Enabling public verifiability and availability for secure data storage in cloud computing

被引:10
|
作者
Jogdand, Rashmi M. [1 ,2 ]
Goudar, R. H. [2 ]
Sayed, Gazal Begum [1 ]
Dhamanekar, Pratik B. [1 ]
机构
[1] KLS Gogte Inst Technol, Dept Comp Sci & Engn, Belgaum, Karnataka, India
[2] Graph Era Univ, Dept Comp Sci, Dehra Dun, India
关键词
Cloud; Merkle hash tree; Security; Storage; Availability; Optimisation;
D O I
10.1007/s12530-013-9095-4
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The use of cloud computing has increased rapidly in many organizations. Cloud computing provides many benefits in terms of low cost and accessibility of data. Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centers, where the management of the data and services may not be fully trustworthy. The major advantage with this technology is it is cost efficient. But there follows a key disadvantage associated with it, the disadvantage with it is the security issues related to the data stored on clouds. We have first identified the potential security problems and the difficulties with fully extension of data dynamics in the cloud and service availability. While prior works ensure remote data integrity, they lack public verifiability and data availability. Hence the aim here is to ensure data integrity with public verifiability and availability. We have constructed an elegant verification with access rights scheme for seamless integration of these two salient features in our protocol design. This paper in particular tries to achieve public verifiability by manipulating the classic Merkle Hash Tree and moving towards multi clouds or in other words inter-clouds which has emerged recently. We have tried to assure data availability by adopting DepSky System model for multi-clouds.
引用
收藏
页码:55 / 65
页数:11
相关论文
共 50 条
  • [1] Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing
    Wang, Qian
    Wang, Cong
    Li, Jin
    Ren, Kui
    Lou, Wenjing
    [J]. COMPUTER SECURITY - ESORICS 2009, PROCEEDINGS, 2009, 5789 : 355 - +
  • [2] Improved Verifiability Scheme for Data Storage in Cloud Computing
    YANG Xiaoyuan1
    2.Key Laboratory of Network and Information Security of APF /Engineering College of Armed Police Force
    [J]. Wuhan University Journal of Natural Sciences, 2011, 16 (05) : 399 - 404
  • [3] A survey of public auditing for secure data storage in cloud computing
    [J]. Hwang, Min-Shiang (mshwang@asia.edu.tw), 1600, Femto Technique Co., Ltd. (18):
  • [4] Enhanced Public Auditability & Secure Data Storage in Cloud Computing
    Chakraborty, Tamal Kanti
    Dhami, Anil
    Bansal, Prakhar
    Singh, Tripti
    [J]. PROCEEDINGS OF THE 2013 3RD IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2013, : 101 - 105
  • [5] Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
    Wang, Qian
    Wang, Cong
    Ren, Kui
    Lou, Wenjing
    Li, Jin
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2011, 22 (05) : 847 - 859
  • [6] Secure storage of data in cloud computing
    20150500466883
    [J]. (1) School of Computer and Software and Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science and Technology, Nanjing; 210044, China, 1600, IEEE Tainan Section; International Society of Management Engineers; JSPS/NSFC/NRF A3 Foresight Program Ultra-Realistic Acoustic Interactive Communication on Next-Generation Internet; Tainan Chapter of IEEE Signal Processing Society; Waseda University (Institute of Electrical and Electronics Engineers Inc.):
  • [7] Enabling efficient and secure data sharing in cloud computing
    Li, Jingwei
    Li, Jin
    Liu, Zheli
    Jia, Chunfu
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2014, 26 (05): : 1052 - 1066
  • [8] Data storage with secure boundary in cloud computing
    Zhu, Shuaishuai
    Han, Yiliang
    [J]. ICIC Express Letters, 2014, 8 (09): : 2389 - 2394
  • [9] A Secure and Searchable Data Storage in Cloud Computing
    Gupta, Sarika
    Satapathy, Sangita Rani
    Mehta, Piyush
    Tripathy, Anupam
    [J]. PROCEEDINGS OF THE 2013 3RD IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2013, : 106 - 109
  • [10] Secure Public-Auditing Cloud Storage Enabling Data Dynamics in the Standard Model
    Ma, Mingxiao
    Weber, Jos
    van den Berg, Jan
    [J]. 2016 THIRD INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION PROCESSING, DATA MINING, AND WIRELESS COMMUNICATIONS (DIPDMWC), 2016, : 170 - 175