Implementation of TPA and Data Integrity in Cloud Computing using RSA Algorithm
Journal Title: INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY - Year 2014, Vol 12, Issue 2
Abstract
Cloud infrastructure has been envisioned as the next-generation construction of IT Initiative. It passages the application software and databases to the integrated large data hubs, where the administration of the data and services may not be fully trustworthy. This exceptional prototype brings about many new security challenges, which have not been well unwritten. This work studies the problem of ensuring the integrity of data storage in Cloud Computing. In certain, we consider the task of allowing a trusted third party (TPA), on behalf of the cloud client, to verify the data integrity of the data stored in the cloud server. By using TPA we eliminate the involvement of the cloud client through the auditing of whether his data integrity 0f stored data in the cloud server is to be sure integral. The support for data changing aspects via the most general forms of data operation, such as text modification, insertion and deletion, is also a significant step toward practicality, since services in Cloud Computing are not limited to archive or backup data only. While previous works on ensuring remote data integrity often lacks the support of either public auditability or dynamic data operations, but our work can be succeeds in both steps both. In this we first identify the difficulties and possible security problems of direct extensions with fully dynamic data updates from previous works and then show how to construct a smart verification scheme for the unified integration of these two outstanding features in our design. In particular, to achieve effective data dynamics, we improve the current proof of storage models by manipulating block tag authentication. To support efficient handling of multiple auditing tasks, we further explore the technique of signature to extend our main result into a multi-user setting, where TPA can perform multiple auditing tasks simultaneously. Extensive security and performance analysis show that the proposed schemes are highly efficient and provably secure.
Authors and Affiliations
Mr. Vinay Tila Patil , Prof. Gajendra Singh Chandel
Feature Extraction Using Empirical Mode Decomposition of Speech Signal
Speech signal carries information related to not only the message to be conveyed, but also about speaker, language, emotional status of speaker, environment and so on. Speech is produced by exciting the time varyin...
Multiple Lecture Video Annotation and Conducting Quiz Using Random Tree Classification
In the modern days, the institutes of education are showing more interest in the field of E-Learning or in the field of internet based educational services. The growth of video lecture annotation tools also plays an esse...
Z – Source Inverter for Fuel Cells
This paper presents a Z-source converter also known as impedance-source (or impedance-fed) power converter and its control method for implementing dc-to-ac, ac-to-dc, ac-to-ac, and dc-to-dc power conversion. The Z-...
A Comparison of Decision Tree Algorithms For UCI Repository Classification
The development of decision tree algorithms have been used for industrial, commercial and scientific purpose. However, the choice of the most suitable algorithm becomes increasingly difficult. In this paper, we pre...
A VLSI Implementation of Three-Lift Controller Based on Verilog
The high growth of the semiconductor industry over the past two decades has put Very Large Scale Integration in demand all over the world. The basics of digital logic theory and techniques are easily understood by the de...