Secure Erasure Code-Based Privacy-Preserving Public Auditing System?
Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.4, No. 2)Publication Date: 2015-02-28
Authors : S.Ramya; K.B.Suganya; C.R.Sathya; V.Sathiya;
Page : 284-292
Keywords : Public auditing; privacy-preserving; shared data; proxy re-encryption; secure erasure code; cloud computing;
Abstract
Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centres, where the management of the data and services may not be fully trustworthy. This work studies the problem of ensuring the integrity of data storage in Cloud Computing. Several mechanisms have been used for privacy preserving of shared data in the cloud but these may fail to end the direct server attacks and other similar attacks. In these mechanisms data is stored only in one server. In this project, we ensure the integrity of the remote data in the cloud. We divide the data into blocks and thus we exploit the shared key generation algorithm which create key for each block and these blocks are encrypted and stored in multiple servers. We also consider the task of allowing a threshold proxy re-encryption, on behalf of the cloud client, to verify the integrity of the dynamic data stored in the cloud. Thus our mechanism improves the storage and security related problems. In addition, our mechanism also improves the security problem from unauthorized user by creating one time password with key generated to the data owner and this also provides dynamic data operations to data owner and privileged user.
Other Latest Articles
- Review on: Generation of Multimedia Answer by Gathering Web Information?
- SECURE CLOUD CONSISTENCY BASED ON SLA SYSTEM USING KPI?
- A Comparison Between Neighbour Discovery Protocols in Low Duty-Cycled Wireless Sensor Networks?
- An Approach for Efficient Way to Evaluate Statistical Source Anonymity in Wireless Sensor Network?
- Qualitative nature of a discrete predator-prey system
Last modified: 2015-02-28 02:00:11