Integrity verification using PDP in multi cloud storage
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 9
Abstract
Now a days cloud computing has been used by many organizations, because of its benefits like total cost reduction and accessibility of data. Multi cloud storage is recently being popular through it’s several advantages. Though there are many benefits by using cloud computing the security breaches make some of the users to step out of using it, as they share confidential data with cloud storage providers but, they may be untrusted. Provable data possession(PDP) ensures the data integrity in the multi cloud. By using the PDP we can improve the scalability of service and data migration. In this paper we describe the integrity verification to secure the data in the cloud storage.
Authors and Affiliations
V. Prashanthi, K. Srinivas Kumar
Side-Channel Passive Attacks Implementation to Cryptographic Hardware Using FPGA
This paper dealt with an FPGA based test bed used for injecting faults through clock glitches, to result in setup and hold violations. The UART interface is realized on FPGA to provide PC based controlling for this f...
EFFICIENT APPROACH FOR PRIVACY PRESERVING MICRODATA PUBLISHING USING SLICING
Many agencies and organizations are willing to release the data they collected to other parties for research and the formulation of public policies. Data often contains personally identifiable information and therefor...
Key Frame Extraction and Shot Change Detection for compressing Color Video
Progress intechnology is rapidly increasing now-a-days. The number of user are increasing but the resources are limited. So this project is to effectively and efficiently use the limited and expensive resource, soas...
Monte-Carlo simulation of a 10T Full adder for propagation delay optimizations
Monte Carlo analysis generates random variations in parameter values by drawing them probabilistically from a defined distribution. Monte Carlo simulations were performed for full adders to find out the reliability a...
Client-Merchant Online Payment System Exploiting Visual Cryptography
This paper exhibits another methodology for giving restricted data just that is important for asset exchange amid web shopping along these lines defending client information and expanding client certainty and avoidin...