slugPrivacy Protection of User’s Data in Cloud Storage Against External Auditors Attacks

Abstract

Cloud computing is the delivery of computing services over the Internet. It supports remote accessing of resources. The physical existence of users using data in cloud is very less. The data integrity is a challenging issue of data in cloud. The user’s data privacy and preserving in cloud can be introduced by third party auditing system. Extensive security and performance analysis gives good security and highly efficient. Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources, without the burden of local data storage and maintenance. Thus, enabling public auditability for cloud storage is of critical importance so that users can resort to a third party auditor to check the integrity of outsourced data and be worry-free.

Authors and Affiliations

B Kumara Swamy, Errolla Venkataiah, A. V. S. M AdiSeshu

Keywords

Related Articles

Detection of Grade of Tumor in MRI Images with Hybrid Technique

Human brain is a very complex structure and brain image analysis is a very intricate task. Detection and segmentation of tumors from brain is very difficult due to variance and complexity of tumors and dense brain tissu...

Energy Optimization in Ad-hoc Networks Using Ant Colony Optimization

MANET is known for its dynamic nature, heterogeneous devices and limited resources without any supportive infrastructure. Mobile devices in MANET have constrained resources like memory, energy, bandwidth etc. that must...

Recent Trends in Face Recognition

With the advances in information technology coupled with the need for high security, the application of biometric as identification and recognition process has received special attention. The biometric authentication sy...

Steganography and Digital Watermarking as Promising Approaches to Information Hiding: A State-Of-The-Art Review

Since the invention of the Internet, the exchange of digital content has become much easier. One can send and receive such large data files as a text, video, audio, image data or other in the blink of an eye. On the one...

Mobile Controlling and Video Streaming Robot in Remote Areas

This paper presents the technical construction of the vehicle controlled by user mobile. The designed GSM based vehicle could be operated from almost anywhere if GSM network exists. The procedurecommences with initiatin...

Download PDF file
  • EP ID EP17968
  • DOI -
  • Views 322
  • Downloads 11

How To Cite

B Kumara Swamy, Errolla Venkataiah, A. V. S. M AdiSeshu (2014). slugPrivacy Protection of User’s Data in Cloud Storage Against External Auditors Attacks. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 2(4), -. https://europub.co.uk/articles/-A-17968