100% found this document useful (1 vote)
43 views1 page

Conclusion

This paper proposes a privacy-preserving system for third-party auditing of data storage in cloud computing. The system allows a third party auditor to verify the integrity of stored data without seeing the data contents, protecting user privacy. It utilizes techniques like homomorphic authenticators and random masks to guarantee privacy during efficient auditing. The system can also handle multiple concurrent audit sessions from different users, allowing batch auditing of multiple files simultaneously. Analysis shows the system is secure and efficient.

Uploaded by

Manjula Ashok
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
43 views1 page

Conclusion

This paper proposes a privacy-preserving system for third-party auditing of data storage in cloud computing. The system allows a third party auditor to verify the integrity of stored data without seeing the data contents, protecting user privacy. It utilizes techniques like homomorphic authenticators and random masks to guarantee privacy during efficient auditing. The system can also handle multiple concurrent audit sessions from different users, allowing batch auditing of multiple files simultaneously. Analysis shows the system is secure and efficient.

Uploaded by

Manjula Ashok
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 1

8.

CONCLUSION

In this paper, we propose a privacy-preserving public auditing system for data storage security in Cloud Computing, where TPA can perform the storage auditing without demanding the local copy of data. We utilize the homomorphic authenticator and random mask technique to guarantee that TPA would not learn any knowledge about the data content stored on the cloud server during the efficient auditing process, which not only eliminates the burden of cloud user from the tedious and possibly expensive auditing task, but also alleviates the users fear of their outsourced data leakage. Considering TPA may concurrently handle multiple audit sessions from different users for their outsourced data files, we further extend our privacy-preserving public auditing protocol into a multi-user setting, where TPA can perform the multiple auditing tasks in a batch manner, i.e., simultaneously. Extensive security and performance analysis shows that the proposed schemes are provably secure and highly efficient. We believe all these advantages of the proposed schemes will shed light on economies of scale for Cloud Computing.

You might also like