Data Integrity Proof In Cloud Storage

Authors

  • Bhavesh Prajapati  Department of Information Technology, L. D. College of Engineering, Ahmedabad, Gujarat, India

Keywords:

DNS Hacking, QoS Violation, Denial of Service, Man in the Middle Attack, IP Spoofing, Data Sanitization, Data centre Security, Cloud Computing, Proof of irretrievability, Service level agreement, Cloud storage

Abstract

Cloud computing has been envisioned as the de-facto solution to the rising storage costs of IT Enterprises. With the high costs of data storage devices as well as the rapid rate at which data is being generated it proves costly for enterprises or individual users to frequently update their hardware. Apart from reduction in storage costs data outsourcing to the cloud also helps in reducing the maintenance. Cloud storage moves the user’s data to large data centres, which are remotely located, on which user does not have any control. However, this unique feature of the cloud poses many new security challenges which need to be clearly understood and resolved. We provide a scheme which gives a proof of data integrity in the cloud which the customer can employ to check the correctness of his data in the cloud. This proof can be agreed upon by both the cloud and the customer and can be incorporated in the Service level agreement (SLA).

References

  1. Beginning ASP.NET 4: in C# and VB by Imar Spaanjaars
  2. ASP.NET 4 Unleashed by Stephen Walther
  3. Programming ASP.NET 3.5 by Jesse Liberty, Dan Maharry, Dan Hurwitz
  4. Beginning ASP.NET 3.5 in C# 2008: From Novice to Professional, Second Edition by Matthew MacDonald
  5. Amazon Web Services (AWS), Online at http://aws. amazon.com
  6. Google App Engine, Online at http://code.google.com/ appengine
  7. Microsoft Azure, http://www.microsoft.com/azure/.
  8. A. Agrawal et al. Ws-bpel extension for people (bpel4people), version 1.0., 2007.
  9. M. Amend et al. Web services human task (ws-humantask), version 1.0., 2007.
  10. D. Brabham. Crowdsourcing as a model for problem solving: An introduction and cases.
  11. Data Communications and Networking, by Behrouz A Forouzan.
  12. E. Mykletun, M. Narasimha, and G. Tsudik, “Authentication and integrity in outsourced databases,” Trans. Storage, vol. 2, no. 2, pp. 107-138, 2006.
  13. D. X. Song, D. Wagner, and A. Perrig, “Practical techniques for searches on encrypted data,” in SP ’00: Proceedings of the 2000 IEEE Symposium on Security and Privacy. Washington, DC, USA: IEEE Computer Society, 2000
  14. A. Juels and B. S. Kaliski, Jr., “Pors: proofs of retrievability for large files,” in CCS ’07: Proceedings of the 14th ACM conference on Computer and communications security. New York, NY, USA: ACM, 2007, pp. 584-597.
  15. G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable data possession at untrusted stores,” in CCS ’07: Proceedings of the 14th ACM conference on Computer and communications security. New York, NY, USA: ACM, 2007, pp. 598-609.

Downloads

Published

2015-04-10

Issue

Section

Research Articles

How to Cite

[1]
Bhavesh Prajapati, " Data Integrity Proof In Cloud Storage, International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 1, Issue 1, pp.31-34, March-April-2015.