An Approach to Minimize Computational and Communicational Overhead in Cloud Computing
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2013, Vol 4, Issue 7
Abstract
Cloud computing has been envisioned as the next generation information technology architecture for enterprises. Cloud Computing moves the data on the cloud storage servers maintained by service providers, which deprive the user of their control of the physical possession of data, even though they are the owners of the data. This unique feature however has raised many new security challenges which have not been well understood. Efficient verification techniques are of significant importance for cloud customers to validate data integrity and availability are not applicable on the outsourced data without having a local copy of the data. Downloading all outsourced data in order to validate its integrity is impractical for the excessive I/O cost and the high communication overhead across the network Therefore efficient techniques are needed for this. In this paper, we introduce a framework and efficient constructions for dynamic provable data possession (DPDP), which extends the PDP model to support provable updates on the stored data.
Authors and Affiliations
Kalpana Batra
Exploration of Cloud Computing and its Essential Facets
Cloud computing is all about how we can use external services over network by various resources provided by many different companies that share and access through the internet to perform many commercial essentialities. C...
System for Devices mobile based in recognition facial
In this paper is documents the development of the work of a security system for mobile devices based on Facial recognition. This recognition is based on the algorithm of Wu and SUSAN, it was obtained for 80% efficiency a...
Human-Computer Interaction: Preamble and Future in 2020.
The growth in Human-Computer Interaction (HCI) field has not only been in quality of interaction, it has also experienced different branching in its history. The intention behind writing this paper is to provide an overv...
A COMPARATIVE ANALYSIS OF OBJECT POINT METHOD WITH USE CASE METHOD IN SOFTWARE EFFORT ESTIMATION
The important work in software development process is to develop projects within estimated time and cost. As accuracy and effort plays a vital role for software development system. Several techniques are available for ef...
Design and Implementation of an Active RFID Tag
The Active Radio Frequency Identification tag that is RFID tag with battery is promising for RFID low power consumption and precise localization in indoor cluttered as well as for outdoor environment. In this paper, Desi...