Downloads: 108 | Views: 257
M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 5 Issue 5, May 2016 | Popularity: 6.3 / 10
A Survey on Public Auditing for Integrity Checking and Regenerating Faulty Data Block in Cloud Data Storage
Shamala M G, Rekha K B
Abstract: To ensure outsourced information in distributed storage against debasements, adding adaptation to non-critical failure to distributed storage together with information honesty checking and disappointment reparation gets to be basic. As of late, recovering codes have picked up fame because of their lower repair transmission capacity while giving adaptation to non-critical failure. Existing remote checking techniques for recovering coded information just give private reviewing, requiring information proprietors to dependably stay online and handle evaluating, and in addition repairing, which is here and there unreasonable. In this paper, we propose an open reviewing plan for the recovering code-based distributed storage. To tackle the recovery issue of fizzled authenticators without information proprietors, we present an intermediary, which is advantaged to recover the authenticators, into the conventional open examining framework model. Besides, we plan a novel open evident authenticator, which is produced by a few keys and can be recovered utilizing incomplete keys. Hence, our plan can totally discharge information proprietors from online weight. Furthermore, we randomize the encode coefficients with a pseudo irregular capacity to protect information security. Broad security examination demonstrates that our plan is provable secure under arbitrary prophet model and test assessment shows that our plan is exceptionally effective and can be practically coordinated into their producing code-based distributed storage.
Keywords: Cloud storage, regenerating codes, public audit, privacy preserving, authenticator regeneration, proxy, privileged, provable secure
Edition: Volume 5 Issue 5, May 2016
Pages: 1092 - 1095
DOI: https://www.doi.org/10.21275/NOV163622
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 1
Review Papers, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021
Pages: 1126 - 1129Privacy Preserving Utility Verification of Data Published
Madhushree M
Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2
Student Project, Computer Science & Engineering, India, Volume 12 Issue 11, November 2023
Pages: 306 - 309A Basic Framework for Policy Updates for the Outsourced Exchange of Private Medical Records
V. Jayaganesh
Downloads: 94
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1253 - 1257Implementation Details of Anonymization of Sensitive Labels in Collaborative Data Publishing
Vandhana V
Downloads: 100
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 878 - 881Detection of Malicious Client based HTTP/DoS Attack on Web Server
Dhanya Jayan, Pretty Babu
Downloads: 100
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1058 - 1060Data Integrity Proof in Cloud Computing using TPA with Privacy Preserving
Rushikesh P. Dhanokar