INCLUSIVE AUDIT IN IDENTITY BASED INFORMATION OUTSOURCING WITH CLOUD COMPUTING ENVIRONMENT
Author(s):
KAMALI. R, Chandra Prabha. K, Rajanandhini. M
Keywords:
Cloud storage, data outsourcing, proof of storage, remote integrity proof, public auditing
Abstract
The cloud storage system provides convenient file storage and sharing services for distributed clients. In order to solve the integrity, we present identity-based data outsourcing (IBDO), outsourcing and original auditing concerns about outsourced documents, The program is equipped with an ideal feature that facilitates existing recommendations to protect outsourcing data. First of all, our IBDO plan Allows the user to authorize the dedicated agent to upload the data to the cloud storage server (for example, the company can authorize) Some employees upload files to the company's cloud account in a controlled manner. The agent is identified and authorized Identifiable identity eliminates complex certificate management in conventional secure distributed computing systems. Second, Our IBDO program is a comprehensive audit that our program not only allows for formal integrity audits in existing programs Used to protect the outsourced data, but also allows the review of external data sources, types and consistency information.
Article Details
Unique Paper ID: 146323

Publication Volume & Issue: Volume 4, Issue 12

Page(s): 294 - 299
Article Preview & Download


Share This Article

Join our RMS

Conference Alert

NCSEM 2024

National Conference on Sustainable Engineering and Management - 2024

Last Date: 15th March 2024

Call For Paper

Volume 10 Issue 10

Last Date for paper submitting for March Issue is 25 June 2024

About Us

IJIRT.org enables door in research by providing high quality research articles in open access market.

Send us any query related to your research on editor@ijirt.org

Social Media

Google Verified Reviews