Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








5,753 Hits in 6.6 sec

Adjacency-Hash-Table Based Public Auditing for Data Integrity in Mobile Cloud Computing

Wenqi Chen, Hui Tian, Chin-Chen Chang, Fulin Nan, Jing Lu
2018 Wireless Communications and Mobile Computing  
In this paper, we propose a novel public auditing protocol based on the adjacency-hash table, where dynamic auditing and data updating are more efficient than those of the state of the arts.  ...  Moreover, with such an authentication structure, computation and communication costs can be reduced effectively.  ...  data auditing. (2) We introduce a novel dynamic structure, AHT, to save data properties for dynamic data auditing.  ... 
doi:10.1155/2018/3471312 fatcat:3yg2dygepndfrnvvjhgkjbpnve

A SURVEY: CLOUD COMPUTING SECURITY ISSUES AND TECHNIQUES

R. Ahila
2017 International Journal of Advanced Research in Computer Science  
In the recent years, auditing protocols for cloud storages has been proposed to deal the integrity problem of cloud data. This paper deals with different auditing protocols.  ...  Literature survey shows that the protocols are focused on different aspects such as dynamic data operations, privacy protection of the data, the high efficiency, the privacy protection of the identities  ...  The public auditing system of data storage security in cloud computing they implemented an efficient construction for the seamless integration of public auditability and data dynamics protocol [11] that  ... 
doi:10.26483/ijarcs.v8i7.4377 fatcat:yl7umbggmbeshbex4tbviak23a

Efficient and Secure Auditing of Cloud Data with Key -Updating

2016 International Journal of Science and Research (IJSR)  
Cloud storage auditing is the process of verifying the integrity of the data stored in public cloud.  ...  If secret key for auditing is exposed, most of the current auditing protocols become unable to work.  ...  The paper -An efficient and secure dynamic auditing protocol for data storage in cloud computing‖ by K. Yang and X. Jia mainly concentrated on the security issues arrived due to dynamic operations.  ... 
doi:10.21275/v5i5.nov163986 fatcat:qqf5okwjrnbafmp2cyaynffaye

Enabling Cloud Storage Auditing with Key Exposure Resistance

V. Goutham, B. Mounika, P. Shiva
2016 International Journal of Computer Applications  
Cloud storage auditing is viewed as an imperative service to corroborate the veracity of the data in public cloud.  ...  Formalized the definition and the security model of auditing protocol with key-exposure resilience and propose such a protocol.  ...  In contrast, the verification algorithm does not need a secret key from the auditor in an auditing protocol with public verifiability.  ... 
doi:10.5120/ijca2016910794 fatcat:vpvk7kuehvavrgigozwovbqkbi

Proficient Justification of Data Accuracy for Cloud Storage Using Dual Protection

Deepika. N, Durga. P, Gayathri. N, Murugesan. M
2019 International Journal of Scientific Research in Science and Technology  
More and more clients would like to keep their data to PCS (public cloud servers) along with the rapid development of cloud computing.  ...  Multiple verification tasks from different users can be performed efficiently by the auditor and the cloud-stored data can be updated dynamically.  ...  In this paper, we propose a novel public auditing mechanism for the integrity of shared data with efficient user revocation in mind.  ... 
doi:10.32628/ijsrst196250 fatcat:4b5txdyby5bbrirnxf2qu47zpu

Public Auditing for a Secure Cloud Storage using Dynamic Hash Table

2017 International Journal of Recent Trends in Engineering and Research  
In this paper we designed a public auditing scheme for securing data residing on cloud using dynamic hash table(DHT).DHT is a two dimensional data structures sited at a third party auditor(TPA) to keep  ...  track of data property information for dynamic auditing.  ...  preservation: TPA not allowed to learn actual content of users data stored in cloud storage Dynamic Hash Table It is an authentic and efficient data structure used to achieve dynamic auditing for cloud  ... 
doi:10.23883/ijrter.2017.3529.mmycv fatcat:6xftn43skfga3mjm3aowyzrl7u

Efficient Data Integrity Auditing Supporting Provable Data Update for Secure Cloud Storage

Changsong Yang, Bowen Song, Yong Ding, Jiangtao Ou, Chengyuan Fan, Junjuan Xia
2022 Wireless Communications and Mobile Computing  
Subsequently, on the basis of the Merkel sum hash tree (MSHT), we introduce an efficient outsourced data integrity auditing scheme.  ...  In this article, we primarily investigate the problem of efficient data integrity auditing supporting provable data update in cloud computing environment.  ...  Acknowledgments The authors would like to sincerely thank the anonymous referees for their very valuable time.  ... 
doi:10.1155/2022/5721917 fatcat:hkf3remrrrgtxgsuni4lxaziua

Comparison of Security and Performance Issues in Fog Enabled Cloud Computing

C. Nagarani, R. Kousalya
2018 International Journal of Computer Applications  
However, several challenges are addressed in fog computing in terms of security, authentication and authorization, privacy, revocation handling and data auditing techniques.  ...  Fog computing is a paradigm that extends the cloud computing and services to the edge of the network. Similar to services to end users.  ...  A novel public auditing scheme is proposed for secure cloud storage based on dynamic hash table (DHT), which is a new two-dimensional data structure located at a third parity auditor (TPA) to record the  ... 
doi:10.5120/ijca2018916511 fatcat:odewnt5xkneojezbx6663xt3ma

A Comprehensive Survey on Storage Techniques in Cloud Computing

Amol S.Choure, S. M. Bansode
2015 International Journal of Computer Applications  
work and then constructed a sophisticated public auditing scheme with a protocol that gives provision of dynamic data operation.  ...  Public Auditing with Complete Data Dynamics support In the previous work of ensuring remote data integrity there is deficiency of provision of public auditability and dynamic data operation.  ... 
doi:10.5120/21801-5109 fatcat:yq6bbpsrird4tbrjanpfxzqugq

A Blockchain-Based Public Auditing Protocol with Self-Certified Public Keys for Cloud Data

Hongtao Li, Feng Guo, Lili Wang, Jie Wang, Bo Wang, Chuankun Wu, Yinghui Zhang
2021 Security and Communication Networks  
This paper proposes a public auditing protocol with a self-certified public key system using blockchain technology.  ...  The chain structure of the block ensures the security of auditing data source.  ...  [21] designed a novel public auditing protocol based on a new dynamic structure to overcome the drawbacks in [18] . e proposed dynamic structure consists of a doubly linked info table and a location  ... 
doi:10.1155/2021/6623639 fatcat:xnj3x7nkpjd2leqjde5mxkbqeu

A Metadata Verification Scheme for Data Auditing in Cloud Environment

Muralikrishnan Ramane
2012 International Journal on Cloud Computing Services and Architecture  
In the process of avoiding such an access this work designs a well secured, novel verification scheme that allows the vulnerable third party to perform verification as well as ensures data privacy in cloud  ...  The notion on verifying data for intactness is termed as data auditing and the process is carried out by the client or by a third party auditor delegated by the client.  ...  ACKNOWLEDGEMENTS The authors would like to thank all those who have shared their valuable inputs, especially our students Sivaramakrishnan and Rilvana Begum, for their insights, suggestions and time throughout  ... 
doi:10.5121/ijccsa.2012.2405 fatcat:ucf33fn25vgbhaadbv5wl7xlmm

Public Integrity Checking for Dynamic Data Sharing among Multi Groups

2016 International Journal of Science and Research (IJSR)  
This paper concluded as, a efficient integrity auditing scheme for cloud data characterized by multi-user modification, public auditing, high error detection probability, efficient user revocation, resist  ...  For that a number of techniques have been proposed for data integrity auditing to ensure user's confidence of their shared data on cloud.  ...  We design a novel public auditing mechanism for the integrity of shared data with efficient user revocation.  ... 
doi:10.21275/v5i5.nov164000 fatcat:dke4i27ccrho7nwlo7cms2vexu

Efficient Audit Services for Data Outsourcing in Clouds

Anuraj C.K
2014 IOSR Journal of Computer Engineering  
We also propose an efficient approach based on probabilistic query and periodic verification for improving the performance of audit services.  ...  Constructed on interactive proof system (IPS) with the zero knowledge property, our audit service can provide public auditability without downloading raw data and protect privacy of the data.  ...  Acknowledgements I would like to take this opportunity for expressing our profound gratitude and deep regards to Mr. P.  ... 
doi:10.9790/0661-16662428 fatcat:n6c6stwusnenvfvx3i5ix5k5eu

AN EXTENSIVE REVIEW ON DATA INTEGRITY SCHEMES AND SECURITY ISSUES IN CLOUD PARADIGM

Hariharan R, Komarasamy G, Daniel Madan Raja S
2020 Zenodo  
Generally, internal entities are responsible for the theft data, this leads to audit the data integrity by the third party.  ...  Because of the massive complexities and size of the cloud there is been a threat all the time to the data from the internal and external entities.  ...  Employed a secure and an efficient protocol auditing enable dynamics of data for influencing the consumer that information are kept correctly in the cloud.  ... 
doi:10.5281/zenodo.3953775 fatcat:l2a5wvplynbknmh6x352wfrqzq

Secured Data Storage for RDPC Protocol with Enhanced TPA Auditing Scheme Using MHT in Cloud Computing
IJIREEICE - Electrical, Electronics, Instrumentation and Control

MS.N. ELAMATHI, B. SELVANAYAGI
2014 IJIREEICE  
And to enable dynamics of data MHT is used to find the location of each data operation in the RDPC protocol. it allow the third party auditor (TPA) to check the integrity of outsourced data. d.  ...  responsible for keeping the data available and accessible.but the security of cloud storage is always the focus of several potential cloud clients,and huge impact for its widespread application.  ...  Dynamic Auditing The auditing protocol should support the dynamic updates of the data in the cloud. 3 .  ... 
doi:10.17148/ijireeice.2014.21111 fatcat:735k3g5cavcmjhou7zsekffy64
« Previous Showing results 1 — 15 out of 5,753 results