Loheswaran 2016
Loheswaran 2016
Loheswaran 2016
DOI 10.1007/s11277-016-3296-7
K. Loheswaran1 • J. Premalatha2
Keywords Cloud computing Trust and reputation Cloud service providers Cloud
providers
1 Introduction
Cloud computing deals with active, ascendable, shared, and elastic resources such as that
of storage, software that are present over the internet from data centres to the operators that
are present remotely. The chances that are given by the cloud computing are very much
striking for the customers in the marketplaces. The mode to comprehend these chances,
& K. Loheswaran
loheswarank7@gmail.com; loheswarank79@gmail.com
1
Sasurie College of Engineering, Tirupur District, India
2
Kongu Engineering College, Erode, India
123
K. Loheswaran, J. Premalatha
however, is not allowed of difficulties. Therefore, the extremely dispersed and non-
transparent environment that is present in the cloud computing symbolizes a significant
obstacle to the receiving and market success of cloud services. Possible operators of these
services often sense that they lose control over their data and they are often not sure
whether to trust the cloud providers. The users generally don’t trust the Cloud providers as
they are confused about the cloud providers’ capabilities. Furthermore, current survey was
lead to more than 3000 consumers in cloud computing from 6 different countries. It
exhibited that out 84 % of the consumers were concerned on their data storage and 88 % of
them were worried about the user who is going to use to the presented data [1]. The market
in the business is rising quickly as the new companies enter the marketplace of the Cloud
computing and it is predictable that Cloud providers are functioning in order to satisfy and
finish the required work for the customers by providing needed services having func-
tionality [2, 3]. However, this causes a big difference with regards to the quality level that
has been provided by the services. Thus, a reliable and a dependable service are provided
to identify the reliable service providers in a viable marketplace. The capability of pro-
vided such a service will lead to build the confidence of the users in adopting cloud-based
services and support in choosing the suitable service providers. Comparable subjects of
starting trust and confidence are previously recognized from the Internet of Services [4].
Trust and reputation (TR) systems are effectively used in many application scenarios in
order to support the consumers to identify the dependability of the suppliers. Some of the
providers are eBay, Amazon, and other application markets for mobile applications [5].
Linked thoughts are very required for supporting and selecting the needed trustworthy
and dependable Cloud providers. The Industry experts along with the and academic
assistants created the necessity for directive, checking and trust establishment in the Cloud
computing environments, as the overview of the exemplarily is given in the upcoming text.
A current article has given out the list of challenges and prepared an outline of the
solutions with the help of the using developing technologies for starting trust in Cloud
computing. Numerous numbers of security and confidentiality tasks in Cloud computing
surroundings has also been discussed earlier and it has been recommended that the trust-
based framework for an adaptive policy integration [2]. Moreover, a quantity of research
articles intended at close-fitting security weaknesses, also providing security leadership
and giving approvals concerning cloud computing. This paper deals with the outcome
having an appropriate solution to start sureness and trust between the consumers and the
cloud providers [6].
Cloud computing is documented as an substitute to out-dated and commonly used
information technology owing to its inherent reserve sharing with low upkeep features. In
cloud computing, the cloud service providers (CSPs), such as Amazon and others are able
to allocate dissimilar facilities to cloud users with the assist of authoritative data centres.
By ever-changing the local data management systems into cloud servers and consumers
may appreciate great excellence services and save substantial reserves on their incomplete
organizations [7]. One of the greatest essential facilities is obtained by cloud providers was
data storage. Let’s deliberate a limited data application the company permits its staffs in
the department or within the same group to supply and common files in the cloud. Though,
it is also posing a noteworthy danger to the privacy of the stored files. Precisely, all the
cloud servers that is taken care off by the cloud providers cannot be fully trusted by the
consumers when they store the files in the cloud. This might be confidential and also highly
delicate with regards to the business plans. In order to preserve the privacy of the data, the
primary solution is to encrypt and decrypt the data files and then uploaded the encrypted
data in the cloud in order to keep up the security of the data.
123
Renaissance System Model Improving Security and Third Party…
The Internet cloud that is built with the virtualized data centre works as a service factory
for proving services. Initially the Cloud platforms are built dynamically over virtualization
with the help of the software, hardware, systems, and datasets that are provisioned. The
impression is to drift the desktop computing to a service based computing by using the
virtual server clusters that are present at the data centres. Nevertheless, an absence of trust
among the cloud users and the cloud providers are used as the outsourced computing
services. In order to endorse multitenancy, cloud ecosystem is taken care off to have a
secure, dependable, and steady. Then, in reality it must have been noted that the trust is a
communal difficult, not a practical issue. Though, it has been believed that expertise can
improves belief, impartiality, reputation, trustworthiness, and guarantee in Internet appli-
cations [8]. In order to raise the acceptance of Web services and the cloud services, cloud
service providers (CSPs) must first start hope and safety to ease the uncertainties of a great
number of consumers. A healthy cloud ecosystem should be free from abuses, violence,
duplicitous, hacking, viruses, rumours, confidentiality, spams and patent violations.
The major issue in the traditional database system of cloud computing is the data
integrity. Third party users may spoil the database of the cloud users and so the autho-
rization is more concern in the cloud computing [9, 10]. Cloud security pivots are used to
start the belief amongst the various service providers and also the data owners [11]. Many
security schemes for data sharing on untrusted servers had been proposed. In these
methods, data owners are privileged to save the encrypted data files of that of the con-
sumers in distrustful storing along with the equivalent decryption files that are only to
official users. Thus, unofficial users along with the storage servers could not understand
and know the content of the data files as they do not have information regarding the
decrypted files or keys.
Nevertheless, the complexity of user contribution and repeal in these arrangements is
growing as the numbers of data owners along with the various numbers of retracted users,
correspondingly. By allocating a unique attribute to a group, we proposed a safe attribution
structure is established along with the policy of cipher text is established as an encryption
technique, this allows to share the data any member in the group with the others in the
group. Nevertheless, the subject of consumer reversals is not lectured in their system. A
mountable and acceptable grained data access control system has been presented on cloud
computing based on the key policy attributes founded on by encryption technique with the
implementation of the Proxy Server in High availability mode. Unfortunately, the solitary
proprietor method delays the acceptance of theirs scheme into the case, where all users are
decided to supply and share data.
In cloud computing, security is major concern due to the critical issues of cloud security
alliance and privacy. Both public and private clouds are required the security enforcement
[12, 13]. The cloud providers are suggested the different SLAs (Service level agreement) to
the users. The issues in the cloud computing include user confidentiality, data integrity,
group users, individual users, trust providers and shared responsibility users. The four most
popular cloud service models that are often used are as follows: The Infrastructure-as-a-
Service (IaaS), Platform-as-a-Service (PaaS), Software-as-a-Service (SaaS) and Security-
as-a-Service (SecaaS) which is shown in Fig. 1.
123
K. Loheswaran, J. Premalatha
Due to the decentralized and distributed architecture, trusting the users is more con-
cerned in the Scenario of cloud computing. An example is illustrated in the subsequent
section. The vital role of the trust establishment is explained in the section. This takes place
in the cloud computing, in specific creating trust on the cloud providers. The stimulating
task in the cloud computing is the collection of potential provider for the health care
providers. This potential provider has taken from the alternatives of numerous values.
Suppose all the potential providers have the same function that will be selected based on
the trust worthy cloud provider. The cumbersome task includes the comparison of health
care provider solutions and services offered by the health care provider requirements. It
will analyse the SLAs based on the health care provider’s requirements and it will check
out the security controls based on the cloud provider requirements [14].
The parameters of Quality of Service for TR models in Cloud environments are shown in
Fig. 2. They are predictable that are built on the state-of-the-art survey of pressures and
hazards. The cloud specific parameters are measured in Cloud environments for trust
models and it will support the cloud users based on the known competences of the CPs
previously relating with them [15]. The direct and indirect information are essential by the
TR model. They are needed for QoS parameters for trust assessment and computation
phase. The multiple entities provide the information about the parameters. The information
is provided by means of different approaches and different methods. The parameters are
discussed briefly in the following [16]:
1. SLAs The service level agreement is used to provide the services and here CPs can
access the standardized SLA. The information sharing in the service level agreement is
between the corresponding entities.
2. Compliance As an guarantee for the presence of technical and structural controls
associated to their accessible services, the CPs use audit standards. The ultimate
consequences can be acquired either from CSA indirectly or can be obtained directly
from the CPs.
3. Audits In order to assure the users about the accessible platforms and the services, the
CPs use different audit standards. For instance the security and the privacy is ensured
for the users by using Google lists SAS 70 II. The audit SAS 70 II that has been
123
Renaissance System Model Improving Security and Third Party…
considered for instance covers only the operational act and depends on a extremely
specific set of goals and standards. The CP’s does not share the reports of the audits as
it lacks the transference. Similarly they are insufficient to alleviate the users’ security
concerns.
4. Portability, interoperability, and geographical location The data regarding portability,
interoperability, and geographical location obtainable directly from the CPs.
5. Customer support CPs typically delivers guarantees about terms and sections related to
customer support in their SLAs.
6. Performance With the help of the service monitoring technologies the information
about the performance is obtained in Cloud computing environments. The validation
outcomes that it is the rate of success or failure that may be influenced by evaluating
trustworthiness of CPs.
7. Security The security and non-security related behaviours of the software that is made
to run on those platforms using remote-attestation mechanism are learned by the
consumers in a distributed service environments.
The current trends in the cloud computing are always ad hoc in nature. These inclinations
are either technical or useful features for developing the trust in cloud computing. This will
generate on user’s feedback for improving the trust for cloud users. But these trends are
deficient in a combined method such as the trust evaluation outline where all these
movements can be measured corresponding to care the users in evaluating the sources and
choosing the most trustworthy. However, the present methods are analysing the SLAs and
123
K. Loheswaran, J. Premalatha
1. There was a huge increase towards the Protection and security towards sensitive data
innovative technology was an issue
2. The access to the infrastructure was made Dissemination politics is highly involved
throughout the day
3. Green technologies used are to protect the Solution need to be highly maturity
environment
4. There is a possibility of an offline usage Sometimes the reduced speed of the Internet can
affect the methods
5. There is an easy access to the application Not all the applications run on the cloud
from anywhere
6. The cloud software is free Threat related to protection of Data is present
also the learning the audit reports that are based on the time consuming [17, 18]. Table 1
shows that the benefits and limitations of cloud computing.
5 Auditing
Public
Verifier Auditing Challenges
Auditing Proof
Cloud Server
Users
Shared Data Flow
123
Renaissance System Model Improving Security and Third Party…
6 Existing System
Auditing protocols can also prop up active data processes. Additional aspects such as user
revocation, removing certificate and deputy auditing are managed in the cloud storage
auditing [19]. Auditing protocols for cloud storage have fascinated more consideration and
have been explored intensively. Furthermost, the present auditing protocols would develop
incompetent to toil. These protocols focus on several diverse aspects of auditing. Achieve
high bandwidth and working efficiency is one of the vital concerns. Unfortunately prior
auditing protocols did not deem this critical issue, and any revelation of the client’s secret
auditing solution would make most of the obtainable auditing protocols incapable to work
correctly. Focus on how to trim down the damage of the client’s key exposure.
Initially, it is not practical to apply the traditional key revocation to cloud storage
auditing. Every time the client’s secret key is exposed for auditing, two sets of keys such as
the public key and the private key are generated. The keys are restored for the authenti-
cators for the customer’s data stored in cloud [20, 21]. The methods include downloading
the data from the cloud and then producing a set of keys which are re-uploaded to the
cloud. All these can be a tedious process. The second process is directly taking up the
standard key in a growing technique is also not appropriate for the innovative problem.
This process can help in getting back all the genuine files blocks during the verification.
This is partly as the technique is incompatible with block less proof [22].
Drawbacks of the existing system include:
• Using Naı̈ve explanation, the authenticators of the data beforehand deposited in cloud,
on the other hand all need to be efficient as the old secret key is no longer endangered.
Does not finding the optimal answer.
• Two set of keys has to be very long and linear, weak intelligence of refuge and low
security situation at the client.
To protect the data integrity and save the data owners computation resources as well as
online burden, a secure data storage in the cloud using code regeneration and public
audition scheme is proposed for the dynamic multi owner environment, in which the data
integrity checking and renewal are implemented by a third party auditor and a proxy
separately on behalf of the data owner. The high availability proxy server releases data
owners from online burden for the renewal of corrupted blocks.
The unauthorized action done by any group member can be found and revoked by the
high availability proxy. To make the scenario easier to follow, this technique is explained
with an example description: The public and privates keys are initially generated by the
staffs, and then by sharing a partial private key the handover of the authenticator is
regenerated to a proxy. Once the encoded blocks are generated along with the authenti-
cators, it is distributed after uploading it in the cloud server. The high availability proxy is
informed when the occurrence of the data correction takes place. This will perform on
behalf of the operators to redevelop the data blocks along with the corresponding
authenticators in an additional protected method. A group of staffs can work under a same
project and they can be in one group to access and modify the files. Data flow between
users and cloud servers are shown in Fig. 4.
123
K. Loheswaran, J. Premalatha
Data Flow
The renaissance system model for secure data storage is shown in Fig. 5. There are four
entities that are involved: one among them is the group of data owners. They own huge
amounts of data files that are stored in the cloud. The second entity is the cloud. This is
managed by the cloud service provider that offers storage service. The storage service
consists of substantial computational resources. The third entity is the third party auditor
(TPA). The TPA has facts and abilities to transmit out public audits on the coded data in
the cloud. The TPA is important and its audit consequences are independent for both cloud
servers and data owners. Instead of Data owners, a semi trusted proxy agent is made to act
to re-establish the data blocks during the repair procedure. In order to allow the TPA
securely, TPA should audit the adapted resource that it receive from the cloud and should
not ask for a copy. Also the TPA should not create a new vulnerability to user data privacy.
Let us consider the user group and it is denoted as G(U)i, where i = 1,2,…,n.
The first condition is connection establishment between the group user and cloud server.
123
Renaissance System Model Improving Security and Third Party…
GðU Þi ¤ Cs ð1Þ
Likewise, signature delegation between the user group and proxy (Px) is denoted in below
equation.
ð2Þ
Both the cloud server and proxy can access with the high availability. The auditing and the
auditing result is obtained in the third party auditor (TPA). The flow of the proposed
renaissance system model is noted in the below equation.
ð3Þ
Group members are a set of registered users that will 1. Store their private data into the
cloud server and 2. Share them with others in the group. This module maintains the user’s
details in it. The group membership is dynamically modified based on the staff resignation
and the participation of new employee in the company. The group member has the
ownership of changing the files in the group. All the users in the group can view the files
which are uploaded in their group and also can modify it. Also each group will have private
key and public key in it. The public key is used for viewing the document in the cloud
whereas the private is the meant for providing modification rights for a user.
The registered users and data will be maintained using a cloud server. In this module, a
local cloud is created that provides priced plentiful storage services. The users can upload
their data in the cloud. This module can be developed for cloud storage and to make the
secure data. Generally users will not trust the cloud fully because of the CPs is to be the
detained outside of the cloud consumers in the trusted domain. When an owner acts a
client, it changes the data to a third party cloud storage server as the cloud service is very
honest at its own. The third party cloud storage is hypothetical in storing the data. It gives it
back to the owner every time it is required. The cloud server delivers honour to produce
protected multi-owner data allocation system. It suggests that any user in the cluster can
steadily part data with others by the cloud.
123
K. Loheswaran, J. Premalatha
2. Signature verification,
3. Content renaissance.
A proxy agent acts on behalf of the data owner to renaissance authenticators and data
blocks on the servers during the repair procedure. Notice that the data owner is restricted in
computational and storage resources compared to other entities and may become off-line
after the data upload procedure. This will save the resources and online burden which
occurs due to the accidental repairing and periodic auditing. The data owners is used the
TPA for verification of integrity and reparation of proxy will be resorted. Assuming that
the data owner cannot always stay online in practice, in order to hold the storing data after
an obtainable and verifiable malicious corruption, it offers a semi trusted proxy into the
system model. It then brings an honour for the proxy to take care of the reparation of the
coded blocks and authenticators.
User revocation is attained over a public obtainable RL by the proxy that is fashioned on
the group associates and can encode their data files and protects the privacy in contra-
diction of the revoked users. No unauthorized access to the document is encouraged in the
cloud storage. So the data should be provided rights to modify only by the group’s own
users. Other members cannot modify the content. Once if any user tries to hack the private
key of another group and trying to modify this will be detected by the cloud server and the
user’s account will be revoked by the user. The user could never enter his login again.
9 Experimental Setup
A short-termed report on the outdated distributed file systems (DFS) in cloud and Google’s
Hadoop Distributed File System (HDFS) is considered firstly and are given. After which
the advanced test bed, Renaissance HDFS which integrates security module to HDFS is
described. Finally, renaissance system model is implemented into the test bed. This is
shown in Fig. 6.
Traditional DFS systems such as Google HDFS is widely accepted and used in Google,
IBM, and Yahoo to store and manage their large number of data in cloud. Interface
module, storage module, and management module are the three cloud masters. The virtual
file system organization is used to uphold the storage module. They also split the files into
blocks which are uploaded with the help of the selected slave server. The information
regarding the slave server and the resources that are stored are taken care off by the
management module. The slave server’s information includes detecting the heart, speed of
the transmission and the sparse space present in the disk. HDFS is used to improve the DFS
with the addition of computation module Hadoop in the file system.
In order to add security and highly well-organized TPA feature into the current HDFS, it
has been used as a practical test bed. Four computers are present in the testbed with the
123
Renaissance System Model Improving Security and Third Party…
Storage Distributed
Web
Storage
Resources
Resources
Resources
Browser Module
Multiple
Service
Request APIs Computation
Module
to Cloud
Management
Module
Data Encapsulation
Key
management
Web
Resources
Resources
Resources
Browser
Security
Module
APIs
features of Intel Core processor i5-760 running at 2.8 GHz with 4 GB RAM memory.
From these four computers, one act as master server in the cloud computing. This computer
allocates storage data index and space for the rest of the slaves that are present. The storage
requests along with the computation request are uploaded by the cloud either through a
wired medium or through a wireless communication. The security head comprises of the
chosen verifier signatures, symmetric key parameters, hash values and other security
parameters. These are defined in the Security Cloud. After the verification of the signature
of each block by the master server, a virtual file system organization is maintained at the
storage module. This is done by Extensible Mark-up Language (XML) which then allo-
cates each block to slave servers in a random manner. The high availability mode in the
entire setup ensures that the SLA levels of the cloud are high. This also ensures better
security and audit facilities.
The experiments are evaluated by observing the system performance under various
traffic load initializing at 100 MB and gradually increasing to 850 MB. The traffic load on
a system security overhead has been considered.
The effect of traffic load on a performance of the system with and without security is
measured based on the uploading speed shown in Fig. 7. It has been found that the
uploading speeds with security guarantee in renaissance system model seem to be close to
the novel protocol without having any security in itself. For instance, in case of a large files
say over 500 MB, the range varies from 13 to 15 Mb/s for uploading a file, which are
almost 2 Mb/s lower when compared to the original protocols. When considered small
files, there is instability in the speed of uploading at the initial step owing to the session
establishment delay.
The system delay is caused by the security overhead both in the cloud user’s side that is
while generation of the signature and symmetric encryption. Also the signature verification
along with the symmetric decryption is done in the cloud server’s side for the proposed
protocol. The master side and the client side traffic impact is shown in Fig. 8. The curse
123
K. Loheswaran, J. Premalatha
4
Uploading Speed
0
100 200 300 400 500 600 700 800 900 1000 1100 1200
File Size in Mb
Without security Guarantee With security Guarantee
tends to be stable over a period of fickle. When the percentage of the security increases
over 14, the curves become stable. It has also been noted that for a large file say of size
over 500 MB, there is more stability in the security overhead.
To consider the overall overhead, the total time of uploading files has been recorded in
two cases for comparison. Figure 9 show the total uploading time comparison between the
original protocol and renaissance system model. It is observed that renaissance system
model only has a somewhat additional time than the new protocol between 18 % in the
greatest case and 32 % in the poorest case. Thus, the increased time is not significantly
reducing the system performance.
Figure 10 show the average utilization computation between renaissance system model
clients and masters side. It is observed that the renaissance system model at the client’s
side has higher utilization when compared to others.
Figure 11 show the average response rate computation between renaissance system
model clients and masters side. It is observed that the renaissance system model at the
123
Renaissance System Model Improving Security and Third Party…
123
K. Loheswaran, J. Premalatha
client’s side has better response rate when compared to renaissance system model at the
masters’ side.
Figure 12 show the net profit between renaissance system model clients and masters
side. It is observed that there is not much variation in the Net profit of renaissance system
model at the client’s side and at the master’s side. In summary, the experiment results
demonstrate that renaissance system model is indeed a viable, lightweight solution for
secure data storage and computation in the cloud computing.
10 Conclusion
Cloud computing is generally used in the IT industry for secure communication. Even
though cloud computing is related with desktop, server, mobile, laptop, network, database
and others. Its development brings in benefits such as cost saving, ease of use, scalability,
environmental sustainability and flexibility. This new technology adds value to the society;
that will be like a giant and it will not easy to be handle, especially with regard to IT
auditing practices. Renaissance system model has four entities. On behalf of the owner, the
model is a semi trusted proxy agent to restore the data blocks for the time of repair. The
proposed renaissance system model is implemented. Experimental results have compared
the proposed approach with security and without security level. From that observation,
traffic load has decreased and average net profit, response rate and utilization has
increased.
References
1. Dimakis, A. G., Ramchandran, K., Wu, Y., & Suh, C. (2011). A survey on network codes for distributed
storage. Proceedings of the IEEE, 99(3), 476–489.
2. Lopez, J. M., Ruebsamen, T., & Westhoff, D. (2014). Privacy-friendly cloud audits with somewhat
homomorphic and searchable encryption. Hochschule Furtwangen University Furtwangen, Germany.
3. Hwang, K., Fox, G., & Dongarra, J. (2010). Distributed systems and cloud computing: Clusters, Grids/
P2P, and Internet Clouds. Burlington: Morgan Kaufmann.
123
Renaissance System Model Improving Security and Third Party…
4. Chen, B., Curtmola, R., Ateniese, G., & Burns, R. (2010). Remote data checking for network coding-
based distributed storage systems. In Proceedings of the 2010 ACM workshop on cloud computing
security workshop (pp. 31–42). ACM.
5. Wang, C., Wang, Q., Ren, K., & Lou, W. (2010). Privacy preserving public auditing for data storage
security in cloud computing. In INFOCOM, 2010 Proceedings IEEE (pp. 1–9). IEEE.
6. Kuyoro, S. O., Ibikunle, F., & Awodele, O. (2011). Cloud Computing security issues and challenges.
International Journal of Computer Networks, 3(5), 247–255.
7. Ateniese, G., Di Pietro, R., Mancini, L. V., & Tsudik, G. (2008). Scalable and efficient provable data
possession. In Proceedings of the 4th international conference on Security and privacy in communi-
cation networks. ACM.
8. Bugiel, S., Nurnberger, S., Sadeghi, A.-R., & Schneider, T. (2011). Twin clouds: Secure cloud com-
puting with low latency. Germany: CASED.
9. Chen, H., & Lee, P. (2014). Enabling data integrity protection in regenerating-coding-based cloud
storage: Theory and implementation. IEEE Transactions on Parallel and Distributed Systems, 25(2),
407–416.
10. Li, L., Xu, L., Li, J., & Zhang, C. (2011). Study on the third-party audit in cloud storage service. In
International conference on cloud and service computing.
11. Hwang, K., Kulkarni, S., & Hu, Y. (2009). Cloud security with virtualized defense and reputation-based
trust management. In IEEE Int’l conference dependable, autonomic, and secure computing (DASC 09),
IEEE CS Press.
12. Parwekar, P., Kumar, P., Saxena, M., & Saxena, S. (2014). Public auditing: Cloud data storage. In
International conference on 5th 2014.
13. Li, X., Li, W., & Shi, D. (2015). Enterprise private cloud file encryption system based on tripartite
secret key protocol. In International industrial informatics and computer engineering conference (pp.
166–169). Atlantis Press.
14. Li, M., Yu, S., Ren, K., & Lou, W. (2010). Securing personal health records in cloud computing:
Patient-centric and fine-grained data access control in multi-owner settings. In Security and privacy in
communication networks, proceedings of 6th international. conference on security privacy communi-
cation network.
15. Wang, C., Chow, S. S. M., Wang, Q., Ren, K., & Lou, W. (2013). Privacy preserving public auditing for
secure cloud storage. IEEE Transactions on Computers, 62(2), 362–375.
16. Nick, J. (2010). Journey to the private cloud: Security and compliance. Tech. presentation, EMC,
Tsinghua Univ., 25 May 2010.
17. Ye, C., & Reznik, A. (2007). Inter digital communications corporation King of Prussia. Group Secret
Key Generation Algorithms 0701124v1 19 Jan 2007.
18. Catteddu, D., & Hogben, G. (2009). Cloud computing: Benefits, risks and recommendations for
information security. European Network and Information Security Agency (ENISA), Cete.
19. Yang, K., & Jia, X. (2013). An efficient and secure dynamic auditing protocol for data storage in cloud
computing. IEEE Transactions on Parallel and Distributed Systems, 24(9), 1717–1726.
20. Yu, J., Ren, K., Wang, C., & Varsdharajan, V. (2015). Enabling cloud storage auditing with key
exposure resistance. IEEE Transaction on Information Forensics and Security, 10(6), 1167–1179.
21. Nafi, K. W., Kar, T. S., Hoque, S. A., & Hashem, M. M. A. (2012). A newer user authentication, file
encryption and distributed server based cloud computing security architecture. International Journal of
Advanced Computer Science and Applications, 3(10), 181–186.
22. Shacham, H., & Waters, B. (2008). Compact proofs of retrievability. In Proceedings of international
conference on the theory and application of cryptology and information security (ASIACRYPT), 2008
(pp. 90–107).
123
K. Loheswaran, J. Premalatha
123