M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 9, September 2015
Design and Implementation of Audit Cloud for Consistency in Cloud Computing
D. Veerabhadraiah, M. Revathi
, Cloud computing is a new computing paradigm that has been making strides to establish and serve the computing world in its own way. In fact cloud computing is the technology that enables individuals and organizations to gain access to huge amount of computing resource in pay per use fashion. It is complemented by virtualization technology in order to make the offerings affordable. Cloud is able to provide various services that are categorized into Platform as a Service (PaaS), Infrastructure as a Service (IaaS) and Software as a Service (SaaS). Cloud provides plethora of advantages that can avoid capital investment besides gaining access to services without geographical and time restrictions at affordable prices. It also provides many business opportunities and services. However, there is consistency problem in cloud due to replicas maintained in many servers. This is a challenging problem to be addressed. Based on the existing solution provided by Liu et al., in this paper we design and implement a consistency mechanism with algorithms for cloud data integrity and consistency. The proposed system takes care of various violations of data integrity with corrective measures. We also proposed a mechanism that takes care of consistency of data and overcome drawbacks of the previous approaches. We built a prototype application that demonstrates the proof of concept. The empirical results are encouraging.
Keywords: Index Terms Cloud computing, consistency, integrity, security
Edition: Volume 4 Issue 9, September 2015
Pages: 675 - 679
How to Cite this Article?
D. Veerabhadraiah, M. Revathi, "Design and Implementation of Audit Cloud for Consistency in Cloud Computing", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=9091502, Volume 4 Issue 9, September 2015, 675 - 679
23 PDF Views | 23 PDF Downloads
Similar Articles with Keyword 'consistency'
Object Detection and Pose Tracking In Augmented Reality
Vipul P.Chauhan, Dr. Manish M. Kayasth
A Novel Set Level Technique for Image Segmentation Using Fuzzy Clustering and Self Organizing Map Network
Nidhi Kaushal, Murlidhar Vishwakarma, Ravi Singh Pippal
Logo Detection and Recognition from the Images As Well As Videos
Meera Sambhaji Sawalkar, Mrunalinee Patole
Survey on Outlier Pattern Detection Techniques for Time-Series Data
Archana N., S. S. Pawar
Trusted Framework for Secured Information Storage over Cloud Environment
P. Pothuraju, Dasari Rajesh
Similar Articles with Keyword 'integrity'
Regenerating Code Based on Public Auditing Scheme with Security Preserving for Cloud Storage
Dr. K. Sundeep Kumar, Anupama P. V
A Cloud Storage System for Preserving Privacy and Data Integrity of User
M. S. Tore, S. K. Sonkar
Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage
Pranita Bakka, Dr. Jayashree Agarkhed
Public Auditing System with Auto-Data Recovery System on Cloud Scheme
Dhane Sachin V., Joshi P.
Public Integrity Checking for Dynamic Data Sharing among Multi Groups
Athulya Prabhakaran, Nithya VP
Similar Articles with Keyword 'security'
Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN
Rucha Agrawal, Simran Khiani
Optimizing the Ad-Hoc Applications in Vehicular Network: A Study
Sumeet Sekhon, Dinesh Kumar
Survey: Detection Schemes Against Selective Forwarding Attack
Harpal Singh, Vaibhav Pandey
Mobile Based Marketing System Using Privacy and Security Aware Location Based Rewarding System
Digvijay A. Patil, Yogesh B. Gurav
A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme
Rajshree Ambatkar, Purnima Selokar