Menu
s
0 Comments

Cloud computing has made an impact on the IT business by proving itself to be the role model for the next generation IT architecture. In divergence to the conventional solutions, where the IT facilities are under appropriate physical and staff office controls, cloud computing provides the flexibility of migrating the system software and databases to the remote data centers, where the management of the data and services may not be fully trustable. This unparalleled attribute, however, poses a good deal of new security challenges which have not been properly analyzed. In this project, we specialize in cloud data storage security measures, which has always been an important factor when it comes to quality of service. To ensure the rightness of users’ data in the cloud, we devise an efficient and flexible distributed scheme with two prominent features, opposing the conventional methods. By employing three levels of security which involves IP triggering, IP binding, and successful redirection, our schema prevents the misuse of users’ data on the cloud. Unlike most prior works, the new scheme further supports secure and efficient dynamic operations on chunks of data which includes: updating the data, deleting as well as append operations on data. Comprehensive security and performance analysis shows that the proposed scheme is highly efficient and provides an additional layer of security by the method of binding a file to the user’s IP address which prevents data modification attacks from unauthorized addresses and successful redirection to a fake file if in case the

x

Hi!
I'm Anna!

Would you like to get a custom essay? How about receiving a customized one?

Check it out