Reference Hub5
Privacy-Preserving Public Auditing and Data Dynamics for Secure Cloud Storage Based on Exact Regenerated Code

Privacy-Preserving Public Auditing and Data Dynamics for Secure Cloud Storage Based on Exact Regenerated Code

Syam Kumar Pasupuleti
Copyright: © 2019 |Volume: 9 |Issue: 4 |Pages: 20
ISSN: 2156-1834|EISSN: 2156-1826|EISBN13: 9781522567790|DOI: 10.4018/IJCAC.2019100101
Cite Article Cite Article

MLA

Pasupuleti, Syam Kumar. "Privacy-Preserving Public Auditing and Data Dynamics for Secure Cloud Storage Based on Exact Regenerated Code." IJCAC vol.9, no.4 2019: pp.1-20. http://doi.org/10.4018/IJCAC.2019100101

APA

Pasupuleti, S. K. (2019). Privacy-Preserving Public Auditing and Data Dynamics for Secure Cloud Storage Based on Exact Regenerated Code. International Journal of Cloud Applications and Computing (IJCAC), 9(4), 1-20. http://doi.org/10.4018/IJCAC.2019100101

Chicago

Pasupuleti, Syam Kumar. "Privacy-Preserving Public Auditing and Data Dynamics for Secure Cloud Storage Based on Exact Regenerated Code," International Journal of Cloud Applications and Computing (IJCAC) 9, no.4: 1-20. http://doi.org/10.4018/IJCAC.2019100101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Cloud storage allows users to store their data in the cloud to avoid local storage and management costs. Since the cloud is untrusted, the integrity of stored data in the cloud has become an issue. To address this problem, several public auditing schemes have been designed to verify integrity of the data in the cloud. However, these schemes have two drawbacks: public auditing may reveal sensitive data to verifier and does not address the data recovery problem efficiently. This article proposes a new privacy-preserving public auditing scheme with data dynamics to secure the data in the cloud based on an exact regenerated code. This scheme encodes the data for availability, then masks the encoded blocks with randomness for privacy of data and enables a public auditor to verify the integrity of the data. Further, this scheme also supports dynamic data updates. In addition, security and performance analysis proves that proposed scheme is provably secure and efficient.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.