Third Party Public Auditing Scheme for Security in Cloud Storage
Journal Title: International Journal of Trend in Scientific Research and Development - Year 2019, Vol 3, Issue 3
Abstract
By means of cloud storage, users can distantly store their data and enjoy the on demand high quality applications and services from a shared group of configurable computing resources, without the burden of local data storage and maintenance. However, the information that users no longer have physical ownership of the outsourced data makes the data integrity protection in cloud computing a difficult task, particularly for users with constrained computing resources. Moreover, users should be able to just use the cloud storage space as if it is local, without worrying about the need to verify its integrity. Thus, to enable public auditability for cloud storage is of serious importance so that users can rely on a third party auditor TPA to verify the integrity of outsourced data and be worry free. To securely introduce a well organized TPA, the auditing process should bring in no new vulnerabilities to user data privacy, and introduce no additional online burden to user. However we propose a secure cloud storage system supporting privacy preserving public auditing and monitoring. We additional would extend our result to enable the TPA to perform audits for multiple users simultaneously and efficiently, also integrity of data in cloud. Extensive security and performance analysis show the future schemes are provably secure and highly well organized. Our beginning tryouts would be conducted on Amazon EC2 instance additional demonstrating the fast performance of the design. by Heeth Shah | Jill Shah | Ushma Desai "Third Party Public Auditing Scheme for Security in Cloud Storage" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-3 , April 2019, URL: https://www.ijtsrd.com/papers/ijtsrd21687.pdf Paper URL: https://www.ijtsrd.com/other-scientific-research-area/other/21687/third-party-public-auditing-scheme-for-security-in-cloud-storage/heeth-shah
Defining Competitive Advantage of Mongolian Wool Products
The economy of Mongolia has traditionally been based on agriculture and livestock. But since democratic revolution in 1990, mining sector started to play important role in economy of Mongolia. Even though it contributes...
Design and Mitigation Techniques of MV Capacitor Bank Switching Transients on 132 KV Substation
This paper presents the techniques to mitigate transients caused by capacitor switching in the distribution system. It includes the theory of capacitive switching transients with different methods of mitigation. The pape...
Transactional Analysis and Counseling: Insightful Thoughts
Transactional analysis (TA) is a widely recognized form of modern psychology that involves a set of practical conceptual tools designed to promote personal growth and change. It is considered a fundamental therapy for we...
Problems of Women Education in India A Case Study of Mangalagiri Mandal in Guntur District of A.P
Rapidly changing technologies and increasing globalization suggests that better education and training have become essential for sustainable development improved livelihoods and the competitiveness of the economy. Educat...
Experimental Study on Composite Concrete RC Frame Structure using Sisal Fibre
This project aims to compare the mechanical properties of Sisal fiber in the improvement of load carrying capacity of concrete structure in different layers. Beams and columns may be strengthened in flexure through the u...