{"title":"A novel approach to secure cloud data storage and dynamic data auditing in a cloud","authors":"K. Brindha, N. Jeyanthi","doi":"10.1145/3018896.3018907","DOIUrl":null,"url":null,"abstract":"Cloud computing is a new emerging computing paradigm in which any individual or organization can remotely store the information and it also reduces the burden of the cost of its storage and maintenance. Even though the cloud provides tangible merits to cloud users, it suffers from various security flaws. Due to these grave concerns, data confidentiality and integrity has become a challenging task not only for the data owners but also to the trusted service providers. To overcome this problem, this article proposes a novel approach for protecting data using visual cryptography technique, dynamic data verification using algebraic signature and data dynamics using Cuckoo Hash Table (CHT).","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"2017 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3018896.3018907","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Cloud computing is a new emerging computing paradigm in which any individual or organization can remotely store the information and it also reduces the burden of the cost of its storage and maintenance. Even though the cloud provides tangible merits to cloud users, it suffers from various security flaws. Due to these grave concerns, data confidentiality and integrity has become a challenging task not only for the data owners but also to the trusted service providers. To overcome this problem, this article proposes a novel approach for protecting data using visual cryptography technique, dynamic data verification using algebraic signature and data dynamics using Cuckoo Hash Table (CHT).