Advertisement

An Efficient Method for Data Integrity in Cloud Storage Using Metadata

  • R. Ajith KrishnaEmail author
  • Kavialagan Arjunan
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 35)

Abstract

Cloud computing is the fast, reliable and effective fix for the rising storage expenditure of IT companies. The data storage devices available is not cost effective because the data being generated at a faster pace makes it costlier for the IT companies and individual users to repeatedly update their hardware. Cloud computing not only reduces the storage costs but also reduces the protection procedures. Cloud storage shift the user’s data to remotely located large data centers where the user does not have any control. However, as the case of many advanced technologies, this unique feature of the Cloud may create many new security challenges which are to clearly understood and resolved. The user should be guaranteed of the correctness of data in the Cloud. Since the data cannot be accessed physically by the user, it has to provide a tangible solution for the user to ensure that the data integrity is retained or not. In this, a system is developed which provides a substantiation of data integrity in the Cloud so that the user can utilize it in order to ensure the correctness of the user data in the Cloud. This proof of data integrity is mutually agreed in cooperation with the Cloud and the client and can also be included in the Service Level Agreement (SLA). This system gives an assurance that the data storage can be minimized at the client side which will be of immense benefit to smaller clients.

Keywords

Cloud computing Data integrity TPA SLA Cloud clients 

References

  1. 1.
    Bazzi, R., Ding, Y.: Non-skipping timestamps for Byzantine data storage systems. In: Guerraoui, R. (ed.) DISC 2004. LNCS, vol. 3274, pp. 405–419. Springer, Heidelberg (2004)Google Scholar
  2. 2.
    Juels, A., Kaliski Jr, B.S.: Pors: proofs of retrievability for large files. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS 2007, pp. 584–597. ACM, New York (2007)Google Scholar
  3. 3.
    Shacham, H., Waters, B.: Compact proofs of retrievability. In: Proceedings of Asiacrypt 2008, December 2008Google Scholar
  4. 4.
    Mykletun, E., Narasimha, M., Tsudik, G.: Authentication and integrity in outsourced databases. Trans. Storage 2(2), 107–138 (2006)CrossRefGoogle Scholar
  5. 5.
    Bowers, K.D., Juels, A., Oprea, A.: HAIL: a high-availability and integrity layer for cloud storage. Cryptology ePrint Archive, Report 2008/489 (2008). http://eprint.iacr.org/
  6. 6.
    Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: Enabling public verifiability and data dynamics for storage security in cloud computing. Computer Security–ESORICS, pp. 355–370 (2009)CrossRefGoogle Scholar
  7. 7.
    Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores (2007)Google Scholar
  8. 8.
    Ateniese, G., Pietro, R.D., Mancini, L.V., Tsudik, G.: Scalable and efficient provable data possession. In: Proceedings of Secure Communication (2008)Google Scholar
  9. 9.
    Erway, C., Küpçü, A., Papamanthou, C., Tamassia, R.: Dynamic provable data possession. In: Proceedings of the 16th ACM conference on Computer and Communications Security, CCS 2009, New York, NY, USA, pp. 1–6 (2009). Berkeley, CA, USA (2007)Google Scholar
  10. 10.
    Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS 2007, pp. 598–609. ACM, New York (2007)Google Scholar
  11. 11.
    Varalakshmi, P., Deventhiran, H.: Integrity checking for cloud environment using encryption algorithm. In: Recent Trends in Information Technology (ICRTIT). IEEE (2012)Google Scholar
  12. 12.
    Yao, Chuan, Joseph, Xinyi Huang, Liu, K.: A secure remote data integrity checking cloud storage system from threshold encryption. J. Ambient Intell. Hum. Comput. 5(6), 857–865 (2014)CrossRefGoogle Scholar
  13. 13.
    Nuthi, H., Goli, H., Mathe, R.: Data integrity proof for cloud storage. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET) 3(9) (2014)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Department of Electronics and Communication Engineering, College of EngineeringAnna UniversityChennaiIndia

Personalised recommendations