Data Recovery and Integrity Checking By Proxy In Cloud
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2016, Vol 4, Issue 9
Abstract
Cloud is a collection of data centres which provides effective services to cloud clients. Now a day’s users and organizations are forwarding the data to cloud. But problem is repairing cloud data along with integrity checking is challenging issue. Provable information ownership (PDP) and confirmation of retrievability (POR) to discharge the data owner from online weight for check, considered general society auditability in the PDP model interestingly. In any case, their variation convention uncovered the straight blend of tests and in this way gives no information protection ensure.Existing methods only support private auditing means data owner only audit the cloud data and always to stay online for repairing cloud data. In order to overcome this problem introducing public auditing instead of data owner a proxy can repair the corrupted data by using public verifiable authenticator. For cloud data auditing TPA can use the enhanced privacy auditing protocol. This new protocol is introduced to audit the cloud data by TPA. But he can’t know the original data. For security and Integrity checking AES-256 bit as well as SHA-1 Algorithm is used Finally proposed technique is efficient in terms of communication and computation as well as privacy.
Authors and Affiliations
S. Sowmya Sirisha| Dept. of CSE,Aditya Institute of Science & Technology, Surampalem, Kakinada, E.G.dt, AP, India, R. Srinivas| Dept. of CSE,Aditya Institute of Science & Technology, Surampalem, Kakinada, E.G.dt, AP, India
A NOVEL HYBRID FEATURE EXTRACTION TECHNIQUE FOR FACE RECOGNITION
Face recognition is a computer for identifying and retrieving desired images from a large collection on the basis of features(color, texture, shape..).CBIR system is generally used in security, medicine, entertainment...
Significant Cumulative Cryptosystem for Accessible Data Distribution in Cloud Storage
A cryptosystem is pair of calculations that take a key and change over plaintext to ciphertext and back. Data circulation is fundamental usefulness in distributed storage. In this project the aggregate focus is on ho...
Seculation Routing With Fortification Wireless Networks
Wireless sensor networks having so many problems a number of solutios enough? security issues, discusses some existing solutions, and suggests possible research directions like key establishment secrecy,authenticatio...
Impact Analysis of A Car Bumper Using Carbon Fiber Reinforced PEI And S2 Glass/Epoxy Materials By Solid Works Software
Bumper is an important part which is used as protection for passengers from front and rear collision. The intend of this study was to investigate the structure and material employed for car bumper in one of the car m...
Boost Interleaved Converter Integrated Voltage Multiplier Module for Renewable Energy System
This document presents a high step-up converter, which is apt for renewable energy system. Through a voltage multiplier unit composed of switched capacitors and coupled inductors, a conventional interleaved boost con...