Authorized Public Auditing of Dynamic Storage on Cloud with Efficient Verifiable Fine-Grained Updates with MHT
Journal Title: GRD Journal for Engineering - Year 2016, Vol 1, Issue 6
Abstract
One of the top technology concept is Cloud Computing. Cloud storage servers plays an important role in the technology buzz – cloud computing where clients can store their data at cloud servers and can access this data from anywhere and anytime. This opens up the threat on the data which client is storing on the cloud as it has to stored and accessed via Internet from any device. Here we came up with data Security which opens up lot of areas like authentication of clients, data integrity check and data privacy preserving. In our proposed work we are going to focus on data integrity area which is concerned about data security. When we consider about data security data auditing is concept of frequently auditing the integrity of the data to make sure that the data is not tampered and it is secured. Most of the times clients offload the auditing process of their data to Third Party Auditors (TPA) who are able to check the validity of the data without actually accessing the data on cloud. When the verification is done by a trusted third party called data auditing in which third party is called an auditor. There are several drawbacks of these techniques. One of the issue arises here is a necessary authentication process is missing between the auditor and cloud service provider it means that anyone can challenge the cloud service provider for a proof of integrity of certain file which puts auditing service at risk. In our work, we provide a legal Study for possible types of fine-grained data updates and suggest a scheme that can fully support authorized auditing and fine-grained update request.
Authors and Affiliations
Mayur Lokhande, Supriya Kapse, Sonali Darekar, Mahesh Sonawane
PERFORMANCE ANALYSIS OF SALIENCY STRUCTURE MODEL IN IMAGE RETRIEVAL
A novel mechanism to simulate visual attention mechanisms for content-based image retrieval, based on saliency structure histogram method was proposed in this paper. In CBIR, images are indexed by their visual content, s...
A Grid based Secured on-Road Localization System with Liner Error Propagation using VANET AODV Protocol
GPS navigators has widely adopt by drivers. However, due to this sensibility of GPS signals to terrains, vehicles cannot to get their locations, when they are anyone inside a tunnel or a road it’s surrounded by high rise...
Data leakage Detection and Security in Cloud Computing
Data leakage ad security of data is an essential component of cloud computing, most of the data has been proceed through third party application (TPA) and user are unaware about the security essentials. The internet base...
Traffic Flow Study at Majura-Gate Intersection of Surat City
Traffic on the existing road is increase due to rapid modernization and industrialization due to extremely growth of vehicles all over the world. Some problems like congestion, delay and pollution remain a big challenge...
Digital Board with Speakers
This project is to design and develop a digital notice board using Arduino modem. The project is based on Arduino with VGA Shield for sending and receiving messages. It consists of two sections: the transmitting section...