Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014
Privacy-Preserving Public Auditing for Secure Cloud Storage using ElGamal Public Key Encryption Algorithm
Rahul Vijay Badhe, Shriniwas Gadage
The Cloud registering is a most recent engineering which gives different administrations through web. The Cloud server permits client to store their data on a cloud without stressing over accuracy & trustworthiness of data. Cloud data stockpiling has numerous preferences over nearby data stockpiling. Client can transfer their data on cloud and can get to those data at whatever time anyplace without any extra load. The User doesn't need to stress over capacity and support of cloud data. Anyway as data is put away at the remote place how clients will get the affirmation about put away data. Henceforth Cloud data stockpiling ought to have some system which will determine capacity rightness and respectability of data put away on a cloud. The real issue of cloud data stockpiling is security. Numerous specialists have proposed their work or new calculations to accomplish security or to resolution this security issue. In this paper, we propose a safe cloud storage framework supporting protection safeguarding open reviewing. We further augment our result to empower the TPA to perform reviews for numerous clients all the while and effectively. Broad security and execution investigation demonstrate the proposed plans are provably secure and very effective.
Keywords: Privacy Preserving, Public Auditing, TPA, Security, HLA, HRA
Edition: Volume 3 Issue 12, December 2014
Pages: 1204 - 1208
How to Cite this Article?
Rahul Vijay Badhe, Shriniwas Gadage, "Privacy-Preserving Public Auditing for Secure Cloud Storage using ElGamal Public Key Encryption Algorithm", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB14519, Volume 3 Issue 12, December 2014, 1204 - 1208
122 PDF Views | 95 PDF Downloads
Similar Articles with Keyword 'Privacy Preserving'
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1253 - 1257Implementation Details of Anonymization of Sensitive Labels in Collaborative Data Publishing
Vandhana V
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1165 - 1168Privacy Preserving Closed Frequent Pattern Mining
Anju Vijayan
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 651 - 653Watermark Detection for Security of Multimedia Data through MPC Privacy of Multimedia Data on the Cloud
Ujwala Pawar, Dhara Kurian
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 1757 - 1758A Review of Privacy Clustered Mining of Association Rules in Distributed Databases
Vanita Babane, Shital K.Somawar
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1058 - 1060Data Integrity Proof in Cloud Computing using TPA with Privacy Preserving
Rushikesh P. Dhanokar
Similar Articles with Keyword 'Public Auditing'
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015
Pages: 2058 - 2061Privacy Preserved Public Auditing for Distributed Data
Anes P. A., Neethu Francis
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 1989 - 1992Privacy-Preservation and Public Auditing for Cloud Data - A Survey
S Archana, Ananthi J
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2124 - 2127A Review on Privacy-Conserving Public Auditing for Shared Data in Cloud Computing, with a Focus on User Revocation
Mahesh Shinde, Y.B.Gurav
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1499 - 1502Two Stage Public Auditing for Shared Data with Efficient User Revocation in the Cloud
Ajmy Abbas
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1204 - 1208Privacy-Preserving Public Auditing for Secure Cloud Storage using ElGamal Public Key Encryption Algorithm
Rahul Vijay Badhe, Shriniwas Gadage
Similar Articles with Keyword 'TPA'
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1058 - 1060Data Integrity Proof in Cloud Computing using TPA with Privacy Preserving
Rushikesh P. Dhanokar
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015
Pages: 2058 - 2061Privacy Preserved Public Auditing for Distributed Data
Anes P. A., Neethu Francis
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1944 - 1949A Review of Privacy Protection of Cloud Storage and Steganography Techniques
Alok Ranjan, Mansi Bhonsle
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 3, March 2014
Pages: 815 - 819An Approach for Secure Data Storage Services in Cloud Computing
S. Srinivas, Martha Sheshikala, Duvvada Rajeswara Rao
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1709 - 1712A Business Framework for Securing Data Storage over Cloud Environment using ECC Crypto System
Nara Venkata Surendra Reddy, DLS Reddy
Similar Articles with Keyword 'Security'
Research Paper, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021
Pages: 700 - 705Virtual Augmented Reality Application and Research in Police Station Management System with Security Aspects
Kale Jyoti S
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2786 - 2790Survey: Detection Schemes Against Selective Forwarding Attack
Harpal Singh, Vaibhav Pandey
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1380 - 1382A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme
Rajshree Ambatkar, Purnima Selokar
Research Paper, Computer Science & Engineering, China, Volume 9 Issue 4, April 2020
Pages: 1544 - 1554Recent Developments on Probabilistic Graphical Model Applied in Data Analysis
Kan'Sam Nadjak, Guisheng Yin
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2406 - 2408Optimizing the Ad-Hoc Applications in Vehicular Network: A Study
Sumeet Sekhon, Dinesh Kumar
Similar Articles with Keyword 'HLA'
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1204 - 1208Privacy-Preserving Public Auditing for Secure Cloud Storage using ElGamal Public Key Encryption Algorithm
Rahul Vijay Badhe, Shriniwas Gadage
Research Paper, Computer Science & Engineering, Tanzania, Volume 4 Issue 1, January 2015
Pages: 2512 - 2517Drivers of Electronic Commerce (e-commerce) among Small and Medium Tourist Enterprises (SMTEs) in Tanzania
Alberto Gabriel Ndekwa
Similar Articles with Keyword 'HRA'
Research Paper, Computer Science & Engineering, India, Volume 7 Issue 8, August 2018
Pages: 1298 - 1301Prevention and Detection of Sensitive Information Exposure by Advanced Context Based Data Mining Techniques
Shubham Pampattiwar
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016
Pages: 1304 - 1307A Survey Paper on Mining Keywords Using Text Summarization Extraction System for Summary Generation over Multiple Documents
Parmar Paresh B., Ketan Patel
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1204 - 1208Privacy-Preserving Public Auditing for Secure Cloud Storage using ElGamal Public Key Encryption Algorithm
Rahul Vijay Badhe, Shriniwas Gadage
Research Paper, Computer Science & Engineering, Bangladesh, Volume 3 Issue 6, June 2014
Pages: 2403 - 2405Instant Bangla Speech to Text Conversion
Nazia Hossain, Dilruba Shareen, Tarin Kazi
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 1414 - 1418Sentimate Analysis for Web Product Ranking
Shinde Swati Anandrao, Kale N.D.