Recovery of Altered Records in Cloud Storage Utilizing Seed Block Strategy

被引:0
作者
Parvathy, Radhakrishnan [1 ]
Shameem, P. Mohamed [1 ]
Revathy, N. [1 ]
机构
[1] TKM Inst Technol, Dept CSE, Kollam, Kerala, India
来源
SOFT COMPUTING SYSTEMS, ICSCS 2018 | 2018年 / 837卷
关键词
Cloud storage; Data outsourcing; De-duplication; Remote integrity proof; Public auditing; Regeneration;
D O I
10.1007/978-981-13-1936-5_55
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud storage system provides service or assistance for file storage and sharing services for distributed clients. In order to address integrity, controllable outsourcing, file duplication and regeneration of outsourced files, a regeneration scheme is being proposed, which is equipped with seed block algorithm. Dedicated proxies upload data to the cloud storage server on her behalf, e.g., a file owner with a dedicated PC, otherwise proxies, uploads file to cloud server. Dedicated PCs are distinguished and qualified with their recognizable identities, which discards the scenario of file being altered at the time of upload. This scheme facilitates duplication checking at the client-side, i.e., it checks for presence of clone file in cloud, more importantly it checks for clone using SHA1 algorithm. Moreover it allows regeneration of manipulated file on request. i.e., when auditor identifies that a file is being hacked or missing, auditor could inform file owner about the need of file regeneration and file owner could send a regeneration request to the server for regenerating the corresponding file.
引用
收藏
页码:526 / 537
页数:12
相关论文
共 11 条
  • [1] Ateniese G., 2008, P 4 INT C SEC PRIV C, P1, DOI 10.1145/1460877.1460889
  • [2] Security Concerns in Popular Cloud Storage Services
    Chu, Cheng-Kang
    Zhu, Wen-Tao
    Han, Jin
    Liu, Joseph K.
    Xu, Jia
    Zhou, Jianying
    [J]. IEEE PERVASIVE COMPUTING, 2013, 12 (04) : 50 - 57
  • [3] Jadhav S, 2017, INT J INNOV RES SCI, V6, P12217
  • [4] Nishant S, 2016, INT J ADV COMPUT SCI, V4, P13
  • [5] Paterson KG, 2006, LECT NOTES COMPUT SC, V4058, P207
  • [6] Pophale K, 2015, INT J ADV RES COMPUT, V4
  • [7] Ranaware N. S, 2016, IJCAT INT J COMPUT T, V3, P267
  • [8] Sahana Kumari B, 2016, INT J EMERG RES MANA, V5
  • [9] Umesh K, 2015, INT J ADV RES COMPUT, V4, P125
  • [10] Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud
    Wang, Boyang
    Li, Baochun
    Li, Hui
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2015, 8 (01) : 92 - 106