Anandavalli. M and L.mary Immaculate Sheela. Article: Securing Data in Cloud Storage with File Assured Deletion. IJCA Proceedings on International Conference on Communication, Computing and Information Technology ICCCMIT 2014(1):6-9, March 2015. Full text available. BibTeX
@article{key:article, author = {Anandavalli. M and L.mary Immaculate Sheela}, title = {Article: Securing Data in Cloud Storage with File Assured Deletion}, journal = {IJCA Proceedings on International Conference on Communication, Computing and Information Technology}, year = {2015}, volume = {ICCCMIT 2014}, number = {1}, pages = {6-9}, month = {March}, note = {Full text available} }
Abstract
Cloud Storage, Policy – based file assured deletion Cloud computing offers the hardware and software resources are made available on the internet. These services are provided and managed by the third party cloud providers at remote locations. Cloud storage providers are responsible for keeping data available and accessible which reduces the management overhead of the cloud. Cloud storage services are accessed through web content management or API. FADE (File Assured Deletion), a secure overlay cloud storage system constitutes policy-based access control and file assured deletion. It associates each file with access policies are unrecoverable by anyone. It protects the deleted data with policy-based file assured deletion. Our paper focuses on providing privacy and integrity of the outsourced data through FADE.
References
- Y. Tang, P. P. C. Lee, J. C. S. Lui, and R. Perlman. 2010. FADE: Secure Overlay Cloud Storage with File Assured Deletion. In Proc. Of ICST SecureComm.
- W. Stallings. 2006. Cryptography and Network Security. Prentice Hall.
- R. Perlman. 2007 File System Design with Assured Delete. In ISOC NDSS.
- S. Kamara and K. Lauter. 2000. Cryptographic Cloud Storage. In Proc. of Financial Cryptography: Workshop on Real-Life Cryptographic Protocols and Standardization.
- Priyanka Nagtilak and Archana Lomte. 2013. Dynamic Access Control and File Assured Deletion For Secured Cloud Storage. International Journal of Research in Advent Technology, Vol. 1, No. 5, (Dec 2013), 214-215.
- Priyanka Khandelwal. 2013. Analysis of Cloud access security on file system using secure policies. International Journal of Computer Science and Information Technology & Security. Vol. 3, No. 6, (Dec 2013), 406.
- V. Goyal, O. Pandey, A. Sahai, and B. Waters. 2006. Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data. In Proc. Of ACM CCS.
- Rutuja R. Sadul (et. al). , 2014. A Survey of Different Encryption Techniques for Secure Cloud Storage. Multidisciplinary Journal of Research in Engineering and Technology. Vol. 1, No. 1, (Apr 2014).
- Pallavi D. Patil, Ranjana R. Badre. 2014. Access Control and File Deletion as a Service in Cloud Computing. International Journal in Computer Technology and Applications. Vol. 5, No. 3, (May 2014), 1059.
- G. Gayatri, B. Sowmya. 2013. FADE: A Secure Overlay Cloud Storage System. International Journal of Science and Research. Vol. 2, No. 6, (Jun 2013), 150.