Privacy Preserving Public Auditing in Secured Cloud Storage

2012 ◽  
Vol 3 (3) ◽  
pp. 60-61
Author(s):  
V.Sajeev V.Sajeev ◽  
◽  
R.Gowthamani R.Gowthamani
2019 ◽  
Vol 9 (4) ◽  
pp. 1-20
Author(s):  
Syam Kumar Pasupuleti

Cloud storage allows users to store their data in the cloud to avoid local storage and management costs. Since the cloud is untrusted, the integrity of stored data in the cloud has become an issue. To address this problem, several public auditing schemes have been designed to verify integrity of the data in the cloud. However, these schemes have two drawbacks: public auditing may reveal sensitive data to verifier and does not address the data recovery problem efficiently. This article proposes a new privacy-preserving public auditing scheme with data dynamics to secure the data in the cloud based on an exact regenerated code. This scheme encodes the data for availability, then masks the encoded blocks with randomness for privacy of data and enables a public auditor to verify the integrity of the data. Further, this scheme also supports dynamic data updates. In addition, security and performance analysis proves that proposed scheme is provably secure and efficient.


Author(s):  
Syam Kumar Pasupuleti

Cloud storage allows users to store their data in the cloud to avoid local storage and management costs. Since the cloud is untrusted, the integrity of stored data in the cloud has become an issue. To address this problem, several public auditing schemes have been designed to verify integrity of the data in the cloud. However, these schemes have two drawbacks: public auditing may reveal sensitive data to verifier and does not address the data recovery problem efficiently. This article proposes a new privacy-preserving public auditing scheme with data dynamics to secure the data in the cloud based on an exact regenerated code. This scheme encodes the data for availability, then masks the encoded blocks with randomness for privacy of data and enables a public auditor to verify the integrity of the data. Further, this scheme also supports dynamic data updates. In addition, security and performance analysis proves that proposed scheme is provably secure and efficient.


2014 ◽  
Vol 40 (5) ◽  
pp. 1703-1713 ◽  
Author(s):  
Solomon Guadie Worku ◽  
Chunxiang Xu ◽  
Jining Zhao ◽  
Xiaohu He

2016 ◽  
Vol 43 (4) ◽  
pp. 497-508
Author(s):  
Mokryeon Baek ◽  
Dongmin Kim ◽  
Ik Rae Jeong

2013 ◽  
Vol 62 (2) ◽  
pp. 362-375 ◽  
Author(s):  
Cong Wang ◽  
Sherman S.M. Chow ◽  
Qian Wang ◽  
Kui Ren ◽  
Wenjing Lou

2014 ◽  
Vol 16 (4) ◽  
pp. 33-38 ◽  
Author(s):  
Salve Bhagyashri ◽  
◽  
Prof. Y.B Gurav

Sign in / Sign up

Export Citation Format

Share Document