Vous êtes sur la page 1sur 7

Literature Survey

Topic : Enabling Public Verifiability and Data Dynamics for


Storage Security in Cloud Computing
Abstract :
 It presents Concert, an approach for the automated analysis of workflows.
If a workflow does not adhere to the given rules, re-usable rule patterns are
used to pinpoint the workflow vulnerabilities.
 Auditors can check the rule adherence of workflows before workflow
execution, and thanks to the rule patterns certification is open to scrutiny by
customers.
 Companies which so far have refrained from Cloud Computing because of
Compliance concerns can use the new analysis approach to check for rule
adherence, and Cloud providers can demonstrate compliance through
certificates.

Merits :
 A clear business flow is maintained in the system. The request will be
directed to the appropriate work flow accordingly.
 Prescribed compliance rules were defined in the system.
Demerits :
 This project didn’t explain about the deviation of the system
 No clear explanation is provided about the alternatives for the deviation in
the system.
Topic : Ensuring Data Storage Security in Cloud
Computing
Abstract :
 This project explains about the data blocks and the file encryption happening in the
system.
 One of the important concerns that need to be addressed is to assure the customer
of the integrity i.e. correctness of his data in the cloud.
 As the data is physically not accessible to the user the cloud should provide a way
for the user to check if the integrity of his data is maintained or is compromised. In this
paper we provide a scheme which gives a proof of data integrity in the cloud which the
customer can employ to check the correctness of his data in the cloud.
 This proof can be agreed upon by both the cloud and the customer and can be
incorporated in the Service level agreement (SLA). This scheme ensures that the
storage at the client side is minimal which will be beneficial for thin clients.
Merits :
 The data will be proofed based on the Service Level agreement specified by the
stack holders.
 Most of the data were diversified as blocks of encrypted data bits.
Demerits :
 Practical implementation of this project is not focused clearly.
 Author provides a suggestion on the encryption process with out any explanation
on the steps to followed to incorporate this functionality in the cloud server..
Topic : LT Codes-based Secure and Reliable Cloud Storage
Service
Abstract :
 An online PHR system, the patient-centered health record (PcHR), that was
created by a research group at the University of Washington.
 It provides an opportunity to test the feasibility of integrating patient-centered
and provider-centered information systems. Using the PcHR, the patient's own
record of their health information was integrated into two clinical scenarios that
involved exchanging health records with traditional clinical information systems.
 Using the Continuity of Care Record standard (CCR), a personal health
record created through the PcHR system was successfully shared across the
IHE demonstration regional health information network (RHIN) and the patient's
health information viewed in several commercial clinical information systems.
Similarly, provider records were viewed from within the patient's record
Merits :
 This project approaches towards a centralized repository for the health
records.
 The data will be seen by the variety of public domain and clear projection is
defined for the accessibility.
Demerits :
 This project didn’t explain about the deviation of the system like emergency
cases.
 No clear explanation on segregation of data based on the level of users.
Topic : Provable Data Possession at Untrusted Stores
Abstract :
 One of the most important issues in health-related information systems is
high information security and stringent access control for patient's health data
to protect the patient's privacy and to prevent the use of data harmfully or
illegally.
 Carrying health records with a patient, for example in a personal digital
assistant (PDA) or a mobile phone, could provide greater control of the patient's
health data and privacy.
 It can also facilitate exchanging this health data with health care workers at
the point of care and only to the level desired.
 In this paper, we propose a portable personal electronic health record
architecture which natively supports a greater level of privacy using an
extended digital certificate-based approach.

Merits :
 A perfect explanation on “Who can Access”
“How can Access”
“What can Access”
Demerits :
 This project didn’t explain about the maintenance of the data.
 Didn’t focus on user’s perspective in a very normal way.
Topic : Public Auditing for Shared Data with Efficient User
Revocation in the Cloud
Abstract:
Outsourcing of computation and storage resources to general IT providers
(cloud computing) has become very appealing.
They also bear new risks and raise challenges with respect to security and
privacy aspects.
A security architecture for establishing privacy domains in e-health
infrastructures.
Provides client platform security and appropriately combines this with
network security concepts.
Merits:
The beginning primarily proposed for use in large-scale data centers [2],
TVDs can also be useful in other scenarios.
The secure GUI also prevents other compartments from reading user input
when they are not authorized to do so.
Demerits:
The communication between the connector and the client platform a secure
channel is proposed, but not enforced in the German eHC system.