Abstract
Cloud computing is the one which offers infrastructure to the client on a pay-as-you-use model by leveraging on the Internet technology. As this model depicts the electricity billing, it is often termed as utility computing. As the use of cloud increases day by day, the concerns about cloud also increase. There are a number of data breaches that are happening day by day that affect the cloud growth. The major concern in adapting cloud is its security. In order to solve the security issues, there are a number of solutions proposed. This chapter focuses on the integrity assurance strategy for remote data. The technique proposed combines the encrypting mechanism along with the data integrity check mechanism. The analysis and simulation results show that our proposed auditing protocols are secure and it reduces the computation load and communication cost of the auditor.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Ateniese, G., Burns, R.C., Curtmola, R., Herring, J., Kissner, L., Peterson, Z.N.J., Song, D.X.: Provable data possession at untrusted stores. In: ACM Conference on Computer and Communications Security, pp. 598–609, ACM, Alexandria, VA, USA (2007)
Shah, M.A., Swaminathan, R., Baker, M.: Privacy-Preserving Audit and Extraction of Digital Contents, 2008, Report 2008/186, Cryptology ePrint Archive
Juels, A., Kaliski, B.S. Jr.: Pors: proofs of retrievability for large files. In: Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS’07), pp. 584–597, Alexandria, VA, USA (2007)
Chang, E.C., Xu, J.: Remote integrity check with dishonest storage server. In: Proceedings of the 13th European Symposium Research in Computer Security (ESORICS’08), pp. 223–237, Malaga, Spain (2008)
Zhu, Y., Hu, H., Ahn, G., Yu, M.: Cooperative provable data possession for integrity verification in multi-cloud storage. In: IEEE Transactions on Parallel and Distributed Systems, pp. 2231–2244. (2012)
Erway, C., Kupcu, A., Papamanthou, C., Tamassia, R.: Dynamic provable data possession. In: Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS’09), (2009)
Mell, P., Grance, T.: The NIST definition of cloud computing. National Institute of Standards and Technology, Tech. Rep., (2009)
Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R.H., Konwinski, A., Lee, G., Patterson, D.A., Rabkin, A., Stoica, I., Zaharia, M.: A view of cloud computing. Commun. ACM 53(4), 50–58 (2010)
Velte, T., Velte, A., Elsenpeter, R.: Cloud Computing: A Practical Approach, 1st edn. McGraw-Hill, Inc., New York (2010)
Li, J., Krohn, M.N., Mazières, D., Shasha, D.: Secure untrusted data repository (sundr). In: Proceedings of the 6th Conference on Symposium on Operating Systems Design & Implementation, pp. 121–136, Berkeley, CA, USA (2004)
Lillibridge, M., Elnikety, S., Birrell, A., Burrows, M., Isard, M.: A cooperative internet backup scheme. In: USENIX Annual Technical Conference, General Track. USENIX, pp. 29–41. (2003)
Shacham, H., Waters, B.: Compact proofs of retrievability. In: Pieprzyk, J. (eds.) ASIACRYPT.Lecture Notes in Computer Science, vol. 5350, pp. 90–107. Springer, Melvourne, Australia (2008)
Erway, C.C., K¨upc,¨u, A., Papamanthou, C., Tamassia, R.: Dynamic provable data possession. In: Al-Shaer, E., Jha, S., Keromytis, A.D. (eds.) ACM Conference on Computer and Communications Security, pp. 213–222, ACM, Chicago, IL, USA (2009)
Kan Yang, Xiaohua Jia: An efficient and secure dynamic auditing protocol for data storage in Cloud computing. IEEE Trans. Parallel Distrib. Syst. 24(9), 1–11 (2012)
Zhu, Y., Wang, H., Hu, Z., Ahn, G.-J., Hu, H., Yau, S.S.: Dynamic audit services for outsourced storages in clouds. IEEE Trans. Serv. Comput. 6(2), 227–238 (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer India
About this paper
Cite this paper
Nirmala, V., Shanmugalakshmi, R., Kiruthika, M. (2015). Auditing Mechanism to Verify the Integrity of Remote Data in Cloud. In: Rajsingh, E., Bhojan, A., Peter, J. (eds) Informatics and Communication Technologies for Societal Development. Springer, New Delhi. https://doi.org/10.1007/978-81-322-1916-3_6
Download citation
DOI: https://doi.org/10.1007/978-81-322-1916-3_6
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-1915-6
Online ISBN: 978-81-322-1916-3
eBook Packages: EngineeringEngineering (R0)