CONFIDENTIALITY-MAINTAINING PUBLIC ASSESSING FOR RESTORING-CODE-BASED CLOUD STORAGE

P. Chandu, P. Prashanth Kumar

Abstract


Several techniques that deal with the sturdiness of outsourced data missing of local copy were recommended in many models up to now. Fliers and card printing of remote trying to find regenerating-coded information provide private auditing, necessitates data keepers to constantly stay web mange auditing. We introduce a apparent auditing method of regeneration-code-basis cloud storage. For solving regeneration impracticality of ineffective authenticators in inadequate data proprietors, we initiate a proxy, which regenerate authenticators, into established public auditing system representation. As opposed to direct improvement in fliers and card printing of public auditing towards multi-server setting, we advise novel authenticator, that's suitable for regenerating codes that's produced by means of several keys and they're regenerated by means of partial keys hence our method can totally make data owner’s burden free.


Keywords


Regenerating Codes; Proxy; Public Auditing; Cloud Storage; Multi-Server; Authenticator;

References


B. Chen, R. Curtmola, G. Ateniese, and R. Burns, “Remote data checking for network coding-based distributed storage systems,” in Proc. ACM Workshop Cloud Comput. Secur. Workshop, 2010, pp. 31–42.

A. G. Dimakis, K. Ramchandran, Y. Wu, and C. Suh, “A survey on network codes for distributed storage,” Proc. IEEE, vol. 99, no. 3, pp. 476–489, Mar. 2011.

H. Shacham and B. Waters, “Compact proofs of retrievability,” in Advances in Cryptology. Berlin, Germany: Springer-Verlag, 2008, pp. 90–107.

Y. Hu, H. C. H. Chen, P. P. C. Lee, and Y. Tang, “NCCloud: Applying network coding for the storage repair in a cloud-of-clouds,” in Proc. USENIX FAST, 2012, p. 21.

K. D. Bowers, A. Juels, and A. Oprea, “HAIL: A high-availability and integrity layer for cloud storage,” in Proc. 16th ACM Conf. Comput. Commun. Secur., 2009, pp. 187–198.

J. He, Y. Zhang, G. Huang, Y. Shi, and J. Cao, “Distributed data possession checking for securing multiple replicas in geographicallydispersed clouds,” J. Comput. Syst. Sci., vol. 78, no. 5, pp. 1345–1358, 2012.


Full Text: PDF

Refbacks

  • There are currently no refbacks.




Copyright © 2012 - 2021, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.