Third Party Auditing for Data Sharing in Cloud via Key Encryption

Sathavelli Sindhu, M. Omprakash

Abstract


Customers can outsource data without the burden of regional data storage and upkeep. In Cloud computing, clients should be in a position to use cloud storage without annoying about the have to determine it’s integrity. So enabling public auditability for Cloud data storage should have valuable significance.So clients can use outside audit occasion to verify the integrity of data in Cloud Storage. Utilising third  party Auditor(TPA) for checking integrity of data, the users or data owners must no longer need to keep online and the clients are be fear-free. For using TPA the auditing process will have to provide security to cloud storage. As a result TPA preserves to user data privacy.   The regeneration code provide fault tolerance with low restore bandwidth. In regeneration coded data, there exists remote checking process offering confidential auditing, which involves data owners to stay online, which is impractical . To preclude this, public auditing scheme for regenerating code is proposed, proxy is used to solve drawback of regeneration concern used to generate failed authenticator in public auditing approach. This scheme eliminates data owners from online burden.


Keywords


Cloud computing, Public Auditing, Data integrity, privacy-preserving.

Full Text:

PDF




Copyright (c) 2016 Edupedia Publications Pvt Ltd

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

 

All published Articles are Open Access at  https://journals.pen2print.org/index.php/ijr/ 


Paper submission: ijr@pen2print.org