ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Improved Data Integrity Protection Regenerating-Coding Based Cloud Storage

Journal: International Journal for Scientific Research and Development | IJSRD (Vol.3, No. 10)

Publication Date:

Authors : ; ; ; ;

Page : 956-957

Keywords : Cloud server; regenerating codes; public auditing; private auditing; proxy agent;

Source : Downloadexternal Find it from : Google Scholarexternal


In today�s world a huge amount of data is loaded on the cloud storage. The protection of such type of data is main concern. It is somewhat difficult to protect such data against corruption, checking the integrity of data and also representation of failure data. Together with this it is also critical to implement fault tolerance among such type of data against corruptions. The private auditing for regenerating codes which is nothing but the existing system, developed to address such types of problems. The private auditing for regenerating codes can generate codes for such corrupted and incomplete data, but for this, data owners always have to stay online for checking completeness as well as integrity of data. In this paper, we are introducing the public auditing technique for regenerating code, based on cloud storage. The proxy is the main component in public auditing to regenerate failed authenticators in the absence of owner of the data. A public verifiable authenticator is also designed, which is generated by a several keys and can be regenerate using partial keys. We are also using pseudorandom function to preserve data privacy by randomizing the encode coefficient. Thus our technique can successfully regenerate the failed authenticators without data owner. Experiment implementation also indicates that our scheme is highly efficient and can be used to regenerate code in cloud based storage.

Last modified: 2016-01-11 17:51:05