Keywords:-
Article Content:-
Abstract
Cloud computing presents a new way of using and delivering model for IT over internet to users by providing dynamic scalability and virtualized resources where users are hidden from actual processing and hosting their services in cloud. In cloud often data is outsourced, leading to a number of issues related to accountability and authentication by the cloud service provider (CSP) and make data usage be transparent and tractable to the users. To provide users to widely adopt the cloud without the threat
References:-
References
. H. Abu-Libdeh, L. Princehouse, and H. Weatherspoon, “RACS: A Case for Cloud Storage Diversity,” Proc. ACM First ACM Symp.Cloud Computing (SoCC), 2010.
. Y. Tang, P.P.C. Lee, J.C.S. Lui, and R. Perlman, “FADE: Secure Overlay Cloud Storage with File Assured Deletion”, IEEE Trans. On DEPEN DABLE AND SECURE COMPUTING, VOL. 9, NO. 6, NOVEMBER /DECEMB ER 2012.
. Smitha S, Anna C. S. “Ensuring Distributed Accountability for Data Sharing in t he Cloud” , IEEE TRANSA CTIONS ON DEPEN DABLE AND SECURE COMPUTING, VOL. 9, NO. 4, JU LY/AUGUST 2012
. Flickr, http://www.flickr.com/, 2012.
. Emulab Network Emulation Testbed, www.emulab.net, 2012
. Eucalyptus Systems, http://www.eucalyptus.com/, 2012.
. M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, “Plutus: Scalable Secure File Sharing on Untrusted Storage,” Proc.Second USENIX Conf. File and Storage Technologies, 2003.
. M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R. Katz, A.Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M.Zaharia, “A View of Cloud Computing.” Comm. ACM, vol. 53,no. 4, pp. 50-58, Apr. 2010.
. G. Ateniese, R.D. Pietro, L.V. Mancini, and G. Tsudik, “Scalable and Efficient Provable Data Possession,” Proc. Fourth Int’l Conf. Security and Privacy in Comm. (SecureComm), 2008.
. C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-Preserving Public Auditing for Storage Security in Cloud Computing,” Proc.IEEE INFOCOM, Mar. 2010.
. J . Bethencourt , A . Sah a i, a nd B. Waters, “ Ciphertext- Policy At tribute-
Based Encryption,” Proc. I EEE Sy mp. Security and Privacy, May 2006.
. W. Wang, Z. Li, R. Owens, and B. Bhargava, “Secure and Efficient Access to Outsourced Data,” Proc. ACM Workshop Cloud Comput-ing Security (CCSW), Nov. 2009
. A. Yun, C. Shi, and Y. Kim , “On Protecting Integrity and Confidentiality of Cryptographic File System for Outsourced Storage,” Proc. ACM Workshop Cloud Computing Security. (ASIACCS), Apr. 2010.
. P. Gutmann, “Secure Deletion of Data from Magnetic and Solid-State Memory,” Proc. Sixth USENIX Security Symp. Focusing on Applications of Cryptography, 1996.
. JungleDisk, http://www.jungledisk.com/, 2010.
. V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data,”Proc. 13th ACM Conf. Computer and Comm. Security (CCS), 2006.
. M. Pirretti, P. Traynor, P. McDaniel, and B. Waters, “Secure Attribute-Based Systems,” Proc. 13th ACM Conf. Computer and Comm. Security (CCS), 2006.
. S. Nair, M.T. Dashti, B. Crispo, and A.S. Tanenbaum, “A Hybrid PKI-IBC Based Ephemerizer System,” Int’l Federation for Informa-tion Processing, vol. 232, pp. 241-252, 2007.
. A. Boldyreva, V. Goyal, and V. Kumar, “Identity-Based Encryp-tion with Efficient Revocation,” Proc. 15th ACM Conf. Computer and Comm. Security (CCS), 2008.
. R. Geambasu, J.P. John, S.D. Gribble, T. Kohno, and H.M. Levy,
“Keypad: Auditing File System for Mobile Devices,” Proc. Sixth Conf. Computer Systems (EuroSys), Apr. 2011.
. Nasuni, “Nasuni Announces New Snapshot Retention Function-ality in Nasuni Filer; Enables Fail-Safe File Deletion in the Cl oud ,” htt p:/ /ww w. nas u ni. c om /n ew s/ p res s- rel ea se s/ na su ni -an no u nc es - n ew - s na p sh ot - r et e nt i on - f u nc t i on al it y - i n- na su n i- f il e r -enables-fail-safe-file-deletion-in-the-clo ud/, Mar. 2011.
. NTP: The Network Time Protocol, http://www.ntp.org/, 2012.
. S. Pearso n and A. Charle sworth, “Account abil ity as a Way Forward for Privacy Protection in the Cloud,” Proc. First Int’l Conf. Cloud Computing, 2009.
. Trusted Java Virtual Machine IBM, http://www.almaden.ibm.com/cs/projects/jvm/, 2012.
. OpenSSL, http://www.openssl.org/, 2010.
. Amazon S3, http://aws.amazon.com/s3, 2010.
. S. Kamara and K. Lauter, “Cryptographic Cloud Storage,” Proc.14th Int’l Conf. Financial Cryptography and Data Security, 2010.
. LibAWS++, http://aws.28msec.com/, 2010.
. A.J. Menezes, P.C. van Oorschot, and S.A. Vanstone, Handbook of Applied Cryptography. CRC Press, Oct. 1996.
.
. B. Schneier, “File Deletion,” http://www.schneier.com/blog/archives/2009/09/file_deletion.html, Sept. 2009.
. A. Shamir, “How to Share a Secret,” Comm. ACM, vol. 22, no. 11,pp. 612-613, Nov. 1979.
. W. Stallings, Cryptography and Network Security. Prentice Hall,2006.