Shared Authority Based Privacy Preserving Authentication Protocol in De-duplication Cloud Computing

2015 
Cloud computing has changed the way computing takes place. It is the technology that enables outsourcing of computing and storage to a public cloud maintained by cloud service providers. Cloud users can use cloud storage and other facilities without capital investment in pay as you use fashion. Cloud data services, it is commonplace for data to be not only stored in the cloud, but also shared across multiple users. Unfortunately, the integrity of cloud data may suffer from hardware/software failures and human errors. Several mechanisms have been designed to allow both data owners and public verifiers to efficiently audit cloud data integrity without retrieving the entire data from the cloud server. As the data is stored in remote server in the data center of cloud service provider, there is security concern among the cloud users. This proposed mechanism ensures data integrity in cloud storage by utilizing third party auditing concept. The third party auditor is responsible to verify the integrity of data on behalf of cloud data owners.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    0
    References
    0
    Citations
    NaN
    KQI
    []