Open Access   Article Go Back

Improving Zero Knowledge in Cloud Storage Auditing System

B. Subasri1 , P. Vijayalakshmi2 , P. Yurega3 , E. Revathi4

Section:Research Paper, Product Type: Journal Paper
Volume-2 , Issue-3 , Page no. 204-207, Mar-2014

Online published on Mar 30, 2014

Copyright © B. Subasri, P. Vijayalakshmi, P. Yurega, E. Revathi . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: B. Subasri, P. Vijayalakshmi, P. Yurega, E. Revathi, “Improving Zero Knowledge in Cloud Storage Auditing System,” International Journal of Computer Sciences and Engineering, Vol.2, Issue.3, pp.204-207, 2014.

MLA Style Citation: B. Subasri, P. Vijayalakshmi, P. Yurega, E. Revathi "Improving Zero Knowledge in Cloud Storage Auditing System." International Journal of Computer Sciences and Engineering 2.3 (2014): 204-207.

APA Style Citation: B. Subasri, P. Vijayalakshmi, P. Yurega, E. Revathi, (2014). Improving Zero Knowledge in Cloud Storage Auditing System. International Journal of Computer Sciences and Engineering, 2(3), 204-207.

BibTex Style Citation:
@article{Subasri_2014,
author = {B. Subasri, P. Vijayalakshmi, P. Yurega, E. Revathi},
title = {Improving Zero Knowledge in Cloud Storage Auditing System},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2014},
volume = {2},
Issue = {3},
month = {3},
year = {2014},
issn = {2347-2693},
pages = {204-207},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=97},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=97
TI - Improving Zero Knowledge in Cloud Storage Auditing System
T2 - International Journal of Computer Sciences and Engineering
AU - B. Subasri, P. Vijayalakshmi, P. Yurega, E. Revathi
PY - 2014
DA - 2014/03/30
PB - IJCSE, Indore, INDIA
SP - 204-207
IS - 3
VL - 2
SN - 2347-2693
ER -

VIEWS PDF XML
3535 3453 downloads 3520 downloads
  
  
           

Abstract

Usage of cloud storage user can store the data tenuously and have the benefit of on demand high quality applications and services from a shared pool of configurable computing resources without the burden of local data storage and maintenance. Utilize the random masking to guarantee that the EA would not learn any knowledge about the data content stored on the cloud server during the efficient auditing process, which not only eliminates the burden of cloud user from the tedious and possibly expensive auditing task, but also alleviates the users� fear of their outsourced data leakage

Key-Words / Index Term

Zero Knowledge, Data Storage, Public Auditing, Cloud Computing, Batch Auditing

References

[1]. M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, A. Konwinski, G. Lee, D.A. Patterson, A. Rabkin, I. Stoica, and M.Zaharia, �A View of Cloud Computing,� Comm. ACM, vol. 53, no. 4,
[2]. YashpalKadam, �Security Issues in Cloud Computing A Transparent View�, International Journal of Computer Science Emerging Technology, Vol-2 No 5 October, 2011 , 316-322
[3]. K.S.Suresh M.Tech#1 Prof K.V. Prasad #2Asst. Professor Principal Department of CSE, MLRIT Security Issues and security algorithms in cloud computing
[4]. LIET, Hyderabad, India, Assoc. Professor, LIET, Hyderabad, India Linear programming in cloud computing for Practical outsourcing
[5]. RohitBhadauria, RituparnaChaki, NabenduChaki, SugataSanyal, �A Survey on Security Issues in Cloud Computing�, 2011
[6]. Cloud computing: benefits ,risks and recommendation for information security Nelson Gonzalez1*, Charles Miers1,4, Fernando Red�ıgolo1, Marcos Simpl�ıcio1, Tereza Carvalho1, Mats N�aslund2 and MakanPourzandia
[7]. cloud computing security NGONGANG GUY MOLLET
[8]. YanZhua,b, HongxinHuc, Gail-JoonAhnc, Stephen S. Yauc.�Efficient audit service outsourcing for data integrity in clouds�.In �The Journal of Systems and Software 85 (2012) 1083� 1095�.
[9]. JoanDaemen, Vincent Rijmen, �Announcing the ADVANCED ENCRYPTION STANDARD (AES)�, Federal Information Processing Standards Publication 197, November 26, 2001
[10]. AbhishekMohta , Ravi Kant Sahu,Lalit Kumar Awasthi Robust Data Security for Cloud while using Third Party Auditor
[11]. Using Third Party Auditor for Cloud Data Security: A Review .AshishBhagat Ravi Kant Sahu
[12]. A Newer User Authentication, File encryption and Distributed Server Based Cloud Computing security architecture KawserWazed Nafi1,2, TonnyShekha Kar2, SayedAnisul Hoque3, Dr. M. M. A Hashem4
[13]. Mladen A. Vouk, �Cloud Computing � Issues, Research and Implementations�, Journal of Computing and Information Technology - CIT 16, 2008, 4, 235�246
[14]. Cloud Security Alliance, �Security guidance for critical areas of focus in cloud computing,� 2009, online at http://www.cloudsecurityalliance.org115.G. Ateniese et al., ―Scalable and Efficient Provable Data Possession, Proc. Secure Comm ‗08, Sept. 2008.