A Survey on Public Auditing for Integrity Checking and Regenerating Faulty Data Block in Cloud Data Storage
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 5 Issue 5, May 2016

A Survey on Public Auditing for Integrity Checking and Regenerating Faulty Data Block in Cloud Data Storage

Shamala M G, Rekha K B

To ensure outsourced information in distributed storage against debasements, adding adaptation to non-critical failure to distributed storage together with information honesty checking and disappointment reparation gets to be basic. As of late, recovering codes have picked up fame because of their lower repair transmission capacity while giving adaptation to non-critical failure. Existing remote checking techniques for recovering coded information just give private reviewing, requiring information proprietors to dependably stay online and handle evaluating, and in addition repairing, which is here and there unreasonable. In this paper, we propose an open reviewing plan for the recovering code-based distributed storage. To tackle the recovery issue of fizzled authenticators without information proprietors, we present an intermediary, which is advantaged to recover the authenticators, into the conventional open examining framework model. Besides, we plan a novel open evident authenticator, which is produced by a few keys and can be recovered utilizing incomplete keys. Hence, our plan can totally discharge information proprietors from online weight. Furthermore, we randomize the encode coefficients with a pseudo irregular capacity to protect information security. Broad security examination demonstrates that our plan is provable secure under arbitrary prophet model and test assessment shows that our plan is exceptionally effective and can be practically coordinated into their producing code-based distributed storage.

Keywords: Cloud storage, regenerating codes, public audit, privacy preserving, authenticator regeneration, proxy, privileged, provable secure

Edition: Volume 5 Issue 5, May 2016

Pages: 1092 - 1095

Share this Article

How to Cite this Article?

Shamala M G, Rekha K B, "A Survey on Public Auditing for Integrity Checking and Regenerating Faulty Data Block in Cloud Data Storage", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV163622, Volume 5 Issue 5, May 2016, 1092 - 1095

124 PDF Views | 96 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Cloud storage'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1939 - 1946

An Approach for Video Compression Technique for Efficient Data Backup and Recovery in Public Cloud

Nagaraj S Kolhar, Dr. Suvarna Nandyal

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2242 - 2246

Efficient and Secure Auditing of Cloud Data with Key -Updating

Niranjana S, Manjusha M S

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1812 - 1814

A Survey on Deduplication Scheme in Cloud Storage

Deepa.D, Revathi.M

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1845 - 1848

A Cloud Storage System for Preserving Privacy and Data Integrity of User

M. S. Tore, S. K. Sonkar

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1232 - 1234

A Review on Data Sharing Across Cloud Storage Using Key Aggregate Cryptosystem

Rashmi Khawale, Omprakash Tembhurne

Share this Article

Similar Articles with Keyword 'regenerating codes'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1092 - 1095

A Survey on Public Auditing for Integrity Checking and Regenerating Faulty Data Block in Cloud Data Storage

Shamala M G, Rekha K B

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1805 - 1807

A Survey on CloudNCFS: Building Network-Coding-Based Distributed Storage System

Pranjali A. Pali, N. D. Kale

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 5, May 2017

Pages: 1164 - 1168

Network Coding Based Cloud Storage Security for Enhancing Reliability

Pooja P. Patel, Brona A. Shah

Share this Article

Similar Articles with Keyword 'public audit'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 2058 - 2061

Privacy Preserved Public Auditing for Distributed Data

Anes P. A., Neethu Francis

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2124 - 2127

A Review on Privacy-Conserving Public Auditing for Shared Data in Cloud Computing, with a Focus on User Revocation

Mahesh Shinde, Y.B.Gurav

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1499 - 1502

Two Stage Public Auditing for Shared Data with Efficient User Revocation in the Cloud

Ajmy Abbas

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1989 - 1992

Privacy-Preservation and Public Auditing for Cloud Data - A Survey

S Archana, Ananthi J

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1204 - 1208

Privacy-Preserving Public Auditing for Secure Cloud Storage using ElGamal Public Key Encryption Algorithm

Rahul Vijay Badhe, Shriniwas Gadage

Share this Article

Similar Articles with Keyword 'privacy preserving'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1253 - 1257

Implementation Details of Anonymization of Sensitive Labels in Collaborative Data Publishing

Vandhana V

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1165 - 1168

Privacy Preserving Closed Frequent Pattern Mining

Anju Vijayan

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1757 - 1758

A Review of Privacy Clustered Mining of Association Rules in Distributed Databases

Vanita Babane, Shital K.Somawar

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1058 - 1060

Data Integrity Proof in Cloud Computing using TPA with Privacy Preserving

Rushikesh P. Dhanokar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 10, October 2016

Pages: 1345 - 1350

Security Methods for Privacy Preserving and Data Sharing Over Cloud Computing and Big Data Frameworks

Kapilesh S. Swami, Dr. P Sai Kiran

Share this Article

Similar Articles with Keyword 'proxy'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 878 - 881

Detection of Malicious Client based HTTP/DoS Attack on Web Server

Dhanya Jayan, Pretty Babu

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2982 - 2984

Protection of Server from Proxy Based HTTP Attacks

Poonam Uttam Patil, Y. V. Chavan

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1499 - 1502

Two Stage Public Auditing for Shared Data with Efficient User Revocation in the Cloud

Ajmy Abbas

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1644 - 1648

Survey on VANET Protocols and Security Techniques

Ashok Shivaji Dadali, Prof. Ram Joshi

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1092 - 1095

A Survey on Public Auditing for Integrity Checking and Regenerating Faulty Data Block in Cloud Data Storage

Shamala M G, Rekha K B

Share this Article

Similar Articles with Keyword 'privileged'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1092 - 1095

A Survey on Public Auditing for Integrity Checking and Regenerating Faulty Data Block in Cloud Data Storage

Shamala M G, Rekha K B

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1111 - 1114

Survey on EMI: Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage

Shilpa Singh, Padmavathi B.

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2900 - 2904

Privileged Cloud Storage By MaaS JuJu

Sarita Shankar Pol, S. V. Gumaste

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 974 - 976

Differentiating Identical Twins by Using Conditional Face Recognition Algorithms

Swati Y. Dhote, A. D. Gotmare, M. S. Nimbart

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 11 - 18

Anomaly Detection via Online Over-Sampling Principal Component Analysis

Pachunoori Naresh, Garine Bindu Madhavi

Share this Article

Similar Articles with Keyword 'provable secure'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 2451 - 2458

Regenerating Code Based on Public Auditing Scheme with Security Preserving for Cloud Storage

Dr. K. Sundeep Kumar, Anupama P. V

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1092 - 1095

A Survey on Public Auditing for Integrity Checking and Regenerating Faulty Data Block in Cloud Data Storage

Shamala M G, Rekha K B

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 862 - 866

Survey: Identity- Based Encryption in Cloud Computing

Madhavi Langute, H. A. Hingoliwala

Share this Article
Top