Shaik Salma, S.Suresh Babu


Several techniques that deal with the durability of outsourced data missing of local copy were recommended in many models up to now. Traditional techniques of remote searching for regenerating-coded information provide private auditing, necessitates data entrepreneurs to constantly stay on the web and mange auditing. We introduce a wide open auditing method of regeneration-code-basis cloud storage. For fixing regeneration impracticality of ineffective authenticators in inadequate data entrepreneurs, we initiate a proxy, which regenerate authenticators, into established public auditing system representation. Rather than direct improvement in traditional techniques of public auditing towards multi-server setting, we advise novel authenticator, that's suitable for regenerating codes that is produced by means of several keys and so are regenerated by means of partial keys hence our method can totally make data owner’s burden free.


Regenerating Codes; Proxy; Public Auditing; Cloud Storage; Multi-Server; Authenticator


G. Ateniese, R. Di Pietro, L. V. Mancini, and G. Tsudik, “Scalable and efficient provable data possession,” in Proc. 4th Int. Conf. Secur. Privacy Commun. Netw., 2008, Art. ID 9.

C. Erway, A. Küpçü, C. Papamanthou, and R. Tamassia, “Dynamic provable data possession,” in Proc. 16th ACM Conf. Comput. Commun. Secur., 2009, pp. 213–222.

Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, “Enabling public verifiability and data dynamics for storage security in cloud computing,” in Computer Security. Berlin, Germany: Springer-Verlag, 2009, pp. 355–370.

B. Chen, R. Curtmola, G. Ateniese, and R. Burns, “Remote data checking for network coding-based distributed storage systems,” in Proc. ACM Workshop Cloud Comput. Secur. Workshop, 2010, pp. 31–42.

H. C. H. Chen and P. P. C. Lee, “Enabling data integrity protection in regenerating-coding-based cloud storage: Theory and implementation,” IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 2, pp. 407–416, Feb. 2014.

K. Yang and X. Jia, “An efficient and secure dynamic auditing protocol for data storage in cloud computing,” IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 9, pp. 1717–1726, Sep. 2013.

Full Text: PDF


  • There are currently no refbacks.

Copyright © 2012 - 2023, All rights reserved.|

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at