Posted Date : 07th Mar, 2025
Peer-Reviewed Journals List: A Guide to Quality Research Publications ...
Posted Date : 07th Mar, 2025
Choosing the right journal is crucial for successful publication. Cons...
Posted Date : 27th Feb, 2025
Why Peer-Reviewed Journals Matter Quality Control: The peer revie...
Posted Date : 27th Feb, 2025
The Peer Review Process The peer review process typically follows sev...
Posted Date : 27th Feb, 2025
What Are Peer-Reviewed Journals? A peer-reviewed journal is a publica...
Network Coding Approach for Secure Cloud Storage
Author Name : Ch. Lokesh, P. V. Ramesh
ABSTRACT
This paper focuses the ingrained relationship between secure cloud storage and secure network coding. The secure cloud storage protocol is that the user can check the data integrity without possessing the actual data. The secure network coding uses the concept of data fragmentation. Though different and studied independently they can work together to give effective results. It shows systematic construction of secure cloud storage protocol when secure network coding protocol is used with it.
Further two specific secure cloud storage protocols based on two recent secure network coding protocols are proposed. First is security mediated anonymous cloud storage is proposed and second is third party auditable secure cloud storage. It will give us the effective and efficient mechanism for secure cloud storage.
Key Words: Cloud storage auditing, network coding, security, fragmentation, user anonymity, third-party public auditing