Data integrity and Auditing for Secured Cloud Data Storage
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2016, Vol 4, Issue 10
Abstract
Time and Trend has its own significance to build the technology smarter, better and easier to the end user.To the Better stretch of the Information Technology, the Innovation and renovation has changed computing approach to the next level. For this paper, we try giving the glimpse of the contextual virtual storage in cloud in the public data distribution. These days cloud storage become common, but having the constrainttowards the technical advancement is the Security. If we consider behavioral aspect of the cloud data storage, we will come across much aspect. Hence,In this we have overcome the public protection in terms of the privacy towards the authorization of public audit,tag based data uploading with the help of the SecCloud and SecCLoud+ based processing with the aim to maintain the integrity and data consistency. Metadata with the protocol to prevent the leakage of the dataset, which we call it as the best to the trend of the acknowledgement based identification with the cryptographic model where ever the node to the parallel cloud distributed elastic stretchableenvironment with the high end cloud data center marinating the graphics of the flow triggering the security in the public Domain.
Authors and Affiliations
D. UshaRaj| M. Tech. Student, Department of Computer Science and Engineering, Aditya Engineering College, Surampalem, Peddapuram, East Godavari Dist., Andhra Pradesh, India 1usharazzd@gmail.com, CH. Udaya Bhaskar| Associate Professor, Department of Computer Science and Engineering, Aditya Engineering College, Surampalem, Peddapuram, East Godavari Dist., Andhra Pradesh, India 2cudayab@rediffmail.com
Transparent User Authentication Using Biometric Traits for Secure Internet Services
In this innovation time security of electronic applications is a genuine worry, because of the late increment in the recurrence and many-sided quality of digital assaults, biometric methods offer developing answer fo...
Design of Smart Grid Using Interactive Home Automation and Security Based on Raspberry Pi Micro-Controller
Computerized innovation that takes into consideration two ways correspondence between the utility and its clients, and the detecting along the Transmission lines is the thing that makes the Grid Smart. Like the Intern...
A Fault Localization Algorithm To Isolate Faulty Devices and Rules
Network engineerspursue down bugs by means of the simplest tools and track down root causesusing a grouping of mount upinsight and perception. Debuggingnetworks is only fetching harder as networks are gettingbigger....
Secured and Smart Electronic voting system
Now a days various displays are becoming available for implementing a new kind of human computer interaction (HCI) method. Among them, touch panel displays have been used in wide variety of applications and are prov...
Analysis the effect of condenser pressure (vacuum) on efficiency and heat rate of steam turbine
Electricity plays a vital role in our daily life. The power demand is increasing day by day due to increasing the population. The power is required for Industrialization and development of nation. Our country mainly...