Cloud Data Storage Services Considering Public Audit for Security

1
Dr. swathi sambangi
Dr. swathi sambangi
2
Swathi Sambangi
Swathi Sambangi

Send Message

To: Author

GJCST Volume 13 Issue B1

Article Fingerprint

ReserarchID

CSTBKY1H3

Cloud Data Storage Services Considering Public Audit for Security Banner
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

The cloud computing is a computing technology that allows us to share the pool of configurable sources where the data of individuals or the organisations can be stored remotely those can be accessible on-demand high quality applications. Even though there are many advantages associated with cloud computing still it brings new challenges in terms of security provided for the data storage providers as sensitive information of individuals is stored in these cloud storage providers. The owners of data expect a cloud data storage provider to be ensured with high servicelevel requirements. To ensure the deployment of cloud data storage service with security levels, some efficient methods has to be designed for the verification of the correctness of data. This paper proposes architecture for cloud computing that has a trusted entity with expertise and capability to assess cloud storage security in assistance of data owner request. The main aim of this paper is to enable public risk auditing protocols with which data owners can gain trust in cloud.

11 Cites in Articles

References

  1. Qian Wang,Cong Wang,Jin Li,Kui Ren,Wenjing Lou (2009). Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing.
  2. Amazon (2008). Amazon s3 Availability Event.
  3. C Erway (2009). Dynamic Provable Data Possession.
  4. C Wang (2010). Privacy-Preserving Public Auditing for Storage Security in Cloud Computing.
  5. Ralph Merkle (1980). Protocols for Public Key Cryptosystems.
  6. P Mell,T Grance (2009). Draft NIST Working Definition of Cloud Computing.
  7. Victor Ohenhen,Osahenrumwen Ovenseri Christopher,Egbe Enobakhare (2006). Ectopic Pregnancy: A 5-year Review at Central Hospital, Benin City.
  8. M Armbrust (2009). Proceedings of the 1975 PEP summer study, July 28--August 20, 1975, Berkeley, California.
  9. M Krigsman (2008). Apple's MobileMe Experiences Post-Launch Pain.
  10. Ari Juels,Burton Kaliski (2007). Pors.
  11. G Ateniese (2008). Scalable and Efficient Provable Data Possession.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

Dr. swathi sambangi. 1970. \u201cCloud Data Storage Services Considering Public Audit for Security\u201d. Global Journal of Computer Science and Technology - B: Cloud & Distributed GJCST-B Volume 13 (GJCST Volume 13 Issue B1): .

Download Citation

Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Keywords
Classification
Not Found
Version of record

v1.2

Issue date

Language

English

Experiance in AR

The methods for personal identification and authentication are no exception.

Read in 3D

The methods for personal identification and authentication are no exception.

Article Matrices
Total Views: 25756
Total Downloads: 11037
2026 Trends
Research Identity (RIN)
Related Research

Published Article

The cloud computing is a computing technology that allows us to share the pool of configurable sources where the data of individuals or the organisations can be stored remotely those can be accessible on-demand high quality applications. Even though there are many advantages associated with cloud computing still it brings new challenges in terms of security provided for the data storage providers as sensitive information of individuals is stored in these cloud storage providers. The owners of data expect a cloud data storage provider to be ensured with high servicelevel requirements. To ensure the deployment of cloud data storage service with security levels, some efficient methods has to be designed for the verification of the correctness of data. This paper proposes architecture for cloud computing that has a trusted entity with expertise and capability to assess cloud storage security in assistance of data owner request. The main aim of this paper is to enable public risk auditing protocols with which data owners can gain trust in cloud.

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]
×

This Page is Under Development

We are currently updating this article page for a better experience.

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Cloud Data Storage Services Considering Public Audit for Security

Swathi Sambangi
Swathi Sambangi

Research Journals