Call for Paper - July 2022 Edition
IJCA solicits original research papers for the July 2022 Edition. Last date of manuscript submission is June 20, 2022. Read More

Privacy-Preserving and Public Auditing for Cloud Storage Applying Regeneration-Code-based using RSA Algorithm

Print
PDF
IJCA Proceedings on National Conference on Advancements in Computer & Information Technology
© 2016 by IJCA Journal
NCACIT 2016 - Number 5
Year of Publication: 2016
Authors:
Pooja K. Patil
Reshma Anil Bhailume
Dipali Arun Ware
Sayali Avinash Inamdar
Sushma Bhagawat Waghmare

Pooja K Patil, Reshma Anil Bhailume, Dipali Arun Ware, Sayali Avinash Inamdar and Sushma Bhagawat Waghmare. Article: Privacy-Preserving and Public Auditing for Cloud Storage Applying Regeneration-Code-based using RSA Algorithm. IJCA Proceedings on National Conference on Advancements in Computer & Information Technology NCACIT 2016(5):1-3, May 2016. Full text available. BibTeX

@article{key:article,
	author = {Pooja K. Patil and Reshma Anil Bhailume and Dipali Arun Ware and Sayali Avinash Inamdar and Sushma Bhagawat Waghmare},
	title = {Article: Privacy-Preserving and Public Auditing for Cloud Storage Applying Regeneration-Code-based using RSA Algorithm},
	journal = {IJCA Proceedings on National Conference on Advancements in Computer & Information Technology},
	year = {2016},
	volume = {NCACIT 2016},
	number = {5},
	pages = {1-3},
	month = {May},
	note = {Full text available}
}

Abstract

The cloud has measure issues of bulk data storage, outsourced data corruptions, fault tolerance together with data integrity check and failure reparation. Another problem is that user need to always stay online for the purpose of continuous auditing of his own data which is not practically possible, especially for long-term archival storage. This might result in data owner's loss of ultimate control over the fate of their outsourced data [1]. Thus, the correctness, accessibility and reliability of the data are being put at risk. To solve the above problem of failed auditing in the absence of data owners, system introduce a proxy server, which is privileged to regenerate the authenticators, into the traditional public auditing system. This arrangement helps to outsource the burden of continuous online availability of user for auditing purpose to proxy server. In addition to this systems introduce regenerating-code-based cloud storage to handle the problem of data integrity check and failure reparation.

References

  • Fox, R. Grif?th, A. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, and I. Stoica, Dept. Electrical Eng. and Comput. Sciences, Above the clouds: A berkeley view of cloud computing.
  • G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, in Proceedings of the 14th ACM Conference on Computer and Communications Security, ser. CCS '07. New York, NY, USA: ACM, 2007, pp. 598– 609, Provable data possession at untrusted stores.
  • Juels and B. S. KaliskiJr, in Proceedings of the 14th ACM conference on Computer and communications security. ACM, 2007, pp. 584–597. Pors: Proofs of retrievability for large ?les.
  • R. Curtmola, O. Khan, R. Burns, and G. Ateniese, in Distributed Computing Systems, 2008. ICDCS'08. The 28th International Conference on. IEEE, 2008, pp. 411–420. Mr-pdp: Multiple- replica provable data possession.
  • K. D. Bowers, A. Juels, and A. Oprea, in Proceedings of the 16th ACM conference on Computer and communications security. ACM, 2009, pp. 187–198. Hail: a high-availability and integrity layer for cloud storage.
  • Bo Chen, Reza Curtmola, Giuseppe Ateniese, Randal Burns, Remote Data Checking for Network Coding-basedDistributed Storage Systems.
  • Henry C. H. Chen and Patrick P. C. Lee, Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage.
  • Kan Yang, Student Member, IEEE, and Xiaohua Jia, Fellow, IEEE, An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing.
  • Yunghsiang S. Han, Fellow, IEEE, Hung-Ta Pai, Senior Member, IEEE, Efficient Exact Regenerating Codes for Byzantine Fault Tolerance in Distributed Networked Storage.
  • Boyang Wang, Student Member, IEEE, Baochun Li, Oruta: Privacy-Preserving Public Auditing For Shared Data in the Cloud.
  • Chao Tian, Senior Member, IEEE, Characterizing the Rate Region of the (4, 3, 3) Exact-Repair Regenerating Codes.
  • S. Nancy Priya1, D. Elavarasi, Remote resource maintenance with data integrity based on code regeneration scheme.
  • Jing He a, Yanchun Zhang a, Guangyan Huang a, Yong Shib, c, Distributed data possession checking for securing multiple replicas in geographically-dispersed clouds.
  • Henry C. H. Chen and Patrick P. C. Lee, Enabling Data Integrity Protection in Regenerating- Coding- Based Cloud Storage: Theory and Implementation.
  • Onur Ozan Koyluoglu, Member, IEEE, Ankit Singh RawatSecure Cooperative Regenerating Codes for Distributed StorageSystems.