Data Integrity and Data Dynamics with Secure Storage Service in Cloud

被引:0
|
作者
Nithiavathy, R. [1 ]
机构
[1] Coimbatore Inst Engn & Technol, Dept Comp Sci & Engn, Coimbatore, Tamil Nadu, India
关键词
Error localization; data dynamics; Cloud Computing; Data Integrity; storage; Audit;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The current utilization of the spectrum is quite inefficient; consequently, if properly used, there is no shortage of the spectrum that is presently available. Therefore, it is anticipated that more flexible use of spectrum and spectrum sharing between radio systems will be key enablers to facilitate the successful implementation of future systems. Cognitive radio, however, is known as the most intelligent and promising technique in solving the problem of spectrum sharing. In this paper, we consider the technique of spectrum sharing among users of service providers to share the licensed spectrum of licensed service providers. It is shown that the proposed technique rCloud computing is upcoming technology which has gained a lot of hype in the current world of I. T. Cloud computing is said to be the next big thing in the computer world after the internet. Though the benefits are huge, such a service is also relinquishing users' physical possession of their outsourced data, which inevitably poses new security risks towards the correctness of the data in cloud. In order to address this new problem and further achieve a secure and dependable cloud storage service. We propose in this paper a flexible distributed storage integrity auditing mechanism, utilizing the homomorphic token and distributed erasure-coded data for dynamically storing data. The proposed design allows users or third party auditor to audit the cloud storage with very lightweight communication and less computation cost. The auditing result ensures reliable cloud storage correctness, and simultaneously achieves fast data error localization, i.e., finding which server is misbehaving in the fast rapidly changing its data in the cloud and the user's application stored in cloud, it also supports efficient dynamic operations on outsourced data which is secured, including, deletion, and append, block modification and resilient against Byzantine failure, malicious data modification attack, and even server colluding attacks.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] Verification of data integrity and co-operative loss recovery for secure data storage in cloud computing
    Rejin, Paul R.
    Paul, Raj D.
    COGENT ENGINEERING, 2019, 6 (01):
  • [32] SecACS: Enabling lightweight secure auditable cloud storage with data dynamics
    Li, Li
    Liu, Jiayong
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 54
  • [33] A Secure Certificate-Based Data Integrity Auditing Protocol with Cloud Service Providers
    Tian, Yuan
    Zhou, Xuan
    Zhou, Tanping
    Zhong, Weidong
    Li, Ruifeng
    Yang, Xiaoyuan
    MATHEMATICS, 2024, 12 (13)
  • [34] Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage
    Yong Yu
    Man Ho Au
    Yi Mu
    Shaohua Tang
    Jian Ren
    Willy Susilo
    Liju Dong
    International Journal of Information Security, 2015, 14 : 307 - 318
  • [35] A secure remote data integrity checking cloud storage system from threshold encryption
    Chuan Yao
    Li Xu
    Xinyi Huang
    Joseph K. Liu
    Journal of Ambient Intelligence and Humanized Computing, 2014, 5 : 857 - 865
  • [36] Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage
    Yu, Yong
    Au, Man Ho
    Mu, Yi
    Tang, Shaohua
    Ren, Jian
    Susilo, Willy
    Dong, Liju
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2015, 14 (04) : 307 - 318
  • [37] Secure Data Integrity in Cloud Storage with Multi-level Hash Indexing Technique
    Kavyashree, T. P.
    Poornima, A. S.
    SUSTAINABLE COMMUNICATION NETWORKS AND APPLICATION, ICSCN 2019, 2020, 39 : 652 - 660
  • [38] Enabling Ternary Hash Tree Based Integrity Verification for Secure Cloud Data Storage
    Thangavel, M.
    Varalakshmi, P.
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2020, 32 (12) : 2351 - 2362
  • [39] A secure remote data integrity checking cloud storage system from threshold encryption
    Yao, Chuan
    Xu, Li
    Huang, Xinyi
    Liu, Joseph K.
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2014, 5 (06) : 857 - 865
  • [40] Secure Sharing Data Integrity Audit Scheme with Dynamic User Groups in Cloud Storage
    Liu, Jia-Xian
    Huang, Hui
    Chen, Qun-Shan
    Huang, Zhen-Jie
    Journal of Network Intelligence, 2024, 9 (03): : 1673 - 1692