Data Security in Cloud Storage using Regenerating Code and Visual Cryptography  
  Authors : Geeta Nadlamani

 

The regeneration code provide fault tolerance with low repair bandwidth. In regeneration coded data, there exists remote checking method providing private auditing, which includes data owners to stay online, which is impractical . In order to avoid this, public auditing scheme for regenerating code is proposed; proxy is used to solve problem of regeneration problem; used to generate failed authenticator in public auditing system. This scheme eliminates data owners from online burden.

 

Published In : IJCAT Journal Volume 2, Issue 11

Date of Publication : November 2015

Pages : 478 - 482

Figures :04

Tables : --

Publication Link :Data Security in Cloud Storage using Regenerating Code and Visual Cryptography

 

 

 

Geeta Nadlamani : Computer Department, University of Pune, AISSMS, COE Pune, Maharashtra 411001, India

 

 

 

 

 

 

 

Visual Cryptography

Regenerated Code

Public Auditing Scheme

Privacy Preserving

Cloud Storage

This paper has introduced public auditing for regenerating code based cloud storage system, which includes TPA, data owners, cloud servers and untrusted-proxy. Few schemes are proposed like setup audit and repair; whereas in previous topics of privacy preserving public auditing for cloud storage only two schemes where proposed audit and setup. But this topic includes additional scheme repair due to regeneration concept. Concept of proxy is introduced which solves problem of regeneration in case of authenticator failure.

 

 

 

 

 

 

 

 

 

[1] Jian Liu, Kun Huang, Hong Rong, Huimei Wang and Ming Xian, " Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage ", in IEEE TRANSACTIONS ON INFORMATION AND SECURITY,2015, Vol. 1. [2] Boyang Wang, Student Member, IEEE, Baochun Li, Senior Member, IEEE, and Hui Li, Member, IEEE, " Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud", in IEEE TRANSACTIONS ON CLOUD COMPUTING, 2014, Vol. 2, pp. 43-56. [3] Cong Wang, Sherman S.M. Chow, Qian Wang, Kui Ren, and Wenjing Lou, " Privacy-Preserving Public Auditing for Secure Cloud Storage",in IEEE TRANSACTIONS ON COMPUTERS, 2013, Vol. 62, pp. 362-375. [4] Cong Wang, Qian Wang, Kui Ren, and Wenjing Lou, " Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing", in IEEE INFOCOM, 2010, pp. 1-15.