Impact Factor:6.549
 Scopus Suggested Journal: Tracking ID for this title suggestion is: 55EC484EE39417F0

International Journal
of Computer Engineering in Research Trends (IJCERT)

Scholarly, Peer-Reviewed, Open Access and Multidisciplinary




Welcome to IJCERT

International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed, Open Access and Multidisciplinary

ISSN(Online):2349-7084                 Submit Paper    Check Paper Status    Conference Proposal

Back to Current Issues

Public Reviewing for Imparted Information to Effective Client Repudiation in Cloud Computing

P Baziga Tabassum, Varada Sravani, Katrimala Sahaja, V Jhansi Rani,
Affiliations
Department of IT, G.Pullaiah College of Engineering and Technology. Kurnool JNTU Anatapur, Andhra Pradesh, India
:NOT ASSIGNED


Abstract
With promotion of cloud administrations, different clients effectively impart and overhaul their information through distributed storage. For information uprightness and consistency in the distributed storage, the review mechanisms were proposed. Be that as it may, existing methodologies have some security vulnerabilities and oblige a ton of computational overheads. This paper proposes a protected and proficient review mechanism for element imparted information in distributed storage. The proposed plan keeps vindictive cloud service providers from misleading an examiner. In addition, with information storing and offering administrations in the cloud, clients can without much of a stretch alter and offer information as a gathering to guarantee offer information uprightness can be checked openly, clients in the gathering need to process marks on all the squares in imparted information. Distinctive pieces in imparted information are for the most part marked by diverse clients because of information alterations performed by distinctive clients. For security reasons, once a client is disavowed from the gathering, the squares which were awhile ago marked by this denied client must be re-marked by a current client. The straight forward system, which permits a current client to download the comparing piece of imparted information and re-sign it amid client repudiation, is wasteful because of the expansive size of imparted information in the cloud. In this paper, we propose a novel open evaluating mechanism for the uprightness of imparted information to proficient client repudiation at the top of the priority list.


Citation
P Baziga Tabassum,Varada Sravani,Katrimala Sahaja,V Jhansi Rani."Public Reviewing for Imparted Information to Effective Client Repudiation in Cloud Computing". International Journal of Computer Engineering In Research Trends (IJCERT) ,ISSN:2349-7084 ,Vol.1, Issue 04,pp.183-187, OCTOBER - 2014, URL :https://ijcert.org/ems/ijcert_papers/V1I42.pdf,


Keywords : Cloud Service Provider (CSP), Public Auditing, Trusted Third party (TPA), Client Repudiation.

References
[1] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L.
Kissner, Z. Peterson,and D. Song, “Provable Data
Possession at Untrusted Stores,” in the Proceedings of
ACM CCS 2007, 2007, pp. 598–610.
[2] H. Shacham and B. Waters, “Compact Proofs of
Retrievability,” in the Proceedings of ASIACRYPT
2008. Springer-Verlag, 2008, pp. 90–107.
[3] C. Wang, Q. Wang, K. Ren, and W. Lou, “Ensuring
Data Storage Security in Cloud Computing,” in the
Proceedings of ACM/IEEE IWQoS 2009, 2009, pp. 1–9.
[4] Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou,
“Enabling Public Veri-fiability and Data Dynamic for
Storage Security in Cloud Computing,”in the
Proceedings of ESORICS 2009. Springer-Verlag, 2009,
pp. 355–370
[5] C. Wang, Q. Wang, K. Ren, and W. Lou, “PrivacyPreserving Public Auditing for Data Storage Security
in Cloud Computing,” in the proceedings of IEEE
infocom 2010,pp355-370.
[6] Y. Zhu, H. Wang, Z. Hu, G.-J. Ahn, H. Hu, and S. S.
Yau, “Dynamic Audit Services for Integrity
Verification of Outsourced Storage in Clouds,” in n
the Proceedings of ACM SAC 2011, 2011, pp. 1550–
1557.
[7] B. Wang, B. Li, and H. Li, “Oruta: PrivacyPreserving Public Auditing for Shared Data in the
Cloud,” in the Proceedings of IEEE Cloud 2012,2012,
pp. 295–302.
[8] N. Cao, S. Yu, Z. Yang, W. Lou, and Y. T. Hou, “LT
Codes-based Secure and Reliable Cloud Storage
Service,” in the Proceedings of IEEE INFOCOM 2012,
2012, pp. 693–701.
[9] B. Wang, B. Li, and H. Li, “Knox: PrivacyPreserving Auditing for Shared Data with Large
Groups in the Cloud,” in the Proceedings of ACNS
2012, June 2012, pp. 507–525


DOI Link : NOT ASSIGNED

Download :
  V1I42.pdf


Refbacks : Currently there are no Refbacks

Quick Links



DOI:10.22362/ijcert


Science Central

Score: 13.30





Submit your paper to [email protected]