EFFICIENT DATA INTEGRITY AND AUDITING IN CLOUD BY USING BLOCK CHAIN

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Dynamic Data Integrity and Checkpoint Recovery Using Public Auditing in Cloud Storage

Cloud computing brings great challenges in the field of data security and security assurance. In this paper, we are analysing the different types of cloud security issues. The key and signature are generated using the elliptic curve cryptography algorithm and Ron Rivest, AdiShamir and Leonard Adlema algorithm to provide efficient security. Dynamic Merkle hash tree is constructed for providing d...

متن کامل

Cloud Data Auditing Using Proofs of Retrievability

Cloud servers offer data outsourcing facility to their clients. A client outsources her data without having any copy at her end. Therefore, she needs a guarantee that her data are not modified by the server which may be malicious. Data auditing is performed on the outsourced data to resolve this issue. Moreover, the client may want all her data to be stored untampered. In this chapter, we descr...

متن کامل

Efficient and Secure Auditing of Cloud Data with Key -Updating

Cloud storage auditing is the process of verifying the integrity of the data stored in public cloud. The existing auditing protocols are based on the assumption that the client’s secret key for auditing is secure. In practical the secret key is not absolutely secure due to weak security settings at the client. If secret key for auditing is exposed, most of the current auditing protocols become ...

متن کامل

Cloud Data Security using Auditing Scheme

Cloud computing has emerged as one of the latest computing paradigm and is a growing technology for upcoming years. According to NIST Cloud computing is a model for convenient, on-demand network access to a large pool of computing resources. Resource can be hardware or software resource and this pool of resources can be rapidly provisioned and released with minimum management effort or cloud se...

متن کامل

Preserving Data Integrity and Public Auditing for Data Storage in Cloud Computing

In this project the utilization and combining of public key based homomorphic authenticator with random masking to achieve the preservation of privacy to the public cloud data auditing system which meets all the above requirements. If there is a situation for multi auditing tasks then we further extend the technique of bilinear aggregate signature to extend the main result to multi user setting...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Innovative Research in Computer Science & Technology

سال: 2020

ISSN: 2347-5552

DOI: 10.21276/ijircst.2020.8.4.9