PRIVACY-PRESERVING FOR A SECURE DATA STORAGE ON CLOUD USING PUBLIC AUDITING TECHNIQUE

被引:0
作者
Suryawanshi, Akash Udaysinh [1 ]
Naveenkumar, J. [1 ]
机构
[1] BharatVidyapeeth Deemed Be Univ, Dept Comp Engn, Coll Engn, Pune, Maharashtra, India
关键词
Cloud Computing; Cryptography; Data integrity; Privacy-Preserving; Third-party public auditing etc;
D O I
暂无
中图分类号
Q5 [生物化学]; Q7 [分子生物学];
学科分类号
071010 ; 081704 ;
摘要
In this paper, we describe the data security term as more important on the cloud, for the efficiently access control mechanism of information to preserve it. The data accessing mechanism are a very important method present in the cloud storage, so the data outsourcing is authorized on the cloud server for verification of information or various unauthorized users. Basically, cloud computing is utilized in request processing of data and access that request for preserving information. Cloud is used for putting away information it may be shared by various users. All time it is not possible to access all information and verify reliability, so is proposed to contain TPA to confirm the correctness of shared facts of that system. Data Security is done authentication of that the TPA could not obtain client's knowledge from the information captured along with the verification of inspecting process. However, for the security reviewing process of that shared information, to preserve the identification of user remaining part is the open challenge. This paper proposes the system for security preserving so as to permit reviewing the information of clients for common information access in cloud storage. These systems focus on the verification of information is necessary for auditing to check the correctness of common information. The reliability of this mutual information of the TPA can verify secretly without retrieving whole information. The Final output achieved through this experiment proves the capacity of this executed system while reviewing shared information
引用
收藏
页码:111 / 115
页数:5
相关论文
共 9 条
[1]  
Boyang W, 2012, IEEE IEEE INT C COMP, P124
[2]   Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage: Theory and Implementation [J].
Chen, Henry C. H. ;
Lee, Patrick P. C. .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (02) :407-416
[3]  
Ghutugade KB, 2016, 2016 INTERNATIONAL CONFERENCE ON COMPUTING, ANALYTICS AND SECURITY TRENDS (CAST), P300, DOI 10.1109/CAST.2016.7914984
[4]   TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage [J].
Li, Wei ;
Xue, Kaiping ;
Xue, Yingjie ;
Hong, Jianan .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2016, 27 (05) :1484-1496
[5]   Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud [J].
Liu, Xuefeng ;
Zhang, Yuqing ;
Wang, Boyang ;
Yan, Jingbo .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2013, 24 (06) :1182-1191
[6]  
Pearson S., 2013, PRIVACY SECURITY CLO, P3, DOI DOI 10.1007/978-1-4471-4189-1
[7]  
Wang B, 2013, 2013 IEEE INTERNATIONAL WORKSHOP ON ELECTROMAGNETICS (IWEM): APPLICATIONS AND STUDENT INNOVATION COMPETITION, P124, DOI 10.1109/iWEM.2013.6888788
[8]  
Wang C, 2010, IEEE INFOCOM SER, DOI 10.1109/PEDG.2010.5545769
[9]   Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing [J].
Yu, Shucheng ;
Wang, Cong ;
Ren, Kui ;
Lou, Wenjing .
2010 PROCEEDINGS IEEE INFOCOM, 2010,