scispace - formally typeset
Proceedings ArticleDOI

Preserving privacy using TPA for cloud storage based on regenerating code

TLDR
The utilization of visual cryptography is investigated to safeguard the privacy of a picture captcha and some security levels which includes encryption, digital signature and visual cryptography are provided.
Abstract
Cloud storage is getting popular as it offers flexible service with appealing benefits of on-demand data outsourcing. Putting away files remotely instead of locally boasts an array of preferences for both home and professional clients. In this paper we are trying to secure all kind of private data into cloud by providing some security levels which includes encryption, digital signature and visual cryptography. The utilization of visual cryptography is investigated to safeguard the privacy of a picture captcha. This picture captcha is broken down into two shares also known as sheets that are put away in separate database servers one with client and one with application such that the first picture captcha can be uncovered only when both shares are accessible. The individual sheet pictures do not uncover the character of the first picture captcha. When the original picture captcha is uncovered to the client it can be utilized as the secret word. In private auditing scheme for regenerated coded file there exist remote checking method, which include users to stay online, which is not practical. So to endeavor this, third party auditor (TPA) is used to resolve problem of clients for being online all the time.

read more

Citations
More filters
Journal Article

Oruta: Privacy- Preserving Public Auditing for Shared Data in the Cloud

TL;DR: This paper proposes the first privacy-preserving mechanism that allows public auditing on shared data stored in the cloud, and exploits ring signatures to compute the verification information needed to audit the integrity of shared data.
References
More filters
Journal ArticleDOI

A digital signature scheme secure against adaptive chosen-message attacks

TL;DR: A digital signature scheme based on the computational difficulty of integer factorization possesses the novel property of being robust against an adaptive chosen-message attack: an adversary who receives signatures for messages of his choice cannot later forge the signature of even a single additional message.
Proceedings ArticleDOI

Provable data possession at untrusted stores

TL;DR: The provable data possession (PDP) model as discussed by the authors allows a client that has stored data at an untrusted server to verify that the server possesses the original data without retrieving it.
Posted Content

Provable Data Possession at Untrusted Stores.

TL;DR: Ateniese et al. as discussed by the authors introduced the provable data possession (PDP) model, which allows a client that has stored data at an untrusted server to verify that the server possesses the original data without retrieving it.
Journal ArticleDOI

Network Coding for Distributed Storage Systems

TL;DR: It is shown that there is a fundamental tradeoff between storage and repair bandwidth which is theoretically characterize using flow arguments on an appropriately constructed graph and regenerating codes are introduced that can achieve any point in this optimal tradeoff.
Posted Content

Network Coding for Distributed Storage Systems

TL;DR: In this paper, the authors introduce a general technique to analyze storage architectures that combine any form of coding and replication, as well as presenting two new schemes for maintaining redundancy using erasure codes.
Related Papers (5)