Main Reference PaperPrivacy-Preserving and Public Auditing for Cloud Storage Applying Regeneration-Code-based using RSA Algorithm, International Journal of Computer Applications, May 2016. [Java].
  • The computation of data integrity verification process is outsourced to the proxy server while maintaining the privacy of data in regenerating-code-based cloud storage. It reduces the online availability requirement of user.

+ Description
  • The computation of data integrity verification process is outsourced to the proxy server while maintaining the privacy of data in regenerating-code-based cloud storage. It reduces the online availability requirement of user.

  • To protect the privacy of data from TPA.

  • To ensure the data integrity without imposing burden on data owner.

+ Aim & Objectives
  • To protect the privacy of data from TPA.

  • To ensure the data integrity without imposing burden on data owner.

  • A technique is contributed that enables the efficient auditing of fien-grained data updates.

+ Contribution
  • A technique is contributed that enables the efficient auditing of fien-grained data updates.

  • Java JDK 1.8, MySQL 5.5.40.

  • Netbeans 8.0.1, & J2SE.

+ Software Tools & Technologies
  • Java JDK 1.8, MySQL 5.5.40.

  • Netbeans 8.0.1, & J2SE.

  • B.E / B.Tech / M.E / M.Tech

+ Project Recommended For
  • B.E / B.Tech / M.E / M.Tech

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.