Secure and Dependable Cloud Services for TPA in Cloud Computing
Nandeesh. B.B1, Ganesh Kumar R2, Jitendranath Mungara3
1Nandeesh.B.B, 4th Sem, M-Tech Dept of CSE, CMR Institute of Technology, Bangalore, India.
2Mr. Ganesh Kumar R, HOD, Dept of ISE, CMRIT, Bangalore, India.
3Dr. Jitendranath Mungara, Prof & Dean, PG Programme, Dept of CSE &ISE, CMRIT, Bangalore, India.
Manuscript received on August 01, 2012. | Revised Manuscript received on August 05, 2012. | Manuscript published on August 10, 2012. | PP: 80-85 | Volume-1 Issue-3, August 2012. | Retrieval Number: C0219071312/2012©BEIESP
Open Access | Ethics and Policies | Cite
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: The cloud storage provides users to easily store their data and enjoy the good quality cloud applications need not install in local hardware and software system. So benefits are clear, such a service is also gives users’ physical control of their outsourced data, which provides control over security problems towards the correctness of the storage data in the cloud. In order to do this new problem and further achieve a secure and dependable cloud storage services, we propose in this paper a flexible distributed storage integrity auditing mechanism, using the homomorphism token and distributed erasure-coded data. We are also proposing allows users to audit the cloud storage with very lightweight communication and computation cost. The auditing result not only ensures strong cloud storage correctness guarantee, but also simultaneously achieves fast data error localization, i.e., the identification of hacker information. And securely introduce an effective TPA, the auditing process should bring in no new vulnerabilities towards user data privacy, and introduce no additional online burden to user. In this paper, we propose a secure cloud storage system supporting privacy preserving public auditing. We further extend our result to enable the TPA to perform audits for multiple users simultaneously and efficiently. This shows the proposed scheme is highly efficient and data modification attack, and even server colluding attacks
Keywords: Data integrity, dependable distributed storage, error localization, data dynamics, Cloud Computing.