Abstract

Cloud computing is a promising technology that provides several advantages to services provider, developers and customers with respect to litheness, scalability at a lower cost. With these technical and cost cutting advantages, several data owners outsourced their data to cloud storage where the data is not only stored but also distribute amongst several users. The promising Cloud computing technology provides convenient access to their data, computing resources on pay-as-you-use basis. This paradigm gives an option of remotely storing their data so as to enjoy powerful application, on-demand network access to computing resources. With these benefits user can decrease the load on local data storage space and reduce the maintenance cost. The main challenging task for the user is to protect the data from unauthorized access, data privacy preservation, modification and deletion of original data. Several methods were used to verify the integrity of outsourced data in cloud storage. This paper presents the Data Privacy preservation model using Third Party Auditing (TPA) which helps to audits the integrity of the data without demanding the local copy of data, and any additional burden. Our system model also uses bilinear aggregate signatures so that TPA can handle multiple client auditing requests concurrently. We conduct the Experiment with diverse methods and the compare the performance of the each method. The results show that the proposed method is secure and more efficient as compare to the existing methods in terms of performances.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call