{"title":"提供安全的云存储服务","authors":"K. Vanathi, C. Valliyammai","doi":"10.1109/ICRTIT.2013.6844190","DOIUrl":null,"url":null,"abstract":"Cloud computing allows the cloud customer to hoard their data on the remote store and endow them to utilize the On-demand high quality applications with super colossal computational power. As prodigious amount of data are stored on the cloud, it inevitably acquaint new security hazards such as data integrity, data availability problems in the system. To overcome these issues, we propose an extensible mechanism to perform data integrity auditing by delegating it to the Third Party Auditor (TPA) in a privacy preserving manner. This design is formulated based on tagging and hash tag table which supports the updates in the data and also it identifies the deleterious servers. With the use of TPA, it also reduces the burden of Cloud Service Provider (CSP).","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Providing secure storage services on cloud\",\"authors\":\"K. Vanathi, C. Valliyammai\",\"doi\":\"10.1109/ICRTIT.2013.6844190\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cloud computing allows the cloud customer to hoard their data on the remote store and endow them to utilize the On-demand high quality applications with super colossal computational power. As prodigious amount of data are stored on the cloud, it inevitably acquaint new security hazards such as data integrity, data availability problems in the system. To overcome these issues, we propose an extensible mechanism to perform data integrity auditing by delegating it to the Third Party Auditor (TPA) in a privacy preserving manner. This design is formulated based on tagging and hash tag table which supports the updates in the data and also it identifies the deleterious servers. With the use of TPA, it also reduces the burden of Cloud Service Provider (CSP).\",\"PeriodicalId\":113531,\"journal\":{\"name\":\"2013 International Conference on Recent Trends in Information Technology (ICRTIT)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-07-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 International Conference on Recent Trends in Information Technology (ICRTIT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICRTIT.2013.6844190\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICRTIT.2013.6844190","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Cloud computing allows the cloud customer to hoard their data on the remote store and endow them to utilize the On-demand high quality applications with super colossal computational power. As prodigious amount of data are stored on the cloud, it inevitably acquaint new security hazards such as data integrity, data availability problems in the system. To overcome these issues, we propose an extensible mechanism to perform data integrity auditing by delegating it to the Third Party Auditor (TPA) in a privacy preserving manner. This design is formulated based on tagging and hash tag table which supports the updates in the data and also it identifies the deleterious servers. With the use of TPA, it also reduces the burden of Cloud Service Provider (CSP).