slugPrivacy Protection of User’s Data in Cloud Storage Against External Auditors Attacks
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 4
Abstract
Cloud computing is the delivery of computing services over the Internet. It supports remote accessing of resources. The physical existence of users using data in cloud is very less. The data integrity is a challenging issue of data in cloud. The user’s data privacy and preserving in cloud can be introduced by third party auditing system. Extensive security and performance analysis gives good security and highly efficient. Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources, without the burden of local data storage and maintenance. Thus, enabling public auditability for cloud storage is of critical importance so that users can resort to a third party auditor to check the integrity of outsourced data and be worry-free.
Authors and Affiliations
B Kumara Swamy, Errolla Venkataiah, A. V. S. M AdiSeshu
Detection of Grade of Tumor in MRI Images with Hybrid Technique
Human brain is a very complex structure and brain image analysis is a very intricate task. Detection and segmentation of tumors from brain is very difficult due to variance and complexity of tumors and dense brain tissu...
Energy Optimization in Ad-hoc Networks Using Ant Colony Optimization
MANET is known for its dynamic nature, heterogeneous devices and limited resources without any supportive infrastructure. Mobile devices in MANET have constrained resources like memory, energy, bandwidth etc. that must...
Recent Trends in Face Recognition
With the advances in information technology coupled with the need for high security, the application of biometric as identification and recognition process has received special attention. The biometric authentication sy...
Steganography and Digital Watermarking as Promising Approaches to Information Hiding: A State-Of-The-Art Review
Since the invention of the Internet, the exchange of digital content has become much easier. One can send and receive such large data files as a text, video, audio, image data or other in the blink of an eye. On the one...
Mobile Controlling and Video Streaming Robot in Remote Areas
This paper presents the technical construction of the vehicle controlled by user mobile. The designed GSM based vehicle could be operated from almost anywhere if GSM network exists. The procedurecommences with initiatin...