Cloud Computing

2069 Words5 Pages

user. Here in our paper the TPA audits the requested user’s data without reading the actual content of the data of the requested user so that preserving more privacy and auditing in a effective way so that the client gets the required results so that he user can take his further steps in improving their data security.
II. RELATED WORK
Cloud Computing has many threats which are disturbing gigantic acceptance of cloud. Major threats that affect data integrity and privacy in cloud storage. In order to reduce this type of threats in cloud many researches are going on.
A. Existing system:
Many useful solutions were come in to picture by these research to reduce the threats in data integrity. Many approaches were come in to picture to assure the data integrity in cloud storage system. Ensuring data storage security in cloud computing by Wang C, Wang Q proposed a verification scheme for public verifiability and data dynamic operations and enhanced the POR model by changing the classic Merkle Hash Tree (MHT) construction for block tag authentication.
According to the ACM security issues which introduced one flexible and an efficient way of distributed method which attain the combined way of storage correctness assurance and supported efficient dynamic operations on data blocks along with and data error localization in the distributed verification of erasure-coded cloud data.
Dynamic Audit Services deals with the HAIL, integrity layer and a high-availability, a distributed cryptographic system which allows a group of servers to prove the client that the stored file is an intact along with retrievable.
Integrity check verification for SaaS introduced an useful approach based on the periodic verification for enhancing the performance of a...

... middle of paper ...

... is done with the use of local copy of the requested data, or it may lead to extra burden to the data owner i.e. client in the case of private auditing of their data. In our proposed scheme the zero knowledge property i.e. the TPA verifies the requested client data without knowing the actual data content of the client such that the TPA who is responsible to verify the user’s data will not be having any knowledge about the client data thus providing more secure. So, our proposed scheme can be more secured than any other if we compared it to the existing conventional schemes. Next, for the verification, only the encryption of the data with the block wise auditing and such that communication cost can also be reduced in our scheme. By all these advantages of the proposed scheme it is the most economical secured way of auditing in the storage system of Cloud Computing.

More about Cloud Computing

Open Document