Prediction of availability and integrity of cloud data using soft computing technique

被引:8
作者
Pitchai, R. [1 ]
Babu, S. [2 ]
Supraja, P. [3 ]
Anjanayya, S. [1 ]
机构
[1] BV Raju Inst Technol, Dept Comp Sci & Engn, Narsapur, Telangana, India
[2] SRM Inst Sci & Technol, Dept Comp Sci & Engn, Chennai, Tamil Nadu, India
[3] SRM Inst Sci & Technol, Dept Informat Technol, Kattankulathur, Tamil Nadu, India
关键词
Prediction; Availability; Integrity; AIVP; Cloud computing; SECURE; VERIFICATION; STORAGE;
D O I
10.1007/s00500-019-04008-0
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In cloud computing, data storage is the most important task. In cloud storage, security and privacy are the major issues. To avoid such issues, we proposed a new protocol called availability and integrity verification protocol (AIVP) to predict the available space in cloud and verify the integrity of the stored data. For availability verification, this protocol is used to learn the size of the available data before it starts the storing process. Based on the learning, can find available storage space, cloud service provider will allow to store the data. This reduces the latency, communication cost and computational cost. For integrity verification, we separate the public data and private data and this leads to avoid the privacy issues. Private data will be integrated by the cloud service providers and the public data will be integrated by the third-party verifier. By using this verification process, it can avoid the security issues. In simulation results, proposed AIVP has outperformed the high-efficiency and throughput and this will cut the latency, computational cost and communication cost.
引用
收藏
页码:8555 / 8562
页数:8
相关论文
共 23 条
[1]  
Al-Saffar AMH, 2015, IDENTITY, V4, P505
[2]  
Brandenburger M., 2015, P 8 ACM INT SYST STO
[3]   Experience Availability: Tail-Latency Oriented Availability in Software-Defined Cloud Computing [J].
Cai, Bin-Lei ;
Zhang, Rong-Qi ;
Zhou, Xiao-Bo ;
Zhao, Lai-Ping ;
Li, Ke-Qiu .
JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2017, 32 (02) :250-257
[4]  
Chen F., 2016, P 4 ACM INT WORKSH S, P24
[5]   A Survey of Remote Data Integrity Checking: Techniques and Verification Structures [J].
Chen, Yu ;
Wang, Feng ;
Zhu, Liehuang ;
Zhang, Zijian .
INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2015, 8 (04) :179-198
[6]   A secure cloud storage system combining time-based one-time password and automatic blocker protocol [J].
El-Booz S.A. ;
Attiya G. ;
El-Fishawy N. .
Eurasip Journal on Information Security, 2016, 2016 (01)
[7]   High availability in clouds: systematic review and research challenges [J].
Endo, Patricia T. ;
Rodrigues, Moises ;
Goncalves, Glauco E. ;
Kelner, Judith ;
Sadok, Djamel H. ;
Curescu, Calin .
JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2016, 5
[8]   Comparative analysis of cloud data integrity auditing protocols [J].
Garg, Neenu ;
Bawa, Seema .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 66 :17-32
[9]  
Glass S., 2016, SECURITY SELF ORG NE
[10]   Enabling public verifiability and availability for secure data storage in cloud computing [J].
Jogdand, Rashmi M. ;
Goudar, R. H. ;
Sayed, Gazal Begum ;
Dhamanekar, Pratik B. .
EVOLVING SYSTEMS, 2015, 6 (01) :55-65