Efficient Remote Data Possession Checking In Critical Information Infrastructures Ensuring Data Storage Security In Cloud Computing

@inproceedings{Nalini2014EfficientRD,
  title={Efficient Remote Data Possession Checking In Critical Information Infrastructures Ensuring Data Storage Security In Cloud Computing},
  author={Dr. T. Nalini and Dr. K. Manivannan and Vaishnavi Moorthy},
  year={2014}
}
Cloud computing has been envisioned as the on-demand self-service, ubiquitous network access, location independent resource pooling, rapid resource elasticity, usage-based pricing and transference of risk. Today, technical research works focus on Remote data possession Checking protocols permit to check that a remote server can access an uncorrupted file with the help of third party verifiers. In this paper, Seb ́e et al.’s protocol is adapted to support efficient remote data possession… CONTINUE READING
2 Extracted Citations
11 Extracted References
Similar Papers

Referenced Papers

Publications referenced by this paper.
Showing 1-10 of 11 references

Member, ”A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability

  • Zhuo Hao, Sheng Zhong, Member, IEEE, Nenghai Yu
  • 2011
Highly Influential
3 Excerpts

Draft nist working definition of cloud computing,

  • P. Mell, T. Grance
  • Referenced on June
  • 2009

Similar Papers

Loading similar papers…