Improving Security in Cloud Storage Using Eraser Code Techniques

Abstract

To achieve a secure and dependable cloud storage service, a flexible distributed storage integrity auditing mechanism, utilizing the homomorphic token and distributed erasure-coded data. This allows users to audit the cloud storage with very lightweight communication and computation cost. The auditing result not only ensures strong cloud storage correctness guarantee, but also simultaneously achieves fast data error localization, i.e., the identification of misbehaving server. To support secure and efficient dynamic operations on outsourced data, including block modification, deletion, and append. This approach ensures efficient and resilient against Byzantine failure, malicious data modification attack, and even server colluding attacks. In this storage have fault tolerance along with data integrity checking and recovery procedures become critical.

Authors and Affiliations

Vidhya. K, Rethina sabapathi. , Thulasibai-u

Keywords

Related Articles

Studies on Self Compacting Fuel Dispenser Hose Pipe Rubber in Concrete

The experimental study undertaken to investigate the influence of partial replacement of Coarse aggregate with Fuel dispenser hose pipe rubber in concrete. Tests were conducted to determine the optimum level of replacem...

A Smart Helmet for Air Quality and Hazardous Event Detection for the Mining Industry

A smart helmet has been developed that is able to detect of hazardous events in the mines industry. In the development of helmet, we have considered the four main types of hazard such as air quality, helmet removal, fir...

Memory Management For Heterogeneous Main Memory

In the near future new technologies will make it possible to enlarge the main memory layer in the current memory hierarchy using devices with small cost and access penalties, such as the Storage Class Memory (SCM). In o...

Design of Deterministic Finite Automata using Pattern Matching Strategy

An automaton is an entity work for specific computation and designed for that computation. Based on the problem automaton can be designed to satisfy the given problem. Automata have finite and infinite types. Finite aut...

Design of Single Master Inter-Integrated Circuit Bus Controller

Inter-Integrated Circuit Bus commonly known as IIC or I2C Bus was developed by Philips semiconductors. I2C is a multi-master, multi-slave, single-ended, serial computer bus and is typically used for attaching lower-spee...

Download PDF file
  • EP ID EP19144
  • DOI -
  • Views 277
  • Downloads 8

How To Cite

Vidhya. K, Rethina sabapathi. , Thulasibai-u (2014). Improving Security in Cloud Storage Using Eraser Code Techniques. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 2(11), -. https://europub.co.uk/articles/-A-19144