A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Ponmagal, R. S.
- Bilinear Aggregate Signature and PDP Encryption in Audit Service for Cloud Storage
Authors
1 Dr. M.G.R Educational and Research Institute University, Chennai, IN
2 Dr. M.G.R Educational and Research Institute University, Chennai, IN
Source
Networking and Communication Engineering, Vol 7, No 6 (2015), Pagination: 283-286Abstract
Cloud-based outsourced storage relieves the client’s burden for storage management and maintenance by providing a comparably low-cost, scalable, location-independent platform. However, the fact that clients no longer have physical possession of data indicates that they are facing a potentially formidable risk for missing or corrupted data. Provable data possession (PDP), which is a cryptographic technique for verifying the integrity of data without retrieving it at a distrusted server, can be used to realize audit services. We prove that our construction holds these properties based on the computation Diffie–Hellman assumption and the rewind able black-box knowledge extractor. We also propose an efficient mechanism with respect to probabilistic queries and periodic verification to reduce the audit costs per verification and implement abnormal detection timely. In addition, we present an efficient method for selecting an optimal parameter value to minimize computational overheads of cloud audit services. Our experimental results demonstrate the effectiveness of our approach. This kind of outsourced storage services in clouds have become a new profit growth point by providing a comparably low-cost and scalable.Keywords
Provable Data Possession, Audit Services, Probabilistic Queries, Periodic Verification.- SAMON-C:Sensor Access and Monitoring in Cloud Environment
Authors
1 Department of CSE, Anna University of Technology, Tiruchirappalli, TamilNadu, IN
2 Department of ECE, Anna University of Technology, Tiruchirappalli, Tamilnadu, IN
Source
Networking and Communication Engineering, Vol 3, No 2 (2011), Pagination: 136-144Abstract
This paper aims to examine how the sensor information can be deployed as a service, through a new resource called ―cloud‖. The recent research issue in integrating Wireless sensor Networks with Cloud is to find a method to establish a faster communication link between the two. The wireless sensor networks are used to sense and collect the information required. The sensor information is deployed into the cloud through the sensor profile for web services. The Sensor Profile for Web Services specifies a lightweight subset of the overall Web services protocol suite that is appropriate for network-connected sensors. Cloud generally offers resources on demand. Since wireless sensor networks are limited in their processing power, battery life and communication speed, cloud computing usually offers the opposite, which makes it attractive for long term observations, analysis and use in different kinds of environments. In this paper a model is presented, which combines the concept of wireless sensor networks with the cloud computing paradigm, and show how both can benefit from this combination. Sensor data access is thus moved from loosely managed system to a well managed cloud. The integration of sensor information into the cloud through the sensor as a service paradigm proves the faster communication establishment. The scalability of this approach seems to be unlimited, since wireless sensor networks operate independently, and are connected to the cloud computing environment through a scalable number of wireless sensor network communication gateways. The cloud computing environment leads to the concept of green engineering, because it offers a massive storage of information at a distance place, which makes it very attractive. The main goal is to design a flexible architecture in which sensor network‘s information can be accessed by applications efficiently.Keywords
Cloud, Information, Resources, Sensors, Sensor Profiles, Scalability, Web Services.- Secure Preserving Public Auditing for Regenerating Code based on Cloud Storage
Authors
1 Dept. of CSE, IN
Source
Networking and Communication Engineering, Vol 8, No 5 (2016), Pagination: 200-204Abstract
The main aim of the cloud is to store boundless data with location independence. Once the data is bring in contact with the cloud it is known to be an outsourced data. This proposed work safeguards the outsourced data in cloud storage against degradation, malicious attacks, and malwares and stealth viruses. Since the users don’t have any control over the cloud, cloud admin takes care of protecting the data over a period of time. But now the scenario has been changed .No more the data owners stay online. Thus to lower the burden of the data owners to monitor continuously, a public auditing scheme has been introduced. This comprises of a third party auditor and a semi-trusted proxy. Regenerating code simply means the exact replication of the data which plays a vital role here. The privacy preservation of the data and the security will be assured in this proposed system.