A New approach for Regenerating Code Based Secure Cloud Storage Using Public Auditing

N. Venkatesh Naik, A. Ranjith Kumar, K. Praveena

Abstract


In cloud computing, data owners host their data on cloud servers and users can easily access the data from cloud servers. By way of data outsourcing, users can also be relieved from the burden of regional data storage and maintenance. However in view that of the large quantity of data on the cloud it increases privacy challenges against data loss and hacking. For earlier it makes use of regenerating code even as supplying fault tolerance towards data loss. However given that of the fault tolerance the data owner ought to continuously keep on-line to affirm the individual data. However challenges are providing integrity of the data. Public audit potential for cloud storage allows users to ask third party auditor (TPA) to determine the integrity of the data. To obtain answer for regeneration main issue of failed authenticators within the absence of data holders, we make a proxy, which is privileged to regenerate the authenticators, in the normal public auditing approach model. We also design a novel public verifiable authenticator, which is made by using some keys. Accordingly, this scheme can just about release data holders from online burden.

Key Words: Cloud Storage, regenerating codes , public auditing, privacy preserving, proxy.


Full Text:

PDF




Copyright (c) 2016 N. Venkatesh Naik, A. Ranjith Kumar, K. Praveena

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

 

All published Articles are Open Access at  https://journals.pen2print.org/index.php/ijr/ 


Paper submission: ijr@pen2print.org