Cooperative and Riskless Data Publishing in Cloud Computing
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 1
Abstract
This paper explains. Proposing a flexible distributed storage integrity auditing mechanism, utilizing the homomorphic token and distributed erasurecoded data. The proposed design allows users to audit the cloud storage with very lightweight communication and computation cost. Extension is introducing Third Party auditing users can safely delegate the integrity checking tasks to third party auditors. But still many companies are not ready to implement cloud computing technology due to lack of proper security control policy and weakness in protection which lead to many challenge in cloud computing.
Authors and Affiliations
Ramesh Babu Gorla, M . Lakshmi Bai
Cloud Computing Services to Business perspective
Cloud Computing Services shows to offer significant cost advantages. Particularly start-up companies benefit from these advantages, since frequently they do not operate an internal IT infrastructure. But those costs...
Accurately Computing Aggregates Using Synopsis Diffusion Framework
The communication wounded resultant from node and transmission failures, which are frequent in WSNs, can unfavorably affect tree-based aggregation approaches. To address this dilemma, we can make use of multi-path ro...
Cooperative Caching Strategy For Provisioning Cost Minimization In Social Wireless Networks(Swnet’s)
Social Wireless Networks are formed by mobile devices such as data enabled phones, electronic book readers etc., allocating common interests in electronic content and physically gathering together in public places. E...
Single sample Overlapping Doppler filter bank for processing Real Time Continuous Data
Real time continuous Doppler filtering is used to calculate the spectrum of the input signal to detect the presence of random disturbances and properly isolate them. For continuous input data this can be done in two...
Detection and Prevention Of Cooperative Black Hole Attack in a MANET
A mobile ad hoc network (MANET) is a selfconfiguring infrastructure-less network of mobile devices connected wirelessly. In MANETs, security plays a major role as the mobile nodes can join and leave the network random...