BLOCKCHAIN-BASED SECURITY ARCHITECTURE FOR DISTRIBUTED CLOUD STORAGE
Main Article Content
Abstract
Cloud Computing is the use of hardware and software to deliver a service over a network (typically the Internet). It offers various data storage, infrastructure, and application. Moreover, we can say that the cloud is something which is present at a location. Cloud computing refers to manipulating and access hardware and software resources. Cloud computing based on service models. In this thesis paper, Our primary objective is to propose an auditing project for users who use cloud data sharing services which are attributed by multi-user modification, public auditing, high error awareness, probability efficient user nonexistent as well as a pragmatic computational and communication auditing performance. Our layout for this paper would be to resist user duplicate attack; while we are doing this, we won’t consider any current methods that support multi-user modifications.
Downloads
Article Details
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.
References
Xuefeng Liu, Yuqing Zhang, Boyang and Jingbo Yan," Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud," IEEE Transactions on Parallel and Distributed Systems, 2012.
Jiawei Yuan, Shucheng Yu," Public Integrity Auditing for Dynamic Data Sharing with Multiuser Modification," IEEE Transactions on Information Forensics and Security,2015.
Pranjali waghe, Mayuri Khaire, Oshika Shinde, Prof. Torana Kamble, " Public Integrity Auditing Using Group User Revocation For Shared Dynamic Cloud Data," International Journal of Recent Trends in Engineering & Research,2017.
S. Monika1, M. Jawahar2, S.K. Murugaraja, "Data Sharing in Cloud Storage by RSA based Encryption," International Journal of Computer Science Trends and Technology, 2015.
Siva Sakthi Janani.G1, Vinodhini.S2, Miss.Divya.G3, "Group User Revocation For Shared Dynamic Data In Cloud," International Journal of Science Technology and management,2016.
Swapnil Deshmukh, Sourabh Dhivare, Prof.Mr. Harshad Dagade," Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption," International Journal of Scientific & Engineering Research,2018.
C. Pavani1, S.Vasundra, "Enabling Secure Data Sharing Scheme in the Cloud Storage Groups," International Research Journal of Engineering and Technology,2017.
A.Hannah, B.Gobinathan," A new privacy-aware public auditing scheme for cloud data sharing with group users," International Journal of current engineering and scientific research (IJCESR), 2018.
Ahmad-Reza Sadeghi, Thomas Schneider, and Marcel Winandy," Token-Based Cloud Computing! Secure Outsourcing of Data and Arbitrary Computations with Lower Latency".2010.