Improvement of Data Integrity and Data Dynamics for Data Storage Security in Cloud Computing

被引:0
|
作者
Pardeshi, Poonam M. [1 ]
Tidke, Bharat [1 ]
机构
[1] Univ Pune, Dept Comp Engn, Flora Inst Technol, Pune, Maharashtra, India
关键词
Advanced encryption standard; Cloud computing; Data dynamics; Merkle hash tree; Public auditability; Recovery system; Secured hash algorithm; third party auditor;
D O I
10.1007/978-81-322-2250-7_27
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud stands today as an emerging standard, however, data outsourcing paradigm is main security concern in cloud. To make sure that the data stored on the cloud is safe, frequent data integrity checking is imperative. This work considers the problem of data integrity in cloud storage and makes use of Dynamic Merkle Hash Tree (DMHT) along with AES and SHA-1 algorithms to solve the same. RSA algorithm has been used by many previously developed systems; the proposed work makes use of AES which leads to performance improvement. The work also makes use of the concept of Third Party Auditor (TPA) to achieve Public Auditing. In case of corruption of data or data loss, the proposed work promises to recover the lost data with the help of a backup system. In order to support dynamic data operations, the Merkle Tree is made dynamic by making use of relative index. Further, to save the communication bandwidth and cost, block level recovery is made instead of recovery of entire file. On comparison with previous systems, the proposed system shows reduction in server computation time. The proposed work thus aims at improving and maintaining data integrity at untrusted server, supports dynamic data operations and makes recovery possible by providing a recovery system.
引用
收藏
页码:279 / 289
页数:11
相关论文
共 50 条
  • [1] Improving Data Integrity for Data Storage Security in Cloud Computing
    Pardeshi, Poonam M.
    Borade, Deepali R.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2015, 15 (07): : 61 - 67
  • [2] Improving Data Integrity for Data Storage Security in Cloud Computing
    Pardeshi, Poonam M.
    Borade, Deepali R.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2015, 15 (06): : 75 - 82
  • [3] Cloud Computing Data Storage Security framework relating to Data Integrity, Privacy and Trust
    Sirohi, Preeti
    Agarwal, Amit
    [J]. 2015 1ST INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING TECHNOLOGIES (NGCT), 2015, : 115 - 118
  • [4] Optimized Public Auditing and Data Dynamics for Data Storage Security in Cloud Computing
    Singh, Anirudha Pratap
    Pasupuleti, Syam Kumar
    [J]. PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING AND COMMUNICATIONS, 2016, 93 : 751 - 759
  • [5] Key Derivation Policy for data security and data integrity in cloud computing
    Senthil Kumari P.
    Nadira Banu Kamal A.R.
    [J]. Automatic Control and Computer Sciences, 2016, 50 (3) : 165 - 178
  • [6] Data Integrity and Data Dynamics with Secure Storage Service in Cloud
    Nithiavathy, R.
    [J]. 2013 INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION, INFORMATICS AND MEDICAL ENGINEERING (PRIME), 2013,
  • [7] A framework for Data Security and Storage in Cloud Computing
    Bhandari, Akshita
    Gupta, Ashutosh
    Das, Debasis
    [J]. 2016 INTERNATIONAL CONFERENCE ON COMPUTATIONAL TECHNIQUES IN INFORMATION AND COMMUNICATION TECHNOLOGIES (ICCTICT), 2016,
  • [8] Ensuring Data Storage Security in Cloud Computing
    Wang, Cong
    Wang, Qian
    Ren, Kui
    Lou, Wenjing
    [J]. IWQOS: 2009 IEEE 17TH INTERNATIONAL WORKSHOP ON QUALITY OF SERVICE, 2009, : 37 - +
  • [9] Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
    Wang, Qian
    Wang, Cong
    Ren, Kui
    Lou, Wenjing
    Li, Jin
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2011, 22 (05) : 847 - 859
  • [10] Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing
    Wang, Qian
    Wang, Cong
    Li, Jin
    Ren, Kui
    Lou, Wenjing
    [J]. COMPUTER SECURITY - ESORICS 2009, PROCEEDINGS, 2009, 5789 : 355 - +