To Ensure Data Possession of Multiple Auditing In The Distributed Storage System Using TPA
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 11
Abstract
In view of the large size of the outsourced data and the user’s inhibited resource capability the tasks of auditing the data correctness in a cloud environment can be frightening and expensive for the cloud users. Users may not want to go through the difficulty in verifying the data integrity. Besides there may be more than one user accesses the same cloud storage say in an enterprise setting. For easier management it is enviable that cloud only entertains verification request from a single designated party. It is of vital importance to enable public auditing service for cloud data storage so that users may resort to an independent third-party auditor (TPA) to audit the outsourced data when needed. The TPA who has expertise and capabilities that users do not and can periodically check the integrity of all the data stored in the cloud on behalf of the users which provides a much more easier and affordable way for the users to ensure their storage correctness in the cloud.
Authors and Affiliations
P Amaravathi, V Josephraju, M. Mani Deepika
Contribution of Information Sharing In Wireless Sensor Network
The widespread availability of miniature wireless devices such as cell phones, laptops, mobiles has become an indispensable part of our life. The increase in the number of smart phone users has lead to the increase i...
Fuzzy Logic Based Contrast Image Enhancement Technique
Image Enhancement is one of the most important and difficult techniques in image research. Many images like satellite images, medical images, aerial images and even real life photographs may suffer from poor contrast...
Design and Implementation of GSM based Irrigation System Using ARM7
The developed system is a machine based system, which automates the irrigation of land by combining various software and hardware approaches together to find exact field information and to provide instant across the...
Biometric Security Techniques For IRIS Recognition System
Iris recognition is an automated method of biometric identification that uses mathematical patternrecognition techniques on video images of the irides of an individual's eyes, whose complex random patterns are unique...
A Review – OFDM-RoF (Radio over Fiber) System for Wireless Network
In future generation wireless and mobile communication system must be increase with high quality bandwidth service for inaccessible area. The recent wireless network providers require high transmission bandwidth with...