Improving Zero Knowledge in Cloud Storage Auditing System
Keywords:
Zero Knowledge, Data Storage, Public Auditing, Cloud Computing, Batch AuditingAbstract
Usage of cloud storage user can store the data tenuously and have the benefit of on demand high quality applications and services from a shared pool of configurable computing resources without the burden of local data storage and maintenance. Utilize the random masking to guarantee that the EA would not learn any knowledge about the data content stored on the cloud server during the efficient auditing process, which not only eliminates the burden of cloud user from the tedious and possibly expensive auditing task, but also alleviates the users� fear of their outsourced data leakage
References
M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, A. Konwinski, G. Lee, D.A. Patterson, A. Rabkin, I. Stoica, and M.Zaharia, “A View of Cloud Computing,” Comm. ACM, vol. 53, no. 4,
YashpalKadam, “Security Issues in Cloud Computing A Transparent View”, International Journal of Computer Science Emerging Technology, Vol-2 No 5 October, 2011 , 316-322
K.S.Suresh M.Tech#1 Prof K.V. Prasad #2Asst. Professor Principal Department of CSE, MLRIT Security Issues and security algorithms in cloud computing
LIET, Hyderabad, India, Assoc. Professor, LIET, Hyderabad, India Linear programming in cloud computing for Practical outsourcing
RohitBhadauria, RituparnaChaki, NabenduChaki, SugataSanyal, “A Survey on Security Issues in Cloud Computing”, 2011
Cloud computing: benefits ,risks and recommendation for information security Nelson Gonzalez1*, Charles Miers1,4, Fernando Red´ıgolo1, Marcos Simpl´ıcio1, Tereza Carvalho1, Mats N¨aslund2 and MakanPourzandia
cloud computing security NGONGANG GUY MOLLET
YanZhua,b, HongxinHuc, Gail-JoonAhnc, Stephen S. Yauc.“Efficient audit service outsourcing for data integrity in clouds”.In “The Journal of Systems and Software 85 (2012) 1083– 1095”.
JoanDaemen, Vincent Rijmen, “Announcing the ADVANCED ENCRYPTION STANDARD (AES)”, Federal Information Processing Standards Publication 197, November 26, 2001
AbhishekMohta , Ravi Kant Sahu,Lalit Kumar Awasthi Robust Data Security for Cloud while using Third Party Auditor
Using Third Party Auditor for Cloud Data Security: A Review .AshishBhagat Ravi Kant Sahu
A Newer User Authentication, File encryption and Distributed Server Based Cloud Computing security architecture KawserWazed Nafi1,2, TonnyShekha Kar2, SayedAnisul Hoque3, Dr. M. M. A Hashem4
Mladen A. Vouk, “Cloud Computing – Issues, Research and Implementations”, Journal of Computing and Information Technology - CIT 16, 2008, 4, 235–246
Cloud Security Alliance, “Security guidance for critical areas of focus in cloud computing,” 2009, online at http://www.cloudsecurityalliance.org115.G. Ateniese et al., ―Scalable and Efficient Provable Data Possession, Proc. Secure Comm ‗08, Sept. 2008.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
