Data Recovery and Integrity Checking By Proxy In Cloud

Abstract

Cloud is a collection of data centres which provides effective services to cloud clients. Now a day’s users and organizations are forwarding the data to cloud. But problem is repairing cloud data along with integrity checking is challenging issue. Provable information ownership (PDP) and confirmation of retrievability (POR) to discharge the data owner from online weight for check, considered general society auditability in the PDP model interestingly. In any case, their variation convention uncovered the straight blend of tests and in this way gives no information protection ensure.Existing methods only support private auditing means data owner only audit the cloud data and always to stay online for repairing cloud data. In order to overcome this problem introducing public auditing instead of data owner a proxy can repair the corrupted data by using public verifiable authenticator. For cloud data auditing TPA can use the enhanced privacy auditing protocol. This new protocol is introduced to audit the cloud data by TPA. But he can’t know the original data. For security and Integrity checking AES-256 bit as well as SHA-1 Algorithm is used Finally proposed technique is efficient in terms of communication and computation as well as privacy.

Authors and Affiliations

S. Sowmya Sirisha| Dept. of CSE,Aditya Institute of Science & Technology, Surampalem, Kakinada, E.G.dt, AP, India, R. Srinivas| Dept. of CSE,Aditya Institute of Science & Technology, Surampalem, Kakinada, E.G.dt, AP, India

Keywords

Related Articles

Enable Tpa To Perform Audits For Multiple Users Efficiently For Securing Cloud Storage

The concept of public audit capability has been planned in the conditions of make certain remotely stored data reliability under different system and security models. To fully make sure the data honesty and save the...

A Study to Learn Robust and Discriminative Representation to Tackle Cyber bullying Detection

We build up another content portrayal display in view of a variation of SDA: marginalized stacked denoising autoencoders (mSDA), which receives straight rather than nonlinear projection to quicken preparing and minim...

Percolate And M Supremacy User Walls By Using Pfw

Users have attraction about on social networks they are ready to keep in touch with his/her friends by seesawing different information of meta data. Now a day social networks have more privacy and security problems a...

Success Pattern Finding With Regards To Textual Content Exploration

The success pattern is mainly concentrated on Object Rank and PageRank, the latter created by Larry Page and used in msn Search Engine, were heavy costly as they required a PageRank style iterative computation over t...

Adaptable conveyed administration uprightness verification for software as a service clouds

SaaS gives an adaptable situation through which application administration providers permitted to have their applications in a conveyed domain, with the goal that clients can get to the facilitated administrations in...

Download PDF file
  • EP ID EP16801
  • DOI -
  • Views 298
  • Downloads 10

How To Cite

S. Sowmya Sirisha, R. Srinivas (2016). Data Recovery and Integrity Checking By Proxy In Cloud. International Journal of Science Engineering and Advance Technology, 4(9), 520-523. https://europub.co.uk/articles/-A-16801