Skip to main content
Article thumbnail
Location of Repository

Secured Cloud Storage using Raptor Codes

By Anupriya. A. S, S. Ananthi and Dr. S Karthik

Abstract

ABSTRACT: Cloud computing has developed as one of the most persuasive paradigms in the IT industry for last few years. To achieve the assertion of cloud data integrity and availability and impose the quality of dependable cloud storage service for users, an effective and flexible distributed scheme with explicit dynamic data support, including block update, delete, and append is designed. Erasure-correcting code in the file distribution preparation provides redundancy parity vectors and guarantees the data dependability. By utilizing the homomorphic token with distributed verification of erasure-coded data, this scheme achieves the integration of storage. The system safeguarded the security and dependability for cloud data storage under the aforementioned adversary model. Analysis shows the proposed scheme is highly efficient and resilient against Byzantine failure, malicious data modification attack, and even server colluding attacks. This paper enhances the work by using Raptor codes, which is an additional pre-coding on an appropriate LT-Code. In asymptotic settings, a class of universal Raptor Codes with linear encode/decode time for which the failure probability converges to 1 polynomial fast in input size

Topics: Cloud computing, Raptor Codes, Security, Confidentiality, Integrity, Erasure-code, Data
Year: 2014
OAI identifier: oai:CiteSeerX.psu:10.1.1.415.8197
Provided by: CiteSeerX
Download PDF:
Sorry, we are unable to provide the full text but you may find it at the following location(s):
  • http://citeseerx.ist.psu.edu/v... (external link)
  • http://www.ijser.org/researchp... (external link)
  • Suggested articles


    To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.