Confidential And Stabilized Security For Third Party On Clouds

Abstract

Using Cloud Storage, users can remotely store their data and enjoy the ondemand high quality applications and services from a shared pool of configurable computing resources, without the burden of local data storage and maintenance. However, the fact that users no longer have physical possession of the outsourced data makes the data integrity protection in Cloud Computing a formidable task, especially for users with constrained computing resources. Moreover, users should be able to just use the cloud storage as if it is local, without worrying about the need to verify its integrity. Thus, enabling public auditability for cloud storage is of critical importance so that users can resort to a third party auditor (TPA) to check the integrity of outsourced data and be worry-free. To securely introduce an effective TPA, the auditing process should bring in no new vulnerabilities towards user data privacy, and introduce no additional online burden to user. In this paper, we propose a secure cloud storage system supporting privacy-preserving public auditing. We further extend our result to enable the TPA to perform audits for multiple users simultaneously and efficiently. Extensive security and performance analysis show the proposed schemes are provably secure and highly efficient.

Authors and Affiliations

Giribabu Yalamarthi, Kommu Hephzibah, Saritha Seelam

Keywords

Related Articles

Transmittable Packet Measurers As Well As Transformers in Wireless Sensor Associations

A remote sensor system (WSN) is a vast gathering of sensor hubs with restricted power Supply and obliged computational capacity. Because of the limited correspondence extent and high thickness of sensor hubs, bundle...

Reduction of the frequency offset influence in OFDM using an optimal PRS coding and MLSD

In this work a methodology for the synthesis of optimal correlative codes to reduce inter-carrier interference (ICI) in OFDM systems and maintain good BER performance at large frequency offsets is studied. For the sy...

Comparative Study of Fractional Order Derivative Based Image Enhancement Techniques

In this paper, image enhancement based on fractional gradient is proposed. The Taylor’s Series is used to obtain a generalized expression for this Fractional order derivative. The Image is differentiated in both x and...

Efficient data structure method for spatial objects retrival Using string

This work deals with the surmised string look for in considerable spatial databases. Specifically, we look at reach inquiries expanded with a string similarity look for predicate in both Euclidean space and street fr...

Transforming Digital Unstructured and Semi-structured Data into Structured Data with the Aid of IE and KDT

Data growth has seen an exponential acceleration with the advent of computer and network, which have imparted the digital form to data. Data can be classified into three categories: Unstructured data, Semi-structured...

Download PDF file
  • EP ID EP28014
  • DOI -
  • Views 237
  • Downloads 0

How To Cite

Giribabu Yalamarthi, Kommu Hephzibah, Saritha Seelam (2014). Confidential And Stabilized Security For Third Party On Clouds. International Journal of Research in Computer and Communication Technology, 3(9), -. https://europub.co.uk/articles/-A-28014