Secure Data Integrity in Cloud Storage with Multi-level Hash Indexing Technique

被引:0
|
作者
Kavyashree, T. P. [1 ]
Poornima, A. S. [1 ]
机构
[1] Siddaganga Inst Technol, Dept CSE, Tumkur, India
关键词
Cloud storage; Data Integrity; AES algorithm; Secure Hash algorithm; Multi-level Hash Index Technique;
D O I
10.1007/978-3-030-34515-0_68
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A growing technology which offers storage, compute and network resources over the internet on a pay-for-use basis can be named as cloud computing. Cloud Storage is one of computing and service model in which the system allows you to store, manage, maintained and backed up remotely over a network and made available to users to use. Data integrity implies that the accuracy, validity of data over its Life cycle has to be maintained and any violations are to be detected like if data is loss, altered or compromised. User money and time can be saved by using cloud services. So user loses control over the data as there are maintained, stored by the cloud and it can be hacked, tampered by the attacker. Now integrity of data has to be maintained in a cloud where data is present in cloud. Here the aim is to provide data integrity for which the data will be stored in the cloud by user. Here paper says, we need to have an auditing technique which must be efficient and check the data integrity using Third party auditor (TPA), the auditing schemes uses Advanced Encryption Standard (AES) and Secure hash algorithm for encryption and to generate verification meta data respectively and using multi-level hash indexing technique to eliminate duplicate files, reduce storage consumption of file which is stored in the cloud.
引用
收藏
页码:652 / 660
页数:9
相关论文
共 50 条
  • [1] Enabling Ternary Hash Tree Based Integrity Verification for Secure Cloud Data Storage
    Thangavel, M.
    Varalakshmi, P.
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2020, 32 (12) : 2351 - 2362
  • [2] A Multi-Level Secure File Sharing Server and its Application to a Multi-Level Secure Cloud
    Heckman, Mark R.
    Schell, Roger R.
    Reed, Edwards E.
    [J]. 2015 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2015), 2015, : 1224 - 1229
  • [3] Data Integrity and Data Dynamics with Secure Storage Service in Cloud
    Nithiavathy, R.
    [J]. 2013 INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION, INFORMATICS AND MEDICAL ENGINEERING (PRIME), 2013,
  • [4] Secure and Efficient Data Integrity Verification Scheme for Cloud Data Storage
    Garg, Neenu
    Nehra, Anushka
    Baza, Mohamed
    Kumar, Neeraj
    [J]. 2023 IEEE 20TH CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC, 2023,
  • [5] Data integrity checking with reliable data transfer for secure cloud storage
    Wang, Yong
    Tao, Xiaoling
    Ni, Jianbing
    Yu, Yong
    [J]. INTERNATIONAL JOURNAL OF WEB AND GRID SERVICES, 2018, 14 (01) : 106 - 121
  • [6] Public Data Integrity Verification Scheme for Secure Cloud Storage
    Ping, Yuan
    Zhan, Yu
    Lu, Ke
    Wang, Baocang
    [J]. INFORMATION, 2020, 11 (09)
  • [7] Public data integrity verification scheme for secure cloud storage
    Ping Y.
    Zhan Y.
    Lu K.
    Wang B.
    [J]. Ping, Yuan (pyuan.lhn@xcu.edu.cn); Wang, Baocang (bcwang79@aliyun.com), 1600, MDPI AG (11):
  • [8] Secure Outsourced Data Transfer with Integrity Verification in Cloud Storage
    Ni, Jianbing
    Lin, Xiaodong
    Zhang, Kuan
    Yu, Yong
    Shen, Xuemin
    [J]. 2016 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC), 2016,
  • [9] One secure data integrity verification scheme for cloud storage
    Fan, Yongkai
    Lin, Xiaodong
    Tan, Gang
    Zhang, Yuqing
    Dong, Wei
    Lei, Jing
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 96 : 376 - 385
  • [10] Blockchain and Data Integrity Authentication Technique for Secure Cloud Environment
    Ramachandran, A.
    Ramadevi, P.
    Alkhayyat, Ahmed
    Yousif, Yousif Kerrar
    [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2023, 36 (02): : 2055 - 2070