Data Integrity Proof In Cloud Storage
Keywords:
DNS Hacking, QoS Violation, Denial of Service, Man in the Middle Attack, IP Spoofing, Data Sanitization, Data centre Security, Cloud Computing, Proof of irretrievability, Service level agreement, Cloud storageAbstract
Cloud computing has been envisioned as the de-facto solution to the rising storage costs of IT Enterprises. With the high costs of data storage devices as well as the rapid rate at which data is being generated it proves costly for enterprises or individual users to frequently update their hardware. Apart from reduction in storage costs data outsourcing to the cloud also helps in reducing the maintenance. Cloud storage moves the user’s data to large data centres, which are remotely located, on which user does not have any control. However, this unique feature of the cloud poses many new security challenges which need to be clearly understood and resolved. We provide a scheme which gives a proof of data integrity in the cloud which the customer can employ to check the correctness of his data in the cloud. This proof can be agreed upon by both the cloud and the customer and can be incorporated in the Service level agreement (SLA).
References
- Beginning ASP.NET 4: in C# and VB by Imar Spaanjaars
- ASP.NET 4 Unleashed by Stephen Walther
- Programming ASP.NET 3.5 by Jesse Liberty, Dan Maharry, Dan Hurwitz
- Beginning ASP.NET 3.5 in C# 2008: From Novice to Professional, Second Edition by Matthew MacDonald
- Amazon Web Services (AWS), Online at http://aws. amazon.com
- Google App Engine, Online at http://code.google.com/ appengine
- Microsoft Azure, http://www.microsoft.com/azure/.
- A. Agrawal et al. Ws-bpel extension for people (bpel4people), version 1.0., 2007.
- M. Amend et al. Web services human task (ws-humantask), version 1.0., 2007.
- D. Brabham. Crowdsourcing as a model for problem solving: An introduction and cases.
- Data Communications and Networking, by Behrouz A Forouzan.
- E. Mykletun, M. Narasimha, and G. Tsudik, “Authentication and integrity in outsourced databases,” Trans. Storage, vol. 2, no. 2, pp. 107-138, 2006.
- D. X. Song, D. Wagner, and A. Perrig, “Practical techniques for searches on encrypted data,” in SP ’00: Proceedings of the 2000 IEEE Symposium on Security and Privacy. Washington, DC, USA: IEEE Computer Society, 2000
- A. Juels and B. S. Kaliski, Jr., “Pors: proofs of retrievability for large files,” in CCS ’07: Proceedings of the 14th ACM conference on Computer and communications security. New York, NY, USA: ACM, 2007, pp. 584-597.
- G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable data possession at untrusted stores,” in CCS ’07: Proceedings of the 14th ACM conference on Computer and communications security. New York, NY, USA: ACM, 2007, pp. 598-609.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRST

This work is licensed under a Creative Commons Attribution 4.0 International License.