Downloads: 106 | Views: 307
M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 5 Issue 4, April 2016 | Popularity: 6.3 / 10
Regenerating Code Based on Public Auditing Scheme with Security Preserving for Cloud Storage
Dr. K. Sundeep Kumar, Anupama P. V
Abstract: To secure outsourced information in distributed storage against defilements, adding adaptation to non-critical failure to distributed storage together with information trustworthiness checking and disappointment reparation gets to be basic. As of late, recovering codes have picked up notoriety because of their lower repair transmission capacity while giving adaptation to non-critical failure. Existing remote checking techniques for recovering coded information just give private reviewing, requiring information proprietors to dependably stay online and handle inspecting, and in addition repairing, which is some of the time unrealistic. In this paper, we propose an open inspecting plan for the recovering code-based distributed storage. To tackle the recovery issue of fizzled authenticators without information proprietors, we present an intermediary, which is favored to recover the authenticators, into the conventional open evaluating framework model. In addition, we plan a novel open irrefutable authenticator, which is produced by a few keys and can be recovered utilizing incomplete keys. In this way, our plan can totally discharge information proprietors from online weight. Moreover, we randomize the encode coefficients with a pseudorandom capacity to safeguard information protection. Broad security examination demonstrates that our plan is provable secure under arbitrary prophet model and test assessment shows that our plan is exceptionally productive and can be attainably incorporated into the recovering code-based distributed storage.
Keywords: data integrity, bandwidth, public auditing scheme, regenerating-code-based, regeneration problem and authenticator
Edition: Volume 5 Issue 4, April 2016
Pages: 2451 - 2458
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 190 | Weekly Hits: ⮙6 | Monthly Hits: ⮙6
Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018
Pages: 81 - 84Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey
Priyanka H, Dr. Mary Cherian
Downloads: 3 | Weekly Hits: ⮙3 | Monthly Hits: ⮙3
Experimental Result Paper, Computer Science & Engineering, India, Volume 13 Issue 10, October 2024
Pages: 1492 - 1503Novel Resource Allocation Technique for DVB - RCS Compliant Satellite Terminals
Abhishek Kumar Roy
Downloads: 86
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 5, May 2013
Pages: 297 - 300Balancing the Trade-Offs between Data Availability and Query Delay in MANETs
Umar I. Masumdar, N. S. Killarikar
Downloads: 99 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 528 - 532Knowledge Fusion Technique Using Classifier Ensemble by Combining the Sets of Classification Rules
Jaydeep B. Patil, Vaishali Nandedkar
Downloads: 100
Review Papers, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021
Pages: 594 - 596A Review of Replication Strategies to Increase Data Availability for Data Intensive Applications in Cloud
K. Sreelatha