ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Secured Client Data Access in Distributed Cloud Storage Service

Journal: Excel International Journal of Technology, Engineering and Management (Vol.1, No. 1)

Publication Date:

Authors : ; ;

Page : 68-71

Keywords : ---;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

A cluster distributed cloud storage service should be presented with secured client data in indexed way. The execution level of complexity that is involved in bilinear mapping should be minimized. The cloud data storage presents an Enhanced RSA for the clientâ?™s multiple integrity of data storage outsourcing is performed using provable data possession of the client. The existing works concentrate on the Cooperative Provable Data Possession (CPDP) mechanism for cloud storage in distributed way. The operation of CPDP is carried out using Homo-morphic Verifiable Response and Hash Index Hierarchy. The security of CPDP is determined by using multi-prover zero knowledge proof system. The performance optimization is to provide minimal Computation Complexity Communication Overhead. For cloud storage providers this technique proves the integrity and ownership of clientâ?™s data essentially in case for large files and folders. The existing work presents a Cooperative Provable Data Possession (CPDP) mechanism for cloud storage services in distributed way by maximizing security and transparent verification in extraordinary performance. The CPDP operation is based on the techniques of hash index hierarchy (HIH) and Homo-morphic verifiable response (HVR). The first technique comprises of three layers and denotes the relationships between all blocks for stored resources. The Express Layer provides with the abstract representation of the stored resources. The second layer, service Layer manages cloud storage services and finally, the storage Layer realizes data storage on many physical devices. The second technique provides a map between two groups and provides with two messages that anyone can aggregate them into a value corresponding to the sum of the messages. It constructs the CPDP without compromising data privacy using interactive proof system (IPS). The analysis is made to prove that CPDP construction is a multi-prover zero-knowledge proof system (MP-ZKPS). The CPDP implement security against data leakage attack and tag the forgery attack. The probabilities queues are analyzed for detecting abnormal situations. It minimized the computation and communication overheads.

Last modified: 2015-01-12 21:03:47