Privacy Preserving and Load Balancing For Secure Cloud Storage
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 1
Abstract
Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources, without the burden of local data storage and maintenance. However, the fact that users no longer have physical possession of the outsourced data makes the data integrity protection in Cloud Computing a formidable task. Unfortunately, sharing data in a multi-owner manner while preserving data and identity privacy from an untrusted cloud is still a challenging issue, due to the frequent change of the membership. In proposed a secure cloud storage for multi-owner data sharing authentication system supporting privacy-preserving by enabling public auditability for cloud storage with critical importance so that users can resort to a third party auditor (TPA) to check the integrity of outsourced data and be worry-free. And also by encryption and hashing techniques, such as Advanced Encryption Standard (AES), Merkle Hash Tree, any cloud user can anonymously share data with others. By using these techniques the storage overhead and computation cost is reduced. Also trustworthiness will be increased between the user and the Cloud Service Provider. Load Balancing is also implemented to process the User requested job by allocating to the sub servers which will process the task by evaluating the CPU performance level.
Authors and Affiliations
S. Sasikala
A new approach for user identification in web usage mining preprocessing
Web usage mining is a subset of data mining. In order to huge amount of data but the data is less appropriates “quantity and quality” of the web data is opposite to each other this is the main problem. Web ...
[b]Study On User Interface(UI) Attributes Of Web Forms ForBetter User Experience[/b]
Abstract: Users face many challenges in successfully completing web forms (either online or offline i.e.application-based). This research examines the pitfalls in these forms with respect to its user interface (UI)attrib...
Big Data Mining using Map Reduce: A Survey Paper
Abstract: Big data is large volume, heterogeneous, distributed data. Big data applications where datacollection has grown continuously, it is expensive to manage, capture or extract and process data using existings...
Fuzzy Inference Rule Generation Using Genetic AlgorithmVariant
Abstract: In essence of fuzzy inference system (FIS) for classification, Genetic algorithm (GA) which is anoptimal searching technique is used for generation rules in the proposed work. This paper develops an FIS withrul...
A Study of crossover operators for Genetic Algorithms to solve TSP
Abstract: The travelling salesman problem (TSP) is the most well-known combinatorial optimization problem. TSP is used to find a routing of a salesman who starts from a home location, visits a prescribed set of cit...