Improving Security in Cloud Storage Using Eraser Code Techniques
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 11
Abstract
To achieve a secure and dependable cloud storage service, a flexible distributed storage integrity auditing mechanism, utilizing the homomorphic token and distributed erasure-coded data. This allows users to audit the cloud storage with very lightweight communication and computation cost. The auditing result not only ensures strong cloud storage correctness guarantee, but also simultaneously achieves fast data error localization, i.e., the identification of misbehaving server. To support secure and efficient dynamic operations on outsourced data, including block modification, deletion, and append. This approach ensures efficient and resilient against Byzantine failure, malicious data modification attack, and even server colluding attacks. In this storage have fault tolerance along with data integrity checking and recovery procedures become critical.
Authors and Affiliations
Vidhya. K, Rethina sabapathi. , Thulasibai-u
A Vision-Based Method for the Assessment of Colour Fastness to Washing
Colour fastness is a major factor governing the durability and acceptability of a textile-based product. The most common prevalent method for assessing colour fastness is by means of manual rating using grey scales. Thi...
A Review on Maximum Power Point Tracking Algorithms for Photovoltaic Source
Global Warming and energy policies have become a hot topic on the International agenda in the last years. Developed as well Developing countries are trying to reduce their greenhouse gas emission. India, to at least 33...
Performance Analysis of Power Aware Clustering Based Routing Protocol in Mobile Ad Hoc Network
a mobile ad hoc network (manet) is a progressively self-configuring, wirelessly connected mobile device without an infrastructure. In manet, the flat routing schemes do not scale well in the performance because of the m...
Software-Intensive Systems
In this paper we present an overview of how can people produce and use Software-Intensive Systems. We will describe how different communities can across the Software Lifecycle. Finally we will focus on goals, challenges...
Low Pass Fir Filter Design and Performance Analysis Using Blackman & Bartlett Window Techniques
DSP is the main branch of electronics. It is also used the representation by sequence of number or symbol and the processing of these signals. Dsp have many more applications which are useful in our life. In this Paper...