International Journal of Advance Computational Engineering and Networking (IJACEN)
Follow Us On :
current issues
Volume-12,Issue-2  ( Feb, 2024 )
Past issues
  1. Volume-12,Issue-1  ( Jan, 2024 )
  2. Volume-11,Issue-12  ( Dec, 2023 )
  3. Volume-11,Issue-11  ( Nov, 2023 )
  4. Volume-11,Issue-10  ( Oct, 2023 )
  5. Volume-11,Issue-9  ( Sep, 2023 )
  6. Volume-11,Issue-8  ( Aug, 2023 )
  7. Volume-11,Issue-7  ( Jul, 2023 )
  8. Volume-11,Issue-6  ( Jun, 2023 )
  9. Volume-11,Issue-5  ( May, 2023 )
  10. Volume-11,Issue-4  ( Apr, 2023 )

Statistics report
May. 2024
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 134
Paper Published : 1558
No. of Authors : 4061
  Journal Paper

Paper Title :
Enabling Data Integrity Protection In Cloud Storage

Author :Amit Kumar Gupta, Anupam Sarkar, Suraj Khobragade, Pritish Shrikhande, Nilesh Kewat, Dipali Dakhole, Rupali Burde

Article Citation :Amit Kumar Gupta ,Anupam Sarkar ,Suraj Khobragade ,Pritish Shrikhande ,Nilesh Kewat ,Dipali Dakhole ,Rupali Burde , (2016 ) " Enabling Data Integrity Protection In Cloud Storage " , International Journal of Advance Computational Engineering and Networking (IJACEN) , pp. 17-21, Volume-4,Issue-4

Abstract : Cloud computing is the aggregation of multiple computing services, storage, network resources into a single entity called ”cloud” over the Internet. In cloud computing data security, integrity of data and access control are challenging issues, these issues remain the primary source for adoption of cloud computing services Protection of outsourced data in cloud storage becomes critical because of corruptions of data, enabling integrity protection, fault tolerance, and efficient recovery for cloud storage becomes necessary. Codes which are regenerating of data provide fault tolerance by splitting data across respective multiple servers, while concentrating on less repair traffic than traditional codes during failure recovery. Therefore, remotely checking the integrity of data against corruptions and other issues under a real time cloud storage setting is our problem of study. We practically design and implement data integrity protection (DIP) environment for a specific recovering code, while at the same time we preserving the essential properties of fault tolerance and repair traffic saving. Adversarial model is designed under a DIP scheme, and enables a user to conveniently verify the unity of random subsets of outsourced data against general or destructive corruptions. We demonstrate that remote integrity checking can be conveniently integrated into regenerated codes in practical implementation. Keywords— DIP, repair traffic, integrity, fault tolerance.

Type : Research paper

Published : Volume-4,Issue-4


Copyright: © Institute of Research and Journals

| PDF |
Viewed - 92
| Published on 2016-05-04
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World