An Efficient Pdp Scheme For Distributed Cloud Storage To Support Dynamic Scalability On Multiple Storage Servers
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2014, Vol 2, Issue 12
Abstract
The confirmation examination without downloading makes it particularly important for large-size files and folders typically including many clients’ files to make sure whether these data have been tampered with or deleted without downloading the latest version of data. Provable data possession is such a probabilistic proof technique for a storage provider to establish the integrity and ownership of clients’ data without downloading data. Consequently it is able to put back traditional hash and signature functions in storage outsourcing. Various PDP schemes have been recently proposed such as Scalable PDP and Dynamic PDP. Though these schemes mainly focus on PDP issues at untrusted servers in a single cloud storage provider and are not appropriate for a multi-cloud environment. Furthermore clients need to know the exact position of each file block in a multi-cloud environment. The confirmation process in such a case will lead to high communication overheads and calculation costs at client sides as well. Consequently it is of utmost necessary to design a cooperative PDP model to decrease the storage and network overheads and improve the transparency of verification activities in cluster-based cloud storage systems. A cooperative PDP scheme should give features for timely detecting abnormality and renewing multiple copies of data.
Authors and Affiliations
Ch. Rajeshwari| Balaji Institute of Technology & Science Narsampet warangal, choppararaji@gmail.com, S. Suresh| Balaji Institute of Technology & Science Narsampet warangal
A texture feature extraction of crop field images using GLCM approach
To capture visual content of images for retrieval, feature extraction is one of the method. In this paper feature extraction is done using GLCM (Gray Level Co-occurrence Matrix). In this work 6 varieties of crop imag...
Anonymous Authentication of Data Stored in Clouds with Decentralized Security Mechanism
The term that flourished in the IT industry is the Cloud Computing. Inspired and Motivated by the tremendous growth and the huge success of cloud, we propose a new decentralized access control scheme for secure data...
Transformer less Series Active Filter for Power Quality Improvement
To upgrade the power quality in singlestage frameworks with critical loads a transformer less hybrid series dynamic channel is proposed . This venture helps the energy administration and power quality issues identifie...
Detection of Behavioral Malware in Delay Tolerant Networks
Disruption-tolerant networking has gained currency in the United States due to support from DARPA, which has funded many DTN projects. Disruption may occur because of the limits of wireless radio range, sparsity of m...
CONTROL OF ACTIVE AND REACTIVE POWER USING DISTRIBUTED ENERGY SYSTEM FOR POWER GENERATION IN DISTRIBUTION NETWORK
At present decentralized energy sources are more beneficial than conventional centralized energy sources, distributed energy sources are decentralized energy sources. Decentralized energy sources use renewable energy...