Storage Correctness and Dynamic Data Support for Cloud Data
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 10
Abstract
Cloud users store their data in the cloud environment which is privileged by the service provider. Cloud users can access their cloud storage. Cloud storage is a model with virtualized pools of storage which is generally operated with large third party data centers which are distributed and spread across different geographical locations. A simple issue with cloud storage is that enterprises store “files and clouds stores “objects,” a new data construct that is required as part of its scalable architecture. In addition to this, there are other barriers to enterprise cloud storage adoption like security, availability, and performance. In this paper, we propose a flexible distributed storage integrity auditing mechanism, which utilizes the homomorphic token and distributed erasure-coded data to protect the data from the authorized access. The proposed model allows the users to audit the cloud storage with very light weight communication and computation cost. Users can safely delegate the integrity checking tasks to third party auditor and third party auditing will be provide unique token to the each user .The proposed scheme perfectly stores the data in the cloud and identifies any tamper at the cloud server and also support the dynamic operation tasks like updating, deleting, appending. This paper also addresses a process to avoid Collusion attacks of server modification by authorized users.
Authors and Affiliations
B Anusha, Y. Ramu
Implementation of Slicing Technique for Privacy Preserving Data Publishing
Today, most of the organizations are effectively gathering and storing information in extensive databases. A large number of them have perceived the potential estimation of this information as a data hotspot for settl...
Switched Boost Inverter for Standalone DC Nanogrid Applications
Switched boost inverter (SBI) is a singlestage power converter derived from Inverse Watkins Johnson topology. Unlike the traditional buck-type voltage source inverter (VSI), the SBI can produce an ac output voltage th...
Supportive Accumulation for Proficient Data Approach In Interruption Tolerant Networks
The goal of this is to build up a structural system of social group based agreeable reserving for minimizing electronic substance provisioning cost in Mobile Social Wireless Networks (MSWNET). MSWNETs are framed by r...
Advances In Em (Expectation - Maximization) Algorithm for Image Classification As Per Cost and Accuracy
Image classification is the process of grouping image pixels into categories or classes to produce a Thematic representation.. Image classification used in many areas such as medical imaging, object identification in...
Authentication Token as SSO Devices
Authentication is a process by which a person verifies that someone is who he claims he is. There are many ways of authentication as user login authentication, one-way authentication of communicating entities and two...