Homomorphic Token and Distributed Erasure-Code for cloud
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 10
Abstract
Cloud users store their data in the cloud environment which is privileged by the service provider. Cloud users can access their cloud storage. Here we propose a flexible distributed storage integrity auditing mechanism, utilizing the homomorphic token and distributed erasure-coded data. The proposed design allows users to audit the cloud storage with very lightweight communication and computation cost. The proposed scheme is highly efficient and resilient against Byzantine failure, malicious data modification attack, and even server colluding attacks.
Authors and Affiliations
B Anjani Kumar, K. Hari Prasad, C. Subash Chandra
Identifying and Analyzing Efficient Pattern Discovering Techniques for Text Mining
Mining is the process of finding a small set of valuable nuggets from a great deal of raw materials. Mining of gold from rocks or sand is known as gold mining. The same way, text mining is the discovery of interestin...
Effective Mining Scheme for Large Streams Personalized Data Using Sparse Data
Reference methods are extremely significant in the fields of E-commerce and other Web-based services. One of the major complexities is dynamically providing high-quality suggestion on sparse data. In this paper a wor...
SOLAR CHIRAL GRAPHENE BATTERY
We review the formulation of graphene’s massless Dirac equation, under the chiral electromagnetism approach, demystifying the material’s unusual chiral, relativistic, effective theory. In Dirac's theory, many authors...
Data Security in Cloud Computing using RSA Algorithm
Cloud Computing is an emerging paradigm which has become today’s hottest research area due to its ability to reduce the costs associated with computing. In today’s era, it is most interesting and enticing technology whi...
Resource & Quality Awareness Algorithm for Location Based Wireless Sensor Networks
Location monitoring refers to the system where the wireless sensor network odes counts the number of sensors which are capable of detecting the objects present in their sensing areas. Third party always monitor the pe...