期刊名称:International Journal of Computer Science & Technology
印刷版ISSN:2229-4333
电子版ISSN:0976-8491
出版年度:2012
卷号:3
期号:3
页码:711-715
语种:English
出版社:Ayushmaan Technologies
摘要:Cloud computing refers to the delivery of computing and storage capacity as a service to a heterogeneous community of endrecipients. Cloud Computing is the long vision of computing as a utility, in this users can remotely store their data into the cloud, as to acquire the high quality services as well as applications from a shared pool of configurable computing resources. By this cloud computing data will be high secureandcannot be modified without proper authorization , by these cloud users cannot be maintain a separate database. However, the fact that users no longer have physical possession of the possibly large size of outsourced data makes the data integrity protection in Cloud Computing a very challenging and potentially formidable task, especially for users with constrained computing resources and capabilities. Here we are giving a security to our data by third party auditor (VerifyProof to audit the proof from cloud server). By introducing an effective third party auditor (TPA), the two basic requirements have to be met: 1) The third party auditing process should bring in no new vulnerabilities towards user data privacy. 2) TPA should be able to efficiently audit the cloud data storage without demanding the local copy of data, and introduce no additional on-line burden to the cloud user. By utilizing public key based linear verification with arbitrary masking privacy preserving public auditing can be achieved. The technique of bilinear aggregate signature is used to achieve batch auditing. Batch auditing reduces the computation overhead. As the data in the cloud is used by many industries, modification of data cannot be avoided. Here we use the public key based Linear Verification to achieve the privacy-preserving public cloud data auditing system which will utilize the above requirements. As the data in the cloud is used by many industries, modification of data cannot be avoided.