Privacy Preserving Audit Of Data Storage In Cloud
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 9
Abstract
Cloud computing is the deliverance of computing as a service rather than a product. It gives shared resources, information to computers, softwares and other devices over a set of connections. Cloud computing is the extended vision of computing as a service, where data owners can tenuously store their data in the cloud to enjoy on-demand high-quality applications and services from a public pool of configurable total resources. While data outsourcing mitigates the owners of the load of local data storage and preservation, it also reduces their physical control of storage dependability and security, which conventionally has been expected by both enterprises and individuals with high servicelevel requirements. In order to make possible quick use of cloud data storage service and get back security declarations with outsourced data reliability, well-organized methods that facilitate on-demand data accuracy verification on behalf of cloud data holders have to be designed. The proposed technique publicly auditable cloud data storage is capable to help this emerging cloud economy become fully recognized. With public audit ability, a trusted person with proficiency and abilities data owners do not acquires can be delegated as an outside audit party to review the risk of outsourced data when required. Such an auditing service not only assists save data owners’ computation resources but also provides a apparent yet cost-effective method for data owners to gain trust in the cloud. We describe move toward and system necessities that should be brought into thought, and the challenges that need to be resolved for such publicly auditable secure cloud storage service to become a reality.
Authors and Affiliations
G. Pravallika, P. Chakradhar, A. Rajyalakshmi, Ch. Anil Babu
Design Of Virtual Sense Technology For System Interface
A gesture-based human computer interaction can make computers and devices easier to use, such as by allowing people to control the application on windows by moving their hands through the air. Existing solutions have...
Public Transportation Management Service using GPS-GSM
Transportation management service includes vehicle tracking & security system by embedding of an electronic device in a vehicle, or fleet of vehicles, with purpose-designed computer software to enable the owner or a...
Accurately Computing Aggregates Using Synopsis Diffusion Framework
The communication wounded resultant from node and transmission failures, which are frequent in WSNs, can unfavorably affect tree-based aggregation approaches. To address this dilemma, we can make use of multi-path ro...
An Overview: Peak To Power Average Ratio reduction by Discrete Cosine Transform Selective Mapping
The OFDM is employed in many systems. The main the drawback of the OFDM systems is the high Peak to Power Average Ratio [PAPR].This paper deals with the basic idea of PAPR .The paper also describe in brief the differ...
Local Sharing of Multiple Torrents in Peer to Peer System
The rapid growth traffic of Peer-toPeer applications, especially BitTorrent, is putting a lot of pressure to Internet Service Providers. In this paper, we examine the existence of the locality through a large-scale hy...