Keywords:-

Keywords: Data integrity, dependable distributed storage, error localization, data dynamics, cloud computing.

Article Content:-

Abstract

Several trends are opening up the era of cloud computing, which is an Internet-based development and use of computer technology. The ever cheaper and more powerful processors, together with the Software as a Service (SaaS) computing architecture, are transforming data centers into pools of computing service on a huge scale. The increasing network bandwidth and reliable yet flexible network connections make it even possible that users can now subscribe high quality services from data and software that reside solely on remote data centers. In order to achieve the assurances of cloud data integrity and availability and enforce the quality of cloud storage service, we consider the problem of building a secure cloud storage service on top of a public cloud infrastructure where the service provider is not completely trusted by the customer. We describe, at a high level contract signing protocol that combine recent and non-standard cryptographic primitives in order to achieve our goal.

References:-

References

Amazon.com, “Amazon Web Services (AWS),” Online at

http://aws. amazon.com, 2008.

Luis M. Vaquero, Luis Rodero-Merino, Juan Caceres1,

Maik Lindner, “A Break in Clouds: Towards a cloud

Definition,” ACM SIGCOMM Computer Communication

Review, vol. 39, Number 1, January 2009, pp. 50-55.

Patrick McDaniel, Sean W. Smith, “Outlook: Cloudy

with a chance of security challenges and improvements,”

IEEE Computer and reliability societies (2010), pp. 77-80.

Sameera Abdulrahman Almulla, Chan Yeob Yeun,

“Cloud Computing Security Management,” Engineering

systems management and its applications (2010), pp. 1-7.

Steve Mansfield-Devine, “Danger in Clouds”, Network

Security (2008), 12, pp. 9-11.

Anthony T. Velte, Toby J.Velte, Robert Elsenpeter,

Cloud Computing: A Practical Approach, Tata Mc GrawHill

Gary Anthes, “Security in the cloud,” In ACM

Communications (2010), vol.53, Issue11, pp. 16-18.

Lombardi F, Di Pietro R. Secure virtualization for cloud

computing. Journal of Network Computer Applications

(2010), doi:10.1016/j.jnca.2010.06.008.

Downloads

Citation Tools

How to Cite
Kumar, K. S., & Rao, M. S. S. S. (2013). A Signcryption Based Contract Signing Approach for Accountable Data Sharing in Cloud. International Journal Of Mathematics And Computer Research, 1(09), 257-261. Retrieved from http://ijmcr.in/index.php/ijmcr/article/view/231