A Scalable Privacy-Preserving Verification Correctness Protocol to Identify Corrupted Data in Cloud Storage
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 3
Abstract
Cloud computing prevails over the whole world which makes the mankind to rely more on a number of online storage systems to back up data or for using it in real time which gives an anywhere, anytime access. Thus lot of sensitive data will be stored into the cloud. As the user’s data are stored and maintained out of user’s premises, these services bring with it, concerns of security vulnerabilities for all the services provided by them. There is a lot of research being done to point out the issues with the service providers and cloud security in general. This paper provides a privacy-preserving data integrity protection by enabling public auditability for cloud storage and implements a scalable framework that addresses the construction of an interactive audit protocol to prevent the fraudulence of prover and the leakage of verified data in cloud storage by reducing the overhead in computation, communication and storage. Thus it provides a lightweight, efficient and privacy –preserving auditing scheme which will also identifies the corrupted data. The framework is based on an interactive PDP protocol that uses the challenge – response algorithms and a verification protocol. The protocol supports dynamic operation that allows the granted users to perform insertion, deletion and updation. The protocol allows a Third party Auditor who works on behalf of the Data owner who has a large amount of data to be stored in the cloud, to manage or monitor outsourced data. The experimental results show that the protocol is efficient, lightweight and privacy-preserving
Authors and Affiliations
Neethu Mariam Joseph, , Esther Daniel, , Vasanthi N A
Evaluating QOSMOS Using Markov Decision Process Model
Service discovery has been recognized as an important aspect in the development of service centric systems, i.e., software systems which deploy web services. To develop such systems, it is necessary to identify ser...
P300 based Brain Computer Interface for Disabled
A Brain Computer Interface (BCI) is a communication system that translates brain signals into commands for a computer. BCI is a communication system that recognizes user’s command only from his or her brainwaves...
Biclustering for Microarray Data: A Short and Comprehensive Tutorial
This paper presents a quick and very comprehensive tutorial on biclustering for the analysis of gene expression data obtained from microarray experiments. The results obtained from the conventional clustering methods...
Remote Monitoring, Controlling and Lost Hardware Detecting through GSM
The project aims to develop various network utilities which are required to effectively monitor, control via GSM and to provide security to a LAN network. It aims to develop an integrated software solution that allows a...
Determination of optimum coefficients of IIR Digital Butterworth Band-Stop Filter
Infinite Impulse Response(IIR) filter is of recursive type i.e. the present output sample depends on the present input samples, past input samples and past output samples. There are a number of methods available...