Privacy in Data Storage and MultiOwner Authentication with Load Balancing in Cloud Computing

Abstract

Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources, without the encumbrance of local data storage and maintenance. the data integrity protection in Cloud Computing a formidable task, especially for users with constrained computing resources. Moreover, users should be able to just use the cloud storage as if it is local, without worrying about the need to verify its integrity. Thus, enabling public audit ability for cloud storage is of critical prominence so that users can resort to a Third Party Auditor (TPA) to check the integrity of outsourced data and be worry-free. To securely introduce an effective TPA, the auditing process should bring in no new vulnerabilities towards user data privacy, and introduce no additional online burden to user. In this project, we propose a secure cloud storage system supporting privacy-preserving public auditing. We further extend our result to enable the TPA to perform audits for multiple users simultaneously and efficiently. Extensive security and performance analysis show the proposed schemes are provably secure and highly efficient.

Authors and Affiliations

Thulasibai. U, Arul prem. G, Deepika. J

Keywords

Related Articles

Study of SWT-ANN Based Indoor Optical Wireless Communication System: A Review

This paper reviews on optical wireless system using stationary wavelet and neural network. High-speed wireless optical communication links have become more popular for personal mobile applications. This is a consequence...

Disposal of Solid Waste For Landfilling In Karad City A Review

Landfill considered as one of the most popular method of disposal of Municipal solid Waste in India. The typical composition of MSW in India is around 40-60%, of organic waste 30-40% of earthen materials paper, metals,...

Novel Method for Sensitivity Analysis of Fully Fuzzy Linear Programming Problem by Tabular Method

In the literature, there are various methods that deals with the sensitivity analysis of such linear programming problem in which some or all parameters are represented by triangular or trapezoidal fuzzy numbers by conv...

slugFixed Point Of Multivalued Mapping On Polish Space

A general fixed point the orem, that incorporates several known random fixed point theorems, involving continuous random operators, is proved.

Effect of Cyclic Prefix on OFDM Signal

To fulfill the 4G network systems requirement, higher reliability and high spectral efficiency are required. To achieve this Orthogonal Frequency Division Multiplexing (OFDM) is considered to be the best modulation tech...

Download PDF file
  • EP ID EP19153
  • DOI -
  • Views 265
  • Downloads 12

How To Cite

Thulasibai. U, Arul prem. G, Deepika. J (2014). Privacy in Data Storage and MultiOwner Authentication with Load Balancing in Cloud Computing. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 2(12), -. https://europub.co.uk/articles/-A-19153