An Efficient Pdp Scheme For Distributed Cloud Storage To Support Dynamic Scalability On Multiple Storage Servers
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2014, Vol 2, Issue 12
Abstract
The confirmation examination without downloading makes it particularly important for large-size files and folders typically including many clients’ files to make sure whether these data have been tampered with or deleted without downloading the latest version of data. Provable data possession is such a probabilistic proof technique for a storage provider to establish the integrity and ownership of clients’ data without downloading data. Consequently it is able to put back traditional hash and signature functions in storage outsourcing. Various PDP schemes have been recently proposed such as Scalable PDP and Dynamic PDP. Though these schemes mainly focus on PDP issues at untrusted servers in a single cloud storage provider and are not appropriate for a multi-cloud environment. Furthermore clients need to know the exact position of each file block in a multi-cloud environment. The confirmation process in such a case will lead to high communication overheads and calculation costs at client sides as well. Consequently it is of utmost necessary to design a cooperative PDP model to decrease the storage and network overheads and improve the transparency of verification activities in cluster-based cloud storage systems. A cooperative PDP scheme should give features for timely detecting abnormality and renewing multiple copies of data.
Authors and Affiliations
Ch. Rajeshwari| Balaji Institute of Technology & Science Narsampet warangal, choppararaji@gmail.com, S. Suresh| Balaji Institute of Technology & Science Narsampet warangal
Fast Keyword Search Assumption In The Random Oracle (RO) Model
This proposes searchable public key ciphertexts with hidden structures (SPCHS) for keyword seek as quickly as conceivable without giving up semantic security of the encoded keywords. In SPCHS, all keyword searchable...
Dynamics Of Multi layered Composite Shell With Shape Memory Alloys
The use of different composite materials has been continuously growing in recent years. Although many applications for composite materials have been identified. Extensive research is still being carried out in order...
We initially give a productive certificateless signcryption plan and afterward outline a get to control conspire for the WBANs utilizing the given signcryption. Our plan accomplishes classification, respectability, v...
Efficient And Secure Hop-By-Hop Message Authentication And Source Privacy In Wireless Sensor Networks
security to the data is actually provided by an authentication. Authentication involves a process of confirming an identity. In Wireless sensor networks a lot of message authentication schemes have been developed, ba...
Spyware prevention using graphical passwords
our future work will be based on Click-based graphical password schemes require a user to click on a set of points on one or more presented background images. With the Pass Points and to create users to a password by...