Privacy Preserving Auditing and Data Recovery for Secure Cloud Storage
Journal Title: International Journal of Innovative Research in Computer Science and Technology - Year 2015, Vol 3, Issue 3
Abstract
Cloud Storage permits users to remotely store their data and also provides users with on-demand self service from a shared pool of configurable and computable resources and that can be rapidly provisioned and realized with minimal management efforts or service provider interaction. Despite of its advantage, outsourcing storage prompts a number of interesting challenges. One of the important factors that need to be taken into consideration is to assure the user about the correctness of his outsourced data. Also, cloud user should be able to use the cloud storage without worrying for the need to verify its correctness. Thus, enabling public verifiability for cloud storage system is of critical importance so that cloud user can resort to an external audit party i.e. third party auditor (TPA) to check the correctness of outsourced data. For TPA to be secure and effective, the auditing process should not introduce no new vulnerabilities that violate users’ data privacy and no additional online burden to cloud user. In this paper, a secure storage system that supports user privacy preserving and auditing is implemented using RC4 algorithm to increase efficiency. To speed up auditing by TPA, batch auditing scheme is introduced. Proposed scheme helps to achieve secure and efficient dynamic operations on blocks of data as well as recovery of corrupted data or lost data can be achieved by replicating data on backup servers
Authors and Affiliations
Dimple A. Bedmutha, P. M. Yawalkar
Using Apache Jena Fuseki Server for Exxecution of SPARQL Queries in Job Search Ontology Using Semantic Technology
The "SPARQL Protocols as well as RDF Query Language" allows users to query information from a database or any other data source that can be mapped to RDF. The SPARQL standard, created and supported by the W3C, allows dev...
Analyzing Various Machine Learning Algorithms for Blockchain-Based Fraud Detection
A blockchain network's economics and user confidence can be seriously harmed by fraud. Consensus algorithms like proof of work and proof of stake can verify the legitimacy of a transaction but not the identity of the peo...
NLP for Intelligent Conversational Assistance
Context-specific signals were often used as extra supportive measures secondary kinds of evidence to aid interpret its user's language inputs in the early days of Natural Languages Processing (NLP). The context was emplo...
A Study on Farm Insurance in India
Cultivating different societies involves functional dangers. Normal disasters can possibly hurt agrarian result. Crop protection is only a procedure that might be used to defend against creation chances in cultivating, a...
Virtual World-Based Multii-View-Point Vision Time Reliant Simulation Data
A virtual world is a computer-generated simulation of a world with specific geographical and physical qualities in which users can interact with one another through "avatars," or projections of themselves. Virtual realit...