ijct
  • Home
  • Topics
  • Call For Paper
  • Publication Charges
  • Archives
    • Current Issue
    • Past Issues
    • conference
  • Submission
  • IRG Journals
  • Contact Us

ijct Submit Your Article : editorijctjournal@gmail.com

international journal of computer techniques(ijct)

Paper Title : NOVEL METHOD FOR DELEGATABLE PROOFS OF STORAGE TO PREVENT DATA LEAKAGE IN CLOUD STORAGE

ISSN : 2394-2231
Year of Publication : 2020

10.29126/23942231/IJCT-v7i6p17
Authors: Ms.Madhuri Desale

         



MLA Style: Ms.Madhuri Desale "NOVEL METHOD FOR DELEGATABLE PROOFS OF STORAGE TO PREVENT DATA LEAKAGE IN CLOUD STORAGE " Volume 7 - Issue 6 November - December,2020 International Journal of Computer Techniques (IJCT) ,ISSN:2394-2231 , www.ijctjournal.org

APA Style: Ms.Madhuri Desale "NOVEL METHOD FOR DELEGATABLE PROOFS OF STORAGE TO PREVENT DATA LEAKAGE IN CLOUD STORAGE " Volume 7 - Issue 6 November - December,2020 International Journal of Computer Techniques (IJCT) ,ISSN:2394-2231 , www.ijctjournal.org

Abstract
Cloud storage is associate increasingly customary application of cloud computing, which could provide on-demand outsourcing knowledge services for every organizations and folks. because of the data outsourcing, however, this new paradigm of data hosting service collectively introduces new security challenges that need associate freelance auditing service to examine the data integrity within the cloud. Some existing remote integrity checking ways in which will solely serve for static archive information and so can't be applied to the auditing service since the data within the cloud unit of measurement generally dynamically updated. we have a tendency to take into account the trip of permitting a 3rd Party reviewer (TPA), for the good thing about the cloud client, to verify the trait of the dynamic knowledge hangs on within the cloud. Proofs of storage (including Proofs of Retrievability and demonstrable information Possession) might be a cryptologic tool, that allows knowledge owner or third party auditor to audit integrity of data hold on remotely in Associate in Nursing very cloud storage server, whereas not keeping a district copy {knowledge|of information} or downloading data back throughout auditing.

Reference
[1] J. Xu, A. Yang, J. Zhou, and D. S. Wong, “Lightweight Delegatable proofs of storage,” in Proceedings of 21st European Symposium on Research in Computer Security, ESORICS 2016, pp. 324–343, Springer International Publishing, 2016. [2] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable data possession at untrusted stores,” in Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS 2007, pp. 598–609, ACM. [3] R. Curtmola, O. Khan, R. Burns, and G. Ateniese, “MR-PDP: Multiple-replica provable data possession,” in Proceedings of the 28th International Conference on Distributed Computing Systems, ICDCS 2008, pp. 411–420, IEEE, 2008. [4] C. Wang, S. S. Chow, Q. Wang, K. Ren, and W. Lou, “Privacy preserving public auditing for secure cloud storage,” IEEE Transactions on Computers, TC 2013, vol. 62, no. 2, pp. 362–375, 2013. [5] C. C. Erway, A. K¨upc¸ ¨ u, C. Papamanthou, and R. Tamassia, “Dynamic provable data possession,” ACM Transactions on Information and System Security, vol. 17, pp. 15:1–15:29, April 2015. [6] G. Ateniese, S. Kamara, and J. Katz, “Proofs of storage from homomorphic identification protocols,” in Advances in Cryptology -ASIACRYPT 2009, vol. 5912 of LNCS, pp. 319–333, Springer, 2009. [7] Hui Tian, Yuxiang Chen, Chin-Chen Chang, “Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage,” IEEE TRANSACTIONS ON SEVICE COMPUTING, MANUSCRIPT ID [8] Qian Wang, Cong Wang, Kui Ren, Wenjing Lou “Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing,” IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 22, NO. 5, MAY 2011 [9] Cong Wang, Qian Wang, Kui Ren, Ning Cao, and Wenjing Lou, “Toward Secure and Dependable Storage Services in Cloud Computing,” IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. 5, NO. 2, APRIL-JUNE 2012 [10] G. Ateniese, S. Kamara, and J. Katz, “Proofs of storage from homomorphic identification protocols,” in Advances in Cryptology -ASIACRYPT 2009, vol. 5912 of LNCS, pp. 319–333, Springer, 2009 [11] I. G. Aniket Kate, Gregory M. Zaverucha, “Constant-Size Commitments to Polynomials and Their Applications,” in Advances in Cryptology - ASIACRYPT 2010, pp. 177–194. [12] ] J. Alwen, Y. Dodis, and D. Wichs, “Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model,” in CRYPTO ’09: Annual International Cryptology Conference on Advances in Cryptology, pp. 36–54, 2009. [13] Dan Boneh, Ben Lynn, and Hovav Shacham, “Short Signatures from the Weil Pairing,” J. Cryptology (2004) 17: 297–319 [14] G., Burns, R., Curtmola, R., Herring, J., Khan, O., Kissner, L., Peterson, Z., and Song, “Remote Data Checking Using Provable Data Possession,” ACM Trans. Info. Syst. Sec. 14, 1, Article 12 [15] A. Juels and J. Burton S. Kaliski, “PORs: Proofs of retrievability for large files,” in Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS 2007, pp. 584–597, ACM, 2007. [16] H. Shacham and B. Waters, “Compact proofs of retrievability,” in Advances in Cryptology - ASIACRYPT 2008, vol. 5350 of LNCS, pp. 90–107, Springer, 2008. [17] B.Wang, B. Li, and H. Li, “Oruta: Privacy-preserving public auditing for shared data in the cloud,” in Proceedings of 5th International Conference on Cloud Computing, Cloud 2012, pp. 295–302, IEEE, 2012. [18] T. Okamoto, “Provably secure and practical identification schemes and corresponding signature schemes,” in CRYPTO ’92: Annual International Cryptology Conference on Advances in Cryptology, pp. 31– 53. [19] J. Alwen, Y. Dodis, and D. Wichs, “Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model,” in CRYPTO ’09: Annual International Cryptology Conference on Advances in Cryptology, pp. 36–54, 2009. [20] Jiawei Yuan, Shucheng Yu, and Song, “Proofs of retrievability with Public Verifiability and Constant Communication Cost in Cloud,” ACM Trans. May 8, 2013, Hangzhou, China. [21] Dan Boneh, Ben Lynn, and Hovav Shacham, “Short Signatures from the Weil Pairing,” J. Cryptology (2004) 17: 297–319

Keywords
Multi-Cloud storage, Proof of Storage, Cloud Computing, Third Party Auditor

IJCT Management

  • Home
  • Aim & Scope
  • Indexing
  • Author instruction
  • Call for paper IJCT JOURNAL
  • Current Issues
  • special issue
  • Review process
  • Impact factor
  • Board members
  • Publication ethics
  • Copyright Infringement
  • Join as a Reviewer
  • FAQ
  • Downloads

  • CopyrightForm
  • Paper Template
  • IJCT Policy

  • Terms & Conditions
  • Cancellation & Refund
  • Privacy Policy
  • Shipping &Delivery
  • Publication Rights
  • Plagiarism Policy
Copyright ©2015 IJCT- International Journal of Computer Techniques Published By International Research Group , All rights reserved

This work is licensed under a Creative Commons Attribution 4.0 (International) Licence. (CC BY-NC 4.0)