International Journal of Advances in Computer Science and Cloud Computing (IJACSCC)
.
Follow Us On :
current issues
Volume-11,Issue-2  ( Nov, 2023 )
Statistics report
Apr. 2024
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 20
Paper Published : 176
No. of Authors : 459
  Journal Paper


Paper Title :
Third Party Auditing System For Cloud Storage

Author :Prajakta R. Amrutkar, Hemlata R. Gosavi, Sagar A. Kathe, Roma G. Sheha, Tejaswini R. Shinde

Article Citation :Prajakta R. Amrutkar ,Hemlata R. Gosavi ,Sagar A. Kathe ,Roma G. Sheha ,Tejaswini R. Shinde , (2014 ) " Third Party Auditing System For Cloud Storage " , International Journal of Advances in Computer Science and Cloud Computing (IJACSCC) , pp. 66-70, Volume-2,Issue-2

Abstract : Cloud computing is the long dreamed vision of computing as a utility, where users can remotely store their data into the cloud so as to enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources. By data outsourcing, users can be relieved from the burden of local data storage and maintenance. However, the fact that users no longer have physical possession of the possibly large size of outsourced data makes the data integrity protection in Cloud computing a very challenging and potentially formidable task, especially for users with constrained computing resources and capabilities. Thus, enabling public auditability for cloud data storage security is of critical importance so that users can resort to an external audit party to check the integrity of outsourced data when needed. To securely introduce an effective third party auditor (TPA), the following two fundamental requirements have to be met: 1) TPA should be able to efficiently audit the cloud data storage without demanding the local copy of data, and introduce no additional on-line burden to the cloud user; 2) The third party auditing process should not bring in no new vulnerabilities towards user data privacy. In this paper, we uniquely combine the public key algorithm for generating integrity checker to achieve the privacy-preserving public cloud data auditing system, which meets all above requirements. We further extend our result to enable the TPA to perform audit for multiple users simultaneously and efficiently. Extensive security and performance analysis shows the proposed schemes are provably secure and highly efficient.

Type : Research paper

Published : Volume-2,Issue-2


DOIONLINE NO - IJACSCC-IRAJ-DOIONLINE-1430   View Here

Copyright: © Institute of Research and Journals

| PDF |
Viewed - 81
| Published on 2014-11-01
   
   
IRAJ Other Journals
IJACSCC updates
IJACSCC Volume-11,Issue-2(Nov, 2023)
The Conference World

JOURNAL SUPPORTED BY


Warning: include(footer.php): failed to open stream: No such file or directory in /home/dakhinaray/public_html/ITRESEARCH_WEBSTE/IRAJ.IN/journal/IJACSCC/paper_detail.php on line 842

Warning: include(): Failed opening 'footer.php' for inclusion (include_path='.:/opt/alt/php56/usr/share/pear:/opt/alt/php56/usr/share/php') in /home/dakhinaray/public_html/ITRESEARCH_WEBSTE/IRAJ.IN/journal/IJACSCC/paper_detail.php on line 842