Data integrity verification: a novel approach for cloud computing

被引:3
|
作者
Saxena, Rajat [1 ]
Dey, Somnath [1 ]
机构
[1] Indian Inst Technol Indore, Dept Comp Sci & Engn, Cloud Comp Lab, Indore, Madhya Pradesh, India
关键词
Homomorphic tag; paillier homomorphic cryptography (PHC); proof of retrievability (PoR); provable data possession (PDP); third-party auditing; DATA POSSESSION;
D O I
10.1007/s12046-018-1042-4
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Data integrity verification (DIV) is one of the primary security checks for data stored on cloud servers. Cloud users have assured the safety of their data with frequent checking of data integrity. In this paper, we provide an efficient and effective DIV approach that offers effective and privacy-preserving audit structure. The main building components of our approach are a multi-power variant of the Paillier cryptography system with homomorphic tag. The Paillier cryptography system along with homomorphic tag assigns a unique and verifiable value to each data block, which helps performing dynamic data operations in cloud environment. To demonstrate our approach, we have implemented an application on Hadoop and MapReduce framework. We have tested this application with respect to the different parameters. The efficiency of the proposed method has been shown through the experimental results. Our method has shown a good improvement over those of the other modern systems.
引用
收藏
页数:12
相关论文
共 50 条
  • [1] Data integrity verification: a novel approach for cloud computing
    Rajat Saxena
    Somnath Dey
    [J]. Sādhanā, 2019, 44
  • [2] Cloud Audit: A Data Integrity Verification Approach for Cloud Computing
    Saxena, Rajat
    Dey, Somnath
    [J]. TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016, 2016, 89 : 142 - 151
  • [3] A curious collaborative approach for data integrity verification in cloud computing
    Rajat Saxena
    Somnath Dey
    [J]. CSI Transactions on ICT, 2017, 5 (4) : 407 - 418
  • [4] Improving Dynamic Data Integrity Verification in Cloud Computing
    Khatri, Trushna S.
    Jethava, G. B.
    [J]. 2013 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND NETWORKING TECHNOLOGIES (ICCCNT), 2013,
  • [5] A data integrity verification scheme in mobile cloud computing
    Lin, Chen
    Shen, Zhidong
    Chen, Qian
    Sheldon, Frederick T.
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 77 : 146 - 151
  • [6] An Effective Integrity Verification Scheme for Ensuring Data Integrity in Cloud Computing
    Kamboj, Minakshi
    Rana, Sanjeev
    [J]. INNOVATIONS IN BIO-INSPIRED COMPUTING AND APPLICATIONS, IBICA 2021, 2022, 419 : 42 - 54
  • [7] A Novel Data Auditing Approach to Achieve Data Privacy and Data Integrity in Cloud Computing
    Hiremath, Shivarajkumar
    Kunte, Sanjeev
    [J]. 2017 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, COMMUNICATION, COMPUTER, AND OPTIMIZATION TECHNIQUES (ICEECCOT), 2017, : 306 - 310
  • [8] Efficient integrity verification of replicated data in cloud computing system
    Yi, Mingxu
    Wei, Jinxia
    Song, Lingwei
    [J]. COMPUTERS & SECURITY, 2017, 65 : 202 - 212
  • [9] Two-Level Verification of Data Integrity for Data Storage in Cloud Computing
    Xu, Guangwei
    Chen, Chunlin
    Wang, Hongya
    Zang, Zhuping
    Pang, Mugen
    Jiang, Ping
    [J]. ADVANCED RESEARCH ON ELECTRONIC COMMERCE, WEB APPLICATION, AND COMMUNICATION, PT 1, 2011, 143 : 439 - +
  • [10] Enhanced Cloud Computing Security and Integrity Verification via Novel Encryption Techniques
    Kaur, Ranjit
    Singh, Raminder Pal
    [J]. 2014 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2014, : 1227 - 1233