Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 12, December 2015
Survey on EMI: Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Shilpa Singh, Padmavathi B.
To protect outsourced knowledge in cloud storage against corruptions, adding fault tolerance to cloud storage along with knowledge integrity checking and failure reparation becomes critical. Recently, create codes have gained quality due to their lower repair information measure whereas providing fault tolerance. Existing remote checking strategies for regenerating-coded knowledge only give non-public auditing, requiring knowledge house owners to continuously stay on-line and handle auditing, similarly as repairing, which is sometimes impractical. During this paper, we have a tendency to propose a public auditing theme for the regenerating-code-based cloud storage. To solve the regeneration drawback of unsuccessful authenticators in the absence of knowledge house owners, we have a tendency to introduce a proxy, which is privileged to regenerate the authenticators, into the normal public auditing system model. Moreover, we have a tendency to style a unique public verifiable appraiser that is generated by a few of keys and can be regenerated exploitation partial keys. Thus, our theme will completely unleash knowledge house owners from on-line burden. Additionally, we randomise the code coefficients with a pseudorandom operateto preserve knowledge privacy. Intensive security analysis shows that our theme is demonstrable secure beneath random oracle modeland experimental analysis indicates that our theme is very efficient and might be feasibly integrated into the regenerating code-based cloud storage.
Keywords: keys, codes
Edition: Volume 4 Issue 12, December 2015
Pages: 1111 - 1114
How to Cite this Article?
Shilpa Singh, Padmavathi B., "Survey on EMI: Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV15041202, Volume 4 Issue 12, December 2015, 1111 - 1114
102 PDF Views | 88 PDF Downloads
Similar Articles with Keyword 'keys'
Multilayered Security Approach for Cloud Data Centers using Hash Functions
Jashanpreet Pal Kaur, Rajbhupinder Kaur
A Survey on Deduplication Scheme in Cloud Storage
Efficient and Secure Auditing of Cloud Data with Key -Updating
Niranjana S, Manjusha M S
Data Transfer Based on Between the Node Coverge Area Using Diffe-Hellman Key Algorithm in Adhoc Network
T. Sankar, M. Prakash
Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image
Maulik P. Chaudhari, Neha Parmar
Similar Articles with Keyword 'codes'
Generating EAN-13 Standard Barcodes
Gowtham M N, Kanchana V
Improvised MATLAB Techniques and Applications in Image Processing
R. S. Aarthi
A Survey on Barcode Generation and Modulation Techniques
Vidyashree Kokane, Shyam Gupta
Survey On: Reversible Data Hiding in Encrypted JPEG Images
N. B. Pokale, Sanjivani S. Koli
A Survey on Public Auditing for Integrity Checking and Regenerating Faulty Data Block in Cloud Data Storage
Shamala M G, Rekha K B