Survey on Implementation of Regenerating Code Based Cloud Computing for Privacy Preserving

Authors

  • Megha Sonkusare Priyadarshini Institute Of Engineering and Technology Computer Science & Engineering
  • Khushboo Khobragade Priyadarshini Institute Of Engineering and Technology Computer Science & Engineering
  • Sakshi Chaturvedi
  • Neha Dubey

Keywords:

Cloud storage, regenerating codes, authenticators, homeowners

Abstract

Outsourced knowledge in cloud storage is protected from corruption but it becomes crucial to add fault tolerance in cloud storage along with checking the reparation of knowledge integrity. Adventively make codes have quality because of their lower information measure providing fault tolerance. C remote checking ways for making coded knowledge exclusively offer non-public auditing requiring knowledge owner continuously keep on-line and handle auditing and repairing, that is impractical. A public auditing for the code based mostly cloud storage have been proposed. The regeneration inconvenient for unsuccessful authenticators is to be resolved within the absence of knowledge homeowners, a proxy that's privileged to regenerate the authenticators into the standard public auditing system model is introduced. Additionally style novel public verifiable authenticators that is generated by a handful of keys and may be regenerated exploitation partial keys. Hence this technique will totally unfairnessed knowledge homeowners from on-line burden. To preserve knowledge privacy the code coefficients are disarranged with a pseudorandom way.

References

G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable data possession at untrusted stores,” in Proceedings of the 14th ACM Conference on Computer and Communications Security, ser. CCS ’07. New York, NY, USA: ACM, 2007, pp. 598– 609.

A. Juels and B. S. Kaliski Jr, “Pors: Proofs of retrievability for large files,” in Proceedings of the 14th ACM conference on Computer and communications security. ACM, 2007, pp. 584–597.

R. Curtmola, O. Khan, R. Burns, and G. Ateniese, “Mr-pdp: Multiplereplica provable data possession,” in Distributed Computing Systems, 2008. ICDCS’08. The 28th International Conference on. IEEE, 2008, pp. 411–420.

K. D. Bowers, A. Juels, and A. Oprea, “Hail: a high-availability and integrity layer for cloud storage,” in Proceedings of the 16th ACM conference on Computer and communications security. ACM, 2009, pp. 187–198.

J. He, Y. Zhang, G. Huang, Y. Shi, and J. Cao, “Distributed data possession checking for securing multiple replicas in geographically dispersed clouds,” Journal of Computer and System Sciences, vol. 78, no. 5, pp. 1345–1358, 2012.

Downloads

Published

2017-09-30

How to Cite

Sonkusare, M., Khobragade, K., Chaturvedi, S., & Dubey, N. (2017). Survey on Implementation of Regenerating Code Based Cloud Computing for Privacy Preserving. Universal Research Reports, 4(6), 37–42. Retrieved from https://urr.shodhsagar.com/index.php/j/article/view/186

Issue

Section

Original Research Article