Preserving Confidentiality through Public Auditing In Secure Cloud Storage
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 10
Abstract
Now a day users no longer have physical presence of the outsourced data which makes the data security stronger. Moreover, users should be able to just use the cloud storage as if it is local, without worrying about the its integrity. Therefore several critical security challenges are occur and motivate the researchers for further investigations. Because of this critical issues users can resort to a third party auditor (TPA) to check the integrity of outsourced data. To securely introduce an effective TPA, the auditing process should bring in no new vulnerabilities towards user data privacy, and introduce no additional online burden to user. In this paper, we propose a secure cloud storage system supporting privacy-preserving public auditing. We further extend our result to enable the TPA to perform audits for multiple users simultaneously and efficiently. Extensive security and performance analysis show the proposed schemes are provably secure and highly efficient.
Authors and Affiliations
Gattabhi Ramarao Galidevara, RamaKrishna Mamidisetti
DESIGN AND IMPLEMENTATION OF ARM INTELLIGENT MONITORING SYSTEM USING ZIGBEE
In this paper the research method of Laboratory Intelligent monitoring System based on Zigbee is elaborated, and the hardware design and software design are discussed. Sensors controlling board collect the data to we...
Encryption EXIF Metadata for Protection Photographic Image of Copyright Piracy
Many photographic images that are published to particular interests. This makes it more and more copyright piracy of images. In this study will make a tools and methods that can be used to protect the copyright of th...
Performance Analysis of Different Space Time Block Codes in MIMO Systems
The main limitations of wireless transmission are fading and associated reduction in bit error rate. To mitigate these effects several techniques are employed. It is well known that the performance of the wireless com...
Exemplary Instinctive Repression Of Worms
Key diligence is the routing procedure that absolute the packet in the network routing sachets fully associated to wireless set of connections has considered to a great coverage but the assumption on packed connectiv...
Effective Mining Scheme for Large Streams Personalized Data Using Sparse Data
Reference methods are extremely significant in the fields of E-commerce and other Web-based services. One of the major complexities is dynamically providing high-quality suggestion on sparse data. In this paper a wor...