Privacy in Data Storage and MultiOwner Authentication with Load Balancing in Cloud Computing
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 12
Abstract
Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources, without the encumbrance of local data storage and maintenance. the data integrity protection in Cloud Computing a formidable task, especially for users with constrained computing resources. Moreover, users should be able to just use the cloud storage as if it is local, without worrying about the need to verify its integrity. Thus, enabling public audit ability for cloud storage is of critical prominence so that users can resort to a Third Party Auditor (TPA) to check the integrity of outsourced data and be worry-free. To securely introduce an effective TPA, the auditing process should bring in no new vulnerabilities towards user data privacy, and introduce no additional online burden to user. In this project, we propose a secure cloud storage system supporting privacy-preserving public auditing. We further extend our result to enable the TPA to perform audits for multiple users simultaneously and efficiently. Extensive security and performance analysis show the proposed schemes are provably secure and highly efficient.
Authors and Affiliations
Thulasibai. U, Arul prem. G, Deepika. J
An Improving Accessibility of Web Content Based On Opinion Targets
Social media monitoring the public views can be understood by the theories of people’s opinion. Online reviews became increasingly popular in a broad way for people to share their views and sentiment with other users to...
Exhaust Gas Recirculation in CI Engines
Exhaust Gas Recirculation (EGR) is being widely used to reduce and control the oxides of nitrogen (NOx) emission from diesel engines. When combustion chamber temperature reaches 2500ºF or 1370ºC, nitrogen and oxygen com...
Simulation Development of Linux Firewall
Open-source systems are not going to replace offerings from commercial vendors. They do, however, offer an increasingly viable alternative. Open-source solutions should be evaluated side-by-side with commercial as part...
Secured Login Authentication on Key Attackers
An innovative solution is proposed to avoid the problem such as password security at application layer. For password security all lower case characters, upper case characters, special characters and digits in password c...
Cluster Based Routing With Isolated Nodes in WSN
In designing a cluster based routing in WSN, formation of clusters plays a vital role. The poor design of cluster formation algorithm results in isolated nodes. The data sensed by the isolated nodes should be transmitte...