Skip to main content

Secured Cloud Storage System Using Auto Passkey Generation

  • Conference paper
  • First Online:
Proceedings of International Conference on Deep Learning, Computing and Intelligence

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1396))

  • 675 Accesses

Abstract

The cloud storage system is an improved online drive storage system with storage on cloud. It can handle all details about a file uploads with categories, preceded by file download whenever required. The file gets uploaded with some encryption strategy and stored safely on the cloud, later on while downloading the file, the decryption is done using a security key provided through the registered mail ID. The details include file name, type of file (Private/Public) and auto generated passkey. In case of system, they need a lot of time for searching the file which is not a secured way. So the accuracy will be maintained in this application. This system is managed by the application in cloud server. It is the work of the cloud application which is headed in place to observe the complete procedure.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. R. Buyya, C. Yeo, S. Venugopal, J. Broberg, I. Brandic, Cloud computing and emerging IT platforms: vision hype and reality for delivering computing as the 5th utility. J. Future Gener. Comput. Sci. 25(6), 599–616 (2009)

    Article  Google Scholar 

  2. P. Mell, T. Grance, The NIST Definition of Cloud Computing. (NIST Special Publication, 2011), pp. 800–145

    Google Scholar 

  3. M. Ali, S. Khan, A. Vasilakos, Security in cloud computing: opportunities and challenges. Inf. Sci. 305, 357–383 (2015)

    Article  MathSciNet  Google Scholar 

  4. C. Wang, Q. Wang, K. Ren, N. Cao, W. Lou, Towards secure and dependable storage services in cloud computing. IEEE Trans. Cloud Comput. Date Publ. 5(2) (2015)

    Google Scholar 

  5. J. Wu, L. Ping, X. Ge, Y. Wang, J. Fu, Cloud storage as the infrastructure of cloud computing, in 2010 International Conference on Intelligent Computing and CognitiveInformatics (2010)

    Google Scholar 

  6. https://www.researchgate.net/publication/305508410_Cloud_Storage_Advantages_Disadvantages_and_Enterprise_Solutions_for_Business

  7. G. Suciu, S. Halunga, A. Apostu, A. Vulpe, G. Todoran, Cloud computing as evolution of distributed computing—a case study for SlapOS distributed cloud computing platform. Informatica Economică 17(4), 109–122 (2013)

    Google Scholar 

  8. M.A. Sharkh, M. Jammal, A. Shami, A. Ouda, Resource allocation in a network-based cloud computing environment: design challenges. IEEE Commun. Mag. 51(11), 46–52 (2013)

    Article  Google Scholar 

  9. G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Paterson, D. Song, Provable data possession at untrusted stores, in Proceedings of the ACM Conference on Computer and Communications Security (CCS’07), 29 October–2 November 2007, pp. 598–610

    Google Scholar 

  10. C. Erway, A. Kupcu, C. Papamanthou, R. Tamassia, Dynamic provable data possession, in Proceedings of the 16th ACM conference on Computer and communications security (CCS) (2009), pp. 213–222

    Google Scholar 

  11. C. Wang, Q. Wang, K. Ren, W. Lou, Privacy preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362–375 (2011)

    Article  MathSciNet  Google Scholar 

  12. A. Juels, J. Burton, S. Kaliski, Proofs of retrievaliability for large files, in Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS) (2007), pp. 584–597

    Google Scholar 

  13. M.A. Shah, M. Baker, J.C. Mogul, R. Swaminathan, Auditing to keep online storage services honest, in Proceedings of the 11th workshop on hot topics in operating systems (HotOS'07), ‘HotOS’, USENIX Association (2007), pp. 1–6

    Google Scholar 

  14. Q. Wang, C. Wang, J. Li, K. Renand, W. Lou, Enabling public verifiability and data dynamics for storage security in cloud computing, in Proceedings of 14th European Symposium Research in Computer Security (ESORICS ‘09) (2009), pp. 355–370

    Google Scholar 

  15. P. Prasadreddy, T. Srinivasa, S. Phani, A threat free architecture for privacy assurance in cloud computing, in Proceedings of the IEEE World Congress on Services, 4–9 July 2011, USA. (IEEE Xplore Press), pp. 564–568. https://doi.org/10.1109/SERVICES.2011.11

  16. D. M'Raihi, S. Machani, M. Pei, J. Rydell, TOTP: time-based one-time password algorithm, Request for Comments (RFC) 6238, 13 July 2011

    Google Scholar 

  17. K. Kiran, K. Padmaj, P. Radha, Automatic protocol blocker for privacy-preserving public

    Google Scholar 

  18. S.A. El-Booz, G. Attiya, N. El-Fishawy, A secure cloud storage system combining time-based one time password and automatic blocker protocol. Faculty of Electronic Engineering, Menoufia University, Menouf, Egypt. IEEE Trans. (2015). https://doi.org/10.1109/ICENCO

  19. G. Suciu, S. Halunga, A. Apostu, A. Vulpe, G. Todoran, Cloud computing as evolution of distributed computing—a case study for SlapOS distributed cloud computing platform. Inform. Econ. 17(4), 109–122 (2013)

    Google Scholar 

  20. P. Mell, T. Grance, The NIST definition of cloud computing. National Institute of Standards and Technology, Information Technology Laboratory, 7 October 2009. http://www.nist.govlitI/cloud/

  21. M.A. Sharkh. M. Jammal, A. Shami, A. Ouda, Resource allocation in a network based cloud computing environment: design challenges. IEEE Commun. Mag. 51(11), 46–52 (2013)

    Google Scholar 

  22. c. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-Preserving Public Auditing for Secure Cloud Storage.“ IEEE Transactions on Computers, Vol. 62, No. 2, pp. 1–12,2013.

    Google Scholar 

  23. M. Venkatesh, M.R. Sumalatha, C. Selva Kumar, Improving public auditability, data possession in data storage security for cloud computing,·in Proceedings of the International Conference on Recent Trends in Information Technology (ICRTIT), 19–21 April 2012, pp. 463–467

    Google Scholar 

  24. S. Bhagyashri, Y.B. Gurave, A survey on privacy preserving techniques for secure cloud storage. Int. J. Comput. Sci. Mob. Comput. (IJCSMC) 3(2), 675–680 (2014)

    Google Scholar 

  25. G. Caronni, M. Waldvogel, Establishing trust in distributed storage providers, in Third IEEE P2P Conference, Linkoping 03, 2003

    Google Scholar 

  26. P. Golle, S. Jarecki, I. Mironov, Cryptographic primitives enforcing communication and storage complexity, in Proceedings of Financial Crypto 2002, Southampton, Bermuda

    Google Scholar 

  27. F. Sebe. J. Domingo-Ferrer, A. Martinez-Balleste, Y. Deswarte, J.-J. Quisquater, Efficient remote data possession checking in critical information infrastucures. IEEE Trans. Knowl. Data Eng. 20(8), 1034–1038 (2008)

    Google Scholar 

  28. G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, D. Song, Remote data checking using provable data possession. ACM Trans. Inform. Syst. Sec. 14(1), 12.1–12.34 (2011). Article 12

    Google Scholar 

  29. A. Juels, J. Burton S. Kaliski, PORs: proofs of retrievability for large files, in Proceedings of CCS ’07, Alexandria, Va, USA (2007), pp. 584–597

    Google Scholar 

  30. G. Ateniese, S. Kamara, J. Katz, Proofs of storage from homomorphic identification protocols, in Proceedings of ASIACRYPT ‘09, Tokyo, Japan (2009), pp. 319–333

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Pavan Kunchur .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ayatti, S., Gouri, K., Kunchur, P., Bangarashetti, S.P. (2022). Secured Cloud Storage System Using Auto Passkey Generation. In: Manogaran, G., Shanthini, A., Vadivu, G. (eds) Proceedings of International Conference on Deep Learning, Computing and Intelligence. Advances in Intelligent Systems and Computing, vol 1396. Springer, Singapore. https://doi.org/10.1007/978-981-16-5652-1_2

Download citation

Publish with us

Policies and ethics