Preserving Confidentiality through Public Auditing In Secure Cloud Storage
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 10
Abstract
Now a day users no longer have physical presence of the outsourced data which makes the data security stronger. Moreover, users should be able to just use the cloud storage as if it is local, without worrying about the its integrity. Therefore several critical security challenges are occur and motivate the researchers for further investigations. Because of this critical issues users can resort to a third party auditor (TPA) to check the integrity of outsourced data. To securely introduce an effective TPA, the auditing process should bring in no new vulnerabilities towards user data privacy, and introduce no additional online burden to user. In this paper, we propose a secure cloud storage system supporting privacy-preserving public auditing. We further extend our result to enable the TPA to perform audits for multiple users simultaneously and efficiently. Extensive security and performance analysis show the proposed schemes are provably secure and highly efficient.
Authors and Affiliations
Gattabhi Ramarao Galidevara, RamaKrishna Mamidisetti
CDPP: Inter firewall Rules Redundancy Detection In Firewall
Firewalls playing very important role to provide security to private networks and organizations. . But the firewall policies cannot be communal across domains because it contains confidential information and security...
Design and VLSI Implementation of A Radix-4 64 - Point FFT Processor
It is important to develop a high-performance FFT processor to meet the requirements of real time and low cost in many different systems. So a radix-4 pipelined FFT processor based on Field Programmable Gate Array (FP...
Medium Voltage High-Power Converter Topology for the Large Permanent Magnet Wind Generator Systems
This paper proposes a modular, medium voltage, highpower converter topology for the large permanent magnet wind generator system, eliminating the grid-side step-up transformer, which is desirable for both onshore and o...
An Efficient Content Sharing Scheme For Delay-Tolerant Smart Phone Networks
Some smart phones in the network store content that they are ready to share with others. All Smartphone users are eager to assist and provide a limited amount of their resources such as bandwidth, storage and process...
Securitized Patient Monitoring Telemetry System Using Zigbee
Nowadays due to the increase of elderly people across the world the problem of home-care for elderly people is becoming a challenging task. To overcome this wireless sensor networks are used to structure home-care sy...