The cloud computing is a computing technology that allows us to share the pool of configurable sources where the data of individuals or the organisations can be stored remotely those can be accessible on-demand high quality applications. Even though there are many advantages associated with cloud computing still it brings new challenges in terms of security provided for the data storage providers as sensitive information of individuals is stored in these cloud storage providers. The owners of data expect a cloud data storage provider to be ensured with high servicelevel requirements. To ensure the deployment of cloud data storage service with security levels, some efficient methods has to be designed for the verification of the correctness of data. This paper proposes architecture for cloud computing that has a trusted entity with expertise and capability to assess cloud storage security in assistance of data owner request. The main aim of this paper is to enable public risk auditing protocols with which data owners can gain trust in cloud.
[1]
Ari Juels,et al.
Pors: proofs of retrievability for large files
,
2007,
CCS '07.
[2]
Randy H. Katz,et al.
Above the Clouds: A Berkeley View of Cloud Computing
,
2009
.
[3]
Ralph C. Merkle,et al.
Protocols for Public Key Cryptosystems
,
1980,
1980 IEEE Symposium on Security and Privacy.
[4]
Cong Wang,et al.
Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing
,
2009,
ESORICS.
[5]
Roberto Di Pietro,et al.
Scalable and efficient provable data possession
,
2008,
IACR Cryptol. ePrint Arch..
[6]
M. Phil,et al.
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
,
2015
.