Data Integrity in Multi Cloud Storage

K. Venkat Rao, Avala Atchyuta Rao

Abstract


Data integrity in cloud is became an acceptable challenge in the research community because of its vast application and usability in common people. This paper given an idea and ensure the secure and less loss in data during sharing with different user residing worldwide. We have introduced a new scheme called PDP (Provable Data Possession) scheme for distributed cloud storage to support the scalability of service and data migration. Here we have the existence of multiple cloud service providers to cooperatively store and maintain the clients’ data.

 

We also introduce an another scheme called  (CPDP) i.e. cooperative PDP which is based on homomorphic verifiable response and hash index hierarchy. We prove that the proposed scheme is minimizing the computational error as well as decrease the communication overhead as compare with existing methods.


Keywords


PDP,CPDP, Multi cloud, Storage Security, computational error.

References


B.Sotomayor,R.S.Montero,I.M.Llorente,andI.T.Foster, “Virtual infrastructure management in private and hybrid

clouds,” IEEE Internet Computing, vol. 13, no. 5, pp. 14–22, 2009.

G. Ateniese, R. C. Burns, R. Curtmola, J. Herring, L. Kissner, Z. N. J. Peterson, and D. X. Song, “Provable data possession at untrusted stores,” in ACM Conference on Computer and Communications Security,P.Ning,S.D.C.diVimercati,and P. F. Syverson, Eds. ACM, 2007, pp. 598–609.

A. Juels and B. S. K. Jr., “Pors: proofs of retrievability for large files,” in ACMConference on Computer and Communications Security, P. Ning, S. D. C. di Vimercati, and P. F. Syverson, Eds. ACM, 2007, pp. 584–597.

G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, “Scalable and efficient provable data possession,” in Proceedings of the 4th international conference on Security and privacy in communication netowrks, SecureComm, 2008, pp. 1–10.

C.C.Erway,A.K¨upc¸¨u, C. Papamanthou, and R. Tamassia, “Dynamic provable data possession,” in ACM Conference on Computer and Communications Security, E. Al-Shaer, S. Jha, and A. D. Keromytis, Eds. ACM, 2009, pp. 213–222.

H. Shacham and B. Waters, “Compact proofs of retrievability,” in ASIACRYPT, ser. Lecture Notes in Computer Science, J. Pieprzyk, Ed., vol. 5350. Springer, 2008, pp. 90–107.

Q.Wang,C.Wang,J.Li,K.Ren,andW.Lou,“Enablingpublic verifiability and data dynamics for storage security in cloud computing,” in ESORICS, ser. Lecture Notes in Computer Science, M. Backes and P. Ning, Eds., vol. 5789. Springer, 2009, pp. 355–370.

Y. Zhu, H. Wang, Z. Hu, G.-J. Ahn, H. Hu, and S. S. Yau, “Dynamic audit services for integrity verification of outsourced storages in clouds,” in SAC,W.C.Chu,W.E.Wong,M.J. Palakal, and C.-C. Hung, Eds. ACM, 2011, pp. 1550–1557.

K. D. Bowers, A. Juels, and A. Oprea, “Hail: a high-availability and integrity layer for cloud storage,” in ACM Conference on Computer and Communications Security, E. Al-Shaer, S. Jha, and A. D. Keromytis, Eds. ACM, 2009, pp. 187–198.

Y. Dodis, S. P. Vadhan, and D. Wichs, “Proofs of retrievability via hardness amplification,” in TCC,ser.LectureNotesin Computer Science, O. Reingold, Ed., vol. 5444. Springer, 2009, pp. 109–127.

L. Fortnow, J. Rompel, and M. Sipser, “On the power of multiprover interactive protocols,” in Theoretical Computer Science, 1988, pp. 156–161.

Y. Zhu, H. Hu, G.-J. Ahn, Y. Han, and S. Chen, “Collaborative integrity verification in hybrid clouds,” in IEEE Conference on the 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom, Orlando, Florida, USA, October 15-18, 2011, pp. 197–206.

Yan Zhu ; Beijing Key Lab. of Internet Security Technol., Peking Univ., Beijing, China ; Hongxin Hu ; Gail-Joon Ahn ; Mengyang Yu “ Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage “Parallel and Distributed Systems, IEEE Transactions on (Volume:23 , Issue: 12 )


Full Text: PDF [FULL TEXT]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.