Data invulnerability and data integrity verification of multi cloud storage
| ||International Journal of Computer Trends and Technology (IJCTT)|| |
|© - April Issue 2013 by IJCTT Journal|
|Volume-4 Issue-4 |
|Year of Publication : 2013|
|Authors : N.Janardhan, Y.Rajasree, R .Himaja|
N.Janardhan, Y.Rajasree, R .Himaja "Data invulnerability and data integrity verification of multi cloud storage"International Journal of Computer Trends and Technology (IJCTT),V4(4):707-709 April Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.
Abstract: - Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that users’ data are usually processed remotely in unknown machines that users do not own or operate. Offering strong data protection to cloud users while enabling rich applications is a challenging task. We explore a new cloud platform architecture called Data Protection as a Service, which dramatically reduces the per-application development effort required to offer data protection, while still allowing rapid development and maintenance.
C. Dwork, “The Differential Privacy Frontier Extended Abstract,” Proc. 6th Theory of Cryptography Conf.(TCC 09), LNCS 5444, Springer, 2009, pp. 496-502.
 C. Gentry, “Fully Homomorphic Encryption Using Ideal Lattices,” Proc. 41st Ann. ACM Symp. Theory Computing (STOC 09), ACM, 2009, pp. 169-178.
E. Naone, “The Slow-Motion Internet,” Technology Rev., Mar./Apr.2011; www.technologyreview.com/files/54902/ GoogleSpeed_charts.pdf.
 A. Greenberg, “IBM’s Blindfolded Calculator,” Forbes, 13 July 2009; www.forbes.com/forbes/2009/0713/breakthroughs-privacy-super-secret-encryption.html.
 P. Maniatis et al., “Do You Know Where Your Data Are? Secure Data Capsules for Deployable Data Protection,” Proc. 13th Usenix Conf. Hot Topics in OperatingSystems(HotOS11),Usenix,2011; www.usenix.org/events/hotos11/tech/final_files/ManiatisAkhawe.pdf.
 S. McCamant and M.D. Ernst, “Quantitative Information Flow as Network Flow Capacity,” Proc. 2008 ACM SIGPLAN Conf. Programming Language Design and Implementation (PLDI 08), ACM, 2008, pp. 193-205.
Keywords — Cloud computing, DPaaS, Security