7,284 Hits in 5.9 sec


B. Chinna Babu .
2015 International Journal of Research in Engineering and Technology  
The cloud storage is the one of the large data storage. It is used for security for the stored data, especially users. Cloud is the centralized computing is called cloud computing.  ...  The first support scalable and efficient public auditing in cloud. It introduce secure and efficient TPA, the auditing process should takes in no new another user data privacy.  ...  Here we present a public auditing scheme with provably zero knowledge leakage.  ... 
doi:10.15623/ijret.2015.0414007 fatcat:py7ywxkfx5b43o2dcq3nl6jwgu

Dynamic Public Data Auditing Schemes on Cloud: A Survey

R.Santha Maria Rani, Dr.Lata Ragha
2018 International Journal of Advanced Research in Computer Science and Software Engineering  
Because of the characteristic the data is not under user's control, data security in cloud computing is becoming one of the most concerns in using cloud computing resources.  ...  To improve data reliability and availability, Public data auditing schemes is used to verify the outsourced data storage without retrieving the whole data.  ...  LITERATURE SURVEY 1) Dynamic Audit Service Outsourcing for Data Integrity[6] It explorespublic auditability and data dynamics for remote data integrity check in Cloud Computing.  ... 
doi:10.23956/ijarcsse.v8i1.518 fatcat:2mqozuohabga5bumowsv2tqwly

Privacy Preservation Models for Third-Party Auditor over Cloud Computing: A Survey

Abdul Razaque, Mohamed Ben Haj Frej, Bandar Alotaibi, Munif Alotaibi
2021 Electronics  
Hence, for the sake of reinforcing the trust between cloud clients (CC) and cloud service providers (CSP), as well as safeguarding the CC's data in the cloud, several security paradigms of cloud computing  ...  Despite the manifest development in cloud computing, there are still some concerns regarding the level of security and issues related to adopting cloud computing that prevent users from fully trusting  ...  In addition, the authors would like to thank the deanship of scientific research at Shaqra University for supporting this work. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/electronics10212721 fatcat:c2ii7g47z5avhgh6nl64gjnjkm


R. Ahila
2017 International Journal of Advanced Research in Computer Science  
In the recent years, auditing protocols for cloud storages has been proposed to deal the integrity problem of cloud data. This paper deals with different auditing protocols.  ...  One of the important security problems is how to effectively check the integrity of the cloud data stored in the cloud.  ...  RELATED WORK A privacy preserving public auditing system was proposed [5] for data storage security in cloud computing.  ... 
doi:10.26483/ijarcs.v8i7.4377 fatcat:yl7umbggmbeshbex4tbviak23a

A Review on Cloud Data Security and its Mitigation Techniques

K. Selvamani, S. Jayanthi
2015 Procedia Computer Science  
Cloud users are allowed to store their data in cloud server using cloud storage and reduce the burden of storing and retrieving in local machine.  ...  Cloud providers offer several storage services for their users in efficient manner.  ...  This survey is focused on privacy and security issues in cloud data storage and addressed some privacy approaches for overcoming the issues in privacy on untrusted data stores in cloud computing.  ... 
doi:10.1016/j.procs.2015.04.192 fatcat:tawpw3p2izhc3elenwn5c23aai


Blessty Sweetline T .
2014 International Journal of Research in Engineering and Technology  
Cloud computing is one of the buzzwords of technological developments in the IT industry and service sectors.  ...  The issues and the approaches that can be taken to minimise or even eliminate their effects are discussed in this paper to progress toward more secure storage services on the cloud.  ...  Some examples for such cloud storage services are Dropbox, SkyDrive and Amazon S3 services. SECURITY ISSUES IN OUTSOURCING DATA Security is a troubling concern for cloud computing.  ... 
doi:10.15623/ijret.2014.0301027 fatcat:svt4yy46c5abpkzrytudrdhi6y

Integrity Check of Shared Data on Cloud with Various Mechanisms

Sarika Katkade, J. V.
2017 International Journal of Computer Applications  
These protocols have been proposed a model for ensuring the long-term security and availability of data stored at remote untrusted hosts.  ...  Cloud computing is the process and adoption of existing technologies and paradigms.  ...  According to a survey in [4] , cloud storage does induce some new security hazards to data owners.  ... 
doi:10.5120/ijca2017912945 fatcat:kfahqjcyuvhnzngjgn3pnme46i

Concise Survey on Privacy Preserving Techniques in Cloud
IARJSET - Science, Engineering and Technology

B.Banu priya, V. Sobhana, Mishmala Sushith
2015 IARJSET  
Homomorphic Authenticable Ring Signature (HARS), privacy-preserving public auditing System for data storage security are discussed.  ...  In this paper we have made a concise survey on various privacy preserving techniques in cloud.  ...  The privacy-preserving public auditing system for data storage security in cloud computing. The privacy preserving supports the public auditing without the retrieval access of entire data blocks.  ... 
doi:10.17148/iarjset.2015.2206 fatcat:hk7ocm7hu5cqfdw6bbvmsrdhtq

A Survey over the Various Techniques Which used for Security of the Data in Cloud Storage

Avinash Shukla, Sanjay Silakari, Uday Chourasia
2016 International Journal of Computer Applications  
for the data in cloud storage.  ...  A review over the various techniques which used to provide security for the data over cloud storage is presented in this paper.  ...  In [10] a multi owner based technique for secure data sharing over cloud is presented, That provides a sharing mechanism to store data over cloud storage in [13] a public auditability based technique  ... 
doi:10.5120/ijca2016909657 fatcat:zgr7267rozeslp5rs4nxn5vyhy


2019 Innovare journal of engineering & technology  
Public auditing scheme for secure cloud storage based on dynamic hash table, which is a new two-dimensional data structure located at a third-party auditor (TPA) to record the data property information  ...  The results demonstrate that the proposed scheme can effectively achieve secure auditing for cloud storage and outperform the previous schemes' in computation complexity, storage costs, and communication  ...  Use cases in various cloud storage offerings were also summarized. Title: Enabling public auditability and data dynamics for storage security in cloud computing Author: Q. Wang, C. Wang, K. Ren, W.  ... 
doi:10.22159/ijet.2019.v7i3.19914 fatcat:ao6a3dsiqfa47jdypu3jv257cy

Integrity Verification Mechanisms Adopted in Cloud Environment

2019 International Journal of Engineering and Advanced Technology  
In this paper a number of data auditing mechanism used by different cloud providers have been discussed and optimized integrity verification mechanism have been proposed to overcome the limitations of  ...  Data security on the cloud is the prominent area for researchers and number of techniques and algorithms has been proposed to assure the integrity, consistency and data availability.  ...  Geeta et al. (2018) did the detailed survey of data security and auditing techniques and gave forthcoming future directions in data auditing and security.  ... 
doi:10.35940/ijeat.f1321.0986s319 fatcat:u3ntnjjexrhjpeu7a574kdxj5a

Highly Secure Public Data Verification Architecture Using Secure Public Verifier Auditor in Cloud Enviroment

Ritika Arora, Javed Akthar Khan
2014 International Journal of Innovative Research in Computer and Communication Engineering  
the cloud server or solve this data integrity problem with proper high level security . so in this paper we are proposed a new cloud architecture for Third party auditor authentication with minimum auditing  ...  As we all know the simple definition of Cloud computing means that the Service On Demand .The cloud computing and its work simple working concept is data stored in cloud for utilization .This data is used  ...  LITERATURE SURVEY A careful analysis of literature on the variants and methodologies of privacy preserving in cloud computing reveals the following: So many method are already exiting for auditing cloud  ... 
doi:10.15680/ijircce.2014.0212043 fatcat:5rczhmqc7ngztd4dbzjbooh3km

A Survey on Various Techniques of Data Storage on Cloud using Third Party Auditor

Sankalp Gupta, Garima Joshi, Pragya Shukla, Praveen K. Guatam
2014 International Journal of Computer Applications  
So that cloud user to check integrity, confidentiality and security of data in a span of time, but cloud user and organization not able to put an eye on cloud provider all the time so they resort a TPA  ...  Cloud computing offers various features like scalability, pay on use, using these features giants companies use cloud to store their data, In cloud computing data stores on cloud at remote location and  ...  TPA audit data in periodical span of time to evaluate security provides data integrity and computational accuracy. 2.  ... 
doi:10.5120/16744-7005 fatcat:qmyhn5aeibbc3jbypxtjidihfm

A Survey of Public Provable Data Possession Schemes with Batch Verification in Cloud Storage

Sooyeon Shin, Taekyoung Kwon
2015 Journal of Internet Services and Information Security  
Thus, an auditing service is desired to convince users that their data are correctly stored in the cloud. In this paper, we present a survey of remote auditing schemes in the literature.  ...  Remote data auditing refers to a sampling of the outsourced data to securely, frequently, and efficiently verify the correctness of the data in the cloud.  ...  SecCloud firstly bridges data storage security and computation auditing security.  ... 
doi:10.22667/jisis.2015.08.31.037 dblp:journals/jisis/ShinK15 fatcat:wqy6parzbndhvi2mt24anqcgle

Third Party Public Auditing Scheme for Cloud Storage

Swapnali More, Sangita Chaudhari
2016 Procedia Computer Science  
Cloud storage is one of the service provided by Cloud computing in which data is maintained, managed, backed up remotely and made available to users over a network (typically the Internet).  ...  The purpose of this work is to develop an auditing scheme which is secure, efficient to use and possess the capabilities such as privacy preserving, public auditing, maintaining the data integrity along  ...  y of data Privacy Preserving Public auditing for data storage security in Cloud computing[9] HLA with random masking Yes Yes No No Yes No Privacy Preserving public Auditing for Secure  ... 
doi:10.1016/j.procs.2016.03.010 fatcat:3xm6jgxg6fglreluruwjbsf5my
« Previous Showing results 1 — 15 out of 7,284 results