DATA INTEGRITY METHOD FOR DYNAMIC AUDITING IN CLOUD ENVIRONMENT

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Metadata Verification Scheme for Data Auditing in Cloud Environment

Cloud, being the most vulnerable next generation architecture consists of two major design elements i.e. the cloud service provider and the client. The architecture shifts data, applications and development environments to large data centers thereby providing storage, software and platform services online. The notion on verifying data for intactness is termed as data auditing and the process is...

متن کامل

Dynamic Data Integrity and Checkpoint Recovery Using Public Auditing in Cloud Storage

Cloud computing brings great challenges in the field of data security and security assurance. In this paper, we are analysing the different types of cloud security issues. The key and signature are generated using the elliptic curve cryptography algorithm and Ron Rivest, AdiShamir and Leonard Adlema algorithm to provide efficient security. Dynamic Merkle hash tree is constructed for providing d...

متن کامل

Remote Data Auditing Scheme in Secured Cloud Storage Environment

Cloud data centers are used to maintain the shared data values for the data owners .Data owners and public verifiers are involved to efficiently audit cloud data integrity without retrieving the entire data from the cloud server. File and block signatures are used in the integrity verification process. Public data auditing schemes are tuned to verify the encrypted cloud storage environment. “On...

متن کامل

Data Auditing in Cloud Environment using Message Authentication Code

Cloud computing can be defined as a platform which provides different users an opportunity to store their data in the cloud. This data can be retrieved by any of the users or the service provider of that cloud. Data integrity is one of the major aspects of cloud computing services that prevails in a cloud environment. A cloud user needs to consider about data integrity apart from the confidenti...

متن کامل

Preserving Data Integrity and Public Auditing for Data Storage in Cloud Computing

In this project the utilization and combining of public key based homomorphic authenticator with random masking to achieve the preservation of privacy to the public cloud data auditing system which meets all the above requirements. If there is a situation for multi auditing tasks then we further extend the technique of bilinear aggregate signature to extend the main result to multi user setting...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Indian Journal of Computer Science and Engineering

سال: 2020

ISSN: 2231-3850,0976-5166

DOI: 10.21817/indjcse/2020/v11i6/201106185