CFP last date
20 May 2024
Reseach Article

BST-MRPAS: Binary Search Tree based Multi Replica for Public Cloud Auditing System

by Savita Vishwakarma, Rudresh Shah
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 182 - Number 37
Year of Publication: 2019
Authors: Savita Vishwakarma, Rudresh Shah
10.5120/ijca2019918396

Savita Vishwakarma, Rudresh Shah . BST-MRPAS: Binary Search Tree based Multi Replica for Public Cloud Auditing System. International Journal of Computer Applications. 182, 37 ( Jan 2019), 45-49. DOI=10.5120/ijca2019918396

@article{ 10.5120/ijca2019918396,
author = { Savita Vishwakarma, Rudresh Shah },
title = { BST-MRPAS: Binary Search Tree based Multi Replica for Public Cloud Auditing System },
journal = { International Journal of Computer Applications },
issue_date = { Jan 2019 },
volume = { 182 },
number = { 37 },
month = { Jan },
year = { 2019 },
issn = { 0975-8887 },
pages = { 45-49 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume182/number37/30307-2019918396/ },
doi = { 10.5120/ijca2019918396 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:13:35.178114+05:30
%A Savita Vishwakarma
%A Rudresh Shah
%T BST-MRPAS: Binary Search Tree based Multi Replica for Public Cloud Auditing System
%J International Journal of Computer Applications
%@ 0975-8887
%V 182
%N 37
%P 45-49
%D 2019
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Data integrity and storage efficiency are two essential needs for cloud storage. Cloud computing has emerged as a long-dreamt vision of the utility computing paradigm that provides reliable and resilient infrastructure for users to remotely store data and use on-demand applications and services. Currently, many individuals and organizations mitigate the burden of local data storage and reduce the maintenance cost by outsourcing data to the cloud. However, the outsourced data is not always trustworthy due to the loss of physical control and possession over the data. With the growing awareness of data privacy, more and more cloud users choose to encrypt their sensitive data before outsourcing them to the cloud. Therefore, in order to resolve the issues in cryptographic security a new methodology is required to develop. That provides the data owner and data management with efficient. Thus, the proposed solution incorporates the TF-IDF for calculating frequency of each word of text data and performing indexing on selected words. In this paper, the investigation is done about the outsourced data and their sensitivity and security issues. In this, a mechanism is proposed for public cloud data security by means of BST-MRPAS i.e. Binary Search Tree based Multi Replica for Public Cloud Auditing System for the end user applications. Additionally for providing end user trust and security management the upload, download and Update services are provided.

References
  1. Liu, Yuhong, "A survey of security and privacy challenges in cloud computing: solutions and future directions", Journal of Computing Science and Engineering 9.3 (2015): 119-133.
  2. M. Armbrust, A. Fox, R. Griffith, A. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, “Above the clouds: A berkeley view of cloud computing”, EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2009-28, 2009.
  3. J. F. Yang and Z. B. Chen, “Cloud Computing Research and Security Issues”, 2010 IEEE International Conference on Computational Intelligence and Software Engineering (CiSE), Wuhan pp. 1-3, Dec. 2010.
  4. M.A. Shah, M. Baker, J.C. Mogul, and R. Swaminathan, Auditing to Keep Online Storage Services Honest, Proc. 11th USENIX Workshop Hot Topics in Operating Systems (HotOS 07), pp. 1-6, 2007.
  5. N. Praveen Kumarga and D. Sireesha, “Ensuring Data Integrity in Cloud Computing”, IJCSNS International Journal of Computer Science and Network Security, Volume 14 No.9, September 2014.
  6. G. Janani and C. Kavitha, “Public Auditing of Dynamic Big Data Storage with Efficient High Memory Utilization and ECC Algorithm”, International Journal of Innovative Research in Computer and Communication Engineering, Volume 3, Issue 3, March 2015.
  7. Kai, He, "An efficient public batch auditing protocol for data security in multi-cloud storage", 2013 8th ChinaGrid Annual Conference (ChinaGrid), IEEE, 2013.
  8. A.L. Ferrara, M. Green, S. Hohenberger, and M. Pedersen, “Practical Short Signature Batch Verification”, Proc. Cryptographers’ Track at the RSA Conf. 2009 on Topics in Cryptology (CT-RSA), pp. 309-324, 2009.
  9. Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, “Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing”, IEEE Trans. Parallel and Distributed Systems, vol. 22, no. 5, pp. 847-859, May 2011.
  10. Priya, K., and I. Gunavathi. "Ensure cloud storage correctness based on public auditing mechanism", Communications and Signal Processing (ICCSP), 2015 International Conference on, IEEE, 2015.
  11. Chakraborty, TamalKanti, "Enhanced public auditability & secure data storage in cloud computing" 3rd International IEEE, 2013, Advance Computing Conference (IACC), 2013 IEEE.
  12. Yan, Xiangtao, and Yifa Li. "A wew remote data integrity checking Scheme for cloud storage with privacy preserving", 14th International conference Communication Technology (ICCT), 2012 IEEE.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Storage Public Auditing Multi-Replica TF-IDF Data integrity Cloud Server.