The regeneration code provide fault tolerance
with low repair bandwidth. In regeneration coded data, there
exists remote checking method providing private auditing,
which includes data owners to stay online, which is
impractical . In order to avoid this, public auditing scheme
for regenerating code is proposed; proxy is used to solve
problem of regeneration problem; used to generate failed
authenticator in public auditing system. This scheme
eliminates data owners from online burden.
Published In : IJCAT Journal Volume 2, Issue 11
Date of Publication : November 2015
Pages : 478 - 482
Figures :04
Tables : --
Publication Link :Data Security in Cloud Storage using Regenerating
Code and Visual Cryptography
Geeta Nadlamani : Computer Department, University of Pune, AISSMS, COE
Pune, Maharashtra 411001, India
Visual Cryptography
Regenerated Code
Public
Auditing Scheme
Privacy Preserving
Cloud Storage
This paper has introduced public auditing for regenerating
code based cloud storage system, which includes TPA,
data owners, cloud servers and untrusted-proxy. Few
schemes are proposed like setup audit and repair; whereas in previous topics of privacy preserving public auditing for
cloud storage only two schemes where proposed audit and
setup. But this topic includes additional scheme repair due
to regeneration concept. Concept of proxy is introduced
which solves problem of regeneration in case of
authenticator failure.
[1] Jian Liu, Kun Huang, Hong Rong, Huimei Wang and
Ming Xian, " Privacy-Preserving Public Auditing for
Regenerating-Code-Based Cloud Storage ", in IEEE
TRANSACTIONS ON INFORMATION AND
SECURITY,2015, Vol. 1.
[2] Boyang Wang, Student Member, IEEE, Baochun Li,
Senior Member, IEEE, and Hui Li, Member, IEEE, "
Oruta: Privacy-Preserving Public Auditing for Shared
Data in the Cloud", in IEEE TRANSACTIONS ON
CLOUD COMPUTING, 2014, Vol. 2, pp. 43-56.
[3] Cong Wang, Sherman S.M. Chow, Qian Wang, Kui
Ren, and Wenjing Lou, " Privacy-Preserving Public
Auditing for Secure Cloud Storage",in IEEE
TRANSACTIONS ON COMPUTERS, 2013, Vol. 62,
pp. 362-375.
[4] Cong Wang, Qian Wang, Kui Ren, and Wenjing Lou, "
Privacy-Preserving Public Auditing for Data Storage
Security in Cloud Computing", in IEEE INFOCOM,
2010, pp. 1-15.