National Conference on Advances in Computing |
Foundation of Computer Science USA |
NCAC2015 - Number 7 |
December 2015 |
Authors: Vinod Bharat, Sandeep Mali, Kishor Sawant, Nilesh Thombare |
360d0d7e-0136-4156-8593-7a21dcd90881 |
Vinod Bharat, Sandeep Mali, Kishor Sawant, Nilesh Thombare . A Survey on Public Batch Auditing Protocol for Data Security. National Conference on Advances in Computing. NCAC2015, 7 (December 2015), 39-42.
The cloud provides storage for user to store their data remotely. But there is a problem with the auditing protocol, which was proposed. There is a new paradigm of storage service, which makes the integrity protection for outsourced data. There are also other integrity auditing protocols that has been already proposed but their focus was singleton cloud storage. These protocols don't support batch editing of cloud storage. There is a another auditing protocol for public which will provide integrity of multi-cloud storage. In this protocol there is a third party auditor which will simultaneously verify multiple auditing requests from different users on different storage of data files or different cloud storage servers. This protocol will achieve quick identification of corrupted data by implementing recoverable coding approach and homomorphicciphertext verification. It will also provide privacy preserving public auditing for data integrity. The total editing time can be reduced by batch auditing protocol and communication cost can be maintained low using same protocol. Analysis of extended security and performance shows this protocol is efficient and secure.