Impact Factor:6.549
 Scopus Suggested Journal: UNDER REVIEW for TITLE INCLUSSION

International Journal
of Computer Engineering in Research Trends (IJCERT)

Scholarly, Peer-Reviewed, Open Access and Multidisciplinary


Welcome to IJCERT

International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed,Open Access and Multidisciplinary

ISSN(Online):2349-7084                 Submit Paper    Check Paper Status    Conference Proposal

Back to Current Issues

Survey on NCCloud for Distributed Cloud Storage

Venkat Sujan, Dr.S.Prem Kumar, , ,
Affiliations
(M.Tech), CSE
Professor & HOD, Department of computer science and engineering, G.Pullaiah College of Engineering and Technology, Kurnool, Andhra Pradesh, India.
:NOT ASSIGNED


Abstract
Late advances have offered ascend to the popularity and achievement of cloud registering. Cloud database empowers clients to remotely store their data and appreciate the on-interest fantastic cloud applications without the weight of neighborhood equipment and programming administration. It moves the application programming and databases to the unified expansive data focuses, where the data's administration and administrations may not be completely dependable. This one of a kind worldview realizes numerous new security challenges. To ensure outsourced data in cloud database against defilements, empowering integrity security, adaptation to internal failure and effective recuperation for cloud database gets to be basic. Consequently, we concentrate on the issue of remotely checking the integrity of recovering coded data against debasements under a genuine cloud database setting.


Citation
."Survey on NCCloud for Distributed Cloud Storage". International Journal of Computer Engineering In Research Trends (IJCERT) ,ISSN:2349-7084 ,Vol.2, Issue 09, SEPTEMBER - 2015,


Keywords : cloud computing, remote data checking, security, integrity, regenerating code, FMSR-DIP

References
1. Bansidhar Joshi, A. Santhana Vijayan, Bineet KumarJoshi,―Securing Cloud computing Environment against DDoS 
2. Ramgovind S, Eloff MM and Smith E, ―The Management of Security in Cloud Computing‖, IEEE, 2010.  
3. Wentao Liu, ―Research on Cloud Computing Security Problem and Strategy‖, IEEE, 2012, pp.1216-1219. 
4. Nitin Singh Chauhan and Ashutosh Saxena. ―Energy Analysis of Security for Cloud Application. 
5. Rohit Bhadauria, Rituparna Chaki, Nabendu Chaki and Sugata Sanyal, ―A Survey on Security Issues in Cloud Computing‖, IEEE 2010.
 6. Xiaojun Yu and Qiaoyan Wen ―A view about cloud data security from data life cycle‖, IEEE 2010. 
7. Saxena, Sravan Kumar and Ashutosh,‖Data Integrity Proofs in Cloud Storages‖, IEEE 2011.
8. A. Juels and B. Kaliski. PORs: Proofs of retrievability for large files. In Proc. ACM CCS, pages 584–597, 2007. 
9. G. Ateniese, R. Burns, R. Curtmola, J. Herring, O. Khan, L. Kissner, Z. Peterson, and D. Song. Remote Data Checking Using Provable Data Possession. ACM Trans. on Information and System Security, May 2011. 
10. H.Abu-Libdeh, L. rincehouse, and H. Weatherspoon. RACS: A Case for Cloud Storage Diversity. In Proc. of ACM SoCC, 2010. 
11. M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia. A view of cloud computing. Communications of the ACM, 53(4):50– 58, 2010.
 12. K. Bowers, A. Juels, and A. Oprea. HAIL: A HighAvailability and Integrity Layer for Cloud Storage. In Proc. of ACM CCS, 2009. 
13. R. Li, J. Lin, and P. Lee. CORE: Augmenting Regenerating-Coding-Based Recovery for Single and Concurrent Failures in Distributed Storage Systems. arXiv, preprint arXiv:1302.3344, 2013. 
14. I. Reed and G. Solomon. Polynomial Codes over Certain Finite Fields. Journal of the Society for Industrial and Applied Mathematics, 8(2):300–304, 1960. 
15. J. Breckling, Ed., the Analysis of Directional Time Series: Applications to Wind Speed and Direction, ser. Lecture Notes in Statistics. Berlin, Germany: Springer, 1989, vol. 61. Y. Hu, P. P. C. Lee, and K. W. Shum. Analysis and Construction of Functional Regenerating Codes with Uncoded Repair for Distributed Storage Systems. In Proc. of IEEE INFOCOM, Apr 2013. 
16. N Cao, S Yu, Z Yang, W Lou, YT Hou. LT codesbased secure and reliable cloud storage service- INFOCOM, 2012 Proceeding IEEE, 2012. 
17. Y. Hu, H. Chen, P. Lee,and Y. Tang. NCCloud: Applying Network Coding for the Storage Repair in a Cloud-of-Clouds. In Proc. of USENIX FAST, 2012. 
18. Y. Deswarte and J. Quisquater, ―How to Trust Files Stored on Untrusted Servers,‖2002. 
19. F. Sebe, A. Martinez-Balleste, Y. Deswarte, J. Domingo-Ferrer, and J.-J. Quisquater. ―Time- bounded remote file integrity checking.‖ Technical Report 04429, LAAS, July 2004. 
20. C. Erway, A. Küpçü, C. Papamanthou, and R. Tamassia, ―Dynamic provable data possession,‖ Proceedings of the 16thACM conference on Computer and communications security - CCS ’09, p. 213, 2009. 
21. Q. Wang, S. Member, C. Wang, and K. Ren, ―Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing,‖ pp. 1–13.-2009. 
22. S. Ni-Na and Z. Hai-Yan, ―On Providing Integrity for Dynamic Data Based on the Third-party Verifier in Cloud Computing,‖ 2011 First International Conference on Instrumentation Measurement,Computer Communication and Control, pp. 521–524, Oct. 2011..


DOI Link : NOT ASSIGNED

Download :
  V2I917.pdf


Refbacks : Currently there are no Refbacks

Announcements


Authors are not required to pay any article-processing charges (APC) for their article to be published open access in Journal IJCERT. No charge is involved in any stage of the publication process, from administrating peer review to copy editing and hosting the final article on dedicated servers. This is free for all authors. 

News & Events


Latest issue :Volume 10 Issue 1 Articles In press

A plagiarism check will be implemented for all the articles using world-renowned software. Turnitin.


Digital Object Identifier will be assigned for all the articles being published in the Journal from September 2016 issue, i.e. Volume 3, Issue 9, 2016.


IJCERT is a member of the prestigious.Each of the IJCERT articles has its unique DOI reference.
DOI Prefix : 10.22362/ijcert


IJCERT is member of The Publishers International Linking Association, Inc. (“PILA”)


Emerging Sources Citation Index (in process)


IJCERT title is under evaluation by Scopus.


Key Dates


☞   INVITING SUBMISSIONS FOR THE NEXT ISSUE :
☞   LAST DATE OF SUBMISSION : 31st March 2023
☞  SUBMISSION TO FIRST DECISION :
In 7 Days
☞  FINAL DECISION :
IN 3 WEEKS FROM THE DAY OF SUBMISSION

Important Announcements


All the authors, conference coordinators, conveners, and guest editors kindly check their articles' originality before submitting them to IJCERT. If any material is found to be duplicate submission or sent to other journals when the content is in the process with IJCERT, fabricated data, cut and paste (plagiarized), at any stage of processing of material, IJCERT is bound to take the following actions.
1. Rejection of the article.
2. The author will be blocked for future communication with IJCERT if duplicate articles are submitted.
3. A letter regarding this will be posted to the Principal/Director of the Institution where the study was conducted.
4. A List of blacklisted authors will be shared among the Chief Editors of other prestigious Journals
We have been screening articles for plagiarism with a world-renowned tool: Turnitin However, it is only rejected if found plagiarized. This more stern action is being taken because of the illegal behavior of a handful of authors who have been involved in ethical misconduct. The Screening and making a decision on such articles costs colossal time and resources for the journal. It directly delays the process of genuine materials.

Citation Index


Citations Indices All
Citations 1026
h-index 14
i10-index 20
Source: Google Scholar

Acceptance Rate (By Year)


Acceptance Rate (By Year)
Year Rate
2021 10.8%
2020 13.6%
2019 15.9%
2018 14.5%
2017 16.6%
2016 15.8%
2015 18.2%
2014 20.6%

Important Links



Conference Proposal




DOI:10.22362/ijcert