Confidential And Stabilized Security For Third Party On Clouds

Abstract

Using Cloud Storage, users can remotely store their data and enjoy the ondemand high quality applications and services from a shared pool of configurable computing resources, without the burden of local data storage and maintenance. However, the fact that users no longer have physical possession of the outsourced data makes the data integrity protection in Cloud Computing a formidable task, especially for users with constrained computing resources. Moreover, users should be able to just use the cloud storage as if it is local, without worrying about the need to verify its integrity. Thus, enabling public auditability for cloud storage is of critical importance so that users can resort to a third party auditor (TPA) to check the integrity of outsourced data and be worry-free. To securely introduce an effective TPA, the auditing process should bring in no new vulnerabilities towards user data privacy, and introduce no additional online burden to user. In this paper, we propose a secure cloud storage system supporting privacy-preserving public auditing. We further extend our result to enable the TPA to perform audits for multiple users simultaneously and efficiently. Extensive security and performance analysis show the proposed schemes are provably secure and highly efficient.

Authors and Affiliations

Giribabu Yalamarthi, Kommu Hephzibah, Saritha Seelam

Keywords

Related Articles

Classified Average Precision (CAP) To Evaluate The Performance of Inferring User Search Goals

The presumption and examination of user search goals can be very useful in getting better performance of search engine. To deduce user search goals by analyzing search engine query logs a novel approach is proposed....

An Advanced Anti Phishing Approach Based On Two-Tier Validation

Phishing on the web pages is an attempt by an individual or a group of hackers seeking to retrieve an individual’s personal private information such as passwords, usernames or confidential information, credit card inf...

A Cryptographic Based Implementation Of Secure Hash Algorithm By Using Microblaze Processor

Hash function is simply an algorithm that takes a string of any length and reduces it to a unique fixed length string. Hash functions are used to ensure data and message integrity, password validity as well as the bas...

Voice and Gesture Based Electric-Powered Wheelchair Using ARM

A voice and gesture based system has been developed to control a wheelchair using voice commands and moment of hand i.e. Mems sensor is connected to hand. The system is divided into two main components: speech recogni...

Enhanced Intrusion Detection System with Mobile Agent

This electronic The widespread proliferation of Internet connections has made current computer networks more vulnerable to intrusions than before. In network intrusions, there may be multiple computing nodes that are...

Download PDF file
  • EP ID EP28014
  • DOI -
  • Views 240
  • Downloads 0

How To Cite

Giribabu Yalamarthi, Kommu Hephzibah, Saritha Seelam (2014). Confidential And Stabilized Security For Third Party On Clouds. International Journal of Research in Computer and Communication Technology, 3(9), -. https://europub.co.uk/articles/-A-28014