ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login


Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.6, No. 6)

Publication Date:

Authors : ; ;

Page : 96-102

Keywords : Tessy Vincent*; Mrs.Krishnaveni.V.V;

Source : Downloadexternal Find it from : Google Scholarexternal


Cloud computing is gaining more popularity because of its guaranteed services like online data storage and backup solutions, Web-based e-mail services, virtualized infrastructure etc. User is allowed to access the data stored in a cloud anytime, anywhere using internet connected device with low cost. To provide security to outsourced data in cloud storage against various corruptions, adding fault tolerance to cloud storage together with data integrity checking and failure reparation becomes critical. Existing methods for remote regenerating-coded data checking only provide private auditing, which requires data owners to always stay online and do auditing, as well as repairing, which is sometimes difficult and impractical. Here proposes a public auditing scheme for the regenerating-code-based cloud storage in which data is splitted and encrypted before outsourcing. To solve the regeneration problem of corrupted files in the absence of data owners, a proxy is introduced, which have the right to regenerate the files. This scheme can release data owners completely from online burden. The cloud server is used only to save the encrypted blocks of data. In addition, the encode coefficients are randomized with a random function to preserve data privacy

Last modified: 2017-06-06 19:22:14