A Secure Auditing Framework for Load Balancing in Cloud Environment
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32847
A Secure Auditing Framework for Load Balancing in Cloud Environment

Authors: R. Geetha, T. Padmavathy


Security audit is an important aspect or feature to be considered in cloud service customer. It is basically a certification process to audit the controls that deliver the security requirements. Security audits are conducted by trained and qualified staffs that belong to an independent auditing organization. Security audits must be carried as a standard of security controls. Proper check to be made that the cloud user has a proper reporting and logging facilities with the customer's system and hence ensuring appropriate business and operational flow of data through cloud service. We propose a cloud-based secure auditing framework, which enables confided in power to safely store their mystery information on the semi-believed cloud specialist co-ops, and specifically share their mystery information with a wide scope of information recipient, to diminish the key administration intricacy for power proprietors and information collectors. Unique in relation to past cloud-based information framework, data proprietors transfer their mystery information into cloud utilizing static and dynamic evaluating plan. Another propelled determination is, if any information beneficiary needs individual record to download, the information collector will send the solicitation to the expert. The specialist proprietor has the Access Control. At the off probability, the businessman must impart the primary record to the knowledge collector, acknowledge statistics beneficiary solicitation. Once the acknowledgement for the records is over, the recipient downloads the first record and this record shifting time with date and downloading time with date are monitored by the inspector. In addition to deduplication concept, diminished cloud memory area using dynamic document distribution has been proposed.

Keywords: Cloud computing, cloud storage auditing, data integrity, key exposure.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.3669244

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1114


[1] Cong Wang, Qian Wang, KuiRen, Ning Cao, and Wenjing Lou, “Towards Secure and Dependable Storage Services in Cloud Computing”, IEEE Transactions on Services Computing, Volume: 5, Issue: 2, April-June 2012.
[2] Yan Zhu, Gail-JoonAhn, Hongxin Hu, Stephen S. Yau, Ho G. An, and Chang-Jun Hu “Dynamic Audit Services for Outsourced Storages in Clouds”, IEEE Transactions On Services Computing, Vol. 6, No. 2, April-June 2013.
[3] Qingji Zheng, Shouhuai Xu, “Fair and Dynamic Proofs of Retrievability”, Proceedings of the first ACM conference on Data and application security and privacy, CODASPY '11, pp 237-248, 2011.
[4] Zhengwei Ren, Lina Wang, Qian Wang, Rongwei Yu, and Ruyi Deng “Dynamic Proofs of Retrievability for Coded Cloud Storage Systems”. Zero-knowledge Proofs of Retrievability, Science China: Information Sciences, vol. 54, no. 8, pp. 1608-1617, 2011.
[5] Alptekin Kupcu, “Official Arbitration with Secure Cloud Storage Application”, The Computer Journal 58(4):831-852, 2013.
[6] Decio Luiz Gazzoni Filho, Paulo Sergio Licciardi Messeder Barreto, “Demonstrating data possession and uncheatable data transfer”, IACR Cryptology eprint Archive, pp 150-150,2006.
[7] Ms. Ashwini Mandale, Prof. Shriniwas Gadage, “Cooperative Provable Data possession for integrity verification in multicloud”, International Journal of Engineering Research and General Science Volume 3, Issue 2, Part 2, March-April, 2015.
[8] Zhuo Hao, Sheng Zhong, and Nenghai Yu “A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability”, IEEE Transactions On Knowledge And Data Engineering, Vol. 23, No. 9, September 2011.
[9] Mehul A. Shah, Mary Baker, Jeffrey C. Mogul, Ram Swaminathan, “Auditing to Keep Online Storage Services Honest”, Proceedings of the 11th USENIX workshop on Hot topics in operating systems, HOTOS'07, Article No. 11 2007.
[10] Francesc Sebe, Josep Domingo-Ferrer, Senior Member, Antoni Martınez-Balleste, Yves Deswarte, and Jean-Jacques Quisquater, “Efficient Remote Data Possession Checking in Critical Information Infrastructures”, IEEE Transactions On Knowledge And Data Engineering, Vol. 20, No. 8, August 2008.
[11] Cong Wang, Qian Wang, Kui Ren, Wenjing Lou, “Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing”, 978-1-4244-5837-0/10/$26.00 ©2010 IEEE.
[12] Boyang Wang, Baochun Liand Hui Li, “Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud”, IEEE Transactions on Cloud Computing, Volume: 2, Issue: 1, Jan.-March 2014.
[13] Cong Wang, Sherman S.M. Chow, Qian Wang, KuiRen, and Wenjing Lou, “Privacy-Preserving Public Auditing for Secure Cloud Storage”, IEEE Transactions On Computers, Vol. 62, No. 2, February 2013.
[14] Benoit Libert and Damien Vergnaud, “Adaptive-ID Secure Revocable Identity-Based Encryption”, The Cryptographers’ Track at the RSA Conference 2009, San Francisco, CA, USA, April 20-24, 2009.
[15] Jae Hong Seoand Keita Emura, “Revocable Identity-Based Encryption Revisited: Security Model and Construction”, Proceedings of the 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 – March 1, 2013.
[16] Alexandra Boldyreva, Vipul Goyal, Virendra Kumar, “Identity-based Encryption with Efficient Revocation”, Proceedings of the 15th ACM conference on Computer and communications security ,pp 417-426,2008.