Open Access Open Access  Restricted Access Subscription Access

STABLE - Study on Trusted Authentication Scheme using M-RSA based Blockchain Technique for Legacy Environment (A Novel Method to Enhance Cloud Security)

Janani A, Lavanya A, Mahima Thankam Eapen, Julia Faith S

Abstract


Cloud computing is an important way to drive the IT industry, but security is a key factor in the handling of cloud data. The accuracy of the cloud data is jeopardized. Although cloud-related infrastructures are much more powerful and reliable than computer equipment, they continue to face the wide range of internal and external data integrity threats. In this paper, we propose a secure cloud storage system that supports the protection of privacy. Through this scheme, the data owner uploads the data in the cloud (implemented with Google Drive) and they are allowed to modify the data using the private key. For the protection of cloud computing environments, RSA based Technique uses a newly developed security algorithm based on Encrypted User End Generated (EUEG), which decreases the role of the third party and enhances security testing with an automated logging of malicious devices to produce keycode using System motherboard numbers, System disk number and user password.

Full Text:

PDF

References


Ravi Kant Sahu and Abhishek Mohta, L.K. Awasthi. Robust Data Integration While Using Third Party Auditor for Cloud Data Storage Services. conf. IJARCSSE, 2012.2(2).ISSN: 2277 128X

Qian Wang and Cong Wang and Kui Ren, Wenjing Lou, Jin Li. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing in IEEE transactions on parallel and distributed systems, 2011.22(5).

M.Ashah, R. Swaminathan, M. Baker. Privacy-Preserving Audit and Extraction of Digital Contents. 2011.

Farzad Sabahi. Cloud Computing Security Threats and Responses. IEEE confer. 2011, 978-1-61284-486-2/111

Govinda V, Gurunathaprasad, H Sathshkumar. Third Party Auditing for Security Data Storage in cloud through digital signature using RSA” IJASATR, 2012.2(4). ISSN: 2249-9954.

Clock Skew Based Client Device Identification in Cloud Environments Wei-Chung Teng Dept. of Computer Science & Info. Eng. National Taiwan University of Sci. & Tech.

Phil Lageschulte, Sailesh Gadia. Cloud Computing: Risks and Auditing.

A. Juels, B. S. Kaliski Jr. Pors: proofs of retrievability for large files. Proceedings of the 14th ACM conference on Computer and communications security (CCS): 584–597p, New York, NY, USA, 2007. ACM.

W. Enck, P. Gilbert, B. Chun, L. P. Cox, J. Jung, P. McDaniel, A.N. Sheth. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. In Proc. of the USENIX Symposium on Operating Systems Design and Implementation (OSDI), Vancouver, Canada, October. 4-6, 2010.

Supraja.Y, T.V.Sai Krishna, P.VenkataSubbaReddy, Dr.M.A.D.Swamy, Dr.P.Srinivasulu .Random Forest (RF) Machine Learning Algorithm to Detect Abnormal Behaviour in Cloud – Based Mobile Services.


Refbacks

  • There are currently no refbacks.