Survey on Efficient Data Integrity Techniques for Distributed Cloud Storage
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 3, Issue 11
Abstract
Recent advances have given rise to the popularityand success of cloud computing. Cloud storage enables users to remotely store their data and enjoy the on-demand high quality cloud applications without the burden of local hardware and software management. It moves the application software and databases to the centralized large data centres, where the management of the data and services may not be fully trustworthy. This unique paradigm brings about many new security challenges. To protect outsourced data in cloud storage against corruptions, enabling integrity protection, fault tolerance, and efficient recovery for cloud storage becomes critical. Therefore, we study the problem of remotely checking the integrity of regenerating-coded data against corruptions under a real-life cloud storage setting. In this paper surveys the various protocols to check cloud data integrity and compares them based on the integrity requirements. Finally we compared different remote checking integrity techniques: Replication, Erasure codes (Reed Solomon Code) and regenerating code for various file operations.
Authors and Affiliations
Mr. Divyesh K Joshi
GSM based SPY Robot
Currently, a lot of research is being carried out in the development of USVs (Unmanned surface vehicles), UAVs (Unmanned Aerial Vehicles). Traditional technology we used is wireless using RF circuits which suffer...
PAIRED FASTER FFT: GRIGORYAN FFT IMPLEMENTATION AND PERFORMANCE ON XILINX FPGAS AND TMS DSPS
Discrete Fourier Transform is a principal mathematical method for the frequency analysis and has wide applications in Engineering and Sciences. Because the DFT is so ubiquitous, fast methods for computing DFT have been...
Mobile Ad Hoc Networks Security: Challenges and solutions
Security has become a primary concern in order to provide protected communication between mobile nodes in a hostile environment. Unlike the wire line networks, the unique characteristics of mobile ad hoc networks pose...
Power Efficient Design of BILBO using Various Sequential Elements for Low power VLSI Applications (Basic 5T-transistor and 5T- with MTCMOS)
This paper enumerates low power design of BILBO(Built-In- Logic-Block-Observer) using Basic 5T-TSPC clocked latch and 5T-TSPC(MTCMOS) clocked latch.The clocked latches are basic building block to design the BILBO...
DATA HIDING SECURITY APPROACHED WITH POSITION BASED PIXEL SWAPPING STANDARD METHOD: A REVIEW
In this paper, Position Based Pixel Swapping Standard Method has been proposed, which includes the secret data must be encrypted using key and hiding secret data in image using Data Hiding Algorithm. Applied highe...