An Efficient Integrity Model by Implementing Public Auditing in Cloud
I. Asoon, Dr.Charles, J.P.Jayan "An Efficient Integrity Model by Implementing Public Auditing in Cloud". International Journal of Computer Trends and Technology (IJCTT) V59(2):90-93, May 2018. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.
Abstract
Cloud storage delivers marvelous packing properties aimed at together separate then initiative operators. In a cloud storage scheme, the data kept via a operator is no lengthier controlled nearby. Later, it is not capable to confirm the honesty of the subcontracted statistics by old-style statistics honesty inspection approaches. Therefore, allowing public auditability for cloud records storage refuge is of dangerous position so invigorated persons to custom cloud storage facilities via providing protected situation. In this paper, established a TPA which container confirm and preserve the storage accurateness. TPA is used for inspection the honesty prototypical. The algorithm planned here is online/offline algorithm. So the planned prototypical concepts by the effectual system of honesty then attains the privacy preserving model. Tests display that our procedures are hundreds of periods extra effectual than a fresh suggestion concerning to the computational above on operator side.
Reference
[1] Kan Yang, "An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing", IEEE Transactions On Parallel And Distributed Systems, Vol. 24, No. 9, September 2013.
[2] Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI), International Congress, 2017.
[3] Liu Yang, Lili Xia, "An Efficient and Secure Public Batch Auditing Protocol for Dynamic Cloud Storage Data", Computer Symposium (ICS),International 2016.
[4] Hao Jin, Hong Jiang, "Dynamic and Public Auditing with Fair Arbitration for Cloud Data", IEEE Transactions on Cloud Computing ( Volume: PP, Issue: 99 ), 2016.
[5] Jiangtao Li, Lei Zhang, Joseph K. Liu, Haifeng Qian, Zheming Dong, "Privacy-Preserving Public Auditing Protocol for LowPerformance End Devices in Cloud", IEEE Transactions on Information Forensics and Security, Volume: 11, Issue: 11, Nov. 2016.
[6] P. Mell and T. Grance, “The NIST Definition of Cloud Computing,” technical report, Nat’l Inst. of Standards and Technology, 2009.
[7] M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, A. Konwinski, G. Lee, D.A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “A View of Cloud Computing,” Comm. ACM, vol. 53, no. 4, pp. 50-58, 2010.
[8] T. Velte, A. Velte, and R. Elsenpeter, Cloud Computing: A Practical Approach, first ed., ch. 7. McGraw-Hill, 2010.
[9] J. Li, M.N. Krohn, D. Mazie`res, and D. Shasha, “Secure Untrusted Data Repository (SUNDR),” Proc. Sixth Conf. Symp. Operating Systems Design Implementation, pp. 121-136, 2004.
[10] G.R. Goodson, J.J. Wylie, G.R. Ganger, and M.K. Reiter, “Efficient Byzantine-Tolerant Erasure-Coded Storage,” Proc. Int’l Conf. Dependable Systems and Networks, pp. 135-144, 2004.
[11] V. Kher and Y. Kim, “Securing Distributed Storage: Challenges, Techniques, and Systems,” Proc. ACM Workshop Storage Security and Survivability (StorageSS), V. Atluri, P. Samarati, W. Yurcik, L Brumbaugh, and Y. Zhou, eds., pp. 9-25, 2005.
Keywords
Cloud Storage, Privacy-Preserving, Public Auditing, Online/Offline Signature.