Authorized Public Auditing of Dynamic Storage on Cloud with Efficient Verifiable Fine-Grained Updates with MHT
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 5
Abstract
One of the top technology concept is Cloud Computing. Cloud storage servers plays an important role in the technology buzz – cloud computing where clients can store their data at cloud servers and can access this data from anywhere and anytime. This opens up the threat on the data which client is storing on the cloud as it has to stored and accessed via Internet from any device. Here we came up with data Security which opens up lot of areas like authentication of clients, data integrity check and data privacy preserving. In our proposed work we are going to focus on data integrity area which is concerned about data security. When we consider about data security data auditing is concept of frequently auditing the integrity of the data to make sure that the data is not tampered and it is secured. Most of the times clients offload the auditing process of their data to Third Party Auditors (TPA) who are able to check the validity of the data without actually accessing the data on cloud. When the verification is done by a trusted third party called data auditing in which third party is called an auditor. There are several drawbacks of these techniques. One of the issue arises here is a necessary authentication process is missing between the auditor and cloud service provider it means that anyone can challenge the cloud service provider for a proof of integrity of certain file which puts auditing service at risk. In our work, we provide a legal Study for possible types of fine-grained data updates and suggest a scheme that can fully support authorized auditing and fine-grained update request.
Authors and Affiliations
Mayur Lokhande, Supriya Kapse, Sonali Darekar, Mahesh Sonawane
Fault Diagnosis and Monitoring In Wind Turbine Using Can Bus
This paper is a CAN based architecture intended for the purpose of monitoring and fault diagnosis of wind turbine. CAN is a memo based protocol designed specifically for automotive, late aerospace, industrial automation...
A Scalable approach to detect the duplicate data using Iterative parallel sorted neighbourhood method
Determining the redundant data in the data server is open research in the data intensive application. Traditional Progressive duplicate detection algorithms namely progressive sorted neighbourhood method (PSNM) with sca...
Review of Railway Track Fault Finding System
In India so many transport facilities is available. In which railway played vital role to transport of Indian population. The Indian population is on second position in world. So, transportation problem is reduced becau...
Traffic Sign Detection Via Graph-Based Ranking and Segmentation Algorithm
The majority of the existing traffic sign detection systems to utilize color or shape information, but the methods of remain limited in regard to detecting and segmenting traffic signs from a complex background. In this...
Variation of Pressure and Velocity in A 3- D Flow Through a Plenum
In this study, a plenum box is considered and the fluid is allowed to flow through this plenum box. The threedimensional flow of the fluid which is not dependent on time has been studied. With the help of FLEX PDE softwa...