Preserving Privacy In Public Auditing For Data Storage Security In Cloud Computing

Authors

  • Geethamani G. S.  Assistant Professor, PG Department of (IT), Hindusthan College of Arts and Science, Coimbatore, Tamil Nadu, India
  • Ranjani S  PG Student, Department of (IT) , Hindusthan College of Arts and Science, Coimbatore, Tamil Nadu, India

Keywords:

Network Traffic, Network Security, Protocols, Cloud Computing , Data Mining

Abstract

This paper is proposed  “to computerize the cloud computer. This system was developed in Asp.net as front end, the Microsoft SQL Server as the back end and Windows XP as platform. Computers today have become indispensable tools. They are fast changing the way in which work is done by their speed, accuracy and diligence. Almost all good businesses practices have embraced computers for increasing the productivity and efficiency, which ultimately results in profits. Cloud computing is the long dreamed vision of computing as a utility, where users can remotely store their data into the cloud so as to enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources. By data outsourcing, users can be relieved from the burden of local data storage and maintenance. Thus, enabling public auditability for cloud data storage security is of critical importance so that users can resort to an external audit party to check the integrity   of outsourced data when needed. To securely introduce an effective Third Party Auditor

(TPA), the following two fundamental requirements have to be met:

1) TPA should be able to efficiently audit the cloud data storage without demanding the local copy of data.

2) Introduce no additional on-line burden to the cloud user.

References

  1. ArchanaJadhav, Vipul Oswal, Sagar Madane ,Harshal Zope,Vishal Hatmode “VNC ARCHITECTURE BASED REMOTE DESKTOP ACCESS THROUGH ANDROID MOBILE PHONES” International Journal of Advanced Research in Computer and Communication Engineering Vol. 1, Issue 2, April 2012 .
  2. Remote Control of Mobile Devices in Android Platform Angel, Gonzalez Villan , Student Member, IEEE and JosepJorbaEsteve,Member, IEEE.
  3. Virtual Network Computing,Tristan Richardson, Quentin StaffordFraser,Kenneth R. Wood and Andy Hopper,Reprint from IEEE Internet Computing Volume 2, Number 1 January/February 1998.
  4. T. Richardson, \The RFB Protocol", Tech. rep., RealVNC Ltd,2007 .
  5. The RFB Protocol, Tristan Richardson, Real VNC Ltd(formerly of Olivetti Research Ltd / AT&T Labs Cambridge) ,Version 3.8,Last updated 26 November 2010.
  6. R.Manikandasamy”Remote Desktop Connection Using Mobile Phone ”International Journal of Science, Engineering and Technology Research (IJSETR) Volume 2, Issue 8, August 2013.
  7. H.Kawashima, K. Koshiba, K. Tuchimochi, K. Futamura, M. Enomoto, and M. Watanabe, “Virtual PC-type thin client system,” NEC TECHNICAL JOURNAL,( SEP- 2007).
  8. P. Simoens, F. A. Ali, B. Vankeirsbilck, L. Deboosere, F. De Turck, B. Dhoedt, P. Demeester, and R. Torrea-Duran,“Cross-Layer Optimization of Radio Sleep Intervals to Increase Thin Client Energy Efficiency,” IEEE COMMUNICATIONS LETTERS, (DEC- 2010).
  9. V. Rivoira and F.Pascali, “HSDPA: High-speed internet over your mobile phone”, IEC newsletter, (June -2007).
  10. Michael Lloyd Lee, “J2ME VNC”, codigofonte, (February-2005).
  11. HarshitaTomar ,GunjeshSahney ,”Virtual Network Computing- A Prodigious Technology For Remote Desktop Sharing”HarshitaTomar et al Int. Journal of Engineering Research and Applications . www.ijera.com ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013.
  12. Virtual Network Computing Tristan Richardson, Quentin Stafford-Fraser, Kenneth R. Wood and Andy Hopper Reprint from IEEE Internet Computing Volume 2, Number 1 AT&T Laboratories Cambridge (1999). "Xbased VNC server". Virtual Network Computing. Archived from the original on 2007-03-19. Retrieved 2007-03-24
  13. IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 22788727Volume 6, Issue 5 (Nov. - Dec. 2012), PP 16-20 Virtual Network Computing Based Droid desktop VaidehiMurarka, Sneha Mehta,DishantUpadhyay, AbhijitLal .

WEBSITES

  1. http://www.asp.net.com
  2. http://www.dotnetspider.com/
  3. http://www.dotnetspark.com
  4. http://www.almaden.ibm.com/software/quest/Resources/
  5. http://www.computer.org/publications/dlib
  6. http://www.developerfusion.com

Downloads

Published

2018-02-28

Issue

Section

Research Articles

How to Cite

[1]
Geethamani G. S., Ranjani S, " Preserving Privacy In Public Auditing For Data Storage Security In Cloud Computing, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 1, pp.1757-1762, January-February-2018.