Effective Cloud Backup Scheme using SBA algorithm in cloud auditing

  • Unique Paper ID: 144360
  • Volume: 3
  • Issue: 10
  • PageNo: 218-222
  • Abstract:
  • This reveals an intrinsic relationship between secure cloud storage and secure network coding for the first time. Secure cloud storage was proposed only recently while secure network coding has been studied for more than ten years. Although the two areas are quite different in their nature and are studied independently, it show how to construct a secure cloud storage protocol given any secure network coding protocol. This gives rise to a systematic way to construct secure cloud storage protocols. This construction is secure under a definition which captures the real world usage of the cloud storage. Furthermore, two specific secure cloud storage protocols based on two recent secure network coding protocols is proposed. In particular, this obtain the first publicly verifiable secure cloud storage protocol in the standard model .It also enhance the proposed generic construction to support user anonymity and third-party public auditing, which both have received considerable attention recently. Finally, the newly proposed protocol is prototyped and evaluate its performance. Experimental results validate the effectiveness of the protocol.
add_icon3email to a friend

Copyright & License

Copyright © 2025 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

BibTeX

@article{144360,
        author = {S.Ranjini and T.Sahaya Arthi Jeno},
        title = {Effective Cloud Backup Scheme using  SBA algorithm in cloud auditing},
        journal = {International Journal of Innovative Research in Technology},
        year = {},
        volume = {3},
        number = {10},
        pages = {218-222},
        issn = {2349-6002},
        url = {https://ijirt.org/article?manuscript=144360},
        abstract = {This reveals an intrinsic relationship between secure cloud storage and secure network coding for the first time. Secure cloud storage was proposed only recently while secure network coding has been studied for more than ten years. Although the two areas are quite different in their nature and are studied independently, it show how to construct a secure cloud storage protocol given any secure network coding protocol. This gives rise to a systematic way to construct secure cloud storage protocols. This construction is secure under a definition which captures the real world usage of the cloud storage. Furthermore, two specific secure cloud storage protocols based on two recent secure network coding protocols is proposed. In particular, this obtain the first publicly verifiable secure cloud storage protocol in the standard model .It also enhance the proposed generic construction to support user anonymity and third-party public auditing, which both have received considerable attention recently. Finally, the newly proposed protocol is prototyped and evaluate its performance. Experimental results validate the effectiveness of the protocol.},
        keywords = {auditing, secure storage , secure network coding, third party auditing},
        month = {},
        }

Cite This Article

  • ISSN: 2349-6002
  • Volume: 3
  • Issue: 10
  • PageNo: 218-222

Effective Cloud Backup Scheme using SBA algorithm in cloud auditing

Related Articles