Remote Data Integrity in Cloud Security Services
نویسندگان
چکیده
Cloud Structure delivers infrastructure, platform and software as a service which are made available in pay-as-you go model. Cloud storage is a model of networked online storage where data is stored in virtualized pools of storage which are generally hosted by third parties. Users interact with the cloud servers through Cloud Storage Providers (CSP) to access or retrieve the data. Users have no time to monitor the data online. Hence, it entrust the auditing task to an optional Third Party Auditor (TPA). Its main aim is to achieve the integration of storage correctness across multiple servers and data error localization. Homomorphic pre computation is used in this paper to identify the error corruption. User precomputes the token for the data file; server computes signature over specified blocks. If the signature is not matched with the precomputed token which denotes the data corruption. Byzantine Fault tolerant algorithm or data error localization algorithm is used to identify in which server the data gets corrupted or which server is not behaving properly. After detecting the error, reed Solomon algorithm is used to recover the corrupted data. In this paper, precompute the token for large number of data will improve the performance of error detection in storage services. Keywords-Cloud computing, Storage verification, Error localization, Data storage, Tokens
منابع مشابه
Remote Data Integrity Protection Enhancement in Cloud Storage
Cloud computing is the delivery of computing services over the Internet. Protecting all users’ data in the cloud is highly challenging. Since all our data stored in third party’s computer, security concerns arise. The main focus in cloud storage is data security and integrity. This paper works on securing cloud data from corruptions, checking for its integrity and recovering data during failure...
متن کاملTrusted Authentication and Security of Medical Data in Cloud Computing
Cloud computing provides shared, on-demand and scalable services over internet with user’s data being processed in remote machines and required services provided. The main barrier in using this new technology in different field is the users fear on data security, availability and integrity of their own data in remote servers. In this paper, an efficient cloud storage system for storing medical ...
متن کاملSurvey Paper on Cloud Storage Security
Cloud computing is envisioned as the next-generation technology. It is an Internet based technology where quality services are provided to users including data and software, on remote servers. Advantages of cloud computing includes creating and storing data at remote servers, hence utilizing the client resource to the minimum level. But this advantage implicitly contains drawback of data securi...
متن کاملA Novel Approach to Enhance Security in Cloud
The exponential growth in Cloud technology has driven organizations to outsource data from local to remote cloud storages. Most of the infrastructure service providers like, Microsoft, Amazon and Google are providing services were in their clients can easily store and access data. But the concern in such scenario is about data Security and Integrity. To address these technical challenges, this ...
متن کاملCloud manufacturing system
Cloud manufacturing is defined as a relationship between the consumer and a flexible array of production services, managed by an intervening architecture that can match service providers to product and manufacturing processes Cloud manufacturing definitions typically make explicit or imply three groups of actors: consumers, who request and use cloud manufacturing processes; application provider...
متن کاملIdentity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud.dvi
More and more clients would like to store their data to PCS (public cloud servers) along with the rapid development of cloud computing. New security problems have to be solved in order to help more clients process their data in public cloud. When the client is restricted to access PCS, he will delegate its proxy to process his data and upload them. On the other hand, remote data integrity check...
متن کامل