Open Access Open Access  Restricted Access Subscription or Fee Access

Preserver Privacy Based On External Agent for Cloud Storage Using Repair Code

Geeta F. Nadlamani, Dr. Shabnam Shaikh

Abstract


Cloud storage is gaining popularity as it offers flexible service with appealing benefits of on-demand data outsourcing. Putting away files remotely instead of locally boasts an array of preferences for both home and professional clients. In this firstly, we are trying to secure all kind of private data into the cloud by providing security levels. Secondly, we are utilizing homomorphic authenticator based on public key integrated with random masking technique. In private auditing scheme for regenerated coded data there exist remote checking method, which includes users to stay online, perform auditing and repairing which is impractical. In order to avoid this, is used to resolve a problem of clients for being online full time. Further, enabled to perform an auditing for multi-user simultaneously and effectively.


Keywords


Cloud Storage, Proxy Server, Regenerating Code.

Full Text:

PDF

References


H. Chen and P. Lee, “Enabling data integrity protection in regenerating coding- based cloud storage: Theory and implementation,” IEEE Trans. Parallel and Distributed Systems, vol. 25, pp. 407–416, February 2014.

G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable data possession at untrusted stores,” in Proc. 14th ACM Conference Conf. Computer and Communications Security, New York, 2007, pp. 598–609.

Jia Yu, Kui Ren, Cong Wang and Vijay Varadharajan, “Enabling Cloud Storage Auditing With Key-Exposure Resistance,” IEEE Trans. Information Forensics and Security, vol. 10, pp. 1167–1179, June 2015.

C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-preserving public auditing for data storage security in cloud computing,” in Proc. IEEE Infocom, 2010, pp. 1–9.

Cong Wang, Sherman S.M. Chow, Qian Wang, Kui Ren, and Wenjing Lou, “Privacy-Preserving Public Auditing for Secure Cloud Storage,” IEEE Trans. Computers, vol. 62, pp. 362–375, February 2013.

Md Whaiduzzaman, Abdullah Gani, “Measuring Security for Cloud Service Provider: A Third Party Approach,” in International Conference on Electrical Information and Communication Technology, 2013.

Qin Liu, Guojun Wang and Jie Wu, “Consistency as a Service: Auditing Cloud Consistency,” IEEE Trans. Network and service management, vol. 11, pp. 25–35, March 2014.

G. Ateniese, R. Di Pietro, L. V. Mancini, and G. Tsudik, “Scalable and efficient provable data possession,” in Proc. 4th international conference on Security and privacy in communication networks, ACM, 2008, pp. 9.

F. Sebe, J. Domingo-Ferrer, A. Martinez-Balleste, Y. Deswarte, and J.-J. Quisquater, “Efficient remote data possession checking,” IEEE Trans. critical information infrastructures, vol. 20, pp. 1034–1038, August 2008.

K. Yang and X. Jia, “Data storage auditing service in cloud computing: Challenges, methods and opportunities,” in World Wide Web vol. 15, 2012, pp. 409–428.

Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, “Enabling public auditability and data dynamics for storage security in cloud computing” IEEE Trans. Parallel and Distributed Systems, vol. 22, pp. 847–859, May 2011.

Y. Dodis, S. Vadhan, and D. Wichs, “Proofs of retrievability via hardness amplification,” in Proc. 6th Theory Cryptogr Conf., 2009, pp. 109–127.

Mrs. R. Navajothi, Mr. S. Jean Adrien Fenelon, “AN EFFICIENT, DYNAMIC, PRIVACY PRESERVING PUBLIC AUDITING METHOD ON UNTRUSTED CLOUD STORAGE,” in ICICES2014 - S.A.Engineering College, Chennai, Tamil Nadu, India, 2014.

Boyang Wang, Baochun Li and Hui Li,, “Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud,” IEEE Trans. Cloud computing, vol. 2, pp. 43–56, January–March 2014.

C. Wang, Q. Wang, K. Ren, and W. Lou, “Towards secure and dependable storage services in cloud computing,” IEEE Trans. Service Computing, vol. 5, pp. 220–232, May2012.

A. G. Dimakis, P. B. Godfrey, Y. Wu, M. J. Wainwright, and K. Ramchandran, “Network coding for distributed storage systems,” IEEE Trans. Information Theory, vol. 56, pp. 4539–4551, September2010.

Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, “Enabling public verifiability and data dynamics for storage security in cloud computing,” in Computer Security–ESORICS 2009, Springer, 2009, pp. 355–370.

S. Goldwasser, S. Micali, and R. Rivest, “A digital signature scheme secure against adaptive chosen message attacks,” in SIAM Journal of Computing, vol. 17, pp. 281–308, 1988.




DOI: http://dx.doi.org/10.36039/AA072016002.

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.