Effective Cloud Backup Scheme using SBA algorithm in cloud auditing
Author(s):
S.Ranjini, T.Sahaya Arthi Jeno
Keywords:
auditing, secure storage , secure network coding, third party auditing
Abstract
This reveals an intrinsic relationship between secure cloud storage and secure network coding for the first time. Secure cloud storage was proposed only recently while secure network coding has been studied for more than ten years. Although the two areas are quite different in their nature and are studied independently, it show how to construct a secure cloud storage protocol given any secure network coding protocol. This gives rise to a systematic way to construct secure cloud storage protocols. This construction is secure under a definition which captures the real world usage of the cloud storage. Furthermore, two specific secure cloud storage protocols based on two recent secure network coding protocols is proposed. In particular, this obtain the first publicly verifiable secure cloud storage protocol in the standard model .It also enhance the proposed generic construction to support user anonymity and third-party public auditing, which both have received considerable attention recently. Finally, the newly proposed protocol is prototyped and evaluate its performance. Experimental results validate the effectiveness of the protocol.
Article Details
Unique Paper ID: 144360

Publication Volume & Issue: Volume 3, Issue 10

Page(s): 218 - 222
Article Preview & Download


Share This Article

Join our RMS

Conference Alert

NCSEM 2024

National Conference on Sustainable Engineering and Management - 2024

Last Date: 15th March 2024

Call For Paper

Volume 10 Issue 10

Last Date for paper submitting for March Issue is 25 June 2024

About Us

IJIRT.org enables door in research by providing high quality research articles in open access market.

Send us any query related to your research on editor@ijirt.org

Social Media

Google Verified Reviews