首页> 外文会议>International Conference on Data Science, Machine Learning and Applications >Capable and Verification Protocol for Restricting Information Storage in Cloud Computing
【24h】

Capable and Verification Protocol for Restricting Information Storage in Cloud Computing

机译:在云计算中限制信息存储的功能和验证协议

获取原文

摘要

Applications are stored in one place and get into a different location by any authorised users where the user don't crave for any model. In cloud stowage, while subcontracting the reliability of statistical info is a creepy stint in the cloud. To certify the reliability of the active information resided in the cloud, an unbiased observer external auditor identifies a cloud infrastructure. It's a useful remote storage technology like cloud storage. The actuary can be a crowd other than the data legatee; therefore, the directory is usually centered on a publicly available basis. We show that the auditor can tell if the punter has stowed a particular sleeve and linked different chunks of those documents based only on the put out metadata. We propose a dynamic diagram of PoR with a fixed storage capacity for the client whose cost of bandwidth is similar to a Merkle retail tree and therefore very practical. Our construction outperforms the facilities of surmise and practice. Specifically, for external blocks with x bytes each, x w log (x log i) requires the bandwidth and the server account O (x log i) (x is the security parameter). Audits are also very efficient, which requires bandwidth x + O (x2 log i). We also parade how to brew our plan widely verifiable, giving the first active scheme with such a feature. Ultimately, we provide a very effective implementation of our scheme.
机译:应用程序被存储在一个地方,并且被任何授权用户放到不同的位置,而这些用户不需要任何模型。在云存储中,虽然分包了统计信息的可靠性,但在云中却是令人毛骨悚然的。为了证明驻留在云中的活动信息的可靠性,公正的观察员外部审核员会确定云基础架构。这是一种有用的远程存储技术,例如云存储。精算师可以是数据受遗赠者以外的其他人群;因此,该目录通常以公开可用为中心。我们表明,审核员可以仅根据发布的元数据来判断下注者是否已存放特定的袖子并链接了这些文档的不同块。我们为客户提供了一个具有固定存储容量的PoR动态图,其带宽成本类似于Merkle零售树,因此非常实用。我们的建筑胜过推测和练习的设施。具体来说,对于每个x个字节的外部块,x w log(x log i)需要带宽和服务器帐户O(x log i)(x是安全性参数)。审核也非常有效,这需要带宽x + O(x2 log i)。我们还展示了如何广泛验证我们的计划,从而为第一个具有这种功能的主动方案做好了准备。最终,我们提供了非常有效的方案实施方案。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号