Author(s): Komal Gajanan Nadekar, Siddhata Hushar Ramteke, Priyanka Suresh Babulkar, Jotesh R. Dhuriya, Nikesh Aote

Email(s): komalnadekar50@gmail.com , rsiddhataramteke@gmail.com , priyanka.babulakar@gmail.com , joteshdhuriyadj@gmail.com , nikeshaote@gmail.com

DOI: 10.5958/2321-581X.2015.00046.X   

Address: Komal Gajanan Nadekar*, Siddhata Hushar Ramteke, Priyanka Suresh Babulkar, Jotesh R. Dhuriya, Prof. Nikesh Aote
Dept. of Computer Science and Engineering Nagpur Institute of Technology, Nagpur, India,
*Corresponding Author

Published In:   Volume - 6,      Issue - 2,     Year - 2015


ABSTRACT:
Cloud computing is the long dreamed vision of computing as a utility, where users can remotely store their data into the cloud so as to enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources. By data outsourcing, users can be relieved from the burden of local data storage and maintenance. Thus, enabling public auditability for cloud data storage security is of critical importance so that users can resort to an external audit party to check the integrity of outsourced data when needed. To securely introduce an effective third party auditor (TPA), the following two fundamental requirements have to be met: 1) TPA should be able to efficiently audit the cloud data storage without demanding the local copy of data, and introduce no additional on-line burden to the cloud user. Specifically, our contribution in this work can be summarized as the following three aspects. 2) We motivate the public auditing system of data storage security in Cloud Computing and provide a privacy-preserving auditing protocol, i.e., our scheme supports an external auditor to audit user’s outsourced data in the cloud without learning knowledge on the data content. 3) To the best of our knowledge, our scheme is the first to support scalable and efficient public auditing in the Cloud Computing. In particular, our scheme achieves batch auditing where multiple delegated auditing tasks from different users can be performed simultaneously by the TPA. 4) We prove the security and justify the performance of our proposed schemes through concrete experiments and comparisons with the state-of-the-art.


Cite this article:
Komal Gajanan Nadekar, Siddhata Hushar Ramteke, Priyanka Suresh Babulkar, Jotesh R. Dhuriya, Nikesh Aote. Annexure Privacy Preserving Public Auditing for Data Storage Security in Cloud Computing. Research J. Engineering and Tech. 6(2): April-June, 2015 page 301-304. doi: 10.5958/2321-581X.2015.00046.X


Recomonded Articles:

Author(s): Rajeev Kumar Dang, Deepam Goyal, SS Dhami, Amit Chauhan

DOI: 10.5958/2321-581X.2017.00023.X         Access: Open Access Read More

Author(s): Komal Gajanan Nadekar, Siddhata Hushar Ramteke, Priyanka Suresh Babulkar, Jotesh R. Dhuriya, Nikesh Aote

DOI: 10.5958/2321-581X.2015.00046.X         Access: Open Access Read More

Author(s): Geogen George, Aditya Anil

DOI: 10.5958/2321-581X.2018.00049.1         Access: Closed Access Read More

Author(s): Seema Pathak, Anil Kumar Tiwari, Khirodra Bhoi

DOI: 10.5958/2321-581X.2020.00013.6         Access: Closed Access Read More

Author(s): Priya Rao, Abhay Kumar Tiwari

DOI: 10.5958/2321-581X.2020.00007.0         Access: Closed Access Read More

Author(s): Amrita Sharma Rathod, Anil Kumar Tiwari

DOI: 10.5958/2321-581X.2020.00005.7         Access: Closed Access Read More

Author(s): Amrita Sharma Rathod, Jyoti Nainani, Tejeshwani Nishad

DOI: 10.5958/2321-581X.2020.00011.2         Access: Closed Access Read More

Research Journal of Engineering and Technology (RJET) is an international, peer-reviewed, research journal aiming at promoting and publishing original high quality research in all disciplines of engineering sciences and technology....... Read more >>>

RNI: Not Available                     
DOI: 10.5958/2321-581X 


Recent Articles




Tags