Data Possession Of Multiple Replicas Across The Distributed Storage System By Third Party Auditor

Abstract

Cloud computing has four models as Public cloud through which the service is obtainable to all public use. Private cloud through which service is accessible to private enterprise or organization. Community Cloud permits us to share infrastructure among various organizations through which we can achieve security, compliance and jurisdiction. Users should be able to just use the cloud storage as if it is local without worrying about the need to authenticate its integrity. Thus enabling public audit capability for cloud storage is of critical importance so that users can resort to a third party auditor (TPA) to check the integrity of outsourced data and be worry-free. To securely introduce an effective TPA the auditing process should bring in no new vulnerabilities towards user data privacy and introduce no additional online burden to user. In this we propose a secure cloud storage system supporting privacy-preserving public auditing. We further extend our result to enable the TPA to execute audits for multiple users simultaneously and efficiently.

Authors and Affiliations

A. Sasidhar, D Vijay

Keywords

Related Articles

Faults Identification by Passing Test Packets Through Efficient Tool In Network

ATPG comprehends router designs and produces a device autonomous model. The reproduction is utilized to deliver a base arrangement of test packets to negligibly put into impact each connection in the network or maxim...

Challenges Faced by OFDM Technique for Broadband Wireless Mobile Communication

Orthogonal Frequency Division Multiplexing (OFDM) has been adopted as a predominant access technique to meet the challenges offered by next generation broadband wireless mobile systems. OFDM has gained a lot of inte...

An Improved Security Approach For User authentication

A Key logger is software intended to imprison all of a user’s keyboard strokes, and then create use of them to mimic a user in financial transactions. Threats next to electronic and financial services can be secret in...

To Demonstrate Best Cooperative Caching For Provisioning Cost Reduction In Networks

Social Wireless Networks (SWNETs) can be produced using ad hoc wireless associations amid the devices. Electronic object caching in such SWNETs are shown to be competent to dwindle the content provisioning cost which...

A Study on Jamming and Wormhole Attacks in Wireless Mesh Network

Wireless Mesh Networks (WMNs) is a network ,where data is transmitted using mesh networking. It is an arising technology in recent days due to its simple installation, low cost ,self connectivity of nodes ,flexibility a...

Download PDF file
  • EP ID EP28092
  • DOI -
  • Views 233
  • Downloads 0

How To Cite

A. Sasidhar, D Vijay (2014). Data Possession Of Multiple Replicas Across The Distributed Storage System By Third Party Auditor. International Journal of Research in Computer and Communication Technology, 3(11), -. https://europub.co.uk/articles/-A-28092