

 

 

 

 
+++
About IJCSI

IJCSI is a refereed open access international journal for scientific papers dealing in all areas of computer science research...

Learn more »
Join Us
FAQs

Read the most frequently asked questions about IJCSI.

Frequently Asked Questions (FAQs) »
Get in touch

Phone: +230 911 5482
Email: info@ijcsi.org

More contact details »