In data publishing cloud computing is going to
be play a vital role. Cloud storage offers the users to store
their data on cloud in cloud computing to reduce the online
burden and maintenance. The user physically deletes the
data from his local storage after outsourcing the data to the
cloud so providing security for outsourced data is
considered as an important task. So this paper proposes
privacy preserving and public auditing for secure storage.
In this technique the users delegates their work to third
party auditors (TPA) to check the integrity of the out
sourced data when needed is called auditing process so
that the users do not worry about their data possession and
the data towards TPA should be protected using some
encryption mechanisms to provide privacy. Efficient and
secure access for large amount of data stored in cloud
server an important task. for efficient access of large
amount of outsourced data they proposes to encrypt every
block with different encryption keys, they uses key
derivation methods to reduce the no of keys used. In this
paper they also proposes lazy revocation and over
encryption where revoked users cannot access the updated
information from the cloud server.
Published In : IJCSN Journal Volume 3, Issue 3
Date of Publication : 01 June 2014
Pages : 144 - 147
Figures : 02
Tables : --
Publication Link :
ch.Sravan Kumar : Asst Professor,Vardhaman College Of Engineering(Cse Dept)
srinivas Kolli : Asst Professor, Vardhaman College Of Engineering(Cse Dept)
Dr P.Chenna Reddy : Professor, Jntua College Of Engineering, Cse Dept
Outsourcing data to remote servers has become a growing
trend for many organizations to alleviate the burden of
local data storage and maintenance. In this work we have
studied different aspects of outsourcing data storage:
block-level data dynamic, newness, mutual trust, and
access control. We have proposed a cloud-based storage
scheme which supports outsourcing of dynamic data,
where the owner is capable of not only archiving and
accessing the data stored by the CSP, but also updating
and scaling this data on the remote servers. The proposed
scheme enables the authorized users to ensure that they are
receiving the most recent version of the outsourced data.
Moreover, in case of dispute regarding data
integrity/newness.
[1] A. Singh and L. Liu, “Sharoes: A data sharing platform
for outsourced enterprise storage environments,” in
Proceedings of the 24th International Conference on Data
Engineering, ICDE. IEEE, 2008, pp. 993–1002.
[2] 104th United States Congress, “Health Insurance
Portability and Accountability Act of 1996 (HIPAA),”
Online at http://aspe. hhs.gov/admnsimp/pl104191.htm,
1996.
[3] D. L. G. Filho and P. S. L. M. Barreto, “Demonstrating
data possession and uncheatable data transfer,”
Cryptology ePrint Archive, Report 2006/150, 2006.
[4] M. A. Shah, M. Baker, J. C. Mogul, and R. Swaminathan,
“Auditing to keep online storage services honest,” in
HOTOS’07: Proceedings of the 11th USENIX workshop
on Hot topics in operating systems, Berkeley, CA, USA,
2007, pp. 1–6.