Data Possession Of Multiple Replicas Across The Distributed Storage System By Third Party Auditor
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 11
Abstract
Cloud computing has four models as Public cloud through which the service is obtainable to all public use. Private cloud through which service is accessible to private enterprise or organization. Community Cloud permits us to share infrastructure among various organizations through which we can achieve security, compliance and jurisdiction. Users should be able to just use the cloud storage as if it is local without worrying about the need to authenticate its integrity. Thus enabling public audit capability for cloud storage is of critical importance so that users can resort to a third party auditor (TPA) to check the integrity of outsourced data and be worry-free. To securely introduce an effective TPA the auditing process should bring in no new vulnerabilities towards user data privacy and introduce no additional online burden to user. In this we propose a secure cloud storage system supporting privacy-preserving public auditing. We further extend our result to enable the TPA to execute audits for multiple users simultaneously and efficiently.
Authors and Affiliations
A. Sasidhar, D Vijay
Performance Issues of WMNs by implementing Coordinator in IEEE 802.11 Networks
The wireless networking is the current trend that most of the peoples that used and fastly grow in the world. The number of topologies has been used in this network and few are Star, Bus , Mesh etc. but the Mesh Topol...
PIXEL WISE CLASSIFICATION MODELLINGTO DETECT AND TRACK MOVING VEHICLES
This paper presents an automatic vehicle detection system for aerial surveillance. In this system, we escape from the stereotype and existing frameworks of vehicle detection in aerial surveillance, which are either re...
Random Key Generation For Advanced Encryption System (Aes) Using Rm-Prng Algotihm
The advent of electronics have played a vital role in the development of communication system. One of the major issues in the field of communications is maintaining security and privacy of the data transmitted and rec...
Design Of Ternary Arithmetic Circuits Using QDGFET
This paper presents a novel design of ternary arithmetic circuits like half-adder and multiplier using quantum dot field effect transistors. Due to the change in threshold voltage over the range QDGFETs produce one i...
WSN Based Industrial Environmental Monitoring System Using µC/OS-II
The paper describes the performance and functional characteristics of arm7 embedded microprocessor and Micro C/OS-II based wireless sensor node (WSN) in monitoring the parameters such as temperature, humidity, gas an...