Performance Efficiency Analysis on Slepian-Wolf based Proof of Retrievability and Its Variants for Cloud Storage

Author(s):  
Choon Beng Tan ◽  
Mohd Hanafi Ahmad Hijazi ◽  
Yuto Lim ◽  
Yong Jin Park ◽  
Kashif Nisar
2018 ◽  
Vol 7 (3.6) ◽  
pp. 55
Author(s):  
Neha Narayan Kulkarni ◽  
Shital Kumar A. Jain ◽  
. .

Recently the technologies are growing fast, so they have become the point of source and also the sink for data. Data is generated in large volume introducing the concept of structured and unstructured data evolving "Big Data" which needs large memory for storage. There are two possible solutions either increase the local storage or use the Cloud Storage. Cloud makes data available to the user anytime, anywhere, anything. Cloud allows the user to store their data virtually without investing much. However, this data is on cloud raising a concern of data security and recovery. This attack is made by the untrusted or unauthorized user remotely. The attacker may modify, delete or replace the data. Therefore, different models are proposed for a data integrity check and proof of retrievability. This paper includes the literature review related to various techniques for data integrity, data recovery and proof of retrievability.  


2018 ◽  
Vol 104 ◽  
pp. 97-106 ◽  
Author(s):  
Anmin Fu ◽  
Yuhan Li ◽  
Shui Yu ◽  
Yan Yu ◽  
Gongxuan Zhang

2015 ◽  
Vol 3 (2) ◽  
pp. 59-62
Author(s):  
Антон Нестеров ◽  
Anton Nesterov ◽  
Юрий Баркалов ◽  
Yuriy Barkalov

Relevance of the work is due to the increase of crimes committed with the use of cloud technologies and lack of scientific support and research methods of obtaining information located in the cloud storage. Currently, there is a significant increase in incidents committed using cloud technologies. Therefore, to obtain forensically important information from the cloud storage is an urgent task. The process of obtaining such information is a complex technical actions that require a lot of experience and time. The data obtained in this work, experts will optimize actions to improve the efficiency analysis of incidents in the area of ​​information security related to the use of cloud technologies, both through optimization of labor and time costs, and due to the quality of research results.


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Hao Yan ◽  
Yanan Liu ◽  
Zheng Zhang ◽  
Qian Wang

Cloud computing is a fast-growing technology which supplies scalable, innovative, and efficient business models. However, cloud computing is not fully trusted, and the security of the data outsourced in cloud storage needs to be guaranteed. One of the hottest issues is how to ensure the integrity of the data in cloud storage. Until now, many researchers have proposed lots of provable data possession (PDP) schemes to deal with the problem of data integrity audition. Nevertheless, very little effort has been devoted to preserve the data uploader’s privacy while auditing the integrity of data shared in a group. To overcome the shortcoming, we propose a novel certificateless PDP protocol to efficiently audit the integrity of data shared in a workgroup with user privacy preserving. Due to the inherent structural advantage of the certificateless crypto mechanism, our PDP scheme eliminates the key escrow problem and the certificate management problem simultaneously. Moreover, the audition process in our scheme does not need any user’s identity which helps to keep the anonymity of data uploader. We give for our scheme a detailed security proof and efficiency analysis. Experiment results of performance evaluation demonstrate that our new scheme is very efficient and feasible.


2018 ◽  
Vol 24 (3) ◽  
pp. 1812-1816
Author(s):  
Tan Choon Beng ◽  
Mohd Hanafi Ahmad Hijazi ◽  
Yuto Lim

Sign in / Sign up

Export Citation Format

Share Document