Public Auditing Scheme for Cloud Data Integrity Verification

被引:0
|
作者
Hiremath, Shivarajkumar [1 ]
Kunte, R. Sanjeev [2 ]
机构
[1] SKSVMACET, Dept ISE, Lakshmeshwar, India
[2] JNNCE, Dept CSE, Shivamogga, India
关键词
Third Party Auditor (TPA); Merkle Hash Tree; Cloud storage; Public auditing;
D O I
10.1007/978-3-030-38040-3_28
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Cloud computing is one that provides an on-demand accessibility for computer resources, particularly data storage and computing power by the user. It is generally used to describe data hubs that remain accessible to users over the internet. The users place their data in cloud to save their local memory. The cloud service providers will control the data that is placed in the cloud. As users upload their data in cloud that is controlled by service providers, they lose control over their data. Hence, we must have few safety measures to retain the user's data securely. Here, we described an auditing system that makes use of external auditor. We utilized Advanced Encryption Standard (AES) and Merkle Hash Tree (MHT) for ensuring integrity of cloud data. This work is accomplished in Amazon EC2 ubuntu16.04 server instance. From the results gained, we determine that our scheme is intact and considers a firm time to process files.
引用
收藏
页码:237 / 246
页数:10
相关论文
共 50 条
  • [41] Identity-based public data integrity verification scheme in cloud storage system via blockchain
    Yilin Yuan
    Jianbiao Zhang
    Wanshan Xu
    Zheng Li
    The Journal of Supercomputing, 2022, 78 : 8509 - 8530
  • [42] Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation
    Jiang, Tao
    Chen, Xiaofeng
    Ma, Jianfeng
    IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (08) : 2363 - 2373
  • [43] Public Integrity Auditing of Shared Encrypted Data within Cloud Storage Group
    Han, Chunxia
    Wang, Linjie
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [44] Distributed Data Integrity Verification Scheme in Multi-Cloud Environment
    Witanto, Elizabeth Nathania
    Stanley, Brian
    Lee, Sang-Gon
    SENSORS, 2023, 23 (03)
  • [45] An Effective Integrity Verification Scheme of Cloud Data Based on BLS Signature
    Luo, Xiling
    Zhou, Zequan
    Zhong, Lin
    Mao, Jian
    Chen, Chaoyong
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [46] Data Integrity Verification Scheme For Lightweight Devices in Cloud Storage Scenarios
    Han, Bing
    Wang, Hao
    Fang, Min
    Zhang, Yongchao
    Zhou, Lu
    Ge, Chunpeng
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2024, 61 (10): : 2467 - 2481
  • [47] Data Confidentiality and Integrity Verification using User Authenticator scheme in cloud
    Nirmala, V.
    Sivanandhan, R. K.
    Lakshmi, R. Shanmuga
    2013 IEEE INTERNATIONAL CONFERENCE ON GREEN HIGH PERFORMANCE COMPUTING (ICGHPC), 2013,
  • [48] THE APPLICATION OF CLOUD DATA INTEGRITY VERIFICATION SCHEME IN INTERNET OF THINGS SECURITY
    Sai, Wei
    Zhang, Xinpeng
    Xie, Chengyang
    Li, Hong
    Zhang, Hui
    2017 14TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2017, : 268 - 273
  • [49] AUDITING OF DATA INTEGRITY OVER DYNAMIC DATA IN CLOUD
    Kumar, P. Santhosh
    Parthiban, Latha
    Jegatheeswari, V.
    2017 SECOND INTERNATIONAL CONFERENCE ON RECENT TRENDS AND CHALLENGES IN COMPUTATIONAL MODELS (ICRTCCM), 2017, : 43 - 48
  • [50] Lightweight Dynamic Integrity Auditing Scheme for Cloud Data of Ubiquitous Power Internet of Things
    Tian X.-X.
    Liu T.-S.
    Niu X.-Y.
    Zhou A.-Y.
    Jisuanji Xuebao/Chinese Journal of Computers, 2020, 43 (12): : 2298 - 2314