Data Integrity and Data Dynamics with Secure Storage Service in Cloud

被引:0
作者
Nithiavathy, R. [1 ]
机构
[1] Coimbatore Inst Engn & Technol, Dept Comp Sci & Engn, Coimbatore, Tamil Nadu, India
来源
2013 INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION, INFORMATICS AND MEDICAL ENGINEERING (PRIME) | 2013年
关键词
Error localization; data dynamics; Cloud Computing; Data Integrity; storage; Audit;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The current utilization of the spectrum is quite inefficient; consequently, if properly used, there is no shortage of the spectrum that is presently available. Therefore, it is anticipated that more flexible use of spectrum and spectrum sharing between radio systems will be key enablers to facilitate the successful implementation of future systems. Cognitive radio, however, is known as the most intelligent and promising technique in solving the problem of spectrum sharing. In this paper, we consider the technique of spectrum sharing among users of service providers to share the licensed spectrum of licensed service providers. It is shown that the proposed technique rCloud computing is upcoming technology which has gained a lot of hype in the current world of I. T. Cloud computing is said to be the next big thing in the computer world after the internet. Though the benefits are huge, such a service is also relinquishing users' physical possession of their outsourced data, which inevitably poses new security risks towards the correctness of the data in cloud. In order to address this new problem and further achieve a secure and dependable cloud storage service. We propose in this paper a flexible distributed storage integrity auditing mechanism, utilizing the homomorphic token and distributed erasure-coded data for dynamically storing data. The proposed design allows users or third party auditor to audit the cloud storage with very lightweight communication and less computation cost. The auditing result ensures reliable cloud storage correctness, and simultaneously achieves fast data error localization, i.e., finding which server is misbehaving in the fast rapidly changing its data in the cloud and the user's application stored in cloud, it also supports efficient dynamic operations on outsourced data which is secured, including, deletion, and append, block modification and resilient against Byzantine failure, malicious data modification attack, and even server colluding attacks.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] Review on Mechanisms to Ensure Confidentiality and Integrity of the Data in Cloud Storage
    Srivastav, Niharika
    Mathew, Rejo
    PROCEEDING OF THE INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS, BIG DATA AND IOT (ICCBI-2018), 2020, 31 : 522 - 528
  • [42] Data Integrity and Availability Verification Game in Untrusted Cloud Storage
    Djebaili, Brahim
    Kiennert, Christophe
    Leneutre, Jean
    Chen, Lin
    DECISION AND GAME THEORY FOR SECURITY, GAMESEC 2014, 2014, 8840 : 287 - 306
  • [43] A Compressive Integrity Auditing Protocol for Secure Cloud Storage
    Yang, Yang
    Chen, Yanjiao
    Chen, Fei
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2021, 29 (03) : 1197 - 1209
  • [44] On Fractal Way of Checking Data Storage Integrity in Cloud Storage
    Hariharasitaraman, S.
    Balakannan, S. P.
    2017 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT TECHNIQUES IN CONTROL, OPTIMIZATION AND SIGNAL PROCESSING (INCOS), 2017,
  • [45] Enhancement of data confidentiality and secure data transaction in cloud storage environment
    K. L. Neela
    V. Kavitha
    Cluster Computing, 2018, 21 : 115 - 124
  • [46] Enable Data Dynamics for Algebraic Signatures Based Remote Data Possession Checking in the Cloud Storage
    Luo Yuchuan
    Fu Shaojing
    Xu Ming
    Wang Dongsheng
    CHINA COMMUNICATIONS, 2014, 11 (11) : 114 - 124
  • [47] Enhancement of data confidentiality and secure data transaction in cloud storage environment
    Neela, K. L.
    Kavitha, V.
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2018, 21 (01): : 115 - 124
  • [48] An E-learning System Based on Secure Data Storage Services in Cloud Computing
    Gopinath, R.
    Geetha, B. G.
    INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY AND WEB ENGINEERING, 2013, 8 (02) : 1 - 17
  • [49] Secure Data Integrity Check Based on Verified Public Key Encryption With Equality Test for Multi-Cloud Storage
    Li, Wenchao
    Susilo, Willy
    Xia, Chunhe
    Huang, Luqi
    Guo, Fuchun
    Wang, Tianbo
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (06) : 5359 - 5373
  • [50] Model of Secure Data Storage in the Cloud for Mobile Devices
    Klos, Mateusz
    El Fray, Imed
    COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT, CISIM 2018, 2018, 11127 : 449 - 460