Privacy preserving public auditing system for data storage security in Cloud Computing
| International Journal of Computer Trends and Technology (IJCTT) | |
© - April Issue 2013 by IJCTT Journal | ||
Volume-4 Issue-4 | ||
Year of Publication : 2013 | ||
Authors :G.RajaMohan, K.VenkataRaju |
G.RajaMohan, K.VenkataRaju"Privacy preserving public auditing system for data storage security in Cloud Computing"International Journal of Computer Trends and Technology (IJCTT),V4(4):828-832 April Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.
Abstract: -The cloud computing is the fastest upward idea in IT activity. In That IT environment have realized that the cloud computing is going to be the newest topic in the field of IT. Cloud Computing reduces cost by allocation computing and storage resources, complex with an on demand provisioning mechanism relying on a pay per use business model.TPA should be able to efficiently audit the cloud data storage without demanding the local copy of data, and introduce no additional on-line burden to the cloud user. Specifically, our contribution in this work can be summarized as the following aspects: Stimulate the public auditing system of data storage security in Cloud Computing and provide a privacy-preserving auditing protocol, i.e., our proposal supports an external auditor to audit user’s outsourced data in the cloud without learning information on the data content. In Our scheme is the first to support scalable and capable public auditing in the Cloud Computing. In exacting, our scheme achieves batch auditing where several delegated auditing tasks from different users can be performed concurrently by the TPA.
References-
[1] C.Wang, Q.Wang, K. Ren, and W. Lou, “Ensuring data storage security in cloud computing,” in Proc. of IWQoS’09, July 2009,pp. 1–9.
[2]C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-preserving public auditing for storage security in cloud computing,” in Proc. of IEEE INFOCOM’10, San Diego, CA, USA, March 2010.
[3] Q. Wang, C. Wang, J. Li, K.Ren, and W. Lou, “Enabling public veri?ability and data dynamics for storage security in cloud computing,” in Proc. of ESORICS’09, volume 5789 of LNCS. Springer Verlag, Sep. 2009, pp. 355–370.
[4]. M. A. Shah, R. Swaminathan, and M. Baker, “Privacy preserving audit and extraction of digital contents,” Cryptology ePrint Archive, Report 2008/186, 2008.
[5].Q. Wang, C. Wang, J. Li, K.Ren, and W. Lou, “Enabling public verifiability and data dynamics for storage security in cloud computing,” in Proc. Of ESORICS’09, volume 5789 of LNCS Springer-Verlag, Sep. 2009, pp. 355–370.
Keywords — Data storage, privacy-preserving, public audit ability, cryptographic protocol, cloud computing.