Secured Data Storage for RDPC Protocol with Enhanced TPA Auditing Scheme Using MHT in Cloud Computing
IJIREEICE - Electrical, Electronics, Instrumentation and Control

MS.N. ELAMATHI, B. SELVANAYAGI
2014 IJIREEICE  
Cloud computing enables vastly scalable services consumed over the Internet.Cloud storage is a model of data storage where the digital data is stored in logical pools.These cloud storage providers are responsible for keeping the data available and accessible.but the security of cloud storage is always the focus of several potential cloud clients,and huge impact for its widespread application. Therefore,it is of great importance for users to check whether the data is kept intact.in this paper
more » ... C protocol based on homomorphic hash algorithm is proposed. And to enable dynamics of data MHT is used to find the location of each data operation in the RDPC protocol. it allow the third party auditor (TPA) to check the integrity of outsourced data. d. The scheme allows unlimited times verification without the need for the verifier to compare against the original data, which reduces the communication and computation complexity.and implementing Secure Multi Owner Authentication technique is by which we can secure the data Stored in the Cloud Server's Database.the security and routine analysis shows that the scheme is practical for real time.
doi:10.17148/ijireeice.2014.21111 fatcat:735k3g5cavcmjhou7zsekffy64