Confidentiality-Conserving Community Auditing For Protected Haze Storing
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2014, Vol 2, Issue 8
Abstract
Using Haze Storing, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources, without the burden of local data Storing and maintenance. However, the fact that users no longer have physical possession of the outsourced data makes the data integrity protection in Haze Computing a formidable task, especially for users with constrained computing resources. Moreover, users should be able to just use the Haze Storing as if it is local, without worrying about the need to verify its integrity. Thus, enabling Community auditability for Haze Storing is of critical importance so that users can resort to a third party auditor (TPA) to check the integrity of outsourced data and be worry-free. To Protectedly introduce an effective TPA, the auditing process should bring in no new vulnerabilities towards user data Confidentiality, and introduce no additional online burden to user. In this paper, we propose a Protected Haze Storing system supporting ConfidentialityConserving Community auditing. We further extend our result to enable the TPA to perform audits for multiple users simultaneously and efficiently. Extensive security and performance analysis show the proposed schemes are provably Protected and highly efficient.
Authors and Affiliations
Dr. D. Srujan Chandra Reddy| Department Of Cse, Pbr Visvodaya Institute Of Technology & Science,Kavali, Kareti Venkaiah| student Of M.Tech(C.S) And Department Of Cse, Pbr Visvodaya Institute Of Technology & Science,Kavali
Design and Implementation of home security system with feedback and control of electric gadgetry
An embedded system is designed for providing security to home, as the home security is the more prior among all other aspects which are among to home. The system has two sections, one is main station and other is fee...
Enhanced Protocol for data exchange through Natural Wireless Ad Hoc Networks
Conviction is based on the primary illustration contact between users. Our proposal is a absolute selfconfigured protected procedure that is capable to generate the network and distribute secure services without any i...
Advanced Security System For Railways Using ARM7
In this paper we have discussed about the automotive control and communication systems of the train using High Performance Multi-core Embedded Processors (MCEP). This method has been developed based on the disadvanta...
Design of a Low Power High Speed Double Tail Comparator
The proposed level shifter circuit able with a wide info voltage extend. The circuit depends on a Double-Tail comparator, and has an unmistakable component in current era conspire by checking information and yield ra...
Design Evaluation and Analysis of Vapor Compression Cooling Cycle With Change In Span of Condenser
Refrigeration is a procedure of moving warmth starting with one area then onto the next in controlled conditions. This procedure is customarily determined by mechanical energy, however can likewise be driven by provi...