A Public Auditing Framework for Cloud Storage Security
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 7
Abstract
Commoditization of computing resources has become a reality with cloud computing which is a new computing model. Users are no longer required to invest on procuring computing resources. Instead they use resources provided by cloud service providers in pay as you use fashion. Users are able to use huge storage and processing capabilities of the cloud. However, they feel that they do not have control over data as it is stored in a remote server. Many auditing schemes came into existence for data integrity verification in order to ensure the storage inconsistencies if any are known to end users. Thus they encouraged people to use cloud storage services by providing secure environment. Wang et al. introduced a protocol specification which guarantees security and performance. In this paper we implemented that protocol using Azure cloud. We have developed a prototype that facilitates end user to avail storage and data integrity verification services thus assuring cloud storage security. The empirical results revealed that the protocol is efficient and highly secure.
Authors and Affiliations
Satish Kumar Sidigonda, Sudheer Kumar A, Venkatesh D
Detection & Prevention of Unauthorized User through Policy Server for a Network
Now a day’s Accessing the information all over the world is very fast & quick. Accessing the information is done over the internet. Industry & various organizations are facing access management problems that require n...
Data Sharing In Cloud Storage Using Key Aggregate Cryptosystem
Cloud storage is getting exceptionally famous nowadays .The two noteworthy offices that cloud give are information stockpiling and information sharing. A protected information partaking in cloud is a critical issue....
Robust Image Watermarking using Three Domains of SVD
In this paper robust watermarking scheme is proposed using SVD. Initially singular value decomposition is applied to the host image. After SVD, watermark is embedded in three domains i.e., in D, U and V. Watermark is...
DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK
Routing Protocol design for wireless networks is problem area that has two essential requirements. Minimize energy cost and maximize network throughput. Wireless Sensor Network consists of sensor devices which senso...
Intelligent Database System-Ontology for a Better Database System
With monumental stress on the huge databases of ever increasing data available not only with the standalone systems but with the networks and internet all loaded with Everest size mountains of huge terabytes of infor...