slugPrivacy Protection of User’s Data in Cloud Storage Against External Auditors Attacks

Abstract

Cloud computing is the delivery of computing services over the Internet. It supports remote accessing of resources. The physical existence of users using data in cloud is very less. The data integrity is a challenging issue of data in cloud. The user’s data privacy and preserving in cloud can be introduced by third party auditing system. Extensive security and performance analysis gives good security and highly efficient. Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources, without the burden of local data storage and maintenance. Thus, enabling public auditability for cloud storage is of critical importance so that users can resort to a third party auditor to check the integrity of outsourced data and be worry-free.

Authors and Affiliations

B Kumara Swamy, Errolla Venkataiah, A. V. S. M AdiSeshu

Keywords

Related Articles

Weight Optimisation and Burst Margin of Aero Engine Compressor Disc

Rotating disks are heavy, highly stressed components used in gas turbine mainly due to over speed and operating temperatures. In this work compressor disc are concentrated. The objective of this work was to develop fini...

A Novel Approach for Transaction Management in Heterogeneous Distributed Database Systems

RESTful APIs are widely adopted in designing components that are combined to form web information systems. The use of REST is growing with the inclusion of smart devices and the Internet of Things, within the scope of w...

Image Piracy Alert System in Social Networks Using Watermarking

In this digital age one’s content is growing in social networking sites. A novel technique has been proposed in this article to address this threat by using bit plane digital watermarking technique. A QR code representi...

Synthesis of Tio2 Photocatalyst for Rhodamine B-Dye Degradation Under Solar Light

Photocatalysis is one of the advanced oxidation process used widely for the degradation of waste water.In the current study synthesis of TiO2. Titanium Dioxide photocatalyst has been synthesized using Titanium tetrachlo...

An Overview on Speaker Identification Technologies

This paper aims at providing a brief overview into the area of speaker recognition. Speaker recognition can be classified into text dependent and the text independent methods. This paper gives an overview of major techn...

Download PDF file
  • EP ID EP17968
  • DOI -
  • Views 353
  • Downloads 11

How To Cite

B Kumara Swamy, Errolla Venkataiah, A. V. S. M AdiSeshu (2014). slugPrivacy Protection of User’s Data in Cloud Storage Against External Auditors Attacks. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 2(4), -. https://europub.co.uk/articles/-A-17968