Improving Security in Cloud Storage Using Eraser Code Techniques

Abstract

To achieve a secure and dependable cloud storage service, a flexible distributed storage integrity auditing mechanism, utilizing the homomorphic token and distributed erasure-coded data. This allows users to audit the cloud storage with very lightweight communication and computation cost. The auditing result not only ensures strong cloud storage correctness guarantee, but also simultaneously achieves fast data error localization, i.e., the identification of misbehaving server. To support secure and efficient dynamic operations on outsourced data, including block modification, deletion, and append. This approach ensures efficient and resilient against Byzantine failure, malicious data modification attack, and even server colluding attacks. In this storage have fault tolerance along with data integrity checking and recovery procedures become critical.

Authors and Affiliations

Vidhya. K, Rethina sabapathi. , Thulasibai-u

Keywords

Related Articles

A Novel Attraction Segregation based Image Compression Technique

Digital pictures need sizable amounts of bits to represent them and in their canonical illustration, usually contain important quantity of redundancy. Compression techniques scale back the amounts of bits needed to repr...

A Fault Analysis based Prioritization Specific Regression Test Path Identification Approach using ACO

Testing is a process that never ends even after the software delivery. During the Acceptance testing if some changes are required in the software in terms of inclusion or exclusion of some module, In such case it is req...

Fuzzy Association Rule by Classification Technique

When we use the fuzzy association rule then it is difficult to find the minimum frequency because of distinct fuzzy values of data sets. To resolve such type of problem the classification technique is used in a data set...

A Graph Oriented: Text Database for Knowledge Exposure

While we hope to find information in the writings accessible on the Web, such revelation more often than not requires numerous perplexing examination steps, the vast majority of which require different content taking ca...

Design & Development of Hydraulic Fixture for VMC

Fixtures play an important role within many manufacturing processes. They accurately locate and secure a workpiece during machining such that the part can be manufactured to design specifications. Thus fixtures have a d...

Download PDF file
  • EP ID EP19144
  • DOI -
  • Views 261
  • Downloads 8

How To Cite

Vidhya. K, Rethina sabapathi. , Thulasibai-u (2014). Improving Security in Cloud Storage Using Eraser Code Techniques. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 2(11), -. https://europub.co.uk/articles/-A-19144