SEPDP: Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage

0
1053
SEPDP: Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage

SEPDP: Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage

Abstract

During this paper, we advise a privacy-preserving system for the security of knowledge storage in cloud computing. SEPDP: Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage Victimization cloud storage, users will tenuously store their knowledge and reveal on-demand high-quality applications and services from a shared pool of configurable dividing resources, while not the burden of native knowledge storage and preservation.

Introduction

SEPDP: Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage Cloud computing has been visualized because IT enterprise’s next-generation design, owing to its long list of extraordinary benefits in the IT history: on-demand self-service, worldwide network access, location freelance resource pooling, prompt resource physical property, usage-based valuation and risk transfer. Cloud Computing is reworking the terrible nature of businesses using info technology as a disrupting technology with intense effects. One major side of this paradigm shift is that knowledge is being centralized or outsourced into the cloud.

System Configuration

H/W System Configuration
Speed                   : 1.1 GHz
RAM                      : 256 MB(min)
Hard Disk              : 20 GB
Floppy Drive          : 1.44 MB
Key Board             : Standard Windows Keyboard
Mouse                  : Two or Three Button Mouse
Monitor                : SVGA
S/W System Configuration

Platform                     :  cloud computing

Operating system       : Windows Xp,7,
Server                       : WAMP/Apache
Working on                : Browser Like Firefox, IE

Conclusion

In this paper, we provide a privacy-preserving public auditing system for security of knowledge storage in cloud computing. We tend to operate a hemimorphic linear evaluator and random concealing to ensure that the TPA does not learn any information about the cloud server’s info content throughout the effective auditing technique, which does not only remove the burden of cloud users from the tedious and undoubtedly exclusive auditing task, but at the same time improves users ‘ issues about their outsourced knowledge.