Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








4,953 Hits in 4.5 sec

Survey of Integrity Verification in Cloud-Storage Using Various Techniques
English

Sheela.K, Sivasri.S
2015 International Journal of Innovative Research in Computer and Communication Engineering  
In cloud computing, an enormous amount of data is stored every day. Many organizations are now migrated to cloud and demand for resource is growing.  ...  Though the providers are provide enough security there are still many security issues happening in cloud. This survey paper presents integrity verification of client data using various techniques.  ...  From the two points, propose a novel remote data integrity checking model: ID-DPDP (identity-based distributed provable data possession) in multi-cloud storage.  ... 
doi:10.15680/ijircce.2015.0303029 fatcat:6mwh7he7rfbildpt4fbouwlru4

Multi copy dynamic data in cloud Computing

Dr Gowaramma Y P
2017 International Journal for Research in Applied Science and Engineering Technology  
And there is rapid increase of organization opting for outsourcing data to remote cloud service provider.  ...  In this paper, we are trying to propose a map-based provable multi copy dynamic data possession (MB-PMDDP) scheme that has the respective features: The customers will have an proof that the services provider  ...  An Efficient & Secure Protocol For Data Storage In Cloud There are few existing remote integrity checking methods which serves static data and cannot be applied to the report service since the data in  ... 
doi:10.22214/ijraset.2017.4169 fatcat:2ilriteuhfhwvgq4ab4y3vzvyi

Secured Data Storage for RDPC Protocol with Enhanced TPA Auditing Scheme Using MHT in Cloud Computing
IJIREEICE - Electrical, Electronics, Instrumentation and Control

MS.N. ELAMATHI, B. SELVANAYAGI
2014 IJIREEICE  
Cloud computing enables vastly scalable services consumed over the Internet.Cloud storage is a model of data storage where the digital data is stored in logical pools.These cloud storage providers are  ...  And to enable dynamics of data MHT is used to find the location of each data operation in the RDPC protocol. it allow the third party auditor (TPA) to check the integrity of outsourced data. d.  ...  REMOTE DATA POSSESSION CHECKING PROTOCOL Remote data possession checking is a topic that focuses on how to frequently, efficiently and securely verify that a storage server can faithfully store its client's  ... 
doi:10.17148/ijireeice.2014.21111 fatcat:735k3g5cavcmjhou7zsekffy64

A Review on Identity-Based Proxy Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud

Mangala L, Rajendra A B
2014 IJARCCE  
This protocol will notice delegate checking, private checking, public checking. A. CONCRETE ID-PUIC PROTOCOL This protocol based on 4 methods: 1.  ...  PCS (public cloud server): is an entity which handle valid storage capacity and computational resources to preserve the clients data. 3.  ...  In order to overcome the victimization, proposed a ID-PUIC protocol. ID-PUIC protocol is a novel proxy oriented data uploading and remote data integrity checking model in public cloud, intended to B.  ... 
doi:10.17148/ijarcce.2017.64153 fatcat:pjduvzcf4fg33mhk427yorc47a

A Novel Approach for Data Uploading and Remote Data Integrity Checking Based On Public Key Cryptography

K.Lakshmi Ragini, V.Rani Mounika, K. Sandeep
2017 International Journal of Advanced engineering Management and Science  
From the security problems we propose "A NOVEL APPROACH FOR DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKING BASED ON PUBLIC KEY CRYPTOGRAPHY" (ANDURIC-PKC).  ...  New security problems need to be solved to give intact to the client data available in the cloud. Client has to feel that their outsourced data is in the protected way in the cloud.  ...  ANDRIC-PKC may be a novel proxy-oriented data uploading and remote knowledge integrity checking model in public cloud.  ... 
doi:10.24001/ijaems.3.4.9 fatcat:xz2zox4fc5bi3fvynbmrw7lggy

Automated Identity based Approach to Verify Data Possession in Public Cloud

Pooja G.Natu, Shikha Pachouly
2015 International Journal of Computer Applications  
As clients no longer have physical control of data, outsourced data integrity checking is of crucial importance in cloud storage.  ...  As the verification is to be done at client end, the integrity checking protocol must be efficient to save client's time.  ...  The remote data possession checking (RDPC) is a primarily designed to address the data integrity checking issue in company environment.  ... 
doi:10.5120/21824-5076 fatcat:qrzzv4irofe4neosqjqbhb426q

ID Based Data Integrity Checking in Public Cloud

Pooja G. Natu, Shikha Pachouly
2015 International Journal Of Scientific Research And Education  
As clients no longer have physical control of data, outsourced data integrity checking is of crucial importance in cloud storage.  ...  As the verification is to be done at client end, the integrity checking protocol must be efficient to save client's time.  ...  The remote data possession checking (RDPC) is a primarily designed to address the data integrity checking issue in company environment.  ... 
doi:10.18535/ijsre/v3i701 fatcat:zcilv7urlnbd7pdfiwgdomqhxa

A Survey on Remote Data Integrity Checking in PCS with ID-Based Proxy minded Record Uploading

2017 International Journal of Recent Trends in Engineering and Research  
record uploading and remote data integrity checking in public cloud (identity-PUIC).  ...  However, remote data integrity checking is additionally an crucial security problem in public cloud garage.  ...  SIGNIFICANCE OF REMOTE DATA INTEGRITY CHECKING IN PUBLIC CLOUD Remote Data-integrity assurance techniques go a long way in making a computer system secure.  ... 
doi:10.23883/ijrter.2017.3103.r1y1n fatcat:ldryknv4evd33okgj2ty2u5jaq

A Metadata Verification Scheme for Data Auditing in Cloud Environment

Muralikrishnan Ramane
2012 International Journal on Cloud Computing Services and Architecture  
In the process of avoiding such an access this work designs a well secured, novel verification scheme that allows the vulnerable third party to perform verification as well as ensures data privacy in cloud  ...  The architecture shifts data, applications and development environments to large data centers thereby providing storage, software and platform services online.  ...  Remote Data Checking Using Provable Data Possession This paper [16] introduces a model for provable data possession that can be used for remote data checking.  ... 
doi:10.5121/ijccsa.2012.2405 fatcat:ucf33fn25vgbhaadbv5wl7xlmm

Proficient Justification of Data Accuracy for Cloud Storage Using Dual Protection

Deepika. N, Durga. P, Gayathri. N, Murugesan. M
2019 International Journal of Scientific Research in Science and Technology  
A novel public verification scheme for cloud storage using in distinguishability obfuscation, which requires a lightweight computation on the auditor and delegate most computation to the cloud.  ...  The cloud security is one of the essential roles in cloud, here we can preserve our data into cloud storage.  ...  From the two points, wepropose a novel remote data integrity checking model: ID-DPDP (identity-based distributed provable data possession) in multi-cloud storage.  ... 
doi:10.32628/ijsrst196250 fatcat:4b5txdyby5bbrirnxf2qu47zpu

Proxy Provable Data Possession in Public Clouds

Huaqun Wang
2013 IEEE Transactions on Services Computing  
From the two points, a novel distant information uprightness checking model is proposed, which is called as DPDP Distributed Provable Data Possession [8] . The replica and refuge sculpt are known.  ...  Isolated information truthfulness examination is of critical significance in cloud store room [2] .  ...  [6] Remote data integrity checking is important part while using cloud storage. [20]Cloud stores the data on multicloud servers.  ... 
doi:10.1109/tsc.2012.35 fatcat:d4zxobkzancrlhqmlqrskxab3i

EFFICIENT DATA INTEGRITY AND AUDITING IN CLOUD BY USING BLOCK CHAIN

Prof Chethan Raj C, Shivani M S, Sowjanya D R, Sowmya M T, Tejaswini D R
2020 International Journal of Innovative Research in Computer Science & Technology  
The main aim of this paper is to discuss the usage of cloud storage services, enabling individuals to store their information in the cloud and keep away from the local data storage and maintenance expense  ...  Numerous data integrity auditing systems have been implemented to guarantee the quality of the data stored in the cloud.  ...  ACKNOWLEDGMENT I thank our mentor Prof.Chethan Raj C for analyzing the data and advised on all aspects related to cloud storage, data integrity auditing, the other concept and validated the experimental  ... 
doi:10.21276/ijircst.2020.8.4.9 fatcat:5375uqbzungm3opqzjkv7fhw5i

Efficient and Secure Auditing of Cloud Data with Key -Updating

2016 International Journal of Science and Research (IJSR)  
Cloud storage auditing is the process of verifying the integrity of the data stored in public cloud.  ...  Also develop a novel authenticator construction for forward security and the property of blockless verifiability.  ...  The existing remote data possession checking (RDPC) protocols have been designed in the PKI (public key infrastructure) setting.  ... 
doi:10.21275/v5i5.nov163986 fatcat:qqf5okwjrnbafmp2cyaynffaye

A Survey on Data Integrity Methods in Cloud Storage

Anil Kumar G., A. S. Poornima
2018 European Journal of Engineering and Technology Research  
In spite of these benefits, the major problem with data storage is that there is no guarantee of data consistency and integrity, which has become a major hurdle for using the services offered by cloud.  ...  Now days IT industries are outsourcing their data by storing it remotely in cloud for reducing the load on local storage there by reducing the hardware, software and maintenance cost.  ...  This overview presumes that taking into account the document size and static or element information record plan can be secured the outsourced information in the cloud server.  ... 
doi:10.24018/ejeng.2016.1.5.131 fatcat:en5xbk7hmrgrfh6lpsl2w65yte

NC-Audit: Auditing for network coding storage

Anh Le, Athina Markopoulou
2012 2012 International Symposium on Network Coding (NetCod)  
We propose NC-Audit -a remote data integrity checking scheme, designed specifically for network codingbased storage cloud.  ...  Independently, another body of work has proposed integrity checking schemes for cloud storage, none of which, however, is customized for network coding storage or can efficiently support repair.  ...  CONCLUSION In this paper, we propose NC-Audit, a remote data integrity checking scheme for NC-based storage cloud.  ... 
doi:10.1109/netcod.2012.6261901 dblp:conf/netcod/LeM12 fatcat:eh33zmlopna2zpvhwfiphnkfly
« Previous Showing results 1 — 15 out of 4,953 results