Public Auditing Scheme for Cloud Data Integrity Verification

被引:0
|
作者
Hiremath, Shivarajkumar [1 ]
Kunte, R. Sanjeev [2 ]
机构
[1] SKSVMACET, Dept ISE, Lakshmeshwar, India
[2] JNNCE, Dept CSE, Shivamogga, India
关键词
Third Party Auditor (TPA); Merkle Hash Tree; Cloud storage; Public auditing;
D O I
10.1007/978-3-030-38040-3_28
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Cloud computing is one that provides an on-demand accessibility for computer resources, particularly data storage and computing power by the user. It is generally used to describe data hubs that remain accessible to users over the internet. The users place their data in cloud to save their local memory. The cloud service providers will control the data that is placed in the cloud. As users upload their data in cloud that is controlled by service providers, they lose control over their data. Hence, we must have few safety measures to retain the user's data securely. Here, we described an auditing system that makes use of external auditor. We utilized Advanced Encryption Standard (AES) and Merkle Hash Tree (MHT) for ensuring integrity of cloud data. This work is accomplished in Amazon EC2 ubuntu16.04 server instance. From the results gained, we determine that our scheme is intact and considers a firm time to process files.
引用
收藏
页码:237 / 246
页数:10
相关论文
共 50 条
  • [31] One secure data integrity verification scheme for cloud storage
    Fan, Yongkai
    Lin, Xiaodong
    Tan, Gang
    Zhang, Yuqing
    Dong, Wei
    Lei, Jing
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 96 : 376 - 385
  • [32] Lightweight integrity verification scheme for cloud based group data
    Liu Y.-F.
    Wang Y.-J.
    Fu S.-J.
    Tongxin Xuebao/Journal on Communications, 2016, 37 : 140 - 146
  • [33] Decentralized Integrity Auditing Scheme for Cloud Data Based on Blockchain and Edge Computing
    Yang X.
    Wang X.
    Li X.
    Zhou H.
    Wang C.
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2023, 45 (10): : 3759 - 3766
  • [34] On the Security of a Data Integrity Auditing Scheme in Mobile Multi-cloud Environment
    Zhang, Jianhong
    Ou, Peirong
    Bai, Wenle
    ICCSP 2018: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY, 2018, : 40 - 44
  • [35] Certificateless Public Verification for the Outsourced Data Integrity in Cloud Storage
    Huang, Longxia
    Zhou, Junlong
    Zhang, Gongxuan
    Sun, Jin
    Wang, Tian
    Vajdi, Ahmadreza
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2018, 27 (11)
  • [36] Public integrity verification for data sharing in cloud with asynchronous revocation
    Song, Wei
    Wu, Yu
    Cui, Yihui
    Liu, Qilie
    Shen, Yuan
    Qiu, Zicheng
    Yao, Jianjun
    Peng, Zhiyong
    DIGITAL COMMUNICATIONS AND NETWORKS, 2022, 8 (01) : 33 - 43
  • [37] Cryptographic Public Verification of Data Integrity for Cloud Storage Systems
    Zhang, Yuan
    Xu, Chunxiang
    Li, Hongwei
    Liang, Xiaohui
    IEEE CLOUD COMPUTING, 2016, 3 (05): : 44 - 52
  • [38] Public integrity verification for data sharing in cloud with asynchronous revocation
    Wei Song
    Yu Wu
    Yihui Cui
    Qilie Liu
    Yuan Shen
    Zicheng Qiu
    Jianjun Yao
    Zhiyong Peng
    Digital Communications and Networks, 2022, 8 (01) : 33 - 43
  • [39] Secure public data auditing scheme for cloud storage in smart city
    Wu, Libing
    Wang, Jing
    Kumar, Neeraj
    He, Debiao
    PERSONAL AND UBIQUITOUS COMPUTING, 2017, 21 (05) : 949 - 962
  • [40] Secure public data auditing scheme for cloud storage in smart city
    Libing Wu
    Jing Wang
    Neeraj Kumar
    Debiao He
    Personal and Ubiquitous Computing, 2017, 21 : 949 - 962