Storage Correctness Verification and Data Regaining In Cloud
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 10
Abstract
Users no longer hold physical possession of the outsourced data makes the data integrity protection in cloud computing a formidable task particularly for users with constrained computing resources. Moreover users should be capable to use the cloud storage as if it is local without perturbing about the need to validate its integrity. Consequently enabling public audit ability for cloud storage is of vital importance so that users can way out to a third-party auditor (TPA) to ensure the integrity of outsourced data and be worry free. To securely initiate an effectual TPA, the auditing process should carry in no new vulnerabilities toward user data privacy and bring in no extra online burden to user. Widespread protection and performance analysis show the proposed schemes are provably secure and highly efficient. For data recovery proposing Data regaining algorithm which recovers users data lost by the cloud server.
Authors and Affiliations
G. Parimala Divya, Ramu vikruthi
Implementation Of Fast rate Power Allocation Utilizing Duality gap in OFDM Systems
In this letter, we propose a power allocation strategy for orthogonal frequency division multiplexing (OFDM) systems. To achieve the maximum capacity, the proposed power allocation strategy iteratively tunes the amoun...
A Trusted Identity Acknowledgement Protocol for Security Enhancement in MANET
Identifying trusted node for secure communication is a very important point in mobile adhoc network. It makes a node to compromise for a service and causes uncertainty of node behaviour. Computing a node trust and ma...
Data mining and warehousing for Temporal Data Objects
Mobility data analysis became a more challenging task because of its huge application in different field of science and other daily applications like service accessibility, mobile marketing and traffic management. On...
An Approach To Exploit The Hidden Mobility Regularity Of Vehicles To Predict Future Trajectories
Vehicle scan perform as influential sensors and form movable sensor networks. Vehicular networks have a lot of attractive applications, such as driving safety, intelligent transport, infrastructure monitoring and bui...
A NEW APPROACH FOR EVALUATING THE QUALITY OF DE-BLOCKED IMAGES
JPEG Compression is the most prevalent technique or method for images codecs. But it suffers from blocking artifacts. In this paper a comparison of the perceptual quality of deblocked images based on various quality...