Confidential And Stabilized Security For Third Party On Clouds
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 9
Abstract
Using Cloud Storage, users can remotely store their data and enjoy the ondemand high quality applications and services from a shared pool of configurable computing resources, without the burden of local data storage and maintenance. However, the fact that users no longer have physical possession of the outsourced data makes the data integrity protection in Cloud Computing a formidable task, especially for users with constrained computing resources. Moreover, users should be able to just use the cloud storage as if it is local, without worrying about the need to verify its integrity. Thus, enabling public auditability for cloud storage is of critical importance so that users can resort to a third party auditor (TPA) to check the integrity of outsourced data and be worry-free. To securely introduce an effective TPA, the auditing process should bring in no new vulnerabilities towards user data privacy, and introduce no additional online burden to user. In this paper, we propose a secure cloud storage system supporting privacy-preserving public auditing. We further extend our result to enable the TPA to perform audits for multiple users simultaneously and efficiently. Extensive security and performance analysis show the proposed schemes are provably secure and highly efficient.
Authors and Affiliations
Giribabu Yalamarthi, Kommu Hephzibah, Saritha Seelam
Design a pattern generator with low switching activity to test complex combinational logic with high test coverage
In circuit large number of combinational logic used so logic depth is large, so it is impossible to test every fault with other techniques because it’s take more time. In order to increase speed of an algorithm for te...
Phishing Detection In Selected Feature Using Modified SVM-PSO
The sensitive information such as passwords, credit card number, account details, email information and credential of the external users robbed by threats such kind of threat is called phishing. So many softwareand t...
Attribute Sparse Coding (ASC’s) for Content-Based Image Retrieval (CBIR)
Photographs with individuals are the foremost attention of users. Consequently with the exponentially increasing pictures, large-scale content-based face image retrieval is a facilitating knowledge for various develo...
Windows, Linux and Mac Operating system Booting Process: a Comparative Study
This paper presents a comparative study of Booting Paradigm of Windows, Linux and Mac, the three popular operating systems. Booting process is the essential and first step perform by the OS after this process executio...
A Survey of Techniques for Intrusion Detection System
In this paper we will discuss the various kinds of anomalous and malicious activities, which can be a symptoms of Intrusion. The term Intrusion detection was coined in 1980. Since then many Frameworks for Intrusion D...