Survey on EMI: Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 12, December 2015

Survey on EMI: Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage

Shilpa Singh, Padmavathi B.

To protect outsourced knowledge in cloud storage against corruptions, adding fault tolerance to cloud storage along with knowledge integrity checking and failure reparation becomes critical. Recently, create codes have gained quality due to their lower repair information measure whereas providing fault tolerance. Existing remote checking strategies for regenerating-coded knowledge only give non-public auditing, requiring knowledge house owners to continuously stay on-line and handle auditing, similarly as repairing, which is sometimes impractical. During this paper, we have a tendency to propose a public auditing theme for the regenerating-code-based cloud storage. To solve the regeneration drawback of unsuccessful authenticators in the absence of knowledge house owners, we have a tendency to introduce a proxy, which is privileged to regenerate the authenticators, into the normal public auditing system model. Moreover, we have a tendency to style a unique public verifiable appraiser that is generated by a few of keys and can be regenerated exploitation partial keys. Thus, our theme will completely unleash knowledge house owners from on-line burden. Additionally, we randomise the code coefficients with a pseudorandom operateto preserve knowledge privacy. Intensive security analysis shows that our theme is demonstrable secure beneath random oracle modeland experimental analysis indicates that our theme is very efficient and might be feasibly integrated into the regenerating code-based cloud storage.

Keywords: keys, codes

Edition: Volume 4 Issue 12, December 2015

Pages: 1111 - 1114

Share this Article

How to Cite this Article?

Shilpa Singh, Padmavathi B., "Survey on EMI: Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV15041202, Volume 4 Issue 12, December 2015, 1111 - 1114

102 PDF Views | 88 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'keys'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2394 - 2397

Multilayered Security Approach for Cloud Data Centers using Hash Functions

Jashanpreet Pal Kaur, Rajbhupinder Kaur

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1812 - 1814

A Survey on Deduplication Scheme in Cloud Storage

Deepa.D, Revathi.M

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2242 - 2246

Efficient and Secure Auditing of Cloud Data with Key -Updating

Niranjana S, Manjusha M S

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017

Pages: 1758 - 1764

Data Transfer Based on Between the Node Coverge Area Using Diffe-Hellman Key Algorithm in Adhoc Network

T. Sankar, M. Prakash

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1525 - 1529

Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image

Maulik P. Chaudhari, Neha Parmar

Share this Article

Similar Articles with Keyword 'codes'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1307 - 1309

Generating EAN-13 Standard Barcodes

Gowtham M N, Kanchana V

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 749 - 750

Improvised MATLAB Techniques and Applications in Image Processing

R. S. Aarthi

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2002 - 2005

A Survey on Barcode Generation and Modulation Techniques

Vidyashree Kokane, Shyam Gupta

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1130 - 1132

Survey On: Reversible Data Hiding in Encrypted JPEG Images

N. B. Pokale, Sanjivani S. Koli

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1092 - 1095

A Survey on Public Auditing for Integrity Checking and Regenerating Faulty Data Block in Cloud Data Storage

Shamala M G, Rekha K B

Share this Article
Top