ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Secure Erasure Code-Based Privacy-Preserving Public Auditing System?

Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.4, No. 2)

Publication Date:

Authors : ; ; ; ;

Page : 284-292

Keywords : Public auditing; privacy-preserving; shared data; proxy re-encryption; secure erasure code; cloud computing;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centres, where the management of the data and services may not be fully trustworthy. This work studies the problem of ensuring the integrity of data storage in Cloud Computing. Several mechanisms have been used for privacy preserving of shared data in the cloud but these may fail to end the direct server attacks and other similar attacks. In these mechanisms data is stored only in one server. In this project, we ensure the integrity of the remote data in the cloud. We divide the data into blocks and thus we exploit the shared key generation algorithm which create key for each block and these blocks are encrypted and stored in multiple servers. We also consider the task of allowing a threshold proxy re-encryption, on behalf of the cloud client, to verify the integrity of the dynamic data stored in the cloud. Thus our mechanism improves the storage and security related problems. In addition, our mechanism also improves the security problem from unauthorized user by creating one time password with key generated to the data owner and this also provides dynamic data operations to data owner and privileged user.

Last modified: 2015-02-28 02:00:11