Cloud Services Accessing with Privacy-Preserving Public Auditing

Authors(2) :-Asha K, P.Madhura

To protect outsourced data in cloud storage against corruptions, adding fault tolerance to cloud storage along with data integrity checking and failure reparation becomes critical. Recently, create codes have gained quality due to their lower repair information measure whereas providing fault tolerance. Existing remote checking strategies for regenerating-coded information only offer personal auditing, requiring data owners to forever stay on-line and handle auditing, also as repairing, which is sometimes impractical. During this paper, we tend to propose a public auditing theme for the regenerating-code-based cloud storage. To solve the regeneration problem of failing authenticators in the absence of information house owners, we introduce a proxy, which is privileged to regenerate the authenticators, into the normal public auditing system model. Moreover, we tend to style a novel public verifiable critic, which is generated by a few of keys and can be regenerated using partial keys. Thus, our theme will completely release data owners from on-line burden. Additionally, we randomize the inscribe coefficients with a pseudorandom function to preserve information privacy. in depth security analysis shows that our theme is obvious secure below random oracle model and experimental analysis indicates that our theme is highly economical and may be feasibly integrated into the regenerating-code-based cloud storage.

Authors and Affiliations

Asha K
Department of MCA, Mother Theresa Institute of Computer Applications, Palamaner, India
P.Madhura
Department of MCA, Mother Theresa Institute of Computer Applications, Palamaner, India

Cloud storage, regenerating codes, public audit, privacy preserving, authenticator regeneration, proxy, privileged, provable secure

  1. Hamdi, M., "Security of cloud computing, storage, and networking," Collaboration Technologies and Systems (CTS), 2012 International Conference on , vol., no., pp.1,5, 21-25 May 2012 doi: 10.1109/CTS.2012.6261019
  2. Dinesha, H.A.; Agrawal, V.K., "Multi-level authentication technique for accessing cloud services," Computing, Communication and Applications (ICCCA), 2012 International Conference on , vol., no., pp.1,4, 22-24 Feb. 2012 doi: 10.1109/ICCCA.2012.
  3. Baliga, J.; Ayre, R.W.A.; Hinton, K.; Tucker, RodneyS. "Green Cloud Computing: Balancing Energy in Processing, Storage, and Transport," Proceedings of the IEEE , vol.99, no.1, pp.149,167, Jan. 2011 doi:10.1109/JPROC.2010.2060451
  4. Kumar, A.; Byung Gook Lee; HoonJae Lee; Kumari, A., "Secure storage and access of data in cloud computing," ICT Convergence (ICTC), 2012 International Conference on , vol., no., pp.336,339, 15-17 Oct. 2012 doi: 10.1109/ICTC.2012.6386854
  5. IEEE - The Application of Cloud Computing in Education Informatization, Modern Educational Tech... center Bo Wang, HongYu Xing.
  6. NISTDefinition http://www.au.af.mil/au/awc/awcgate/nist/cloud-def-v15.doc
  7. CA Technologies cloud authentication system http://www.ca.com/us/authentication-system.aspx
  8. X. Suo, Y. Zhu, G. S. Owen, "Graphical passwords: A survey," in Proc. 21st Annual Computer Security Application. Conf. Dec. 5–9, 2005, pp. 463–472.
  9. S. Wiedenbeck, J. Waters, J.-C. Birget, A. Brodskiy, and N. Memon, "Authentication using graphical passwords: Basic results," in Proc. Human-Comput. Interaction Int., Las Vegas, NV, Jul. 25–27, 2005.
  10. Barsoum, A.; Hasan, A.,"Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems," Parallel and Distributed Systems, IEEE Transactions on, vol.24, no.12,pp.2375,2385,Dec.2013doi:10.1109/TPDS.2012.337.
  11. ZHANG GUOLI, LIU WANJUN," The Applied Research of Cloud Computing Platform Architecture in the E-Learning Area". IEEE 2010
  12. Cheng Jiejing, Huang Jingjing, Liu Xiaoxiao, Le Huijin, "On the Application of Educational Information Resource in Jiangxi Province Based on Cloud Computing". IEEE 2010
  13. Ye Conghuan, Chen xiaowen, "E-learning Support Service Based on Interaction Among Local Campus Clouds" IEEE 2011
  14. Huibin Yin, lun Han, ling Liu, ling Dong, "The Application Research of GAE on E-Learning" IEEE 2011
  15. Xin Tan, Yongbeom Kim, "Cloud Computing for Education: A Case of Using Google Docs in MBA Group Projects" IEEE 2011
  16. Bo Wang, HongYu Xing, "The Application of Cloud Computing in Education Informatization" IEEE 2011
  17. Zhihe Yang, "Study on an Interoperable Cloud framework for e-Education" IEEE 2011
  18. Ruan Gaofeng, Cai ling, "Online Course Development Based On a Public Cloud Computing Infrastructure" IEEE 2010
  19. Yuhua Liu, Lilong Chen, Kaihua Xu, Yi Zhang, "Application Modes, Architecture and Challenges for Cloud Educational System" IEEE 2010

Publication Details

Published in : Volume 4 | Issue 2 | March-April 2018
Date of Publication : 2018-03-31
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 135-140
Manuscript Number : CSEIT184105
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Asha K, P.Madhura, "Cloud Services Accessing with Privacy-Preserving Public Auditing", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 4, Issue 2, pp.135-140, March-April.2018
URL : http://ijsrcseit.com/CSEIT184105

Follow Us

Contact Us