Mutual Trust to Provide Data Security in Cloud Environment

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 3

Abstract

 Abstract: We introduce a model for provable data possession (PDP) that allows a client that has stored data at an untrusted server to verify that the server possesses the original data without retrieving it. The model generates probabilistic proofs of possession by sampling random sets of blocks from the server, which drastically reduces I/O costs. The client maintains a constant amount of metadata to verify the proof. The challenge/response protocol transmits a small, constant amount of data, which minimizes network communication. Thus, the PDP model for remote data checking supports large data sets in widely-distributed storage systems. It is also superior in performance by minimizing the use of expensive public-key cryptography in metadata management. We present the architecture and implementation of various SHAROES com- ponents and our experiments demonstrate performance superior to other proposals by over 40% on a number of benchmarks.

Authors and Affiliations

Srinivas Kolli , Ch. Sravan Kumar , Dr P. Chenna Reddy,

Keywords

Related Articles

 Mining Of Influential Users in a Blog Network

 Abstract: Blogging sites are very popular in today’s world; users interact with each other and create socialrelationships between them. Data mining methods can be used to extract the blogging sites. Users can be ac...

A Novel Implementation of Chiral Structure in Computer Honeycomb Diamond Networks Topology

Abstract: This project deals with the efficiency of the Chiral structure in Honeycomb Diamond network. Honeycomb and diamond networks have been proposed as alternatives to mesh and torus architectures for parallel proces...

 The Effect Of Varying Key Length On A Vigenère Cipher

 Abstract: Vigenère cipher is one of the polyalphabetic substitution ciphers. Its weakness is the key repetition.To overcome this weakness there are many researchesgoing on to modify the key generation. In this pape...

 Mining Top-k Closed Sequential Patterns in Sequential Databases

 In data mining community, sequential pattern mining has been studied extensively. Most studies require the specification of minimum support threshold to mine the sequential patterns. However, it is difficult &nbs...

Download PDF file
  • EP ID EP105146
  • DOI 10.9790/0661-16311618
  • Views 88
  • Downloads 0

How To Cite

Srinivas Kolli, Ch. Sravan Kumar, Dr P. Chenna Reddy, (2014).  Mutual Trust to Provide Data Security in Cloud Environment. IOSR Journals (IOSR Journal of Computer Engineering), 16(3), 16-18. https://europub.co.uk/articles/-A-105146