{"title":"一种在云中保护云数据存储和动态数据审计的新方法","authors":"K. Brindha, N. Jeyanthi","doi":"10.1145/3018896.3018907","DOIUrl":null,"url":null,"abstract":"Cloud computing is a new emerging computing paradigm in which any individual or organization can remotely store the information and it also reduces the burden of the cost of its storage and maintenance. Even though the cloud provides tangible merits to cloud users, it suffers from various security flaws. Due to these grave concerns, data confidentiality and integrity has become a challenging task not only for the data owners but also to the trusted service providers. To overcome this problem, this article proposes a novel approach for protecting data using visual cryptography technique, dynamic data verification using algebraic signature and data dynamics using Cuckoo Hash Table (CHT).","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"2017 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"A novel approach to secure cloud data storage and dynamic data auditing in a cloud\",\"authors\":\"K. Brindha, N. Jeyanthi\",\"doi\":\"10.1145/3018896.3018907\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cloud computing is a new emerging computing paradigm in which any individual or organization can remotely store the information and it also reduces the burden of the cost of its storage and maintenance. Even though the cloud provides tangible merits to cloud users, it suffers from various security flaws. Due to these grave concerns, data confidentiality and integrity has become a challenging task not only for the data owners but also to the trusted service providers. To overcome this problem, this article proposes a novel approach for protecting data using visual cryptography technique, dynamic data verification using algebraic signature and data dynamics using Cuckoo Hash Table (CHT).\",\"PeriodicalId\":131464,\"journal\":{\"name\":\"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing\",\"volume\":\"2017 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-03-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3018896.3018907\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3018896.3018907","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A novel approach to secure cloud data storage and dynamic data auditing in a cloud
Cloud computing is a new emerging computing paradigm in which any individual or organization can remotely store the information and it also reduces the burden of the cost of its storage and maintenance. Even though the cloud provides tangible merits to cloud users, it suffers from various security flaws. Due to these grave concerns, data confidentiality and integrity has become a challenging task not only for the data owners but also to the trusted service providers. To overcome this problem, this article proposes a novel approach for protecting data using visual cryptography technique, dynamic data verification using algebraic signature and data dynamics using Cuckoo Hash Table (CHT).