Data integrity proof techniques in cloud storage

IAEME Publication
IAEME PublicationJournal Publishing um Journal Publication
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME
454
DATA INTEGRITY PROOF TECHNIQUES IN CLOUD STORAGE
Ms.RohiniG.Khalkar1
and Prof. Dr. S.H.Patil2
1
M. Tech. Computer Student, Bharati Vidyapeeth Deemed University College of Engineering,
Pune
2
HOD, Computer Engineering Department, Bharati Vidyapeeth Deemed University College of
Engineering, Pune
ABSTRACT
Cloud Computing has been unreal as the next generation architecture of IT Enterprise.
Clients release their work of storing and maintaining the data regionally by storing it over the
cloud. As cloud provides several advantages, it conjointly brings sure challenges. Though
clients cannot physically access the information from the cloud server directly, without
client’s information, cloud supplier will modify or delete information which are not used by
client from a long a time or occupies large space. Hence, there is a requirement of checking
the information periodically for correction purpose which is called information integrity. This
paper contains survey on the different techniques of information integrity. The basic schemes
for information integrity in cloud are Proof of Retrievability (PoR) and Provable information
Possession (PDP). These two schemes are most active space of analysis in the cloud
information integrity field. The objective of this survey is to supply new researchers a
guideline, and to perceive the analysis work carried out in previous few years.
Keywords: Data integrity, Proof of Retrievability, Provable information Possession
I: INTRODUCTION
Cloud computing aims to provide reliable, customized and guaranteed computing
dynamic environment to the end users. Virtualized resources in the cloud can be
dynamically reconfigured to regulate a variable load (scale). It also allows for an optimum
resource utilization. End users can access the services available in the internet without
knowing location and management of these resources.
Cloud storage moves the client’s data to large data centers, which are remotely
located, on which user does not have any control. In this paper we will discuss privacy
concerns of cloud environment. This paper mainly focuses on the survey of the various
privacy techniques.
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING
& TECHNOLOGY (IJCET)
ISSN 0976 – 6367(Print)
ISSN 0976 – 6375(Online)
Volume 4, Issue 2, March – April (2013), pp. 454-458
© IAEME: www.iaeme.com/ijcet.asp
Journal Impact Factor (2013): 6.1302 (Calculated by GISI)
www.jifactor.com
IJCET
© I A E M E
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME
455
II. DATA INTEGRITY PROVING SCHEMES
2.1 Provable Data Possession (PDP)
Definition: A PDP scheme checks that a file, which consists of a collection of n blocks
is retained by a remote cloud server . The data owner processes the information file to
generate some metadata to store it locally. The file is then sent to the server, and the
owner delete the native copy of the file. The owner verifies the possession of file in using
challenge response protocol. This technique is used by clients to check the integrity of the
data and to periodically check their data that is stored on the cloud server. So this technique
ensure server security to the client. PDP scheme supports dynamic expansion.
Ateniese et al. [8] are the first to consider public auditability in their defined
“provable data possession” model for ensuring possession of files on untrusted storages. In
their scheme, they utilize Homomorphic Verifiable Tags for auditing outsourced data, to
achieve public auditability.
However, Ateniese et al. do not consider the case of dynamic data storage, and the
direct expansion of their scheme from static data storage to dynamic case may suffer design
and security .In their subsequent work [9], Ateniese et al. proposed a dynamic version of
the prior PDP scheme problems. The system does not support fully dynamic data
operations. In [4], Wang et al. consider the proposed challenge-response protocol can
both determine the data correctness and locate possible errors. Erway et al. [5] were the
first to explore constructions for dynamic provable data possession. They extend the
PDP model in [8] to support provable updates to stored data files using rank-based
authenticated skip lists. This scheme is essentially a complete dynamic version of the
PDP solution. They remove the index information in the “tag” computation in
Ateniese’s PDP model [8] to support update for block insertion, and employ authenticated
skip list data structure to authenticate the tag information of challenged or updated
blocks first before the verification procedure. Feifei Liu[7] were proposed an improved
dynamic model that reduce the computational and communication complexity to
constant by using Skip-List, Block, Tag and Hash method.
PDP provides following techniques to perform integrity check on the data.
2.2 Methods used in the PDP Schemes.
2.2.1 Proof of Retrievability (PoR)
Definition: In PoR Scheme a cloud server proves to a data owner that a target file is
unbroken, in the sense that the client can retrieve the complete file from the server with high
probability. Hence, PoR guarantees not only correct data possession but it also assures
retrievability upon some data corruptions. To address concerns of corruption PoR scheme
also includes error-correcting codes. It supports only a limited number of queries as a
challenge since it deals with a finite number of check blocks (sentinels).
Juels and Kaliski [1] describe a “proof of retrievability” model in which spot-checking
and error correcting codes are used to ensure both “possession” and “retrievability” of data
files on archive service systems. For detection purpose some special blocks called
“sentinels” are randomly embedded into the data file F, and to protect the positions of these
special blocks file F is encrypted. Shacham and Waters [10] design an improved PoR
scheme with full proofs of security in the security model defined in [1]. They use
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME
456
publicly verifiable homomorphic authenticators built from BLS signatures [6], based on
which the proofs can be aggregated into a small authenticator value.
Table 1. Shows comparison of different Methods used in the PoR Scheme
Techniques Used Public
Auditability
Static/Dynamic
Operation
Unbounded
Queries
Symmetric key Cryptography, Error
Coding
No Static No
BLS signatures, Pseudorandom Functions
(PRFs)
Yes Static -
Generate, Encrypt and Append Metadata No Static No
Fragment structure, Random Sampling and
index-hash table
Yes Dynamic -
Bi-Linear Map,Merkle Hash Tree Yes Dynamic Yes
2.2.2 Naive Method
Comparison of data is the main idea behind this method. In NAIVE method client will
compute the hash value for the file F and having key K (i.e. h(K,F)) and later it will
send the file F to the server. Clients are having different assortment of keys and hash values
so it will perform multiple check on the file F. Whenever client desires to check the file
it release key K and sends it to the server, which is then asked to recomputed the hash value,
supported F and K. Then server provides reply back to the client with hash value for
comparison. This method gives the strong proof that server is having the original file F.
However this method has high overhead as each time hashing process is run over the
entire file. It requires high computation cost.
2.2.3 Original Provable Data Possession
In this method, the data is pre-processed before sending it to the cloud server. Here
the data is filled with some tag value to verify at the client side. Complete data is sent over to
the server and at the client side meta-data is stored. This meta-data is used for the
verification as per user need. To check the integrity user will sends the challenge to the server
at that time server will respond with the data. Then the client will compare the reply data with
the local meta-data. In this way client will check that the data is modified or not. Original
PDP has low computation and storage overhead. It supports both encrypted data and plain
data. It provides public verifiability. It is efficient because small portion of the file needs to
be accessed to generate proof on the server. This technique is only applicable to the static
files. Homomorphic hashing technique is employed to compose multiple block inputs into a
single value to reduce the size of proof.
2.2.4 Scalable PDP
Scalable PDP is an extended version of the original PDP. Original PDP uses public key to
reduce computation overhead whereas Scalable PDP uses the symmetric encryption.
Scalable PDP provides dynamic operation on remote data. Bulk encryption is not required by
scalable PDP. It uses the symmetric-Key which is more efficient than public-Key encryption.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME
457
2.2.5. Dynamic PDP
Dynamic PDP supports full dynamic operations like insert, update, modify,
delete etc. In this technique the dynamic operation permits the authenticated insert and
delete functions with rank-based authenticated directories and with a skip list. Though
DPDP has some procedure quality it is still economical. For example, to generate the
proof for 1GB file, DPDP only produces 415KB proof data and 30ms procedure
overhead. It provides comparatively greater computational, communication, and storage
overhead.
2.3 Other Auditing Methods
2.3.1 Message Authentication Code (MAC) Method
The outsourced data file F consists of a finite ordered set of blocks m1; m2; . . . mn.
One simple way to ensure the data integrity is to pre-compute MACs for the complete file.
Before data outsourcing, the data owner pre-computes MACs of F with a set of secret
keys and stores them locally. During the auditing process each time , the data owner reveals
a secret key to the cloud server and asks for a fresh keyed MAC to verify it. This method
provides deterministic data integrity assurance because the verification covers all the data
blocks. However, the number of verifications can be performed in this solution is limited by
the number of secret keys. Once the keys are exhausted, the data owner has to retrieve
the entire file of F from the server in order to estimate new MACs, which is usually
impractical due to the large communication overhead. Private keys are required for
verification so public audit ability is not supported.
2.3.2 Signature Method
The data owner pre-computes the signature of each block and sends both F and the
signatures to the cloud server for storage. Data owner can adopt a spot-checking approach
to verify correctness of F. i.e., requesting a number of randomly selected blocks and their
corresponding signatures to be returned.
Note that above methods can only support the static data and also a large
communication overhead that greatly affects system efficiency.
Table 2. shows comparison of different methods used for data integrity
Method Used Public Auditability Static/Dynamic
Operation
Unbounded Queries
RSA assumption Yes Static -
Bloom Filter - Dynamic -
HLAs and RSA signature Yes Dynamic -
Encryption Algorithm Yes -
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME
458
III. CONCLUSION
In this paper we observed that data integrity is emerging area in cloud
computing for security purpose. Researcher proposed efficient new techniques based on the
PDP and PoR schemes. PDP scheme easily support dynamic operation but it doesn’t include
error correcting code. so significant amount of overhead in the PoR scheme comes from the
error-correcting codes which are not present in the PDP scheme. Therefore we can say
that designing efficient, secure and fully dynamic remote data integrity is still open area
of research.
REFERENCES
[1]A. Juels and B.S. Kaliski Jr., “Pors: Proofs of Retrievability for Large Files,” Proc. 14th
ACM Conf. Computer and Comm. Security (CCS ’07), pp. 584-597, 2007
[2]Bo Chen and Reza Curtmola. “Robust Dynamic Provable Data Possession,” 1545-0678/12
$26.00 © 2012 IEEE.
[3]B. Priyadharshini and P. Parvathi, “Data Integrity in Cloud Storage”, ISBN: 978-81-
909042-2-3 ©2012 IEEE [4]C. Wang, Q. Wang, K. Ren and W. Lou, “Ensuring Data
Storage Security in Cloud Computing,” Proc. 17th Int’l Workshop Quality of Service
(IWQoS ’09), 2009.
[5]C. Erway, A. Kupcu, C. Papamanthou, and R. Tamassia,“Dynamic Provable Data
Possession,” Proc. 16th ACM Conf. Computer and Comm. Security (CCS ’09), 2009.
[6]D. Boneh, B. Lynn, and H. Shacham, “Short Signatures from the Weil Pairing,” Proc.
Seventh Int’l Conf. Theory and Application of Cryptology and Information Security:
Advances in Cryptology (ASIACRYPT ’01), pp. 514-532, 2001.
[7]Feifei Liu, Dawu Gu, Haining Lu,” An Improved Dynamic Provable Data Possession
Model,” 978-1-61284-204-2/11/$26.00 ©2011 IEEE
[8]G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song,
“Provable Data Possession at Untrusted Stores,” Proc. 14th ACM Conf. Computer and
Comm. Security (CCS ’07), pp. 598-609, 2007.
[9] G. Ateniese, R.D. Pietro, L.V. Mancini, and G. Tsudik, “Scalable and Efficient Provable
Data Possession,” Proc. Fourth Int’l Conf. Security and Privacy in Comm. Networks
(SecureComm ’08), pp. 1-10.
[10] H. Shacham and B. Waters, “Compact Proofs of Retrievability,” Proc. 14th Int’l Conf.
Theory and Application of Cryptology and Information Security: Advances in
Cryptology (ASIACRYPT ’08), pp. 90-107, 2008.
[11] R Suchithra and Dr.N.Rajkumar, “Virtual Machine Placement in a Virtualized Cloud”,
International journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 3,
2012, pp. 435 - 445, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.
[12] Gurudatt Kulkarni, Jayant Gambhir and Amruta Dongare, “Security in Cloud
Computing”, International journal of Computer Engineering & Technology (IJCET), Volume
3, Issue 1, 2012, pp. 258 - 265, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.
[13] V.Ramesh and P.Dhanalakshmi, “Perceiving and Recovering Degraded Data on Secure
Cloud”, International journal of Computer Engineering & Technology (IJCET), Volume 4,
Issue 2, 2013, pp. 229 - 236, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.

Recomendados

IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud von
 IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET - Efficient and Verifiable Queries over Encrypted Data in CloudIRJET Journal
12 views3 Folien
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ... von
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...IJMER
411 views4 Folien
International Journal of Computational Engineering Research(IJCER) von
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
275 views5 Folien
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm von
IRJET- Secure Data Deduplication for Cloud Server using HMAC AlgorithmIRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC AlgorithmIRJET Journal
32 views4 Folien
IRJET- A Survey on Remote Data Possession Verification Protocol in Cloud Storage von
IRJET- A Survey on Remote Data Possession Verification Protocol in Cloud StorageIRJET- A Survey on Remote Data Possession Verification Protocol in Cloud Storage
IRJET- A Survey on Remote Data Possession Verification Protocol in Cloud StorageIRJET Journal
18 views4 Folien
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode... von
IRJET -  	  A Secure AMR Stganography Scheme based on Pulse Distribution Mode...IRJET -  	  A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...IRJET Journal
12 views3 Folien

Más contenido relacionado

Was ist angesagt?

An efficient, secure deduplication data storing in cloud storage environment von
An efficient, secure deduplication data storing in cloud storage environmentAn efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environmenteSAT Journals
134 views4 Folien
Efficient Similarity Search over Encrypted Data von
Efficient Similarity Search over Encrypted DataEfficient Similarity Search over Encrypted Data
Efficient Similarity Search over Encrypted DataIRJET Journal
37 views4 Folien
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE) von
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)IRJET Journal
19 views4 Folien
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES... von
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...ijiert bestjournal
33 views4 Folien
A Hybrid Cloud Approach for Secure Authorized De-Duplication von
A Hybrid Cloud Approach for Secure Authorized De-DuplicationA Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-DuplicationEditor IJMTER
490 views7 Folien
IRJET-Auditing and Resisting Key Exposure on Cloud Storage von
IRJET-Auditing and Resisting Key Exposure on Cloud StorageIRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud StorageIRJET Journal
31 views4 Folien

Was ist angesagt?(19)

An efficient, secure deduplication data storing in cloud storage environment von eSAT Journals
An efficient, secure deduplication data storing in cloud storage environmentAn efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environment
eSAT Journals134 views
Efficient Similarity Search over Encrypted Data von IRJET Journal
Efficient Similarity Search over Encrypted DataEfficient Similarity Search over Encrypted Data
Efficient Similarity Search over Encrypted Data
IRJET Journal37 views
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE) von IRJET Journal
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
IRJET Journal19 views
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES... von ijiert bestjournal
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
A Hybrid Cloud Approach for Secure Authorized De-Duplication von Editor IJMTER
A Hybrid Cloud Approach for Secure Authorized De-DuplicationA Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-Duplication
Editor IJMTER490 views
IRJET-Auditing and Resisting Key Exposure on Cloud Storage von IRJET Journal
IRJET-Auditing and Resisting Key Exposure on Cloud StorageIRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET Journal31 views
Implementing Proof of Retriavaibility for Multiple Replica of Data File using... von IRJET Journal
Implementing Proof of Retriavaibility for Multiple Replica of Data File using...Implementing Proof of Retriavaibility for Multiple Replica of Data File using...
Implementing Proof of Retriavaibility for Multiple Replica of Data File using...
IRJET Journal29 views
A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method von IRJET Journal
A Survey on Efficient Privacy-Preserving Ranked Keyword Search MethodA Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
IRJET Journal33 views
IRJET- Cloud based Deduplication using Middleware Approach von IRJET Journal
IRJET- Cloud based Deduplication using Middleware ApproachIRJET- Cloud based Deduplication using Middleware Approach
IRJET- Cloud based Deduplication using Middleware Approach
IRJET Journal20 views
Postponed Optimized Report Recovery under Lt Based Cloud Memory von IJARIIT
Postponed Optimized Report Recovery under Lt Based Cloud MemoryPostponed Optimized Report Recovery under Lt Based Cloud Memory
Postponed Optimized Report Recovery under Lt Based Cloud Memory
IJARIIT19 views
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)... von dbpublications
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
dbpublications57 views
IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St... von IRJET Journal
IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...
IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...
IRJET Journal20 views
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ... von 1crore projects
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
1crore projects70 views
Cryptographic Cloud Storage with Hadoop Implementation von IOSR Journals
Cryptographic Cloud Storage with Hadoop ImplementationCryptographic Cloud Storage with Hadoop Implementation
Cryptographic Cloud Storage with Hadoop Implementation
IOSR Journals430 views
IRJET- Deduplication of Encrypted Bigdata on Cloud von IRJET Journal
IRJET- Deduplication of Encrypted Bigdata on CloudIRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET Journal55 views
Development of Effective Audit Service to Maintain Integrity of Migrated Data... von IRJET Journal
Development of Effective Audit Service to Maintain Integrity of Migrated Data...Development of Effective Audit Service to Maintain Integrity of Migrated Data...
Development of Effective Audit Service to Maintain Integrity of Migrated Data...
IRJET Journal31 views
Improved Data Integrity Protection Regenerating-Coding Based Cloud Storage von IJSRD
Improved Data Integrity Protection Regenerating-Coding Based Cloud StorageImproved Data Integrity Protection Regenerating-Coding Based Cloud Storage
Improved Data Integrity Protection Regenerating-Coding Based Cloud Storage
IJSRD 74 views
PROVABLE DATA PROCESSING (PDP) A MODEL FOR CLIENT'S SECURED DATA ON CLOUD von Journal For Research
PROVABLE DATA PROCESSING (PDP) A MODEL FOR CLIENT'S SECURED DATA ON CLOUDPROVABLE DATA PROCESSING (PDP) A MODEL FOR CLIENT'S SECURED DATA ON CLOUD
PROVABLE DATA PROCESSING (PDP) A MODEL FOR CLIENT'S SECURED DATA ON CLOUD

Destacado

Investigation of the abrasive wear behaviour of graphite filled carbon fabric... von
Investigation of the abrasive wear behaviour of graphite filled carbon fabric...Investigation of the abrasive wear behaviour of graphite filled carbon fabric...
Investigation of the abrasive wear behaviour of graphite filled carbon fabric...IAEME Publication
260 views8 Folien
Ofdm mimo and v-blast algorithm-key to high speed wireless communication von
Ofdm mimo and v-blast algorithm-key to high speed wireless communicationOfdm mimo and v-blast algorithm-key to high speed wireless communication
Ofdm mimo and v-blast algorithm-key to high speed wireless communicationIAEME Publication
792 views15 Folien
Achieving sustainable competitive advantage through resource configur von
Achieving sustainable competitive advantage through resource configurAchieving sustainable competitive advantage through resource configur
Achieving sustainable competitive advantage through resource configurIAEME Publication
707 views14 Folien
Investigation of heat transfer through cnt composites focusing on conduction ... von
Investigation of heat transfer through cnt composites focusing on conduction ...Investigation of heat transfer through cnt composites focusing on conduction ...
Investigation of heat transfer through cnt composites focusing on conduction ...IAEME Publication
127 views8 Folien
Characterization of fog attenuation for free space optical von
Characterization of fog attenuation for free space opticalCharacterization of fog attenuation for free space optical
Characterization of fog attenuation for free space opticalIAEME Publication
678 views12 Folien
Mergers and acquisitions the hr issues von
Mergers and acquisitions the hr issuesMergers and acquisitions the hr issues
Mergers and acquisitions the hr issuesIAEME Publication
338 views6 Folien

Destacado(7)

Investigation of the abrasive wear behaviour of graphite filled carbon fabric... von IAEME Publication
Investigation of the abrasive wear behaviour of graphite filled carbon fabric...Investigation of the abrasive wear behaviour of graphite filled carbon fabric...
Investigation of the abrasive wear behaviour of graphite filled carbon fabric...
IAEME Publication260 views
Ofdm mimo and v-blast algorithm-key to high speed wireless communication von IAEME Publication
Ofdm mimo and v-blast algorithm-key to high speed wireless communicationOfdm mimo and v-blast algorithm-key to high speed wireless communication
Ofdm mimo and v-blast algorithm-key to high speed wireless communication
IAEME Publication792 views
Achieving sustainable competitive advantage through resource configur von IAEME Publication
Achieving sustainable competitive advantage through resource configurAchieving sustainable competitive advantage through resource configur
Achieving sustainable competitive advantage through resource configur
IAEME Publication707 views
Investigation of heat transfer through cnt composites focusing on conduction ... von IAEME Publication
Investigation of heat transfer through cnt composites focusing on conduction ...Investigation of heat transfer through cnt composites focusing on conduction ...
Investigation of heat transfer through cnt composites focusing on conduction ...
IAEME Publication127 views
Characterization of fog attenuation for free space optical von IAEME Publication
Characterization of fog attenuation for free space opticalCharacterization of fog attenuation for free space optical
Characterization of fog attenuation for free space optical
IAEME Publication678 views
Flexural behavior of composite reinforced concrete t beams cast in steel cha... von IAEME Publication
Flexural behavior of composite reinforced  concrete t beams cast in steel cha...Flexural behavior of composite reinforced  concrete t beams cast in steel cha...
Flexural behavior of composite reinforced concrete t beams cast in steel cha...

Similar a Data integrity proof techniques in cloud storage

An4201262267 von
An4201262267An4201262267
An4201262267IJERA Editor
386 views6 Folien
IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit... von
IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...
IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...IRJET Journal
21 views5 Folien
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING von
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGijcsit
42 views8 Folien
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing von
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingAIRCC Publishing Corporation
28 views8 Folien
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING von
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGAIRCC Publishing Corporation
42 views8 Folien
Mn3422372248 von
Mn3422372248Mn3422372248
Mn3422372248IJERA Editor
360 views12 Folien

Similar a Data integrity proof techniques in cloud storage(20)

IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit... von IRJET Journal
IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...
IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...
IRJET Journal21 views
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING von ijcsit
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
ijcsit42 views
Centralized Data Verification Scheme for Encrypted Cloud Data Services von Editor IJMTER
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesCentralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Editor IJMTER255 views
Improving Data Storage Security in Cloud using Hadoop von IJERA Editor
Improving Data Storage Security in Cloud using HadoopImproving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using Hadoop
IJERA Editor285 views
Enabling Integrity for the Compressed Files in Cloud Server von IOSR Journals
Enabling Integrity for the Compressed Files in Cloud ServerEnabling Integrity for the Compressed Files in Cloud Server
Enabling Integrity for the Compressed Files in Cloud Server
IOSR Journals348 views
International Journal of Computational Engineering Research(IJCER) von ijceronline
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline327 views
Privacy and Integrity Preserving in Cloud Storage Devices von IOSR Journals
Privacy and Integrity Preserving in Cloud Storage DevicesPrivacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage Devices
IOSR Journals342 views
Improving Efficiency of Security in Multi-Cloud von IJTET Journal
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-Cloud
IJTET Journal317 views
Dynamic Resource Allocation and Data Security for Cloud von AM Publications
Dynamic Resource Allocation and Data Security for CloudDynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for Cloud
AM Publications272 views
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou... von IOSR Journals
Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
IOSR Journals628 views
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera... von IJERA Editor
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...
IJERA Editor264 views

Más de IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf von
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
53 views12 Folien
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-... von
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
36 views14 Folien
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS von
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
169 views7 Folien
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS von
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
27 views8 Folien
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS von
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
66 views8 Folien
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS von
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
253 views7 Folien

Más de IAEME Publication(20)

IAEME_Publication_Call_for_Paper_September_2022.pdf von IAEME Publication
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-... von IAEME Publication
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS von IAEME Publication
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
IAEME Publication169 views
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS von IAEME Publication
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS von IAEME Publication
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS von IAEME Publication
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
IAEME Publication253 views
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO von IAEME Publication
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
IAEME Publication101 views
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG... von IAEME Publication
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY von IAEME Publication
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO... von IAEME Publication
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED... von IAEME Publication
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
IAEME Publication181 views
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE... von IAEME Publication
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD... von IAEME Publication
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS... von IAEME Publication
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL... von IAEME Publication
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ... von IAEME Publication
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
IAEME Publication233 views
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET... von IAEME Publication
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF... von IAEME Publication
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT von IAEME Publication
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT

Último

【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院 von
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院IttrainingIttraining
58 views8 Folien
Democratising digital commerce in India-Report von
Democratising digital commerce in India-ReportDemocratising digital commerce in India-Report
Democratising digital commerce in India-ReportKapil Khandelwal (KK)
18 views161 Folien
Business Analyst Series 2023 - Week 3 Session 5 von
Business Analyst Series 2023 -  Week 3 Session 5Business Analyst Series 2023 -  Week 3 Session 5
Business Analyst Series 2023 - Week 3 Session 5DianaGray10
300 views20 Folien
MVP and prioritization.pdf von
MVP and prioritization.pdfMVP and prioritization.pdf
MVP and prioritization.pdfrahuldharwal141
31 views8 Folien
Mini-Track: Challenges to Network Automation Adoption von
Mini-Track: Challenges to Network Automation AdoptionMini-Track: Challenges to Network Automation Adoption
Mini-Track: Challenges to Network Automation AdoptionNetwork Automation Forum
13 views27 Folien
"Running students' code in isolation. The hard way", Yurii Holiuk von
"Running students' code in isolation. The hard way", Yurii Holiuk "Running students' code in isolation. The hard way", Yurii Holiuk
"Running students' code in isolation. The hard way", Yurii Holiuk Fwdays
17 views34 Folien

Último(20)

【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院 von IttrainingIttraining
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
Business Analyst Series 2023 - Week 3 Session 5 von DianaGray10
Business Analyst Series 2023 -  Week 3 Session 5Business Analyst Series 2023 -  Week 3 Session 5
Business Analyst Series 2023 - Week 3 Session 5
DianaGray10300 views
"Running students' code in isolation. The hard way", Yurii Holiuk von Fwdays
"Running students' code in isolation. The hard way", Yurii Holiuk "Running students' code in isolation. The hard way", Yurii Holiuk
"Running students' code in isolation. The hard way", Yurii Holiuk
Fwdays17 views
STKI Israeli Market Study 2023 corrected forecast 2023_24 v3.pdf von Dr. Jimmy Schwarzkopf
STKI Israeli Market Study 2023   corrected forecast 2023_24 v3.pdfSTKI Israeli Market Study 2023   corrected forecast 2023_24 v3.pdf
STKI Israeli Market Study 2023 corrected forecast 2023_24 v3.pdf
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f... von TrustArc
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc11 views
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ... von Jasper Oosterveld
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
Five Things You SHOULD Know About Postman von Postman
Five Things You SHOULD Know About PostmanFive Things You SHOULD Know About Postman
Five Things You SHOULD Know About Postman
Postman36 views
Future of AR - Facebook Presentation von ssuserb54b561
Future of AR - Facebook PresentationFuture of AR - Facebook Presentation
Future of AR - Facebook Presentation
ssuserb54b56115 views
Serverless computing with Google Cloud (2023-24) von wesley chun
Serverless computing with Google Cloud (2023-24)Serverless computing with Google Cloud (2023-24)
Serverless computing with Google Cloud (2023-24)
wesley chun11 views
HTTP headers that make your website go faster - devs.gent November 2023 von Thijs Feryn
HTTP headers that make your website go faster - devs.gent November 2023HTTP headers that make your website go faster - devs.gent November 2023
HTTP headers that make your website go faster - devs.gent November 2023
Thijs Feryn22 views

Data integrity proof techniques in cloud storage

  • 1. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME 454 DATA INTEGRITY PROOF TECHNIQUES IN CLOUD STORAGE Ms.RohiniG.Khalkar1 and Prof. Dr. S.H.Patil2 1 M. Tech. Computer Student, Bharati Vidyapeeth Deemed University College of Engineering, Pune 2 HOD, Computer Engineering Department, Bharati Vidyapeeth Deemed University College of Engineering, Pune ABSTRACT Cloud Computing has been unreal as the next generation architecture of IT Enterprise. Clients release their work of storing and maintaining the data regionally by storing it over the cloud. As cloud provides several advantages, it conjointly brings sure challenges. Though clients cannot physically access the information from the cloud server directly, without client’s information, cloud supplier will modify or delete information which are not used by client from a long a time or occupies large space. Hence, there is a requirement of checking the information periodically for correction purpose which is called information integrity. This paper contains survey on the different techniques of information integrity. The basic schemes for information integrity in cloud are Proof of Retrievability (PoR) and Provable information Possession (PDP). These two schemes are most active space of analysis in the cloud information integrity field. The objective of this survey is to supply new researchers a guideline, and to perceive the analysis work carried out in previous few years. Keywords: Data integrity, Proof of Retrievability, Provable information Possession I: INTRODUCTION Cloud computing aims to provide reliable, customized and guaranteed computing dynamic environment to the end users. Virtualized resources in the cloud can be dynamically reconfigured to regulate a variable load (scale). It also allows for an optimum resource utilization. End users can access the services available in the internet without knowing location and management of these resources. Cloud storage moves the client’s data to large data centers, which are remotely located, on which user does not have any control. In this paper we will discuss privacy concerns of cloud environment. This paper mainly focuses on the survey of the various privacy techniques. INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), pp. 454-458 © IAEME: www.iaeme.com/ijcet.asp Journal Impact Factor (2013): 6.1302 (Calculated by GISI) www.jifactor.com IJCET © I A E M E
  • 2. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME 455 II. DATA INTEGRITY PROVING SCHEMES 2.1 Provable Data Possession (PDP) Definition: A PDP scheme checks that a file, which consists of a collection of n blocks is retained by a remote cloud server . The data owner processes the information file to generate some metadata to store it locally. The file is then sent to the server, and the owner delete the native copy of the file. The owner verifies the possession of file in using challenge response protocol. This technique is used by clients to check the integrity of the data and to periodically check their data that is stored on the cloud server. So this technique ensure server security to the client. PDP scheme supports dynamic expansion. Ateniese et al. [8] are the first to consider public auditability in their defined “provable data possession” model for ensuring possession of files on untrusted storages. In their scheme, they utilize Homomorphic Verifiable Tags for auditing outsourced data, to achieve public auditability. However, Ateniese et al. do not consider the case of dynamic data storage, and the direct expansion of their scheme from static data storage to dynamic case may suffer design and security .In their subsequent work [9], Ateniese et al. proposed a dynamic version of the prior PDP scheme problems. The system does not support fully dynamic data operations. In [4], Wang et al. consider the proposed challenge-response protocol can both determine the data correctness and locate possible errors. Erway et al. [5] were the first to explore constructions for dynamic provable data possession. They extend the PDP model in [8] to support provable updates to stored data files using rank-based authenticated skip lists. This scheme is essentially a complete dynamic version of the PDP solution. They remove the index information in the “tag” computation in Ateniese’s PDP model [8] to support update for block insertion, and employ authenticated skip list data structure to authenticate the tag information of challenged or updated blocks first before the verification procedure. Feifei Liu[7] were proposed an improved dynamic model that reduce the computational and communication complexity to constant by using Skip-List, Block, Tag and Hash method. PDP provides following techniques to perform integrity check on the data. 2.2 Methods used in the PDP Schemes. 2.2.1 Proof of Retrievability (PoR) Definition: In PoR Scheme a cloud server proves to a data owner that a target file is unbroken, in the sense that the client can retrieve the complete file from the server with high probability. Hence, PoR guarantees not only correct data possession but it also assures retrievability upon some data corruptions. To address concerns of corruption PoR scheme also includes error-correcting codes. It supports only a limited number of queries as a challenge since it deals with a finite number of check blocks (sentinels). Juels and Kaliski [1] describe a “proof of retrievability” model in which spot-checking and error correcting codes are used to ensure both “possession” and “retrievability” of data files on archive service systems. For detection purpose some special blocks called “sentinels” are randomly embedded into the data file F, and to protect the positions of these special blocks file F is encrypted. Shacham and Waters [10] design an improved PoR scheme with full proofs of security in the security model defined in [1]. They use
  • 3. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME 456 publicly verifiable homomorphic authenticators built from BLS signatures [6], based on which the proofs can be aggregated into a small authenticator value. Table 1. Shows comparison of different Methods used in the PoR Scheme Techniques Used Public Auditability Static/Dynamic Operation Unbounded Queries Symmetric key Cryptography, Error Coding No Static No BLS signatures, Pseudorandom Functions (PRFs) Yes Static - Generate, Encrypt and Append Metadata No Static No Fragment structure, Random Sampling and index-hash table Yes Dynamic - Bi-Linear Map,Merkle Hash Tree Yes Dynamic Yes 2.2.2 Naive Method Comparison of data is the main idea behind this method. In NAIVE method client will compute the hash value for the file F and having key K (i.e. h(K,F)) and later it will send the file F to the server. Clients are having different assortment of keys and hash values so it will perform multiple check on the file F. Whenever client desires to check the file it release key K and sends it to the server, which is then asked to recomputed the hash value, supported F and K. Then server provides reply back to the client with hash value for comparison. This method gives the strong proof that server is having the original file F. However this method has high overhead as each time hashing process is run over the entire file. It requires high computation cost. 2.2.3 Original Provable Data Possession In this method, the data is pre-processed before sending it to the cloud server. Here the data is filled with some tag value to verify at the client side. Complete data is sent over to the server and at the client side meta-data is stored. This meta-data is used for the verification as per user need. To check the integrity user will sends the challenge to the server at that time server will respond with the data. Then the client will compare the reply data with the local meta-data. In this way client will check that the data is modified or not. Original PDP has low computation and storage overhead. It supports both encrypted data and plain data. It provides public verifiability. It is efficient because small portion of the file needs to be accessed to generate proof on the server. This technique is only applicable to the static files. Homomorphic hashing technique is employed to compose multiple block inputs into a single value to reduce the size of proof. 2.2.4 Scalable PDP Scalable PDP is an extended version of the original PDP. Original PDP uses public key to reduce computation overhead whereas Scalable PDP uses the symmetric encryption. Scalable PDP provides dynamic operation on remote data. Bulk encryption is not required by scalable PDP. It uses the symmetric-Key which is more efficient than public-Key encryption.
  • 4. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME 457 2.2.5. Dynamic PDP Dynamic PDP supports full dynamic operations like insert, update, modify, delete etc. In this technique the dynamic operation permits the authenticated insert and delete functions with rank-based authenticated directories and with a skip list. Though DPDP has some procedure quality it is still economical. For example, to generate the proof for 1GB file, DPDP only produces 415KB proof data and 30ms procedure overhead. It provides comparatively greater computational, communication, and storage overhead. 2.3 Other Auditing Methods 2.3.1 Message Authentication Code (MAC) Method The outsourced data file F consists of a finite ordered set of blocks m1; m2; . . . mn. One simple way to ensure the data integrity is to pre-compute MACs for the complete file. Before data outsourcing, the data owner pre-computes MACs of F with a set of secret keys and stores them locally. During the auditing process each time , the data owner reveals a secret key to the cloud server and asks for a fresh keyed MAC to verify it. This method provides deterministic data integrity assurance because the verification covers all the data blocks. However, the number of verifications can be performed in this solution is limited by the number of secret keys. Once the keys are exhausted, the data owner has to retrieve the entire file of F from the server in order to estimate new MACs, which is usually impractical due to the large communication overhead. Private keys are required for verification so public audit ability is not supported. 2.3.2 Signature Method The data owner pre-computes the signature of each block and sends both F and the signatures to the cloud server for storage. Data owner can adopt a spot-checking approach to verify correctness of F. i.e., requesting a number of randomly selected blocks and their corresponding signatures to be returned. Note that above methods can only support the static data and also a large communication overhead that greatly affects system efficiency. Table 2. shows comparison of different methods used for data integrity Method Used Public Auditability Static/Dynamic Operation Unbounded Queries RSA assumption Yes Static - Bloom Filter - Dynamic - HLAs and RSA signature Yes Dynamic - Encryption Algorithm Yes -
  • 5. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME 458 III. CONCLUSION In this paper we observed that data integrity is emerging area in cloud computing for security purpose. Researcher proposed efficient new techniques based on the PDP and PoR schemes. PDP scheme easily support dynamic operation but it doesn’t include error correcting code. so significant amount of overhead in the PoR scheme comes from the error-correcting codes which are not present in the PDP scheme. Therefore we can say that designing efficient, secure and fully dynamic remote data integrity is still open area of research. REFERENCES [1]A. Juels and B.S. Kaliski Jr., “Pors: Proofs of Retrievability for Large Files,” Proc. 14th ACM Conf. Computer and Comm. Security (CCS ’07), pp. 584-597, 2007 [2]Bo Chen and Reza Curtmola. “Robust Dynamic Provable Data Possession,” 1545-0678/12 $26.00 © 2012 IEEE. [3]B. Priyadharshini and P. Parvathi, “Data Integrity in Cloud Storage”, ISBN: 978-81- 909042-2-3 ©2012 IEEE [4]C. Wang, Q. Wang, K. Ren and W. Lou, “Ensuring Data Storage Security in Cloud Computing,” Proc. 17th Int’l Workshop Quality of Service (IWQoS ’09), 2009. [5]C. Erway, A. Kupcu, C. Papamanthou, and R. Tamassia,“Dynamic Provable Data Possession,” Proc. 16th ACM Conf. Computer and Comm. Security (CCS ’09), 2009. [6]D. Boneh, B. Lynn, and H. Shacham, “Short Signatures from the Weil Pairing,” Proc. Seventh Int’l Conf. Theory and Application of Cryptology and Information Security: Advances in Cryptology (ASIACRYPT ’01), pp. 514-532, 2001. [7]Feifei Liu, Dawu Gu, Haining Lu,” An Improved Dynamic Provable Data Possession Model,” 978-1-61284-204-2/11/$26.00 ©2011 IEEE [8]G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable Data Possession at Untrusted Stores,” Proc. 14th ACM Conf. Computer and Comm. Security (CCS ’07), pp. 598-609, 2007. [9] G. Ateniese, R.D. Pietro, L.V. Mancini, and G. Tsudik, “Scalable and Efficient Provable Data Possession,” Proc. Fourth Int’l Conf. Security and Privacy in Comm. Networks (SecureComm ’08), pp. 1-10. [10] H. Shacham and B. Waters, “Compact Proofs of Retrievability,” Proc. 14th Int’l Conf. Theory and Application of Cryptology and Information Security: Advances in Cryptology (ASIACRYPT ’08), pp. 90-107, 2008. [11] R Suchithra and Dr.N.Rajkumar, “Virtual Machine Placement in a Virtualized Cloud”, International journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 3, 2012, pp. 435 - 445, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. [12] Gurudatt Kulkarni, Jayant Gambhir and Amruta Dongare, “Security in Cloud Computing”, International journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 1, 2012, pp. 258 - 265, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. [13] V.Ramesh and P.Dhanalakshmi, “Perceiving and Recovering Degraded Data on Secure Cloud”, International journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 2, 2013, pp. 229 - 236, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.