Secure Public Auditing With Network Coding Based Storage in Cloud Architecture
B.Lekha,  Prof. P. Kirubanantham
Abstract— Cloud computing setting in which probabilistic querying of outsourced data is a service provider. The data is to be accessed by only to the trusted users, not to the service distributer or anyone else. Outsourcing offers the data owner scalability. The need for privacy may be due to the data being sensitive or otherwise confidential. Still Security challenges and losing of information are the biggest problem when considering the adoption of cloud services. This triggered a several research activities, resulting in a quantity of proposals targeting the various cloud security threats and repair Storage node but doesn’t provide efficient security mechanism and fault isolation process. Now this proposed system will overcome for all existing problems. New public auditing scheme for regenerating-code-based cloud storage, to solve the regeneration criticality problems of failed authenticators in the absence of data owners; to introduce a proxy, which is legally protected to regenerate the authenticators, into the traditional public auditing system model. Moreover, to design a novel public verifiable authenticator is generated by a couple of keys and using partial key for regeneration. Thus, our scheme can completely free that the data owners from online burden. In addition, our system using randomized coefficient which is encoded with a pseudorandom function to preserve data protection. Our scheme is to feasibly integrate into the regenerating-code-based cloud storage and it should be highly efficient.
Keywords- Keywords- public auditing, Cloud storage, regenerating codes, authenticator regeneration, proxy, provable secure.
Cite this Article
B.Lekha,  Prof. P. Kirubanantham,   "Secure Public Auditing With Network Coding Based Storage in Cloud Architecture"
, International Journal of Engineering Development and Research (IJEDR), ISSN:2321-9939, Volume.4, Issue 1, pp.626-630, March 2016, Available at :http://www.ijedr.org/papers/IJEDR1601107.pdf