An Improved Privacy-Preserving Public Auditing for Secure Cloud Storage

Distributed computing or Cloud Computing could be a net fundamentally based rising and rapidly developing model. Inside which client will store their insight remotely and revel in the on-interest top quality applications and administrations from a mutual pool of configurable processing assets, while not the weight of local source and upkeep. Hence, accuracy and security of information could be a prime concern. Physical ownership of the outsourced information is limited to clients. Making certain trustworthiness could be a troublesome undertaking, especially for clients with confined figuring assets. Additionally, client should be prepared to utilize the distributed storage on the grounds that it is local stockpiling, without apprehension concerning the wish to review its honesty. In this way, allowing public auditability for conveyed stockpiling is of basic hugeness; so, cloud tenants or cloud users will use a third party auditor (TPA) to envision the uprightness of saved data and be clear. To solidly present a decent outsider evaluator, the inspecting strategy should usher in no new vulnerabilities toward client learning protection, and present no further online weight to client.

[1]  Cong Wang,et al.  Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.

[2]  K. Kiran Kumar,et al.  Automatic Protocol Blocker for Privacy-Preserving Public Auditing in Cloud Computing , 2012 .

[3]  Mirza Aamir Mehmood,et al.  Implementation of Eap with RSA for Enhancing The Security of Cloud Computing , 2012 .

[4]  Gail-Joon Ahn,et al.  Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage , 2012, IEEE Transactions on Parallel and Distributed Systems.

[5]  Ari Juels,et al.  Pors: proofs of retrievability for large files , 2007, CCS '07.

[6]  Cong Wang,et al.  Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.

[7]  Cong Wang,et al.  Dynamic Data Operations with Deduplication in Privacy-Preserving Public Auditing for Secure Cloud Storage , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).

[8]  Stephen S. Yau,et al.  Dynamic audit services for integrity verification of outsourced storages in clouds , 2011, SAC.

[9]  Reza Curtmola,et al.  Provable data possession at untrusted stores , 2007, CCS '07.

[10]  Hovav Shacham,et al.  Compact Proofs of Retrievability , 2008, ASIACRYPT.

[11]  Yevgeniy Dodis,et al.  Proofs of Retrievability via Hardness Amplification , 2009, IACR Cryptol. ePrint Arch..