Open Access Open Access  Restricted Access Subscription or Fee Access

Multi-Cloud Storage Image Control Reliability and Obliging Provable Data and Confirmation

G.S.R. Yogaraja, Eshwari Devi Jagapur

Abstract


Data integrity is very important while storing few data in multi-cloud. Distributed cloud storage is the method of storing the data in obliging provable data for the reliability confirmation. this paper  proposes the integrity of data while storing  distribute cloud this technique improve can improves overall enterprise performance by avoiding vender lock-in for customers to minimize the computation cost this technique also reduces cost while computation is reflected in performance analysis.


Keywords


Storage Security, Provable Data Possession, Visual Cryptography, Steganography, Multiple Cloud, Cooperative.

Full Text:

PDF

References


Basappa B. Kodada, Gaurav Prasad, Alwyn R. Pais, “Protection against DDoS and Data Modification Attack in Computational Grid Cluster Environment”, MECS Publisher – IJCNIS 2012, ISSN: 2074-9090 (Print), ISSN: 2074-9104 (Online), Vol. 4, No. 7, July 2012

Banerjee (2009) provides an overview of technological researches performed in HP labs, and a cloud-scale intelligent infrastructure attracts.

Grossman et a1, (2009) developed a cloud-based infrastructure which had been optimized for wide area,performance networks and supported necessary data mining

Praveena& Betsy, (2009) provided a comprehensive introduction to Praveena, K., & Betsy T.(2009).www.academia.edu/.../877-0428_Effective_use_of_cloud_computing

Grossman et a1, (2009) developed a cloud-based infrastructure which had been optimized for wide area, performance networks and supported necessary data mining.www.academia.edu/.../877-0428_Effective_use_of_cloud_computing_in

Delic & Riley (2009) assessed the current state of the Enterprise Knowledge would turn into a more global, dependable and efficient infrastructure namely cloudwww.academia.edu/.../877-0428_Effective_use_of_cloud_computing_in...

K. D. Bowers, A. Juels, and A. Oprea, “Hail: a high-availability and integrity layer for cloud storage,” in ACM Conference on Computer and Communications Security, E. AlShaer, S. Jha, and A. D. Keromytis, Eds. ACM, 2009, pp. 187–198

M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “Above the clouds: A berkeley view of cloud computing,” EECS Department, University of California, Berkeley, Tech. Rep.,

Y. Dodis, S. P. Vadhan, and D. Wichs, “Proofs of retrievability via hardness amplification,” in TCC, ser. Lecture Notes in Computer Science, O. Reingold, Ed., vol. 5444. Springer, 2009, pp. 109–127.

G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, “Scalable and efficient provable data possession,” in Proceedings of the 4th international conference on Security and privacy in communication netowrks, SecureComm, 2008, pp. 1–10.

H. Shacham and B. Waters, “Compact proofs of retrievability,” in ASIACRYPT, ser.Lecture Notes in Computer Science, J. Pieprzyk, Ed., vol. 5350. Springer, 2008, pp. 90

G. Ateniese, R. C. Burns, R. Curtmola, J. Herring, L. Kissner, Z. N. J. Peterson, and D. X. Song, “Provable data possession at untrusted stores,” in ACM Conference on Computer and Communications Security, P. Ning, S. D. C. di Vimercati, and P. F. Syverson, Eds. ACM, 2007, pp. 598–609

A. Juels and B. S. K. Jr., “Pors: proofs of retrievability for large files,” in ACMConference on Computer and Communications Security, P. Ning, S. D. C. di Vimercati, and P. F. Syverson, Eds. ACM, 2007, pp. 584–597.

D. Boneh and M. Franklin, “Identity-based encryption from the weil pairing,” in Advances in Cryptology (CRYPTO’2001), vol. 2139 of LNCS, 2001, pp. 213–229

O. Goldreich, Foundations of Cryptography: Basic Tools. Cambridge University

L. Fortnow, J. Rompel, and M. Sipser, “On the power of multiprover interactive protocols,” in Theoretical Computer Science, 1988, pp. 156–161.




DOI: http://dx.doi.org/10.36039/AA032016003.

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.