International Journal of Advances in Computer Science and Cloud Computing (IJACSCC)
.
Follow Us On :
current issues
Volume-10,Issue-1  ( May, 2022 )
Statistics report
Sep. 2022
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 17
Paper Published : 157
No. of Authors : 403
  Journal Paper


Paper Title :
Efficient Method For Cloud Data Storage And Security Based On Third Party Auditor

Author :Chadchankar Amarnath S., Thaksen Parvat

Article Citation :Chadchankar Amarnath S. ,Thaksen Parvat , (2014 ) " Efficient Method For Cloud Data Storage And Security Based On Third Party Auditor " , International Journal of Advances in Computer Science and Cloud Computing (IJACSCC) , pp. 14-18, Volume-2,Issue-1

Abstract : Abstract—in this paper we have presented the extended approach for cloud computing data security and integrity verification with dynamics data under the multiple users. Cloud computing provides more advantages for the users to create and data storing in the remote servers thereby utilizing fewer assets in client scheme. Before the efficient approach is presented with single client which is gets attached with TPA and CSS (Cloud Storage Server) for data dynamics and integrity verification. Although under the cloud environment there may be multiple clients connected with CSS; hence we are aspiring to utilize the approach effectively for such situations by utilizing the concept of synchronization of multiple clients with TPA and CSS. This paper is focusing over security and integrity of facts and figures retained at untrusted or semi-trusted cloud storage server under multiple purchasers. We first identify the difficulties and potential security problems of direct extensions with fully dynamic data updates from prior works. Here significantly it desires to monitor the jobs related to data auditing effectively as per the clients demands. The introduction of TPA eliminates the involvement of the client through the auditing of whether his data stored in the cloud are indeed intact, which can be important in achieving economies of scale for Cloud Computing. The suggested scheme is capable of carrying both public audit ability as well as facts and figures dynamics. Merkle Hash Tree is furthermore utilized for advancing the grade of authentication. The new security model for data blocks security is presented.

Type : Research paper

Published : Volume-2,Issue-1


DOIONLINE NO - IJACSCC-IRAJ-DOIONLINE-679   View Here

Copyright: © Institute of Research and Journals

| PDF |
Viewed - 87
| Published on 2014-05-05
   
   
IRAJ Other Journals
IJACSCC updates
IJACSCC Volume-9,Issue-1(May, 2021)
The Conference World

JOURNAL SUPPORTED BY


Warning: include(footer.php): failed to open stream: No such file or directory in /home/dakhinaray/public_html/ITRESEARCH_WEBSTE/IRAJ.IN/journal/IJACSCC/paper_detail.php on line 842

Warning: include(): Failed opening 'footer.php' for inclusion (include_path='.:/opt/alt/php56/usr/share/pear:/opt/alt/php56/usr/share/php') in /home/dakhinaray/public_html/ITRESEARCH_WEBSTE/IRAJ.IN/journal/IJACSCC/paper_detail.php on line 842