preview

Fig. System Model

Best Essays

III. Implementation Details System Model Fig.System Model The system consists of three main components. Data owner that can be organization basically exhibit sensitive data to be stored in cloud. An organization that offers services to customer from a remote facility connected via internet. A cloud service provider which control cloud server and distribute paid storing area on its framework to store the owner’s data. Cloud service provider that provide client storage along with public or private cloud. Authorized user these are group of owner’s client which have right to obtain the remote data. The system model use in this work can be accepted by numerous practical applications. To give an example such as e-Health application …show more content…

We proposed new provable data possession which provide outsourcing of multiple copies of dynamic data, where data owner is suitable of not only archive and access data copies keep by cloud service provider but also modify and scale those copies on server. To principle of our understanding, this scheme is to address multiple copies of dynamic data. The communication between authorized user and cloud service provider is taking into account, where authorized user can access data copy accept from CSP using separate key distribute with data owner. It maintains the feature of determining indices of corrupted copies. The corrupted copies can be recreate from entire damage applying duplicate copies on different …show more content…

Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, “Scalable and efficient provable data possession,” in Proc. 4th Int. Conf. Secur.Privacy Commun. Netw. (SecureComm), New York, NY, USA, 2008, Art. ID 9. [11] C. Wang, Q. Wang, K. Ren, and W. Lou. (2009). “Ensuring data storage security in cloud computing,” IACR Cryptology ePrint Archive, Tech.Rep. 2009/081. [Online]. Available: http://eprint.iacr.org/ [12] C. Erway, A. Küpçü, C. Papamanthou, and R. Tamassia, “Dynamic provable data possession,” in Proc. 16th ACM Conf. Comput. Commun.Secur. (CCS), New York, NY, USA, 2009, pp. 213–222. [13] Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, “Enabling public verifiability and data dynamics for storage security in cloud computing,”in Proc. 14th Eur. Symp. Res. Comput. Secur. (ESORICS), Berlin, Germany, 2009, pp. 355–370. [14] Z. Hao, S. Zhong, and N. Yu, “A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability,” IEEE Trans. Knowl. Data Eng., vol. 23, no. 9, pp. 1432–1437, Sep. 2011. [15] A. F. Barsoum and M. A. Hasan. (2010). “Provable possession and replication of data over cloud servers,” Centre Appl. Cryptograph. Res., Univ. Waterloo, Waterloo, ON, USA, Tech. Rep. 2010/32.[Online]. Available:

Get Access