Academic Journals Database
Disseminating quality controlled scientific knowledge


Author(s): Shaik Abid | L.Ravi Kumar | G.Charles Babu

Journal: International Journal of Computer & Electronics Research
ISSN 2320-9348

Volume: 2;
Issue: 4;
Start page: 447;
Date: 2013;
Original page

Keywords: Cloud Computing | Proof of retrievability | Cloud storage service | Provable Data Possession | Cryptographic Technique

Cloud Computing brings in the complexity of defensive the security of data outsourced by cloud users and offers elastic, on-demand and measured services to cloud users anytime anywhere each time Internet is obtainable, and facilitate them to benefit from the illusionary unlimited computing resources. The cloud storage service relieves the trouble of storage management and protection. On the other hand, if such a vital service is susceptible to attacks or failures, it would bring irreversible losses to users because their data or archives are stored into an unsure storage pool exterior the enterprises. The concepts of proof of retrievability and provable data possession have been projected to appreciate public audit ability. On the basis of a probabilistic proof system known as verification devoid of downloading the clients’ data remain intact without downloading the stored data for storage provider. proof of retrievability and provable data possession methods evolved around an un-trusted storage presents a publicly available remote interface to make sure the incredible amount of data, and also about the information escape of predictable data in confirmation process at the same time as most of active schemes cannot give a stringent safety proof against the un-trusted cloud service provider deceitfulness. A competent and protected cryptographic interactive audit system for public auditability is proposed. This method retains the soundness property and zero-knowledge property of proof systems.
Why do you need a reservation system?      Save time & money - Smart Internet Solutions