This paper is published in Volume 2, Issue 7, 2017
Area
Cloud Computing
Author
Sindhu J. P
Co-authors
Divyashree .J
Org/Univ
SJB Institute of Technology, India
Pub. Date
21 July, 2017
Paper ID
V2I7-1146
Publisher
Keywords
Cloud Security, Cloud Storage, Proof of Violation, Service-Level Agreements

Citationsacebook

IEEE
Sindhu J. P, Divyashree .J. Survey on Proof of Violation​ in Cloud Storage, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARnD.com.

APA
Sindhu J. P, Divyashree .J (2017). Survey on Proof of Violation​ in Cloud Storage. International Journal of Advance Research, Ideas and Innovations in Technology, 2(7) www.IJARnD.com.

MLA
Sindhu J. P, Divyashree .J. "Survey on Proof of Violation​ in Cloud Storage." International Journal of Advance Research, Ideas and Innovations in Technology 2.7 (2017). www.IJARnD.com.

Abstract

Proof of Violation (POV) scheme in the cloud storage systems, this scheme is used in which it allows the users to produce some cryptographic proofs, to determine whether the violation has been occurred by the user or whether he is innocent by providing cryptographic proofs. Since Security and reliability are the two major concerns about cloud storage. However, clients lose control of files when uploading to the cloud storage. Files may be unexpectedly exposed to a third party or modified without permission or the hackers may take an advantage of such files. The cloud may not follow user’s instruction to safely store files. For example, if files are damaged or lost, users usually do not have any precise proof to prove it. Since customers cannot make informed decisions about the risk of losing data stored, since their incentive to rely on these services is reduced. Hence a new scheme approach i.e., proof of violation is been developed in which it can be achieved using SLA Agreement, in which it can be used to provide the mutual non-repudiation guarantee with the service provider in the cloud storage. Auditing of files must be done, since it keep tracks of each file operation and determines if there is any violation in the SLA. The result of all these file operations and hash values of the downloaded files are stored in the cloud server and hence can achieve real-time auditing through it. Therefore the cloud must provide security features so that only authorized person can access and provide authentication for each file to improve better security features and back-up the lost data files. Therefore in order to enhance better performance and efficiency through which maximum time effort can be reduced.
Paper PDF