About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
sis 21(30): e8

Research Article

SecHMS- A Secure Hybrid Monitoring Scheme for Cloud Data Monitoring

Download969 downloads
Cite
BibTeX Plain Text
  • @ARTICLE{10.4108/eai.23-10-2020.166719,
        author={Anuj Kumar Yadav and Ritika Ritika and M. L. Garg},
        title={SecHMS- A Secure Hybrid Monitoring Scheme for Cloud Data Monitoring},
        journal={EAI Endorsed Transactions on Scalable Information Systems},
        volume={8},
        number={30},
        publisher={EAI},
        journal_a={SIS},
        year={2020},
        month={10},
        keywords={Cloud Storage System, DDoS, IDS, SecHMS, Monitor},
        doi={10.4108/eai.23-10-2020.166719}
    }
    
  • Anuj Kumar Yadav
    Ritika Ritika
    M. L. Garg
    Year: 2020
    SecHMS- A Secure Hybrid Monitoring Scheme for Cloud Data Monitoring
    SIS
    EAI
    DOI: 10.4108/eai.23-10-2020.166719
Anuj Kumar Yadav1,*, Ritika Ritika1, M. L. Garg1
  • 1: CSE, DIT UNIVERSITY, Dehradun, India
*Contact email: anujbit@gmail.com

Abstract

Cloud computing enables the data owners to store and host their data on the cloud storage servers, which is to accessed by data consumers from the cloud storage servers whenever needed. The approach provides not only better accessibility but also unlimited storage capacity to the users. Even though there are numerous benefits of the approach, but security remains the prime concern for cloud computing and cloud service users. There are few solutions that provide protection in cloud computing, but even after having these solution, trust in cloud service providers remains the prime concern for cloud users. To overcome such a situation and to enhance the faith amongst the user and cloud service provider, a hybrid monitoring scheme (SecHMS) have been proposed and evaluated in this paper. The hybrid monitoring scheme (SecHMS) uses public-key cryptography and hashing technique to provide data security in cloud computing. The hybrid scheme (SecHMS) constantly monitors the stored data on behalf of end-users. As user’s data is getting continuously monitored, it leads to the enhancement of trust for the end-user in cloud computing systems. A thorough analysis has been done on different size files, and results have been demonstrated to show the correctness of SecHMS scheme.

Keywords
Cloud Storage System, DDoS, IDS, SecHMS, Monitor
Received
2020-07-07
Accepted
2020-09-30
Published
2020-10-23
Publisher
EAI
http://dx.doi.org/10.4108/eai.23-10-2020.166719

Copyright © 2020 Anuj Kumar Yadav et al., licensed to EAI. This is an open access article distributed under the terms of the Creative Commons Attribution license, which permits unlimited use, distribution and reproduction in any medium so long as the original work is properly cited.

EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL