Enabling public verifiability and availability for secure data storage in cloud computing

被引:10
|
作者
Jogdand, Rashmi M. [1 ,2 ]
Goudar, R. H. [2 ]
Sayed, Gazal Begum [1 ]
Dhamanekar, Pratik B. [1 ]
机构
[1] KLS Gogte Inst Technol, Dept Comp Sci & Engn, Belgaum, Karnataka, India
[2] Graph Era Univ, Dept Comp Sci, Dehra Dun, India
关键词
Cloud; Merkle hash tree; Security; Storage; Availability; Optimisation;
D O I
10.1007/s12530-013-9095-4
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The use of cloud computing has increased rapidly in many organizations. Cloud computing provides many benefits in terms of low cost and accessibility of data. Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centers, where the management of the data and services may not be fully trustworthy. The major advantage with this technology is it is cost efficient. But there follows a key disadvantage associated with it, the disadvantage with it is the security issues related to the data stored on clouds. We have first identified the potential security problems and the difficulties with fully extension of data dynamics in the cloud and service availability. While prior works ensure remote data integrity, they lack public verifiability and data availability. Hence the aim here is to ensure data integrity with public verifiability and availability. We have constructed an elegant verification with access rights scheme for seamless integration of these two salient features in our protocol design. This paper in particular tries to achieve public verifiability by manipulating the classic Merkle Hash Tree and moving towards multi clouds or in other words inter-clouds which has emerged recently. We have tried to assure data availability by adopting DepSky System model for multi-clouds.
引用
收藏
页码:55 / 65
页数:11
相关论文
共 50 条
  • [21] Privacy-preserving public auditing for secure data storage in fog-to-cloud computing
    Tian, Hui
    Nan, Fulin
    Chang, Chin-Chen
    Huang, Yongfeng
    Lu, Jing
    Du, Yongqian
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 127 : 59 - 69
  • [22] Methodological Survey to Improve the Secure Data Storage in Cloud Computing
    Rajkumar, K.
    Dhanakoti, V
    [J]. 2020 INTERNATIONAL CONFERENCE ON EMERGING SMART COMPUTING AND INFORMATICS (ESCI), 2020, : 313 - 317
  • [23] SecACS: Enabling lightweight secure auditable cloud storage with data dynamics
    Li, Li
    Liu, Jiayong
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 54
  • [24] A Secure Method for Data Storage and Transmission in Sustainable Cloud Computing
    Sana, Muhammad Usman
    Li, Zhanli
    Kiren, Tayybah
    Bin Liaqat, Hannan
    Naseem, Shahid
    Saeed, Atif
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 75 (02): : 2741 - 2757
  • [25] Enabling online/offline remote data auditing for secure cloud storage
    Qingqing Gan
    Xiaoming Wang
    Jianwei Li
    Jiajun Yan
    Suyu Li
    [J]. Cluster Computing, 2021, 24 : 3027 - 3041
  • [26] Enabling online/offline remote data auditing for secure cloud storage
    Gan, Qingqing
    Wang, Xiaoming
    Li, Jianwei
    Yan, Jiajun
    Li, Suyu
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (04): : 3027 - 3041
  • [27] SECURE STORAGE OF COMPUTER NETWORK DATA BASED ON CLOUD COMPUTING
    Jiang, Hongwei
    [J]. SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2023, 24 (04): : 663 - 672
  • [28] Enabling Secure Outsourced Cloud Data
    Sankareeswari, G.
    Selvi, S.
    Vidhyalakshmi, R.
    [J]. 2014 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2014,
  • [29] Security analysis and improvement of a public auditing scheme for secure data storage in fog-to-cloud computing
    Zhang, Wenfang
    Jiao, Heng
    Yan, Zhuoqun
    Wang, Xiaomin
    Khan, Muhammad Khurram
    [J]. COMPUTERS & SECURITY, 2023, 125
  • [30] A Secure Data Dynamics and Public Auditing Scheme for Cloud Storage
    Singh, Premlata
    Saroj, Sushil Kr
    [J]. 2020 6TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2020, : 695 - 700