Secure Data Integrity in Cloud Storage with Multi-level Hash Indexing Technique

  • T. P. KavyashreeEmail author
  • A. S. Poornima
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 39)


A growing technology which offers storage, compute and network resources over the internet on a pay-for-use basis can be named as cloud computing. Cloud Storage is one of computing and service model in which the system allows you to store, manage, maintained and backed up remotely over a network and made available to users to use. Data integrity implies that the accuracy, validity of data over its Life cycle has to be maintained and any violations are to be detected like if data is loss, altered or compromised. User money and time can be saved by using cloud services. So user loses control over the data as there are maintained, stored by the cloud and it can be hacked, tampered by the attacker. Now integrity of data has to be maintained in a cloud where data is present in cloud. Here the aim is to provide data integrity for which the data will be stored in the cloud by user. Here paper says, we need to have an auditing technique which must be efficient and check the data integrity using Third party auditor (TPA), the auditing schemes uses Advanced Encryption Standard (AES) and Secure hash algorithm for encryption and to generate verification meta data respectively and using multi-level hash indexing technique to eliminate duplicate files, reduce storage consumption of file which is stored in the cloud.


Cloud storage Data Integrity AES algorithm Secure Hash algorithm Multi-level Hash Index Technique 


  1. 1.
    Govinda Ramaiah, Y., Vijaya Kumari, G.: Complete privacy preserving auditing for data integrity in cloud computing. In: 12th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 1559–1566. IEEE (2013)Google Scholar
  2. 2.
    Awad, A., Kadry, S., Lee, B., Maddodi, G., O’Meara, E.: Integrity assurance in the cloud by combined PBA and provenance. In: 10th International Conference on Next Generation Mobile Applications, Security and technologies, pp. 127–132. IEEE (2016)Google Scholar
  3. 3.
    Rukavitsyn, A.N., Borisenko, K.A., Holod, I.I., Shorov, A.V.: The method of ensuring confidentiality and integrity data in cloud computing, pp. 272–274. IEEE (2017)Google Scholar
  4. 4.
    Suganya, S., Durai Raj Vincent, P.M.: Improving cloud security by enhancing remote data integrity checking algorithm. In: International Conference on Innovations in Power and Advanced Computing Technologies, pp. 1–6. IEEE (2017)Google Scholar
  5. 5.
    Bansal, A., Agrawal, A.: Providing security, integrity and authentication using ECC algorithm in cloud storage. In: International Conference on Computer Communication and Informatics (ICCCI), pp. 1–5. IEEE (2017)Google Scholar
  6. 6.
    Chen, Y., Li, L., Chen, Z.: An approach to verifying data integrity for cloud storage. In: 13th International Conference on Computational Intelligence and Security, pp. 582–585. IEEE (2017)Google Scholar
  7. 7.
    Jianhong, Z., Hua, C.: Security storage in the cloud computing: a RSA-based assumption data integrity check without original data. In: International Conference on Educational and Information Technology, pp. 143–147. IEEE (2010)Google Scholar
  8. 8.
    Mahajan, M.J., Shetty, C.: In-line de-duplication technique using multi-level hash indexing. Imp. J. Interdiscip. Res. 3(7) (2017)Google Scholar
  9. 9.
    Morea, S., Chaudhari, S.: Third party public auditing scheme for cloud storage. Int. J. Procedia Comput. Sci. 79, 69–76 (2016)CrossRefGoogle Scholar
  10. 10. Amazon Web Services (AWS) (2008).
  11. 11.
    Allen, W., Aldossary, S.: Data security, privacy, availability and integrity in cloud computing. Int. J. Adv. Comput. Sci. Appl. 7(4), 485–498 (2016)Google Scholar
  12. 12.
    Yang, N.K., Jia, X.: Data storage auditing service in cloud computing: challenges, methods and opportunities. World Wide Web 15(4), 409–428 (2012)CrossRefGoogle Scholar
  13. 13.
    Wang, C., Chow, S.S.M., Wang, Q., Ren, K., Lou, W.: Privacy preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2) (2013)MathSciNetCrossRefGoogle Scholar
  14. 14.
    Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for data storage security in cloud computing. In: 2010 Proceedings IEEE INFOCOM, pp. 1–9 (2010)Google Scholar
  15. 15.
    Tejaswini, K.S., Prashanth, S.K.: Privacy preserving public auditing service for data storage in cloud computing. Indian J. Res. PARIPEX 2(2), 131–133 (2013)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Department of CSESiddaganga Institute of TechnologyTumkurIndia

Personalised recommendations