To Provide A Privacy Preserving Auditing Protocol In Cloud Computing Using Tpa

Abstract

To completely make sure the data honesty and save the cloud users’ calculation possessions as well as online burden it is of significant importance to facilitate public auditing service for cloud data storage so that users may alternative to an independent third-party auditor (TPA) to review the outsourced data when needed. The TPA who has know-how and potential that users do not can episodically check the integrity of all the data stored in the cloud on behalf of the users which provides a much more easier and reasonable way for the users to make sure their storage correctness in the cloud. Furthermore in addition to help users to evaluate the hazard of their subscribed cloud data services the audit results from TPA would also be advantageous for the cloud service providers to recover their cloud-based service platform and even serve up for independent negotiation purposes. In a word facilitate public auditing services will participate an important role for this promising cloud economy to become fully established where users will need ways to measure risk and gain trust in the cloud.

Authors and Affiliations

M. Vamsi Krishna| Dept. of CSE, Chaitanya Institute of Science & Tech., Madhavapatnam, Kakinada. E.g.dt, AP, India, Dr. K. V. V. S. Narayana Murthy| Dept. of CSE, Chaitanya Institute of Science & Tech., Madhavapatnam, Kakinada. E.g.dt, AP, India, V. Sailaja| Dept. of CSE, Chaitanya Institute of Science & Tech., Madhavapatnam, Kakinada. E.g.dt, AP, India

Keywords

Related Articles

A Technique To Sieve Annoying Communications From Osn Client Walls

Internet safety or online social network safety is the security of people and their information when using the Internet. Social media safety means protecting your personal information and terminates the untrusted inf...

Higher Image Retrieval Efficiency Using Color Features

Image retrieval techniques are useful in many image processing applications. Content based image retrieval systems works with whole images and searching is based on comparison of the query. In this paper we present a...

The Competent Service Management and Reliable Trustworthiness in Cloud Environment

Presently days, Cloud Computing is having trust area in innovative work regardless of loads of work in the stream. There are number of research issues in this section including trust management, privacy, security, re...

Mobile Ad Hoc Networks Authentication Using Npv Method

NPV (Neighbour Position Verification) method is companionable with security architectures counting the ones that have been projected for vehicular networks which symbolize a likely deployment environment for NPV. Suc...

Percolate And M Supremacy User Walls By Using Pfw

Users have attraction about on social networks they are ready to keep in touch with his/her friends by seesawing different information of meta data. Now a day social networks have more privacy and security problems a...

Download PDF file
  • EP ID EP16381
  • DOI -
  • Views 363
  • Downloads 14

How To Cite

M. Vamsi Krishna, Dr. K. V. V. S. Narayana Murthy, V. Sailaja (2014). To Provide A Privacy Preserving Auditing Protocol In Cloud Computing Using Tpa. International Journal of Science Engineering and Advance Technology, 2(11), 737-741. https://europub.co.uk/articles/-A-16381