Safeguarded and Streamlined Confidentiality-Preserving Demonstrable Data Possession in Cloud Storage

Authors(2) :-Prof. Mrs. B. Rupa Devi, G. Sasi Sravani

Cloud computing provides a dependable and durable structure that enables accessors to store data and allows data consumers to pierce that data through Administartors. This helps reduce costs for data possessors by reducing expenditures for storehouse and conservation. nonetheless, possessors lose control over their data and the physical possession of it, performing in implicit security. Thus, it's pivotal to give auditing services to insure the responsibility of data in the pall. This presents a difficulty, since the verification of data power needs to be assured while also maintaining confidentiality. also, the SEPDP system has been expanded to accommodate multiple possessors, handle changes in data, and grease batch verification. The most charming aspect of this plan is that judges can corroborate the power of data with minimum computational trouble. In simple terms, SEPDP allows for the evidence of the delicacy of pall data while maintaining confidentiality. It's designed to efficiently handle multiple data possessors and variations, while also reducing the computational burden on adjudicators. Auditing is a process that ensures the integrity of data and is important for the possessors of the data.

Authors and Affiliations

Prof. Mrs. B. Rupa Devi
Associate Professor, Department of MCA, Annamacharya Institute of Technology & Sciences, Tirupati, Andhra Pradesh, India
G. Sasi Sravani
Post Graduate, Department of MCA, Annamacharya Institute of Technology & Sciences, Tirupati, Andhra Pradesh, India

Possesors, Confidentiality, Store, Data, Cloud

  1. K. Yang and X. Jia, “Data storage auditing service in cloud computing: challenges, methods and opportunities,” World Wide Web, vol. 15, no. 4, pp. 409–428, 2012.
  2. B. Wang, B. Li, H. Li, and F. Li, “Certificateless public auditing for data integrity in the cloud,” in Proceedings IEEE Conference on Communications and Network Security (CNS), 2013, pp. 136–144.
  3. H. Shacham and B. Waters, “Compact proofs of retrievability,” in Proceedings of 14th ASIACRYPT, 2008, pp. 90–107.
  4. C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-preserving public auditing for data storage security in cloud computing,” in Proceedings of 29th IEEE Conference on Computer Communications (INFOCOM), 2010, pp. 1–9.
  5. L. Yuchuan, F. Shaojing, X. Ming, and W. Dongsheng, “Enable data dynamics for algebraic signatures based remote data possession checking in the cloud storage,” China Communications, vol. 11, no. 11, pp. 114–124, 2014.
  6. A. F. Barsoum and M. A. Hasan, “Provable multicopy dynamic data possession in cloud computing systems,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 3, pp. 485–497, 2015.
  7. C. Wang, S. S. Chow, Q. Wang, K. Ren, and W. Lou, “Privacypreserving public auditing for secure cloud storage,” IEEE Transactions on Computers, vol. 62, no. 2, pp. 362–375, 2013.
  8. G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable data possession at untrusted stores,” in Proceedings of the 14th ACM conference on Computer and communications security, 2007, pp. 598–609.
  9. B. Wang, H. Li, X. Liu, F. Li, and X. Li, “Efficient public verification on the integrity of multi-owner data in the cloud,” Journal of Communications and Networks, vol. 16, no. 6, pp. 592–599, 2014.
  10. Y. Zhu, H. Hu, G.-J. Ahn, and M. Yu, “Cooperative provable data possession for integrity verification in multicloud storage,” IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 12, pp. 2231–2244, 2012

Publication Details

Published in : Volume 7 | Issue 2 | March-April 2024
Date of Publication : 2024-04-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 282-289
Manuscript Number : SHISRRJ247275
Publisher : Shauryam Research Institute

ISSN : 2581-6306

Cite This Article :

Prof. Mrs. B. Rupa Devi, G. Sasi Sravani, "Safeguarded and Streamlined Confidentiality-Preserving Demonstrable Data Possession in Cloud Storage", Shodhshauryam, International Scientific Refereed Research Journal (SHISRRJ), ISSN : 2581-6306, Volume 7, Issue 2, pp.282-289, March-April.2024
URL : https://shisrrj.com/SHISRRJ247275

Article Preview