Privacy Preserving Audit Of Data Storage In Cloud
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 9
Abstract
Cloud computing is the deliverance of computing as a service rather than a product. It gives shared resources, information to computers, softwares and other devices over a set of connections. Cloud computing is the extended vision of computing as a service, where data owners can tenuously store their data in the cloud to enjoy on-demand high-quality applications and services from a public pool of configurable total resources. While data outsourcing mitigates the owners of the load of local data storage and preservation, it also reduces their physical control of storage dependability and security, which conventionally has been expected by both enterprises and individuals with high servicelevel requirements. In order to make possible quick use of cloud data storage service and get back security declarations with outsourced data reliability, well-organized methods that facilitate on-demand data accuracy verification on behalf of cloud data holders have to be designed. The proposed technique publicly auditable cloud data storage is capable to help this emerging cloud economy become fully recognized. With public audit ability, a trusted person with proficiency and abilities data owners do not acquires can be delegated as an outside audit party to review the risk of outsourced data when required. Such an auditing service not only assists save data owners’ computation resources but also provides a apparent yet cost-effective method for data owners to gain trust in the cloud. We describe move toward and system necessities that should be brought into thought, and the challenges that need to be resolved for such publicly auditable secure cloud storage service to become a reality.
Authors and Affiliations
G. Pravallika, P. Chakradhar, A. Rajyalakshmi, Ch. Anil Babu
A Reliable Routing Approach in Mobile AdHoc Network based on Genetic Algorithms
The Mobile Network is highly constraint requirement to improve the quality of service in secure way, it uses different changes in MANET protocols, its parameters, routing algorithm etc. Nature inspired and the challeng...
Modified EESM Link Adaptation Method with Multiple Constellation for Future Wireless Networks
Wireless communication systems require high spectral efficiency and throughput in order to be money-spinning. Link adaptation schemes are known to be the best solution to achieve this aspiration. In customary link adap...
Free Hand Motion Based Control Of Robots Using For Military Rescue And Searching Applications
Signal based (Non-contact) operation of electrical mechanical assemblies is ending up being continuously fancied development. Flexible Sensor based touch less game plans end up being all the more understood after the...
Empowering the Privacy in Online Social Networks
Security is one of the converges that develops when correspondence get interceded in Online Social Networks (OSN) distinctive protection issues have been risen in the online interpersonal organization ,this paper cla...
A System to Minimize The Storing And Managing Secret Keys Expense Using KAC
Emerging new computing technology cloud offering storage services. But now focus of data sharing with others in secure and efficient manner. For this the new expandable public-key cryptosystems which derives fixed-si...