0% found this document useful (0 votes)
331 views

Regenerating-Code-Based Cloud Storage Using Privacy-Preserving Public Auditing

This document discusses a regenerating-code-based cloud storage system using privacy-preserving public auditing. It proposes a new method that uses a third party auditor and proxy to allow data changes and repairs without requiring the data owner to be online. This improves on existing techniques by providing stronger security and privacy while maintaining data availability.

Uploaded by

Editor IJRITCC
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
331 views

Regenerating-Code-Based Cloud Storage Using Privacy-Preserving Public Auditing

This document discusses a regenerating-code-based cloud storage system using privacy-preserving public auditing. It proposes a new method that uses a third party auditor and proxy to allow data changes and repairs without requiring the data owner to be online. This improves on existing techniques by providing stronger security and privacy while maintaining data availability.

Uploaded by

Editor IJRITCC
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

International Journal on Recent and Innovation Trends in Computing and Communication

Volume: 3 Issue: 12

ISSN: 2321-8169
6697 - 6698

______________________________________________________________________________________

Regenerating-Code-Based Cloud Storage using Privacy-Preserving Public


Auditing

Kamini Suresh Bhavsar


ME , Dept: Computer Engineering
PVPIT, Bavdhan
City-Pune, Country-INDIA
e-mail: [email protected]

Abstract In Regenerating-code-based cloud storage using Privacy-Preserving public auditing scheme there is no need of data owners for data
change, we can change data using proxy and partial keys. Using Third Party Auditor which provide more security and allows the user to know
the information about the data stored in the cloud. We elaborate on the correctness of verification with public auditing scheme and
regenerating codes have gained Data integrity on cloud data storage.

Keywords- Cloud storage, regenerating codes, public audit, privacy preserving, authenticator regeneration, proxy, privileged, provable secure
.__________________________________________________*****_________________________________________________
I.

INTRODUCTION

Now a days cloud storage is gaining popularity due


to it offers a exible on-demand data outsourcing service with
appealing benets: relief of the burden for storage
management, universal data access with location
independence, and avoidance of capital expenditure on
hardware, software, and personal maintenances, Using privacy
preserving public auditing, data hosting service also brings
new security threats toward users data, thus making
individuals or enter prisers still feel hesitant. Sometimes data
owners lose ultimate control over the fate of their outsourced
data so there is risk that availability and integrity of the data
might be lost. To protect outsourced data in cloud storage
against corruptions, adding fault tolerance to cloud storage
together with data integrity checking and failure reparation.
Due to lower repair bandwidth while providing fault tolerance
Regenerating codes have gained popularity.
II.

LITERATURE SURVEY

In the cloud storage to protect outsource data by adding fault


tolerance with data integrity checking and failure reparation
becomes critical. Due to lower repair bandwidth while
providing fault tolerance of regenerating codes have gained
popularity. By using existing methods for regenerating-coded
data it only provide private auditing and it requires data
owners to always stay online and for repairing also there is
data owner is require which is sometimes impractical.
By manipulating the classic Merkle Hash Tree construction for
block tag authentication, it improves the existing proof of
storage models and as well as achieve efficient data dynamics,
multiple auditing tasks explore the technique of bilinear
aggregate signature to extend the result into a multi-user

setting with the help of TPA which can perform multiple


auditing tasks simultaneously. The proposed schemes are
highly efficient and provably secure as per Extensive security
and performance analysis.
III.

PROBLEM STATEMENT

Protect outsourced data in cloud storage against corruptions,


adding fault tolerance to cloud storage together with data
integrity checking and failure reparation. We elaborate on the
correctness of verification with public auditing scheme and
regenerating codes have gained Data integrity on cloud data
storage.
IV.

PROPOSED SYSTEM

In the privacy auditing there are some problems for designing


public auditor in the regenerating-code-based cloud storage
using privacy auditing, Using Third Party Auditor which
provide more security and allows the user to know the
information about the data stored in the cloud, there are
some schemes which make data change even if data owner is
not online
V.

SYSTEM OVERVIEW

In

the system, by using the technique which


providing more security
that is Third Party
Auditor (TPA)

The TPA

.
allows

the

user

to

know

the

information about the data stored in the cloud .


When anyone tries to modify or steal the data
TPA informs the user by
verifying the data.

6697
IJRITCC | December 2015, Available @ http://www.ijritcc.org

_______________________________________________________________________________________

International Journal on Recent and Innovation Trends in Computing and Communication


Volume: 3 Issue: 12

ISSN: 2321-8169
6697 - 6698

______________________________________________________________________________________
ACKNOWLEDGMENT
I have a great pleasure in presenting the project privacy
preserving public auditing for regenerating code based cloud
storage under the guidance of Prof.S.V.Bodake..I am truly
indebted and grateful to my seminar guide,for her guidance
and encouragement, in selection of this topic and the contents
of project.I wish to express my sincere thanks to the Head of
department, Prof.N.D.Kale for his immense help in planning
and executing the works in time. My grateful thanks to the PG
Co-ordinator Prof.S.V.Bodake and the departmental staff
members for their support.
REFERENCES

The system model for Regenerating-Code-based


cloud storage as Fig., which involves four entities: webapplication,database-system,webserver,web client the third
party auditor (TPA), who has expertise and capabilities to
conduct public audits on the coded data in the cloud, the TPA
is trusted and its audit result is unbiased for both data owners
and cloud servers; and a proxy agent, who is semi-trusted and
acts on behalf of the data owner to regenerate authenticators
and data blocks on the failed servers during the repair
procedure.
VI.

[1]

Farzad Sabahi Student Member, IEEE, Cloud Computing


Security Threats and Responses, Mar 2006.

[2]

Qian Wang, Student Member, IEEE, Cong Wang, Student


Member, IEEE, KuiRen, Member, IEEE,Wenjing Lou, Senior
Member, IEEE, and Jin Li Enabling Public Auditability and
Data Dynamics for Storage Security in Cloud Computing,Dec
2008.

[3]

Yuchong HuStudent Member, IEEE, Lee, P.P.C. Student


Member, IEEE; Shum, K.W,Analysis and construction of
functional regenerating codes with uncoded repair for distributed
storage systems, Jan 2009.

[4]

H. Abu-Libdeh, L. Prince House, and H. Weather spoon. RACS:


A Case for Cloud Storage Diversity. In Proc. of ACM SoCC,
2010.

[5]

Henry C. H. Chen Student Member, IEEE, Yuchong Hu, Patrick


P. C. Lee Student Member, IEEE, and Yang Tang Student
Member, IEEE,NCCloud: A Network-Coding-Based Storage
System in a Cloud-of- Clouds,Jun 2011.

[6]

Cong Wang, Student Member, IEEE, Sherman S.-M. Chow,


Qian Wang, Student Member, IEEE, KuiRen, Member, IEEE,
and Wenjing Lou, Member, IEEEPrivacy-Preserving Public
Auditing for Secure Cloud Storage, Jun 2012.

[7]

H. C. H. Chen and P. P. C. Lee, Enabling data integrity


protection in regenerating-coding-based cloud storage: Theory
and implementation,IEEE Trans. Parallel Distrib. Syst., vol. 25,
no. 2, pp. 407416,Feb. 2014.

[8]

J. He, Y. Zhang, G. Huang, Y. Shi, and J. Cao, Distributed data


possession checking for securing multiple replicas in
geographicallydispersed clouds, J. Comput. Syst. Sci., vol. 78,
no. 5, pp. 13451358, 2012

CONCLUSION

A survey is done to propose a new method to offer a better


Regenerating-code-based cloud storage using PrivacyPreserving public auditing .This system is public auditing for
regenerating code and it does not require data owner to always
stay online Regenerating codes have gained popularity due to
their lower repair bandwidth while providing fault tolerance.

6698
IJRITCC | December 2015, Available @ http://www.ijritcc.org

_______________________________________________________________________________________

You might also like