Improved Data Integrity Public Auditing for Regenerating-Code-Based Cloud Storage
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 4
Abstract
Cloud Computing is very important vision of computing as a utility. Using cloud storage, users can store their data into cloud. So they can enjoy high quality applications and services. Users can outsource data without the burden of local data storage and maintenance. In Cloud computing, users should be able to use cloud storage without worrying about the need to check it’s integrity.so enabling public auditability for Cloud data storage should have critical importance.so users can use external audit party to check the integrity of data in Cloud Storage. Using Third Party Auditor(TPA) for checking integrity of data, the users or data owners should not have to stay online and the users are be worry-free. For using TPA the auditing process should provide security to cloud storage. Hence TPA preserves to user data privacy. In this paper, we motivate the public Auditing system of data storage security in cloud computing. Also secure Cloud storage system supports privacy preserving.TPA also supports for Batch Auditing. In public Auditing, after checking Integrity to solve the Regeneration problem of failed Authenticators, proxy agent can introduce. This is used to regenerate Authenticators in public Auditing. Hence using this scheme can completely release data owners from online burden. Also this scheme is to support scalable and efficient public Auditing. We prove the security and justify the performance of our proposed schemes.
Authors and Affiliations
Miss. Sherkar Snehal R, Miss. Gagare Sital J, Mr. Babre Tanmay A, Mr. Bhangare Rohan S.
Overview of Image Processing
Image Processing is a technique to enhance raw images received from cameras/sensors placed on satellites, space probes and aircrafts or pictures taken in normal day-today life for various applications. Image processing...
Spectrophotometric Methods for the Estimation of Third and Fourth Generation Cephalosporins In Dosage Form
The proposed spectrophotometric methods are rapid, sensitive and reproducible for the analysis of cefdinir(A), and cefepime(B) in pharmaceutical dosage forms with short analysis time. The authors developed reagent for t...
An Algorithm for Association Rules Mining using Apriori based on Genetic Algorithm
Presently Apriori algorithm plays an essential role in deriving frequent itemsets and then extracting association rules out of it. It is one of the classical algorithms for finding association rules, and is widely used...
Data Hiding Using Blind Algorithm of Steganography
The process of hiding messages or information within other non-secret text or data is called steganography. Steganography may be text, image, audio or video steganography. Digital image Steganography is popular because...
A Novel Proposed Approach to find an Optimal Path in DSR
Mobile Ad-hoc Network (MANET) is a collection of independent mobile nodes that can communicate with each other via radio waves. The mobile nodes that are in radio range of each other can directly communicate, whereas ot...