Effective Cloud Backup Scheme using SBA algorithm in cloud auditing
Author(s):
S.Ranjini, T.Sahaya Arthi Jeno
Keywords:
auditing, secure storage , secure network coding, third party auditing
Abstract
This reveals an intrinsic relationship between secure cloud storage and secure network coding for the first time. Secure cloud storage was proposed only recently while secure network coding has been studied for more than ten years. Although the two areas are quite different in their nature and are studied independently, it show how to construct a secure cloud storage protocol given any secure network coding protocol. This gives rise to a systematic way to construct secure cloud storage protocols. This construction is secure under a definition which captures the real world usage of the cloud storage. Furthermore, two specific secure cloud storage protocols based on two recent secure network coding protocols is proposed. In particular, this obtain the first publicly verifiable secure cloud storage protocol in the standard model .It also enhance the proposed generic construction to support user anonymity and third-party public auditing, which both have received considerable attention recently. Finally, the newly proposed protocol is prototyped and evaluate its performance. Experimental results validate the effectiveness of the protocol.
Article Details
Unique Paper ID: 144360
Publication Volume & Issue: Volume 3, Issue 10
Page(s): 218 - 222
Article Preview & Download
Share This Article
Join our RMS
Conference Alert
NCSEM 2024
National Conference on Sustainable Engineering and Management - 2024