Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 12, December 2015
Survey on EMI: Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Shilpa Singh, Padmavathi B.
To protect outsourced knowledge in cloud storage against corruptions, adding fault tolerance to cloud storage along with knowledge integrity checking and failure reparation becomes critical. Recently, create codes have gained quality due to their lower repair information measure whereas providing fault tolerance. Existing remote checking strategies for regenerating-coded knowledge only give non-public auditing, requiring knowledge house owners to continuously stay on-line and handle auditing, similarly as repairing, which is sometimes impractical. During this paper, we have a tendency to propose a public auditing theme for the regenerating-code-based cloud storage. To solve the regeneration drawback of unsuccessful authenticators in the absence of knowledge house owners, we have a tendency to introduce a proxy, which is privileged to regenerate the authenticators, into the normal public auditing system model. Moreover, we have a tendency to style a unique public verifiable appraiser that is generated by a few of keys and can be regenerated exploitation partial keys. Thus, our theme will completely unleash knowledge house owners from on-line burden. Additionally, we randomise the code coefficients with a pseudorandom operateto preserve knowledge privacy. Intensive security analysis shows that our theme is demonstrable secure beneath random oracle modeland experimental analysis indicates that our theme is very efficient and might be feasibly integrated into the regenerating code-based cloud storage.
Keywords: keys, codes
Edition: Volume 4 Issue 12, December 2015
Pages: 1111 - 1114
How to Cite this Article?
Shilpa Singh, Padmavathi B., "Survey on EMI: Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV15041202, Volume 4 Issue 12, December 2015, 1111 - 1114
102 PDF Views | 88 PDF Downloads
Similar Articles with Keyword 'keys'
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2394 - 2397Multilayered Security Approach for Cloud Data Centers using Hash Functions
Jashanpreet Pal Kaur, Rajbhupinder Kaur
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1812 - 1814A Survey on Deduplication Scheme in Cloud Storage
Deepa.D, Revathi.M
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016
Pages: 2242 - 2246Efficient and Secure Auditing of Cloud Data with Key -Updating
Niranjana S, Manjusha M S
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017
Pages: 1758 - 1764Data Transfer Based on Between the Node Coverge Area Using Diffe-Hellman Key Algorithm in Adhoc Network
T. Sankar, M. Prakash
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1525 - 1529Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image
Maulik P. Chaudhari, Neha Parmar
Similar Articles with Keyword 'codes'
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1307 - 1309Generating EAN-13 Standard Barcodes
Gowtham M N, Kanchana V
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 749 - 750Improvised MATLAB Techniques and Applications in Image Processing
R. S. Aarthi
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 2002 - 2005A Survey on Barcode Generation and Modulation Techniques
Vidyashree Kokane, Shyam Gupta
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1130 - 1132Survey On: Reversible Data Hiding in Encrypted JPEG Images
N. B. Pokale, Sanjivani S. Koli
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016
Pages: 1092 - 1095A Survey on Public Auditing for Integrity Checking and Regenerating Faulty Data Block in Cloud Data Storage
Shamala M G, Rekha K B