Loading

A Survey on Automatic Protocol Blocker for Privacy -Preserving Public Auditing in Cloud Computing
Rohini Kadlag1, Rohit Devikar2

1Rohini Kadlag, Department of Information Technology, Amrutvahini College of Engineering, Sangamner (Maharashtra), India.
2Rohit Devikar, Department of Information Technology, Amrutvahini College of Engineering, Sangamner (Maharashtra), India.
Manuscript received on 10 May 2014 | Revised Manuscript received on 20 May 2014 | Manuscript Published on 30 May 2014 | PP: 56-60 | Volume-3 Issue-12, May 2014 | Retrieval Number: L16530531214/14©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Cloud Computing is nothing but specific style of computing where everything from computing power to infrastructure, business apps are provided “as a service”. In cloud, shared resources, softwares and information is provided as a metered service over the network. By data outsourcing, users can be relieved from the burden of local data storage and maintenance. However, the fact that users no longer have physical possession of the possibly large size of outsourced data makes the data integrity protection in Cloud Computing a very challenging and potentially formidable task, especially for users with constrained computing resources and capabilities. Thus, enabling public auditability for cloud data storage security is of critical importance so that users can resort to an external audit party to check the integrity of outsourced data when needed. In particular, we consider the task of allowing a third party auditor (TPA), on behalf of the cloud client, to verify the integrity of the dynamic data stored in the cloud. In this paper we are extending the previous system by using automatic blocker for privacy preserving public auditing for data storage security in cloud computing. We utilize the public key based homomorphic authenticator and uniquely integrate it with random mask technique and automatic blocker. In particular, to achieve efficient data dynamics, we improve the existing proof of storage models by manipulating the block tag authentication. Thus, TPA eliminates the involvement of the client through the auditing of whether his Data stored in the Cloud are indeed intact, which can be important in achieving economies of scale For Cloud Computing.
Keywords: Cloud Computing, CSP, Data Storage, Data Dynamics, Protocol Blocker, Public auditability, TPA.

Scope of the Article: Cloud Computing