Privacy-Preserving Public Auditing For Secure Cloud Storage

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 4

Abstract

 Abstract: By using Cloud storage, users can access applications, services, software whenever they requires over the internet. Users can put their data remotely to cloud storage and get benefit of on-demand services and application from the resources. The cloud must have to ensure data integrity and security of data of user. The issue about cloud storage is integrity and privacy of data of user can arise. To maintain to overkill this issue here, we are giving public auditing process for cloud storage that users can make use of a third-partyauditor (TPA) to check the integrity of data.Not only verification of data integrity, the proposed system also supports data dynamics. The work that has been done in this line lacks data dynamics and true public auditability. The auditing task monitors data modifications, insertions and deletions. The proposed system is capable of supporting public auditability, data dynamics and Multiple TPA are used for the auditing process. We also extend our concept to ring signatures in which HARS scheme is used. Merkle Hash Tree is used to improve block level authentication.Further we extend our result to enable the TPA to perform audits for multiple users simultaneously through Batch auditing.

Authors and Affiliations

Salve Bhagyashri , Prof. Y. B. Gurav

Keywords

Related Articles

 Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A New Technique to Hide Information File with an Image

 Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. There are many application of Steganography with different carrier file format. Here we...

Fuzzy C Means Clustering Algorithm for High Dimensional Data Using Feature Subset Selection Technique

Feature choice involves characteristic a set of the foremost helpful options that produces compatible results because the original entire set of options. A feature choice rule is also evaluated from each the potency...

 Machine Learning Application for Stock Market Prices Prediction.

Abstract: The development of a vibrant application for analyzing and predicting stock market prices is a basic tool aimed at increasing the rate of investors’ interest in stock markets. This paper explains the developmen...

 An Efficient Approach for Requirement Traceability Integrated  With Software Repository

 Traceability links between requirements of a system and its source code are helpful in reducing system conception effort. During software updates and maintenance, the traceability links become invalid since &nbsp...

 Mathematical Modeling of Image Steganographic System

 Image based steganography is a dangerous technique of hiding secret messages in the image in such a way that no one apart from the sender and intended recipient suspects the existence of the message. It is based...

Download PDF file
  • EP ID EP110613
  • DOI 10.9790/0661-16433338
  • Views 124
  • Downloads 0

How To Cite

Salve Bhagyashri, Prof. Y. B. Gurav (2014).  Privacy-Preserving Public Auditing For Secure Cloud Storage. IOSR Journals (IOSR Journal of Computer Engineering), 16(4), 33-38. https://europub.co.uk/articles/-A-110613