Abstract
The cloud storage system is an improved online drive storage system with storage on cloud. It can handle all details about a file uploads with categories, preceded by file download whenever required. The file gets uploaded with some encryption strategy and stored safely on the cloud, later on while downloading the file, the decryption is done using a security key provided through the registered mail ID. The details include file name, type of file (Private/Public) and auto generated passkey. In case of system, they need a lot of time for searching the file which is not a secured way. So the accuracy will be maintained in this application. This system is managed by the application in cloud server. It is the work of the cloud application which is headed in place to observe the complete procedure.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
R. Buyya, C. Yeo, S. Venugopal, J. Broberg, I. Brandic, Cloud computing and emerging IT platforms: vision hype and reality for delivering computing as the 5th utility. J. Future Gener. Comput. Sci. 25(6), 599–616 (2009)
P. Mell, T. Grance, The NIST Definition of Cloud Computing. (NIST Special Publication, 2011), pp. 800–145
M. Ali, S. Khan, A. Vasilakos, Security in cloud computing: opportunities and challenges. Inf. Sci. 305, 357–383 (2015)
C. Wang, Q. Wang, K. Ren, N. Cao, W. Lou, Towards secure and dependable storage services in cloud computing. IEEE Trans. Cloud Comput. Date Publ. 5(2) (2015)
J. Wu, L. Ping, X. Ge, Y. Wang, J. Fu, Cloud storage as the infrastructure of cloud computing, in 2010 International Conference on Intelligent Computing and CognitiveInformatics (2010)
G. Suciu, S. Halunga, A. Apostu, A. Vulpe, G. Todoran, Cloud computing as evolution of distributed computing—a case study for SlapOS distributed cloud computing platform. Informatica Economică 17(4), 109–122 (2013)
M.A. Sharkh, M. Jammal, A. Shami, A. Ouda, Resource allocation in a network-based cloud computing environment: design challenges. IEEE Commun. Mag. 51(11), 46–52 (2013)
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Paterson, D. Song, Provable data possession at untrusted stores, in Proceedings of the ACM Conference on Computer and Communications Security (CCS’07), 29 October–2 November 2007, pp. 598–610
C. Erway, A. Kupcu, C. Papamanthou, R. Tamassia, Dynamic provable data possession, in Proceedings of the 16th ACM conference on Computer and communications security (CCS) (2009), pp. 213–222
C. Wang, Q. Wang, K. Ren, W. Lou, Privacy preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362–375 (2011)
A. Juels, J. Burton, S. Kaliski, Proofs of retrievaliability for large files, in Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS) (2007), pp. 584–597
M.A. Shah, M. Baker, J.C. Mogul, R. Swaminathan, Auditing to keep online storage services honest, in Proceedings of the 11th workshop on hot topics in operating systems (HotOS'07), ‘HotOS’, USENIX Association (2007), pp. 1–6
Q. Wang, C. Wang, J. Li, K. Renand, W. Lou, Enabling public verifiability and data dynamics for storage security in cloud computing, in Proceedings of 14th European Symposium Research in Computer Security (ESORICS ‘09) (2009), pp. 355–370
P. Prasadreddy, T. Srinivasa, S. Phani, A threat free architecture for privacy assurance in cloud computing, in Proceedings of the IEEE World Congress on Services, 4–9 July 2011, USA. (IEEE Xplore Press), pp. 564–568. https://doi.org/10.1109/SERVICES.2011.11
D. M'Raihi, S. Machani, M. Pei, J. Rydell, TOTP: time-based one-time password algorithm, Request for Comments (RFC) 6238, 13 July 2011
K. Kiran, K. Padmaj, P. Radha, Automatic protocol blocker for privacy-preserving public
S.A. El-Booz, G. Attiya, N. El-Fishawy, A secure cloud storage system combining time-based one time password and automatic blocker protocol. Faculty of Electronic Engineering, Menoufia University, Menouf, Egypt. IEEE Trans. (2015). https://doi.org/10.1109/ICENCO
G. Suciu, S. Halunga, A. Apostu, A. Vulpe, G. Todoran, Cloud computing as evolution of distributed computing—a case study for SlapOS distributed cloud computing platform. Inform. Econ. 17(4), 109–122 (2013)
P. Mell, T. Grance, The NIST definition of cloud computing. National Institute of Standards and Technology, Information Technology Laboratory, 7 October 2009. http://www.nist.govlitI/cloud/
M.A. Sharkh. M. Jammal, A. Shami, A. Ouda, Resource allocation in a network based cloud computing environment: design challenges. IEEE Commun. Mag. 51(11), 46–52 (2013)
c. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-Preserving Public Auditing for Secure Cloud Storage.“ IEEE Transactions on Computers, Vol. 62, No. 2, pp. 1–12,2013.
M. Venkatesh, M.R. Sumalatha, C. Selva Kumar, Improving public auditability, data possession in data storage security for cloud computing,·in Proceedings of the International Conference on Recent Trends in Information Technology (ICRTIT), 19–21 April 2012, pp. 463–467
S. Bhagyashri, Y.B. Gurave, A survey on privacy preserving techniques for secure cloud storage. Int. J. Comput. Sci. Mob. Comput. (IJCSMC) 3(2), 675–680 (2014)
G. Caronni, M. Waldvogel, Establishing trust in distributed storage providers, in Third IEEE P2P Conference, Linkoping 03, 2003
P. Golle, S. Jarecki, I. Mironov, Cryptographic primitives enforcing communication and storage complexity, in Proceedings of Financial Crypto 2002, Southampton, Bermuda
F. Sebe. J. Domingo-Ferrer, A. Martinez-Balleste, Y. Deswarte, J.-J. Quisquater, Efficient remote data possession checking in critical information infrastucures. IEEE Trans. Knowl. Data Eng. 20(8), 1034–1038 (2008)
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, D. Song, Remote data checking using provable data possession. ACM Trans. Inform. Syst. Sec. 14(1), 12.1–12.34 (2011). Article 12
A. Juels, J. Burton S. Kaliski, PORs: proofs of retrievability for large files, in Proceedings of CCS ’07, Alexandria, Va, USA (2007), pp. 584–597
G. Ateniese, S. Kamara, J. Katz, Proofs of storage from homomorphic identification protocols, in Proceedings of ASIACRYPT ‘09, Tokyo, Japan (2009), pp. 319–333
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Ayatti, S., Gouri, K., Kunchur, P., Bangarashetti, S.P. (2022). Secured Cloud Storage System Using Auto Passkey Generation. In: Manogaran, G., Shanthini, A., Vadivu, G. (eds) Proceedings of International Conference on Deep Learning, Computing and Intelligence. Advances in Intelligent Systems and Computing, vol 1396. Springer, Singapore. https://doi.org/10.1007/978-981-16-5652-1_2
Download citation
DOI: https://doi.org/10.1007/978-981-16-5652-1_2
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-5651-4
Online ISBN: 978-981-16-5652-1
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)