Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 12, December 2015
Survey on EMI: Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Shilpa Singh, Padmavathi B.
To protect outsourced knowledge in cloud storage against corruptions, adding fault tolerance to cloud storage along with knowledge integrity checking and failure reparation becomes critical. Recently, create codes have gained quality due to their lower repair information measure whereas providing fault tolerance. Existing remote checking strategies for regenerating-coded knowledge only give non-public auditing, requiring knowledge house owners to continuously stay on-line and handle auditing, similarly as repairing, which is sometimes impractical. During this paper, we have a tendency to propose a public auditing theme for the regenerating-code-based cloud storage. To solve the regeneration drawback of unsuccessful authenticators in the absence of knowledge house owners, we have a tendency to introduce a proxy, which is privileged to regenerate the authenticators, into the normal public auditing system model. Moreover, we have a tendency to style a unique public verifiable appraiser that is generated by a few of keys and can be regenerated exploitation partial keys. Thus, our theme will completely unleash knowledge house owners from on-line burden. Additionally, we randomise the code coefficients with a pseudorandom operateto preserve knowledge privacy. Intensive security analysis shows that our theme is demonstrable secure beneath random oracle modeland experimental analysis indicates that our theme is very efficient and might be feasibly integrated into the regenerating code-based cloud storage.
Keywords: keys, codes
Edition: Volume 4 Issue 12, December 2015
Pages: 1111 - 1114
How to Cite this Article?
Shilpa Singh, Padmavathi B., "Survey on EMI: Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV15041202, Volume 4 Issue 12, December 2015, 1111 - 1114
Similar Articles with Keyword 'keys'
Multilayered Security Approach for Cloud Data Centers using Hash Functions
Jashanpreet Pal Kaur, Rajbhupinder Kaur
Efficient and Secure Auditing of Cloud Data with Key -Updating
Niranjana S, Manjusha M S
Similar Articles with Keyword 'codes'
An Analysis on Voice Assistant
PAPR Reduction in OFDM System using Clipping and Filtering based new Hybrid VLM Pre-Coded SLM
Muneeb Manzoor Bhat, Preeti Sondhi