Simulation of Data Integrity Proof in Cloud Storage

نویسنده

  • Lakshmi Prasad Saikia
چکیده

Cloud computing technology enables users and enterprises with various capabilities to store and process their data in either privately owned cloud or on a third-party server in order to make data accessing mechanisms much more easy and reliable. This service releases the burden of huge local data storage and their preservation by outsourcing mass data to the cloud. Apart from reducing the storage costs cloud data outsourcing to the cloud also helps in reducing the maintenance. The data stored in cloud storage is moved to a remotely located cloud server where the user does not have any control and unaware of the storage location, however data is provided back to the owner whenever required. Here risk involved is modification or tampering of data. Hence, there is no guarantee that data stored in the cloud is secured and not altered by the cloud or Third Party Auditor (TPA). Therefore data integrity in the cloud storage should be kept assured with consistency, correctness, accessibility and high quality. In this paper we provide a scheme which gives a proof of data integrity in the cloud which the user can employ to check the correctness of his data in the cloud. This research ensures that the storage at the client side is minimal which will be beneficial for thin clients. One of the significant concerns that need to be spoken is to assure the customer of the integrity i.e. rightness of his data in the cloud as the data is physically not accessible to the user. The data integrity verification is done by introducing third party auditor (TPA) who has privileges to check the integrity of data in cloud on behalf of cloud client. TPA notifies the Cloud client when the data integrity is lost or compromised. This proof can be agreed upon by both the cloud and customer and can be incorporated in the Service Level Agreement (SLA).

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Review On: Cryptographic Algorithms for Data Integrity Proofs in Cloud Storage

In cloud computing , there are many cryptographic algorithm for storing and retrieving data , the cryptographic algorithm is more secure and highly well organized and successful in the field of authenticate information and keep the information private. This paper discusses cryptographic algorithms for data integrity proofs in cloud storage. Data integrity has been proved in cloud by enhancing t...

متن کامل

Public Proof of Retrievability Scheme against Active Attack in Cloud Storage

Data integrity is one of the major concerns with cloud data storage for cloud user. Besides, the cloud user’s constrained computing capabilities make the task of data integrity auditing expensive and even formidable. In recent years, many public data integrity verification schemes have been proposed, however, most of them are vulnerable to an efficient active attack, which means that the active...

متن کامل

A Novel Cryptographic Framework for Cloud File Systems and CryFS, a Provably-Secure Construction

Using the cloud to store data offers many advantages for businesses and individuals alike. The cloud storage provider, however, has to be trusted not to inspect or even modify the data they are entrusted with. Encrypting the data offers a remedy, but current solutions have various drawbacks. Providers which offer encrypted storage themselves cannot necessarily be trusted, since they have no ope...

متن کامل

Comparative Study of Data Possession Techniques for Data Storage as a Service (DSaaS)

Cloud computing is a utility where software, infrastructure or storage can be purchased remotely. Users can access data from anywhere through network connectivity. In Cloud Computing resources are shared among different user so that all users can access the data from shared infrastructure via same physical hardware. However, this technique raises many concerns over the honesty of network users....

متن کامل

Privacy-Preserving Public Auditing Scheme for Shared Data with Supporting Multi-function

most common concerns for users in cloud storage are data integrity, confidentiality and availability, so various data integrity auditing schemes for cloud storage have been proposed in the past few years, some of which achieve privacy-preserving public auditing, data sharing and group dynamic, or support data dynamic. However, as far as we know, until now yet there doesn't exist a practical aud...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017