Improving Security in Cloud Storage Using Eraser Code Techniques

Abstract

To achieve a secure and dependable cloud storage service, a flexible distributed storage integrity auditing mechanism, utilizing the homomorphic token and distributed erasure-coded data. This allows users to audit the cloud storage with very lightweight communication and computation cost. The auditing result not only ensures strong cloud storage correctness guarantee, but also simultaneously achieves fast data error localization, i.e., the identification of misbehaving server. To support secure and efficient dynamic operations on outsourced data, including block modification, deletion, and append. This approach ensures efficient and resilient against Byzantine failure, malicious data modification attack, and even server colluding attacks. In this storage have fault tolerance along with data integrity checking and recovery procedures become critical.

Authors and Affiliations

Vidhya. K, Rethina sabapathi. , Thulasibai-u

Keywords

Related Articles

A Vision-Based Method for the Assessment of Colour Fastness to Washing

Colour fastness is a major factor governing the durability and acceptability of a textile-based product. The most common prevalent method for assessing colour fastness is by means of manual rating using grey scales. Thi...

A Review on Maximum Power Point Tracking Algorithms for Photovoltaic Source

Global Warming and energy policies have become a hot topic on the International agenda in the last years. Developed as well Developing countries are trying to reduce their greenhouse gas emission. India, to at least 33...

Performance Analysis of Power Aware Clustering Based Routing Protocol in Mobile Ad Hoc Network

a mobile ad hoc network (manet) is a progressively self-configuring, wirelessly connected mobile device without an infrastructure. In manet, the flat routing schemes do not scale well in the performance because of the m...

Software-Intensive Systems

In this paper we present an overview of how can people produce and use Software-Intensive Systems. We will describe how different communities can across the Software Lifecycle. Finally we will focus on goals, challenges...

Low Pass Fir Filter Design and Performance Analysis Using Blackman & Bartlett Window Techniques

DSP is the main branch of electronics. It is also used the representation by sequence of number or symbol and the processing of these signals. Dsp have many more applications which are useful in our life. In this Paper...

Download PDF file
  • EP ID EP19144
  • DOI -
  • Views 266
  • Downloads 8

How To Cite

Vidhya. K, Rethina sabapathi. , Thulasibai-u (2014). Improving Security in Cloud Storage Using Eraser Code Techniques. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 2(11), -. https://europub.co.uk/articles/-A-19144