Preserving Confidentiality through Public Auditing In Secure Cloud Storage
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 10
Abstract
Now a day users no longer have physical presence of the outsourced data which makes the data security stronger. Moreover, users should be able to just use the cloud storage as if it is local, without worrying about the its integrity. Therefore several critical security challenges are occur and motivate the researchers for further investigations. Because of this critical issues users can resort to a third party auditor (TPA) to check the integrity of outsourced data. To securely introduce an effective TPA, the auditing process should bring in no new vulnerabilities towards user data privacy, and introduce no additional online burden to user. In this paper, we propose a secure cloud storage system supporting privacy-preserving public auditing. We further extend our result to enable the TPA to perform audits for multiple users simultaneously and efficiently. Extensive security and performance analysis show the proposed schemes are provably secure and highly efficient.
Authors and Affiliations
Gattabhi Ramarao Galidevara, RamaKrishna Mamidisetti
Attribute Sparse Coding (ASC’s) for Content-Based Image Retrieval (CBIR)
Photographs with individuals are the foremost attention of users. Consequently with the exponentially increasing pictures, large-scale content-based face image retrieval is a facilitating knowledge for various develo...
Fuzzy Decision Tree Classification Based On The Peano Count Tree Representation
Image classification is one of the important tasks in remote sensing image interpretation in which the image pixels are classified. Many organizations have large quantities of spatial data collected in various applic...
A Survey on Password Attack Resist Tools
Passwords are the key to all digital secrets. Passwords remain the most widely used authentication method despite their well-known security weaknesses. Text password is the most popular form of user authentication on...
A survey on Secure localization with Intrusion Detection System in WSN
In the current scenario Wireless Sensor Network (WSN) is an emerging area for research work. The localization of WSN is an important feature from the researchers point of view. So Security is a major concern in WSN to...
Implementation of Multinomial Standard Product for RSA State Identify Algorithm
This paper presents architecture and modeling of public key RSA encryption/decryption systems. The RSA(rivest -shamir-adleman)algorithm is a secure, high quality public key algorithm.public key supports confidential...