首页    期刊浏览 2024年10月06日 星期日
登录注册

文章基本信息

  • 标题:A New Data Storage Security Paradigm for Cloud Computing Using TPA
  • 本地全文:下载
  • 作者:T. Nirupama ; Y. Chittibabu ; Dr. P. Harini
  • 期刊名称:International Journal of Computer Science & Technology
  • 印刷版ISSN:2229-4333
  • 电子版ISSN:0976-8491
  • 出版年度:2012
  • 卷号:3
  • 期号:3
  • 页码:711-715
  • 语种:English
  • 出版社:Ayushmaan Technologies
  • 摘要:Cloud computing refers to the delivery of computing and storage capacity as a service to a heterogeneous community of endrecipients. Cloud Computing is the long vision of computing as a utility, in this users can remotely store their data into the cloud, as to acquire the high quality services as well as applications from a shared pool of configurable computing resources. By this cloud computing data will be high secureandcannot be modified without proper authorization , by these cloud users cannot be maintain a separate database. However, the fact that users no longer have physical possession of the possibly large size of outsourced data makes the data integrity protection in Cloud Computing a very challenging and potentially formidable task, especially for users with constrained computing resources and capabilities. Here we are giving a security to our data by third party auditor (VerifyProof to audit the proof from cloud server). By introducing an effective third party auditor (TPA), the two basic requirements have to be met: 1) The third party auditing process should bring in no new vulnerabilities towards user data privacy. 2) TPA should be able to efficiently audit the cloud data storage without demanding the local copy of data, and introduce no additional on-line burden to the cloud user. By utilizing public key based linear verification with arbitrary masking privacy preserving public auditing can be achieved. The technique of bilinear aggregate signature is used to achieve batch auditing. Batch auditing reduces the computation overhead. As the data in the cloud is used by many industries, modification of data cannot be avoided. Here we use the public key based Linear Verification to achieve the privacy-preserving public cloud data auditing system which will utilize the above requirements. As the data in the cloud is used by many industries, modification of data cannot be avoided.
  • 关键词:Linear Verification;Arbitrary Masking;Bilinear Aggregate Signature
国家哲学社会科学文献中心版权所有