By Topic

Secure storage and access of data in cloud computing

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Kumar, A. ; Dept. of Ubiquitous-IT, Dongseo Univ., Busan, South Korea ; Byung Gook Lee ; HoonJae Lee ; Kumari, A.

Cloud computing is the most demanded advanced technology throughout the world. It is one of the most significant topic whose application is being researched in today's time. One of the prominent services offered in cloud computing is the cloud storage. With the cloud storage, data is stored on multiple third party servers, rather than on the dedicated server used in traditional networked data storage. All data stored on multiple third party servers is not cared by the user and no one knows where exactly data saved. It is cared by the cloud storage provider that claims that they can protect the data but no one believes them. Data stored over cloud and flow through network in the plain text format is security threat. This paper proposes a method that allows user to store and access the data securely from the cloud storage. It also guarantees that no one except the authenticated user can access the data neither the cloud storage provider. This method ensures the security and privacy of data stored on cloud. A further advantage of this method is that if there is security breach at the cloud provider, the user's data will continue to be secure since all data is encrypted. Users also need not to worry about cloud providers gaining access to their data illegally.

Published in:

ICT Convergence (ICTC), 2012 International Conference on

Date of Conference:

15-17 Oct. 2012