Privacy Preserving Audit Of Data Storage In Cloud

Abstract

Cloud computing is the deliverance of computing as a service rather than a product. It gives shared resources, information to computers, softwares and other devices over a set of connections. Cloud computing is the extended vision of computing as a service, where data owners can tenuously store their data in the cloud to enjoy on-demand high-quality applications and services from a public pool of configurable total resources. While data outsourcing mitigates the owners of the load of local data storage and preservation, it also reduces their physical control of storage dependability and security, which conventionally has been expected by both enterprises and individuals with high servicelevel requirements. In order to make possible quick use of cloud data storage service and get back security declarations with outsourced data reliability, well-organized methods that facilitate on-demand data accuracy verification on behalf of cloud data holders have to be designed. The proposed technique publicly auditable cloud data storage is capable to help this emerging cloud economy become fully recognized. With public audit ability, a trusted person with proficiency and abilities data owners do not acquires can be delegated as an outside audit party to review the risk of outsourced data when required. Such an auditing service not only assists save data owners’ computation resources but also provides a apparent yet cost-effective method for data owners to gain trust in the cloud. We describe move toward and system necessities that should be brought into thought, and the challenges that need to be resolved for such publicly auditable secure cloud storage service to become a reality.

Authors and Affiliations

G. Pravallika, P. Chakradhar, A. Rajyalakshmi, Ch. Anil Babu

Keywords

Related Articles

Detection of Precise C/C++ Memory Leakage by diagnosing Heap dumps using Inter procedural Flow Analysis statistics

Memory leak is a time consuming bug often created by C++ developers. Detection of memory leaks is often tedious. Things get worst if the code is not written by you, or if the code base is quite huge. The most difficu...

A Brief Servey Of Rfid Devices And Its Security Protocols

Security plays a very important role during the transmission of information in RFID devices. RFID are the wireless devices that contain a tag and a reader. While there are many authentication protocols put into opera...

Joint Estimation of CFO and Channel Estimation for Rayleigh Fading Channel with Kalman Filter for OFDM System

Due to its high data rate transmission capability with high bandwidth efficiency and its robustness to multipath delay, the Orthogonal Frequency Division Multiplexing (OFDM) has recently been applied widely in wireles...

A Novel Secure On-Demand Routing Protocol for MANET using RSA Triple Key Technique

MANET (Mobile and Ad hoc Networks) are networks in which nodes are mobile and link connectivity might change all the time. In this kind of networks routing, security and key management are the important and complex p...

Self-Checking Carry-Select Adder Design Based on Two-Pair Two-Rail Checker

In the design of integrated circuits error checking And area occupancy plays a vital role because of increasing the necessity of portable systems. InThis paper, the self-checking carry-select adder (CSeA) design is prop...

Download PDF file
  • EP ID EP27648
  • DOI -
  • Views 246
  • Downloads 4

How To Cite

G. Pravallika, P. Chakradhar, A. Rajyalakshmi, Ch. Anil Babu (2013). Privacy Preserving Audit Of Data Storage In Cloud. International Journal of Research in Computer and Communication Technology, 2(9), -. https://europub.co.uk/articles/-A-27648