PRIVACY PRESERVING ADVANCED SECURITY ON UNTRUSTED CLOUD WITH SELF BACKUP PROCESS

Authors

  • Sadeer Dheyaa Abdulameer Faculty of Computer Science, Cihan University, Sulaimaniya, Kurdistan, Iraq

DOI:

https://doi.org/10.29121/granthaalayah.v5.i4.2017.1810

Keywords:

Cloud Storage, Data Self-Destruction, Self-Backup, HMAC - Hash Message Authentication Code

Abstract [English]

Cloud Storage service are frequently required for many corporate and government organizations. Most of cloud storage service providers are un-trusted, so it is not safe to keep the data in cloud for long period. Many are using cloud storage for data sharing that means it is not possible to send a big file in email, maximum 25 GB are allowed, for big files, files are uploaded in cloud storage and link is given to the data consumer. After Data consumer download the file, Data owner has to delete the file from the cloud for the security reasons, but most of time Data Owner forget to delete the file. To overcome this problem data self-destruction is proposed in many papers and now proposed system has Self-Destruction cum Self-Backup Process, which help the file to stay in the public cloud for certain period of times and it will be removed from the cloud storage and securely stored in another storage.  To verify the integrity of the file HMAC is created while file is uploaded and Data Consumer can able to download the file and generate the HMAC, check the integrity of the file.

Downloads

Download data is not yet available.

References

L Zeng, S Chen, Q Wei, D Feng - APMRC, “SeDas: A self-destructing data system based on active storage framework,” APMRC, 2012 Digest, 2012.

Y. Zhang and D. Feng, “An active storage system for high perfor-mance computing,” inProc. 22nd Int. Conf. Advanced Information Networking and Applications (AINA), 2008, pp. 644–651. DOI: https://doi.org/10.1109/AINA.2008.103

M Li, S Yu, Y Zheng, K Ren,” Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption”, in IEEE Transactions on Parallel and Distributed Systems 2013 . DOI: https://doi.org/10.1109/TPDS.2012.97

Y Zhou, D Feng, W Xia, M Fu, F Huang,” SecDep: A User-Aware Efficient Fine-Grained Secure Deduplication Scheme with Multi-Level Key Management”, in Mass Storage Systems and Technologies (MSST) 2015. DOI: https://doi.org/10.1109/MSST.2015.7208297

J. Li, X. Chen, M. Li, J. Li, P. P. Lee, and W. Lou, “Secure deduplication with efficient and reliable convergent key management,” Parallel and Distributed Systems, IEEE Transactions on, vol. 25, no. 6, pp. 1615–1625, 2014.

J Wei, W Liu, X Hu,” Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption, in IEEE Transactions on Cloud Computing 2016.

C. Wang, S. S. Chow, Q. Wang, K. Ren, and W. Lou, “Privacy-preserving public auditing for secure cloud storage,” Computers, IEEE Transactions on, vol. 62, no. 2, pp. 362–375, 2013. DOI: https://doi.org/10.1109/TC.2011.245

B. Wang, B. Li, and H. Li, “Public auditing for shared data with efficient user revocation in the cloud,” in INFOCOM, 2013 Proceedings IEEE. IEEE, 2013, pp. 2904–2912. DOI: https://doi.org/10.1109/INFCOM.2013.6567101

N. Cao, S. Yu, Z. Yang, W. Lou, and Y. T. Hou, “LT Codes-based Secure and Reliable Cloud Storage Service,” inthe Proceedings of IEEE INFOCOM 2012,2012, pp. 693–701.

Y. Zhang, J. Chen, R. Du, L. Deng, Y. Xiang, andQ. Zhou, “Feacs: A flexible and efficient access control scheme for cloud computing,” in Trust, Security and Privacy in Computing and Communications, 2014 IEEE 13th International Conference on, Sept 2014, pp. 310–319. DOI: https://doi.org/10.1109/TrustCom.2014.42

Downloads

Published

2017-04-30

How to Cite

Abdulameer, S. D. (2017). PRIVACY PRESERVING ADVANCED SECURITY ON UNTRUSTED CLOUD WITH SELF BACKUP PROCESS. International Journal of Research -GRANTHAALAYAH, 5(4), 176–181. https://doi.org/10.29121/granthaalayah.v5.i4.2017.1810