Dynamic Data Integrity and Checkpoint Recovery Using Public Auditing in Cloud Storage
نویسنده
چکیده
Cloud computing brings great challenges in the field of data security and security assurance. In this paper, we are analysing the different types of cloud security issues. The key and signature are generated using the elliptic curve cryptography algorithm and Ron Rivest, AdiShamir and Leonard Adlema algorithm to provide efficient security. Dynamic Merkle hash tree is constructed for providing dynamic data integrity. Public auditing is performed using Third party auditor (TPA). Checkpoint information is used for recovering the lost data blocks in the cloud storage. The main objective is to provide public auditing and data recovery to recover the lost data from the cloud storage and finally compare the key size, time taken for key generation and signature generation of ECC and RSA encryption algorithm.
منابع مشابه
Privacy-Preserving Public Auditing Scheme for Shared Data with Supporting Multi-function
most common concerns for users in cloud storage are data integrity, confidentiality and availability, so various data integrity auditing schemes for cloud storage have been proposed in the past few years, some of which achieve privacy-preserving public auditing, data sharing and group dynamic, or support data dynamic. However, as far as we know, until now yet there doesn't exist a practical aud...
متن کاملRemote Data Auditing Scheme in Secured Cloud Storage Environment
Cloud data centers are used to maintain the shared data values for the data owners .Data owners and public verifiers are involved to efficiently audit cloud data integrity without retrieving the entire data from the cloud server. File and block signatures are used in the integrity verification process. Public data auditing schemes are tuned to verify the encrypted cloud storage environment. “On...
متن کاملA Survey of Public Auditing for Shared Data Storage with User Revocation in Cloud Computing
Cloud computing technology has matured, so cloud computing produces a wide range of cloud service. Cloud storage services are one of cloud services where cloud service provider can provide storage space to customers. Because cloud storage services bring a lot of convenience, many enterprises and users store the data to the cloud storage. However, the user will outsource data to the cloud storag...
متن کاملIntegrity Auditing with Homomorphic Encryption for Dynamic Cloud with Group user Revocation
With cloud computing, data owners are motivated to outsource their data from local sites to public cloud for great flexibility and economic saving. Recently, some research consider the problem of secure and efficient public data integrity auditing for shared dynamic data. But this scheme is not secure against collusion of cloud storage server. An efficient public integrity auditing with a secur...
متن کاملPrivacy Preserving Public Auditing for Secured Data Storage in Cloud Using Block Authentication Code
Using cloud storage, users can remotely store their data, ondemand high-quality applications and services from a shared pool of configurable computing resources, without the burden of local data storage and maintenance. Users no longer have physical possession of the outsourced data makes the data integrity protection in cloud computing for users with constrained computing resources. Users shou...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017