Data Integrity and Data Dynamics with Secure Storage Service in Cloud

被引:0
|
作者
Nithiavathy, R. [1 ]
机构
[1] Coimbatore Inst Engn & Technol, Dept Comp Sci & Engn, Coimbatore, Tamil Nadu, India
来源
2013 INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION, INFORMATICS AND MEDICAL ENGINEERING (PRIME) | 2013年
关键词
Error localization; data dynamics; Cloud Computing; Data Integrity; storage; Audit;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The current utilization of the spectrum is quite inefficient; consequently, if properly used, there is no shortage of the spectrum that is presently available. Therefore, it is anticipated that more flexible use of spectrum and spectrum sharing between radio systems will be key enablers to facilitate the successful implementation of future systems. Cognitive radio, however, is known as the most intelligent and promising technique in solving the problem of spectrum sharing. In this paper, we consider the technique of spectrum sharing among users of service providers to share the licensed spectrum of licensed service providers. It is shown that the proposed technique rCloud computing is upcoming technology which has gained a lot of hype in the current world of I. T. Cloud computing is said to be the next big thing in the computer world after the internet. Though the benefits are huge, such a service is also relinquishing users' physical possession of their outsourced data, which inevitably poses new security risks towards the correctness of the data in cloud. In order to address this new problem and further achieve a secure and dependable cloud storage service. We propose in this paper a flexible distributed storage integrity auditing mechanism, utilizing the homomorphic token and distributed erasure-coded data for dynamically storing data. The proposed design allows users or third party auditor to audit the cloud storage with very lightweight communication and less computation cost. The auditing result ensures reliable cloud storage correctness, and simultaneously achieves fast data error localization, i.e., finding which server is misbehaving in the fast rapidly changing its data in the cloud and the user's application stored in cloud, it also supports efficient dynamic operations on outsourced data which is secured, including, deletion, and append, block modification and resilient against Byzantine failure, malicious data modification attack, and even server colluding attacks.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] Division of data in cloud environment for secure data storage
    Manjula, S.
    Devi, M. Indra
    Swathiya, R.
    2016 INTERNATIONAL CONFERENCE ON COMPUTING TECHNOLOGIES AND INTELLIGENT DATA ENGINEERING (ICCTIDE'16), 2016,
  • [22] Secure data migration from fair contract signing and efficient data integrity auditing in cloud storage
    Yang, Changsong
    Liu, Yueling
    Ding, Yong
    Liang, Hai
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2025, 239
  • [23] Techniques of secure storage for cloud data
    Feng, Chao-Sheng
    Qin, Zhi-Guang
    Yuan, Ding
    Jisuanji Xuebao/Chinese Journal of Computers, 2015, 38 (01): : 150 - 163
  • [24] Secure Cloud Storage: A framework for Data Protection as a Service in the multi-cloud environment
    Quang Hieu Vu
    Colombo, Maurizio
    Asal, Rasool
    Sajjad, Ali
    El-Moussa, Fadi Ali
    Dimitrakos, Theo
    2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2015, : 638 - 642
  • [25] Modelling a secure framework for data verification and integrity in cloud environment
    Nagesh, Puvvada
    Srinivasu, N.
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2022,
  • [26] Blockchain and Data Integrity Authentication Technique for Secure Cloud Environment
    Ramachandran, A.
    Ramadevi, P.
    Alkhayyat, Ahmed
    Yousif, Yousif Kerrar
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2023, 36 (02) : 2055 - 2070
  • [27] Secure Public-Auditing Cloud Storage Enabling Data Dynamics in the Standard Model
    Ma, Mingxiao
    Weber, Jos
    van den Berg, Jan
    2016 THIRD INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION PROCESSING, DATA MINING, AND WIRELESS COMMUNICATIONS (DIPDMWC), 2016, : 170 - 175
  • [28] Secure Data Integrity in Cloud Storage with Multi-level Hash Indexing Technique
    Kavyashree, T. P.
    Poornima, A. S.
    SUSTAINABLE COMMUNICATION NETWORKS AND APPLICATION, ICSCN 2019, 2020, 39 : 652 - 660
  • [29] A secure remote data integrity checking cloud storage system from threshold encryption
    Chuan Yao
    Li Xu
    Xinyi Huang
    Joseph K. Liu
    Journal of Ambient Intelligence and Humanized Computing, 2014, 5 : 857 - 865
  • [30] A secure remote data integrity checking cloud storage system from threshold encryption
    Yao, Chuan
    Xu, Li
    Huang, Xinyi
    Liu, Joseph K.
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2014, 5 (06) : 857 - 865