SINCE 2004

  • 0

      0 Item in Bag


      Your Shopping bag is empty

      CHECKOUT
  • Notice

    • ALL COMPUTER, ELECTRONICS AND MECHANICAL COURSES AVAILABLE…. PROJECT GUIDANCE SINCE 2004. FOR FURTHER DETAILS CALL 9443117328

    Projects > COMPUTER > 2017 > NON IEEE > APPLICATION

    Privacy Preserving Public Auditing for Secure Cloud Storage


    Abstract

    To protect outsourced data in cloud storage against corruptions, adding fault tolerance to cloud storage together with data integrity checking and failure reparation becomes critical. Recently, regenerating codes have gained popularity due to their lower repair bandwidth while providing fault tolerance. Existing remote checking methods for regenerating-coded data only provide private auditing, requiring data owners to always stay online and handle auditing, as well as repairing, which is sometimes impractical. In this paper, we propose a public auditing scheme for the regenerating-code-based cloud storage. To solve the regeneration problem of failed authenticators in the absence of data owners, we introduce a proxy, which is privileged to regenerate the authenticators, into the traditional public auditing system model. Moreover, we design a novel public verifiable authenticator, which is generated by a couple of keys and can be regenerated using partial keys. Thus, our scheme can completely release data owners from online burden. In addition, we randomize the encode coefficients with a pseudorandom function to preserve data privacy. Extensive security analysis shows that our scheme is provable secure under random oracle model and experimental evaluation indicates that our scheme is highly efficient and can be feasibly integrated into the regenerating-code-based cloud storage.


    Existing System

    In existing various techniques are used to secure and reduce the online over burden of the data owner. To reduce the overburden of the user Auditor is implemented to transfer the data here the auditor safely stores the data in the cloud and next audit the CSP and provide the result to the data owner. Both of them are designed for private audit, only the data owner is allowed to verify the integrity and repair the faulty servers. Considering the large size of the outsourced data and the user’s constrained resource capability, the tasks of auditing and reparation in the cloud can be formidable and expensive for the users. But auditor may misbehave thus the data get corrupted easily. The overhead of using cloud storage should be minimized as much as possible such that a user does not need to perform too many operations to their outsourced data. In particular, users may not want to go through the complexity in verifying and reparation. Here existing method to fully ensure the data integrity and save the users’ computation resources as well as online burden.


    Proposed System

    The proposed work is based on the auditing and secure transmission of regenerating code based implementation in cloud storage. The scope of the project is to enhance the security in cloud. The security authentication can be simply provided by two entities. The Auditing entities are reliable for the auditing check in the cloud storage. The main use of the proposed work is maintained under the auditing verification and the verification of the cloud in the data base. This should be used for the secure data access in cloud computing. The auditing scheme is done by the Auditor provided in the cloud namely (TPA) Third party Auditor. The TPA is responsible for developing the main use of the systematic representation is used to follow the main usage of the system it can be provided. The other usage of the model is it should be further implemented to reduce the overburden of the user side.


    Architecture


    System Architecture


    FOR MORE INFORMATION CLICK HERE