Effective Cloud Backup Scheme using SBA algorithm in cloud auditing
S.Ranjini, T.Sahaya Arthi Jeno
auditing, secure storage , secure network coding, third party auditing
This reveals an intrinsic relationship between secure cloud storage and secure network coding for the first time. Secure cloud storage was proposed only recently while secure network coding has been studied for more than ten years. Although the two areas are quite different in their nature and are studied independently, it show how to construct a secure cloud storage protocol given any secure network coding protocol. This gives rise to a systematic way to construct secure cloud storage protocols. This construction is secure under a definition which captures the real world usage of the cloud storage. Furthermore, two specific secure cloud storage protocols based on two recent secure network coding protocols is proposed. In particular, this obtain the first publicly verifiable secure cloud storage protocol in the standard model .It also enhance the proposed generic construction to support user anonymity and third-party public auditing, which both have received considerable attention recently. Finally, the newly proposed protocol is prototyped and evaluate its performance. Experimental results validate the effectiveness of the protocol.
Article Details
Unique Paper ID: 144360

Publication Volume & Issue: Volume 3, Issue 10

Page(s): 218 - 222
Article Preview & Download

Share This Article

Conference Alert


AICTE Sponsored National Conference on Smart Systems and Technologies

Last Date: 25th November 2021

SWEC- Management


Last Date: 7th November 2021

Go To Issue

Call For Paper

Volume 8 Issue 4

Last Date 25 September 2021

About Us

IJIRT.org enables door in research by providing high quality research articles in open access market.

Send us any query related to your research on editor@ijirt.org

Social Media

Google Verified Reviews

Contact Details

Email: editor@ijirt.org
Website: ijirt.org