Privacy Preserving Data Integrity Verification in Cloud

T.Subha*, S. Jayashri**
* Research Scholar, Anna University, Chennai
** Director-Research, Adhiparasakthi Engineering College, Chennnai.
Periodicity:February - April'2014
DOI : https://doi.org/10.26634/jcc.1.2.3054

Abstract

Cloud computing enables industries to outsource their IT services at a lower cost. It reduces the capital expenditure of the industry and maintenance. Clients upload their data to the storage server in cloud storage service. Ensuring the integrity and confidentiality of the data stored at cloud it is of great importance since the data is stored and maintained by third party. In prior works, the clients need to store the data locally to verify the proofs sent by the server. In this paper, we propose a secure and dependable cloud storage service with data forwarding scheme among the cloud users. It involves TTPA (Trusted Third Party Auditor) who audit the data in cloud server on behalf of the clients. The auditing scheme achieves privacy preserving by not letting the auditor or any adversary to collect information about the client's data. Our approach is provable to be secure and efficient. It works for all Text, Video, Image files and supports dynamic data operations (insert, update, delete) also.

Keywords

Audit, Cloud, Data, Dependable, IT services, Integrity, Secure, Storage, Users

How to Cite this Article?

Subha, T., and Jayashri, S. (2014). Privacy Preserving Data Integrity Verification in Cloud. i-manager’s Journal on Cloud Computing, 1(2), 25-31. https://doi.org/10.26634/jcc.1.2.3054

References

[1]. Qian Wang, Cong Wang, Kui Ren, Wenjing Lou, Jin Li, (2011). “Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing”, IEEE Transactions on Parallel and distributed Systems, Vol 22, No.5, pp. 847-859.
[2]. Amazon.com, (2009). “Amazon Web Services (AWS),” http://aws.amazon.com.
[3]. K. Kajendran, James Jeyaseelan, J. Jakkulin Joshi, (2011). “An Approach For Secured Data Storage Using Cloud Computing “, International Journal of Computer Trends and Technology, Vol. 1, No. 2, pp. 91-96.
[4]. K. Ren, C. Wang, & Q. Wang, (2012). “Security Challenges for the Public Cloud,” IEEE Internet Computing, Vol. 16, No. 1, pp. 69-73.
[5] M. Arrington, (2006). “Gmail Disaster: Reports of Mass Email Deletions”, http://www. techcrunch.com /2006 / 12/28/ gmail-disaster reports of-mass-email-deletions.
[6]. G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z.Peterson, & D. Song, (2007). “Provable Data Possession at Untrusted Stores,” Proc. 14th ACM Conf. Computer and Comm. Security (CCS'07), pp. 598-609
[7]. M.A. Shah, M. Baker, J.C. Mogul, and R. Swaminathan, (2007). “Auditing to Keep Online Storage Services Honest,” Proc. 11th USENIX Workshop Hot Topics in Operating Systems (HotOS '07), pp. 1-6.
[8]. Q.Wang, C.Wang, J.Li, K.Ren and W.Lou, (2009). “Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing” Proc. 14th European Conf. Research in Computer Security (ESORICS'09), pp.355-370.
[9]. Jachak K.B., Korde S.K., Ghorpade P.P. And Gagare G.J. (2012). “Homomorphic Authentication With Random Masking Technique Ensuring Privacy& Security In Cloud Computing”, Bioinfo Security Informatics, Vol. 2, No. 2, pp. 49-52.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Online 15 15

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.