• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 288
Next 10 →

Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing

by Cong Wang, Qian Wang, Kui Ren, Wenjing Lou - In INFOCOM , 2010
"... Abstract. Cloud Computing is the long dreamed vision of computing as a utility, where users can remotely store their data into the cloud so as to enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources. By data outsourcing, users can be relie ..."
Abstract - Cited by 135 (1 self) - Add to MetaCart
with constrained computing resources and capabilities. Thus, enabling public auditability for cloud data storage security is of critical importance so that users can resort to an external audit party to check the integrity of outsourced data when needed. To securely introduce an effective third party auditor (TPA

Enabling public verifiability and data dynamics for storage security in cloud computing

by Qian Wang, Cong Wang, Jin Li, Kui Ren, Wenjing Lou - in Proc. of ESORICS’09, Saint , 2009
"... Abstract. Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centers, where the management of the data and services may not be fully trustworthy. This unique paradigm brings about man ..."
Abstract - Cited by 177 (10 self) - Add to MetaCart
of data operation, such as block modification, insertion and deletion, is also a significant step toward practicality, since services in Cloud Computing are not limited to archive or backup data only. While prior works on ensuring remote data integrity often lacks the support of either public

Enabling public auditability and data dynamics for storage security in cloud computing

by Qian Wang, Student Member, Cong Wang, Student Member, Kui Ren, Wenjing Lou, Senior Member, Jin Li - IEEE Trans. Parallel Distrib. Syst , 2011
"... Abstract—Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centers, where the management of the data and services may not be fully trustworthy. This unique paradigm brings about many ..."
Abstract - Cited by 114 (2 self) - Add to MetaCart
forms of data operation, such as block modification, insertion, and deletion, is also a significant step toward practicality, since services in Cloud Computing are not limited to archive or backup data only. While prior works on ensuring remote data integrity often lacks the support of either public

Privacy-Preserving Public Auditing for Secure Cloud Storage

by Cong Wang, Sherman S.-M. Chow, Qian Wang, Kui Ren, Wenjing Lou , 2009
"... Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources, without the burden of local data storage and maintenance. However, the fact that users no longer have physical possession o ..."
Abstract - Cited by 75 (3 self) - Add to MetaCart
Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources, without the burden of local data storage and maintenance. However, the fact that users no longer have physical possession

THIRD PARTY AUDITING FOR CLOUD STORAGE

by Tech Kedar, Jayesh Rasal, Ip A Kahate
"... With data storage and sharing services provided by the cloud, people can easily work together as a group by sharing data with each other. The Cloud provide platform where all users not only store their data but also used the software and services provided by Cloud Service Provider (CSP). In cloud st ..."
Abstract - Add to MetaCart
storage system, the clients store their data in the server (often locations) without keeping a local copy. Clients store their data in the private clouds but when storage expansion is needed they move to public clouds. Security is the major concern in the public clouds. The security mechanisms for private

Cloud Storage Security Using Encryption and Third- Party Storage Auditing Service

by Rana M Pir
"... Abstract- Cloud computing aims to enable end-users to easily create and use software without a need to worry about the technical implementations and the software's physical hosting location, hardware specifications, efficiency of data processing. Cloud computing is a model for enabling convenie ..."
Abstract - Add to MetaCart
burden of user we have public audit ability for cloud data storage. For that we use external audit party to check integrity of outsource data. We introduce third party auditor (TPA) for audit outsourced data without demanding local copy of user. No additional online burden for the cloud user and that can

Developing Third Party Auditing Scheme for Secure Cloud Storage Service

by Manasi Doshi, Swapnaja Hiray
"... Cloud computing is the use of computing of sources that are delivered as a service over a network. Cloud enables users to store their data, but data is stored at remote location. A major characteristic of the cloud services is that user’s data are usually processed remotely in unknown machines that ..."
Abstract - Add to MetaCart
Cloud computing is the use of computing of sources that are delivered as a service over a network. Cloud enables users to store their data, but data is stored at remote location. A major characteristic of the cloud services is that user’s data are usually processed remotely in unknown machines

Privacy-Preserving Public Auditing In Cloud Storage Security

by D. Srinivas
"... computing utility, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or cloud provider interaction. Cloud computing technologies can be implemented in a wide variety of architectures, under differ ..."
Abstract - Cited by 4 (0 self) - Add to MetaCart
different service and deployment models, and can coexist with other technologies and software design approaches. The security challenges cloud computing presents the burden of local data storage and maintenance. public auditability for cloud data storage security is of critical importance so that users can

Public Auditing For Secure Cloud Storage with HLA

by M. Madhavi, O. Srinivasa Reddy, Dr. S. Sai Satyanarayana Reddy
"... Abstract- Cloud computing is internet based computing which enables sharing of services. Many users place their data in the cloud. However, the fact that users no longer have physical possession of the possibly large size of outsourced data makes the data integrity protection in cloud computing a ve ..."
Abstract - Add to MetaCart
in cloud is achieved by signing the data block before sending to the cloud. Thus, enabling public auditability for cloud storage is of critical importance so that users can resort to a third-party auditor (TPA) to check the integrity of outsourced data and be worry free. To securely introduce an effective

Privacy-Preserving Public Auditing for Secure Cloud Storage

by Prof N. L. Chourasiya, Arun Kumavat, Vipul Kalaskar, Sanket Thaware
"... Contact no: 9970131164 Abstract — The cloud storage has a lot of problems about the security and data Integrity. So we need to prevent the all problems. In cloud storage users can remotely store their data and enjoy the on-demand high quality applications and services from shared resources, without ..."
Abstract - Add to MetaCart
Contact no: 9970131164 Abstract — The cloud storage has a lot of problems about the security and data Integrity. So we need to prevent the all problems. In cloud storage users can remotely store their data and enjoy the on-demand high quality applications and services from shared resources, without
Next 10 →
Results 1 - 10 of 288
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University