Efficient Audit Services for Data Outsourcing in Clouds
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 6
Abstract
Abstract: This paper introduce a dynamic audit service for integrity verification of untrusted and outsourcedstorages. Our audit service is constructed based on the techniques, fragment structure, random sampling, andindex-hash table, supporting provable updates to outsourced data and timely anomaly detection. Constructed oninteractive proof system (IPS) with the zero knowledge property, our audit service can provide publicauditability without downloading raw data and protect privacy of the data. Also, our audit system can supportdynamic data operations and timely anomaly detection with the help of several effective techniques, such asfragment structure, random sampling, and index-hash table (IHT). We also propose an efficient approach basedon probabilistic query and periodic verification for improving the performance of audit services. A proof-ofconceptprototype is also implemented to evaluate the feasibility and viability of our proposed approaches. Ourexperimental results not only validate the effectiveness of our approaches, but also show that our system doesnot create any significant computation cost and require less extra storage for integrity verification.
Authors and Affiliations
Anuraj C. K
A Novel Three-Dimensional Adaptive Localization (T-Dial)Algorithm for Wireless Sensor Networks
Abstract: Wireless Sensor Networks is one of the most important area of research. Over the time, WSN isexpanding its reach from scientific research and monitoring to industrial as well as military operations. With itsinc...
Fault Discovery Probability Analysis for Software Reliability Estimation
Abstract: Software reliability approximation and testing gauge how efficiently software works and meet up the end-user necessities. Software reliability assurance that users can enter the correct information on a day-to-...
A novel algorithm to protect and manage memory locations
Abstract: Most of security vulnerabilities continue to be caused by memory errors, and long-running programsthat interact with untrusted components. While comprehensive solutions have been developed to handle memor...
Main Content Mining from Multi Data Region Deep Web Pages
Abstract: An Automatic Data extraction from the deep web pages is an endeavoring errand. Colossal web substance are gotten to as per well-known interest submitted to Web databases and the returned data records are e...
Enabling Integrity for the Compressed Files in Cloud Server
Cloud computing has been envisioned as next-generation architecture of IT enterprise. Cloud computing is the internet based model which delivers computing services on demand. Cloud storage moves the users...