Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Shared Authority Based Privacy Preserving Authentication Protocol in De-Duplication Cloud Computing


Affiliations
1 Dept of CSE, Kalaignar Karunanidhi Institute of Technology, Coimbatore, India
     

   Subscribe/Renew Journal


Cloud computing has changed the way computing takes place. It is the technology that enables outsourcing of computing and storage to a public cloud maintained by cloud service providers. Cloud users can use cloud storage and other facilities without capital investment in pay as you use fashion. Cloud data services, it is commonplace for data to be not only stored in the cloud, but also shared across multiple users. Unfortunately, the integrity of cloud data may suffer from hardware/software failures and human errors. Several mechanisms have been designed to allow both data owners and public verifiers to efficiently audit cloud data integrity without retrieving the entire data from the cloud server. As the data is stored in remote server in the data center of cloud service provider, there is security concern among the cloud users. This proposed mechanism ensures data integrity in cloud storage by utilizing third party auditing concept. The third party auditor is responsible to verify the integrity of data on behalf of cloud data owners.

 


Keywords

Public Auditing, Cloud Computing, Integrity Checking.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 261

PDF Views: 3




  • Shared Authority Based Privacy Preserving Authentication Protocol in De-Duplication Cloud Computing

Abstract Views: 261  |  PDF Views: 3

Authors

M. Brindha
Dept of CSE, Kalaignar Karunanidhi Institute of Technology, Coimbatore, India
S. Swarnamugi
Dept of CSE, Kalaignar Karunanidhi Institute of Technology, Coimbatore, India
R. P. Shermy
Dept of CSE, Kalaignar Karunanidhi Institute of Technology, Coimbatore, India
B. Leebha
Dept of CSE, Kalaignar Karunanidhi Institute of Technology, Coimbatore, India

Abstract


Cloud computing has changed the way computing takes place. It is the technology that enables outsourcing of computing and storage to a public cloud maintained by cloud service providers. Cloud users can use cloud storage and other facilities without capital investment in pay as you use fashion. Cloud data services, it is commonplace for data to be not only stored in the cloud, but also shared across multiple users. Unfortunately, the integrity of cloud data may suffer from hardware/software failures and human errors. Several mechanisms have been designed to allow both data owners and public verifiers to efficiently audit cloud data integrity without retrieving the entire data from the cloud server. As the data is stored in remote server in the data center of cloud service provider, there is security concern among the cloud users. This proposed mechanism ensures data integrity in cloud storage by utilizing third party auditing concept. The third party auditor is responsible to verify the integrity of data on behalf of cloud data owners.

 


Keywords


Public Auditing, Cloud Computing, Integrity Checking.