Data Possession Of Multiple Replicas Across The Distributed Storage System By Third Party Auditor
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 11
Abstract
Cloud computing has four models as Public cloud through which the service is obtainable to all public use. Private cloud through which service is accessible to private enterprise or organization. Community Cloud permits us to share infrastructure among various organizations through which we can achieve security, compliance and jurisdiction. Users should be able to just use the cloud storage as if it is local without worrying about the need to authenticate its integrity. Thus enabling public audit capability for cloud storage is of critical importance so that users can resort to a third party auditor (TPA) to check the integrity of outsourced data and be worry-free. To securely introduce an effective TPA the auditing process should bring in no new vulnerabilities towards user data privacy and introduce no additional online burden to user. In this we propose a secure cloud storage system supporting privacy-preserving public auditing. We further extend our result to enable the TPA to execute audits for multiple users simultaneously and efficiently.
Authors and Affiliations
A. Sasidhar, D Vijay
Review of Web Structure Mining Techniques using Clustering and Ranking Algorithms
Today, Web mining plays very important role. It discovers and extract information from web services and documents. In this paper we focus on the web structure mining techniques which are used to extract the rich info...
A Novel Secure On-Demand Routing Protocol for MANET using RSA Triple Key Technique
MANET (Mobile and Ad hoc Networks) are networks in which nodes are mobile and link connectivity might change all the time. In this kind of networks routing, security and key management are the important and complex p...
Design of the HL7 messaging RIM-based sharing components for HIS
The advancement of electronic health records(EHR) in healthcare systems ,it becomes necessary for the Healthcare organizations to use certain standards for the exchange of EHR`s of individuals among different healthc...
Cooperative Caching in Wireless P2P Networks: Design, Implementation and Evaluation
In this paper proposing cooperative cache can improve the system performance in wireless P2P networks such as ad hoc networks and mesh networks. However, all these studies are at a very high level, leaving many design...
Monitoring the efficiency of workflow in industry and secure access using NFC and Ethernet
Mobile phones have evolved from their usual function of calling to a lot more in the last decade, the 4G networks are being used for microwave access, But the use of mobile in field of Tele-monitoring is still a open...