Improved Data Integrity Public Auditing for Regenerating-Code-Based Cloud Storage
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 4
Abstract
Cloud Computing is very important vision of computing as a utility. Using cloud storage, users can store their data into cloud. So they can enjoy high quality applications and services. Users can outsource data without the burden of local data storage and maintenance. In Cloud computing, users should be able to use cloud storage without worrying about the need to check it’s integrity.so enabling public auditability for Cloud data storage should have critical importance.so users can use external audit party to check the integrity of data in Cloud Storage. Using Third Party Auditor(TPA) for checking integrity of data, the users or data owners should not have to stay online and the users are be worry-free. For using TPA the auditing process should provide security to cloud storage. Hence TPA preserves to user data privacy. In this paper, we motivate the public Auditing system of data storage security in cloud computing. Also secure Cloud storage system supports privacy preserving.TPA also supports for Batch Auditing. In public Auditing, after checking Integrity to solve the Regeneration problem of failed Authenticators, proxy agent can introduce. This is used to regenerate Authenticators in public Auditing. Hence using this scheme can completely release data owners from online burden. Also this scheme is to support scalable and efficient public Auditing. We prove the security and justify the performance of our proposed schemes.
Authors and Affiliations
Miss. Sherkar Snehal R, Miss. Gagare Sital J, Mr. Babre Tanmay A, Mr. Bhangare Rohan S.
Synthetic Control Chart for Monitoring Parameters of the Weibull Distribution
This paper proposes the synthetic control chart for monitoring the parameters of the Weibull distribution. Performance of the proposed control chart is measured using average run length and is compared with the t-chart...
Locate Me: A Privacy Preserving Pseudonym Generation of Location Proof Updates Through Co-Located Devices
Today’s location-sensitive service relies on user’s mobile device to determine its location and send the location to the application. This approach allows the user to cheat by having his/her device transmit a fake locat...
Six Component Force Analysis Using Torque Sensors in Gough-Stewart Platform Manipulators with Interval Analysis
The six-degrees-of-freedom Gough-Stewart platform manipulator is a promising alternate architecture for the mechanical design of a six component force-torque sensor. Two basic configurations of the Gough-Stewart platfor...
Experimental Behavior of Full Encased Composite Column under Axial Compression
This paper presents the experimental behaviour of full encased composite columns (FECC) under axial compression. A composite column is a column in which steel section is embedded into concrete with longitudinal reinforc...
Torque Control Strategy for Induction Motor Based On Fuzzy System
The paper provides a torque control strategy for induction motor drives. The strategy makes use of fuzzy based switching pattern for the converter switches for conversion of the DC to AC. The converter is a conventional...