Secured Retrieval of Data with Resource Constrained Devices Using OPoR
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 4
Abstract
Cloud storage server is used to store the end user applications and their data’s in a centralized storage area but the cloud service provider itself is not trustworthy. In this paper, we are going to ensure the three main characteristics like data integrity, dynamic data operations as well as the public verifiability by using a new scheme called Proof of Retrievability (PoR). To reduce the overheads and the computational cost due to the tag generation for files at the user side, public verifiability scheme is used. To tackle all these challenges, our new scheme has introduced two servers namely cloud storage server and cloud audit server. The main task of the cloud audit server is to preprocess the data and check for integrity on behalf of the cloud users. It also eliminates the user involvement in the tag generation in preprocessing and auditing phases. In addition to that, PoR model also provides defense against the problems like spoofed reset attacks that is caused by the cloud storage server in the upload phase.
Authors and Affiliations
Sakthi Sree T, Aishwarya V, GowthamKumar T, Safia Ahmadha S
Study of Static Vs Dynamics Methods for Study of High Pressure Behaviour of Solids
There has been considerable interest in the study of structural phase-transition and high pressure behavior of solids due to their technological and geophysical importance. Therefore, a number of experimental and theore...
Low Pass Fir Filter Design and Performance Analysis Using Blackman & Bartlett Window Techniques
DSP is the main branch of electronics. It is also used the representation by sequence of number or symbol and the processing of these signals. Dsp have many more applications which are useful in our life. In this Paper...
Service Oriented Network virtualization Architecture for Internet of Things
As a key technology to realize smart services of Internet of Things, network virtualization technology can support the network diversification and ubiquity which improve the utilization rate of network resources. The pa...
A Review on Security of Data Using PGP Algorithm along with Steganography
Now a day due to rapid increase in number of internet user’s data security is one of the prime concerns of internetwork communication. Several techniques have been evolved to prevent data from unauthorized access. Two f...
A Review on Serial Communication for Tms570 Microcontroller
In parallel communication the cost as well as complexity of the system increases due to simultaneous transmission of data bits on multiple wires. Serial communication alleviates this drawback and emerges as effective ca...