An Approach for Distributed Data Possession in Multi-Cloud using SelCSP
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Downloads: 125

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 6 Issue 1, January 2017

An Approach for Distributed Data Possession in Multi-Cloud using SelCSP

Shaikh Rahil Ahemad, Lalit Dole

The important concept in the cloud storage is checking integrity in the remote data. It can provide the user with verification of the outsourced user files without downloading the complete data. There are some situations in which user needs their files to be kept on multiple cloud servers, so as to provide security and better prediction of cloud servers. The ID-DPDP (identity-based distributed provable data possession) enhance model for checking remote data integrity in multiple clouds. The proposed model can provide various levels of verifications. The ECC (Elliptic Curve Cryptography) algorithm is used for generating keys and symmetric encryption algorithm for encryption of data and the corrupted files concept is introduced in our system also for enhancing the security of the system use the SelCSP (Select Cloud Service Provider) is done. Which will check the authenticity of cloud service provider will also collect the user feedbacks on various cloud service providers weather the cloud service provider is malicious or trustworthy

Keywords: Cloud computing, ID-DPDP, Select Cloud Service Provider, symmetric encryption algorithm, Elliptic Curve Cryptography

Edition: Volume 6 Issue 1, January 2017

Pages: 1862 - 1865

Share this Article

How to Cite this Article?

Shaikh Rahil Ahemad, Lalit Dole, "An Approach for Distributed Data Possession in Multi-Cloud using SelCSP", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20164501, Volume 6 Issue 1, January 2017, 1862 - 1865

Enter Your Email Address




Similar Articles with Keyword 'Cloud computing'

Downloads: 180 | Monthly Hits: ⮙2

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Downloads: 99

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 8, August 2013

Pages: 71 - 73

Cloud Computing and Its Types in Mobile Network

Palak Jain

Share this Article

Downloads: 99

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2394 - 2397

Multilayered Security Approach for Cloud Data Centers using Hash Functions

Jashanpreet Pal Kaur, Rajbhupinder Kaur

Share this Article

Downloads: 99

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1939 - 1946

An Approach for Video Compression Technique for Efficient Data Backup and Recovery in Public Cloud

Nagaraj S Kolhar, Dr. Suvarna Nandyal

Share this Article

Downloads: 99

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2242 - 2246

Efficient and Secure Auditing of Cloud Data with Key -Updating

Niranjana S, Manjusha M S

Share this Article

Similar Articles with Keyword 'symmetric encryption algorithm'

Downloads: 109 | Monthly Hits: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1844 - 1847

A Providing Security on Cloud Data Hadoop using Symmetric Encryption and Identity Authentication

Kale Rohitkumar Bhausaheb, R.L.Paikrao

Share this Article

Downloads: 125

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 6 Issue 1, January 2017

Pages: 1862 - 1865

An Approach for Distributed Data Possession in Multi-Cloud using SelCSP

Shaikh Rahil Ahemad, Lalit Dole

Share this Article

Similar Articles with Keyword 'Elliptic Curve Cryptography'

Downloads: 103

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2223 - 2228

Survey on Wireless Sensor Network for Message Authentication and Source Privacy

Vaishali Kisanrao Gulhane, S. N. Shelke

Share this Article

Downloads: 107 | Weekly Hits: ⮙4 | Monthly Hits: ⮙10

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1235 - 1237

Single Sign-on Secure Password Mechanism for Distributed Computer Networks

Deepali M. Devkate, N. D. Kale

Share this Article

Downloads: 111

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2086 - 2089

Comparatively Study of ECC and Jacobian Elliptic Curve Cryptography

Anagha P. Zele, Avinash P. Wadhe

Share this Article

Downloads: 115

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1884 - 1890

Enhancing Data Security Using Elliptic Curve Cryptography in Cloud Computing

Depavath Harinath

Share this Article

Downloads: 121

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 6 Issue 5, May 2017

Pages: 2058 - 2060

Considering Geo-Scattered Big Data in Progressed Schema of Map Reduce

Ashwini R S, Geetha.N.B

Share this Article



Top