云环境下基于用户身份验证方案的数据保密性和完整性验证

V. Nirmala, R. K. Sivanandhan, R. S. Lakshmi
{"title":"云环境下基于用户身份验证方案的数据保密性和完整性验证","authors":"V. Nirmala, R. K. Sivanandhan, R. S. Lakshmi","doi":"10.1109/ICGHPC.2013.6533902","DOIUrl":null,"url":null,"abstract":"Cloud computing is the one which offers infrastructure to the client on a pay as you use model by leveraging on the Internet technology. As this model depicts the electricity billing it is often termed as utility computing. It offers various services to the client based on the need. The need of the resources can be scaled up or down on the basis of the requirement. The IT sectors started using cloud service models. As the use of cloud increases day by day the concerns of cloud also gets increased. There are number of data breaches that are happening day by day that affect the cloud growth. The major concern in adapting cloud is its security. The companies have lot of data that gets increased each day enlarges the complication of data privacy and security. The data that we talk can be classified as either stagnant data i.e., for simple storage as offered by Amazon's Simple Storage Service (S3) or it can be vibrant that changes often. The solution available to protect the stagnant data will be to simply encrypt the data before it gets stored in the server. In order to solve the issues of vibrant data the techniques are being proposed to work out on the encrypted. This paper is a survey of different security issues that affects the cloud environment and related work that are carried out in the area of integrity. The technique proposed combines the encrypting mechanism along with the data integrity check mechanism. The data are double wrapped to ensure no data leakage happens at the server side. The data are also shared with users with proper access mechanism.","PeriodicalId":119498,"journal":{"name":"2013 International Conference on Green High Performance Computing (ICGHPC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"31","resultStr":"{\"title\":\"Data confidentiality and integrity verification using user authenticator scheme in cloud\",\"authors\":\"V. Nirmala, R. K. Sivanandhan, R. S. Lakshmi\",\"doi\":\"10.1109/ICGHPC.2013.6533902\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cloud computing is the one which offers infrastructure to the client on a pay as you use model by leveraging on the Internet technology. As this model depicts the electricity billing it is often termed as utility computing. It offers various services to the client based on the need. The need of the resources can be scaled up or down on the basis of the requirement. The IT sectors started using cloud service models. As the use of cloud increases day by day the concerns of cloud also gets increased. There are number of data breaches that are happening day by day that affect the cloud growth. The major concern in adapting cloud is its security. The companies have lot of data that gets increased each day enlarges the complication of data privacy and security. The data that we talk can be classified as either stagnant data i.e., for simple storage as offered by Amazon's Simple Storage Service (S3) or it can be vibrant that changes often. The solution available to protect the stagnant data will be to simply encrypt the data before it gets stored in the server. In order to solve the issues of vibrant data the techniques are being proposed to work out on the encrypted. This paper is a survey of different security issues that affects the cloud environment and related work that are carried out in the area of integrity. The technique proposed combines the encrypting mechanism along with the data integrity check mechanism. The data are double wrapped to ensure no data leakage happens at the server side. The data are also shared with users with proper access mechanism.\",\"PeriodicalId\":119498,\"journal\":{\"name\":\"2013 International Conference on Green High Performance Computing (ICGHPC)\",\"volume\":\"38 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-03-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"31\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 International Conference on Green High Performance Computing (ICGHPC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICGHPC.2013.6533902\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 International Conference on Green High Performance Computing (ICGHPC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICGHPC.2013.6533902","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 31

摘要

云计算是一种利用互联网技术以按使用付费的模式向客户提供基础设施的技术。由于该模型描述了电费账单,因此通常称为效用计算。它根据客户的需要为客户提供各种服务。资源的需求可以根据需求增加或减少。IT部门开始使用云服务模式。随着云的使用日益增加,对云的关注也越来越多。每天都有许多影响云增长的数据泄露事件发生。采用云计算的主要关注点是其安全性。公司拥有的大量数据每天都在增加,这加大了数据隐私和安全的复杂性。我们谈论的数据可以分为停滞的数据,即Amazon的简单存储服务(S3)提供的简单存储,也可以是经常变化的动态数据。保护停滞数据的可用解决方案是在数据存储到服务器之前对其进行加密。为了解决动态数据的问题,人们提出了对加密数据进行处理的技术。本文对影响云环境的不同安全问题以及在完整性领域开展的相关工作进行了调查。该技术将加密机制与数据完整性校验机制相结合。数据是双重包装的,以确保在服务器端不会发生数据泄漏。数据还可以通过适当的访问机制与用户共享。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Data confidentiality and integrity verification using user authenticator scheme in cloud
Cloud computing is the one which offers infrastructure to the client on a pay as you use model by leveraging on the Internet technology. As this model depicts the electricity billing it is often termed as utility computing. It offers various services to the client based on the need. The need of the resources can be scaled up or down on the basis of the requirement. The IT sectors started using cloud service models. As the use of cloud increases day by day the concerns of cloud also gets increased. There are number of data breaches that are happening day by day that affect the cloud growth. The major concern in adapting cloud is its security. The companies have lot of data that gets increased each day enlarges the complication of data privacy and security. The data that we talk can be classified as either stagnant data i.e., for simple storage as offered by Amazon's Simple Storage Service (S3) or it can be vibrant that changes often. The solution available to protect the stagnant data will be to simply encrypt the data before it gets stored in the server. In order to solve the issues of vibrant data the techniques are being proposed to work out on the encrypted. This paper is a survey of different security issues that affects the cloud environment and related work that are carried out in the area of integrity. The technique proposed combines the encrypting mechanism along with the data integrity check mechanism. The data are double wrapped to ensure no data leakage happens at the server side. The data are also shared with users with proper access mechanism.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信