Privacy-Preserving Public Auditing for Secure Cloud Storage using ElGamal Public Key Encryption Algorithm
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014

Privacy-Preserving Public Auditing for Secure Cloud Storage using ElGamal Public Key Encryption Algorithm

Rahul Vijay Badhe, Shriniwas Gadage

The Cloud registering is a most recent engineering which gives different administrations through web. The Cloud server permits client to store their data on a cloud without stressing over accuracy & trustworthiness of data. Cloud data stockpiling has numerous preferences over nearby data stockpiling. Client can transfer their data on cloud and can get to those data at whatever time anyplace without any extra load. The User doesn't need to stress over capacity and support of cloud data. Anyway as data is put away at the remote place how clients will get the affirmation about put away data. Henceforth Cloud data stockpiling ought to have some system which will determine capacity rightness and respectability of data put away on a cloud. The real issue of cloud data stockpiling is security. Numerous specialists have proposed their work or new calculations to accomplish security or to resolution this security issue. In this paper, we propose a safe cloud storage framework supporting protection safeguarding open reviewing. We further augment our result to empower the TPA to perform reviews for numerous clients all the while and effectively. Broad security and execution investigation demonstrate the proposed plans are provably secure and very effective.

Keywords: Privacy Preserving, Public Auditing, TPA, Security, HLA, HRA

Edition: Volume 3 Issue 12, December 2014

Pages: 1204 - 1208

Share this Article

How to Cite this Article?

Rahul Vijay Badhe, Shriniwas Gadage, "Privacy-Preserving Public Auditing for Secure Cloud Storage using ElGamal Public Key Encryption Algorithm", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB14519, Volume 3 Issue 12, December 2014, 1204 - 1208

122 PDF Views | 95 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Privacy Preserving'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1253 - 1257

Implementation Details of Anonymization of Sensitive Labels in Collaborative Data Publishing

Vandhana V

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1165 - 1168

Privacy Preserving Closed Frequent Pattern Mining

Anju Vijayan

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 651 - 653

Watermark Detection for Security of Multimedia Data through MPC Privacy of Multimedia Data on the Cloud

Ujwala Pawar, Dhara Kurian

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1757 - 1758

A Review of Privacy Clustered Mining of Association Rules in Distributed Databases

Vanita Babane, Shital K.Somawar

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1058 - 1060

Data Integrity Proof in Cloud Computing using TPA with Privacy Preserving

Rushikesh P. Dhanokar

Share this Article

Similar Articles with Keyword 'Public Auditing'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 2058 - 2061

Privacy Preserved Public Auditing for Distributed Data

Anes P. A., Neethu Francis

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1989 - 1992

Privacy-Preservation and Public Auditing for Cloud Data - A Survey

S Archana, Ananthi J

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2124 - 2127

A Review on Privacy-Conserving Public Auditing for Shared Data in Cloud Computing, with a Focus on User Revocation

Mahesh Shinde, Y.B.Gurav

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1499 - 1502

Two Stage Public Auditing for Shared Data with Efficient User Revocation in the Cloud

Ajmy Abbas

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1204 - 1208

Privacy-Preserving Public Auditing for Secure Cloud Storage using ElGamal Public Key Encryption Algorithm

Rahul Vijay Badhe, Shriniwas Gadage

Share this Article

Similar Articles with Keyword 'TPA'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1058 - 1060

Data Integrity Proof in Cloud Computing using TPA with Privacy Preserving

Rushikesh P. Dhanokar

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 2058 - 2061

Privacy Preserved Public Auditing for Distributed Data

Anes P. A., Neethu Francis

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1944 - 1949

A Review of Privacy Protection of Cloud Storage and Steganography Techniques

Alok Ranjan, Mansi Bhonsle

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 3, March 2014

Pages: 815 - 819

An Approach for Secure Data Storage Services in Cloud Computing

S. Srinivas, Martha Sheshikala, Duvvada Rajeswara Rao

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1709 - 1712

A Business Framework for Securing Data Storage over Cloud Environment using ECC Crypto System

Nara Venkata Surendra Reddy, DLS Reddy

Share this Article

Similar Articles with Keyword 'Security'

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021

Pages: 700 - 705

Virtual Augmented Reality Application and Research in Police Station Management System with Security Aspects

Kale Jyoti S

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Research Paper, Computer Science & Engineering, China, Volume 9 Issue 4, April 2020

Pages: 1544 - 1554

Recent Developments on Probabilistic Graphical Model Applied in Data Analysis

Kan'Sam Nadjak, Guisheng Yin

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Similar Articles with Keyword 'HLA'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1204 - 1208

Privacy-Preserving Public Auditing for Secure Cloud Storage using ElGamal Public Key Encryption Algorithm

Rahul Vijay Badhe, Shriniwas Gadage

Share this Article

Research Paper, Computer Science & Engineering, Tanzania, Volume 4 Issue 1, January 2015

Pages: 2512 - 2517

Drivers of Electronic Commerce (e-commerce) among Small and Medium Tourist Enterprises (SMTEs) in Tanzania

Alberto Gabriel Ndekwa

Share this Article

Similar Articles with Keyword 'HRA'

Research Paper, Computer Science & Engineering, India, Volume 7 Issue 8, August 2018

Pages: 1298 - 1301

Prevention and Detection of Sensitive Information Exposure by Advanced Context Based Data Mining Techniques

Shubham Pampattiwar

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1304 - 1307

A Survey Paper on Mining Keywords Using Text Summarization Extraction System for Summary Generation over Multiple Documents

Parmar Paresh B., Ketan Patel

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1204 - 1208

Privacy-Preserving Public Auditing for Secure Cloud Storage using ElGamal Public Key Encryption Algorithm

Rahul Vijay Badhe, Shriniwas Gadage

Share this Article

Research Paper, Computer Science & Engineering, Bangladesh, Volume 3 Issue 6, June 2014

Pages: 2403 - 2405

Instant Bangla Speech to Text Conversion

Nazia Hossain, Dilruba Shareen, Tarin Kazi

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1414 - 1418

Sentimate Analysis for Web Product Ranking

Shinde Swati Anandrao, Kale N.D.

Share this Article
Top