Privacy Preserving Public Auditing for Secured Data Storage in Cloud Using Block Authentication Code

Using cloud storage, users can remotely store their data, on-demand high-quality applications and services from a shared pool of configurable computing resources, without the burden of local data storage and maintenance. Users no longer have physical possession of the outsourced data makes the data integrity protection in cloud computing for users with constrained computing resources. Users should be able to use the cloud storage as if it is local, without worrying about the need to verify its integrity.

Provided by: International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE) Topic: Cloud Date Added: Apr 2014 Format: PDF

Find By Topic