Enhancing Data Storage Integrity in Cloud Environment by mitigating Repudiation using CS-MPNR
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 3
Abstract
Cloud computing is envisioned as the next generation architecture of IT organisation. It makes the users need of their data to be available wherever they are. Although recent emerging technology Cloud has many striking features, it also has some security dreads. So the users find it difficult to trust the providers who store their data. The vulnerabilities in Cloud storage lead to some loopholes for the attackers to snatch the data and modify or delete it. Data to be secure such as medical reports, industrial files, and other personal and important data should be protected enough from the repudiation problems to maintain Data integrity. To overcome these challenges, a novel new CS-MPNR [Chaining Signature-Multi Party Non Repudiation] protocol is proposed, which is a method that uses Chaining Signature [CS] acting as a link of signature to have a follow up of the chained users and lessens the Disputation. For the need of challenging the providers and also to have fairness during the transaction of data, TTP (Trusted Third Party) is allowed, which reduces the users work of checking the data completeness. Not only it reduces repudiation problem, it also maintains and upholds Data Integrity. Performance evaluation shows that the computational time is reduced with provable security
Authors and Affiliations
Meena S, , Esther Daniel, , Dr. N. A. Vasanthi
Performance Analysis of AODV and DSDV in Simulation Based Map
In recent days Inter-Vehicle communication has fascinated many research communities and automotive industries .With the introduction of inter-vehicle communication it would be possible for vehicles to communicate...
Mining on Medicine Data
In this paper, we propose an approach for Mining as well as data clustering, we have taken some medical data set we not only able to find out the disease detail as well as clustering. Cluster analysis itself is not...
Anomaly Detection using Support Vector Machine
Support vector machine are among the most well known supervised anomaly detection technique, which are very efficient in handling large and high dimensional dataset. SVM, a powerful machine method developed from statisti...
Determination of Noise Levels in Using AMS Features of Noisy Speech Signal and Their Comparison
Great difficulty in recognizing speech is under a noisy background. The signal to noise ratio plays a very important role in speech recognition techniques. The signal to noise ratio is the ratio of the signal estim...
Position based Routing Protocols for Wireless Ad hoc Networks: A Critical Survey
A Mobile Ad-hoc Network is a collection of wireless nodes that cooperatively form a network in the absence of any infrastructure or administration. In this paper we present an overview of position based routing protocols...