An Empirical Model of Data Integrity in Multi Cloud Data Storage

Author(s):  
T.Ravi Kiran ◽  
◽  
G. Roshini ◽  
K.Swetha Harshini ◽  
G.Aparna Gayathri
2014 ◽  
Vol 556-562 ◽  
pp. 5395-5399
Author(s):  
Jian Hong Zhang ◽  
Wen Jing Tang

Data integrity is one of the biggest concerns with cloud data storage for cloud user. Besides, the cloud user’s constrained computing capabilities make the task of data integrity auditing expensive and even formidable. Recently, a proof-of-retrievability scheme proposed by Yuan et al. has addressed the issue, and security proof of the scheme was provided. Unfortunately, in this work we show that the scheme is insecure. Namely, the cloud server who maliciously modifies the data file can pass the verification, and the client who executes the cloud storage auditing can recover the whole data file through the interactive process. Furthermore, we also show that the protocol is vulnerable to an efficient active attack, which means that the active attacker is able to arbitrarily modify the cloud data without being detected by the auditor in the auditing process. After giving the corresponding attacks to Yuan et al.’s scheme, we suggest a solution to fix the problems.


2015 ◽  
Vol 126 (4) ◽  
pp. 27-31
Author(s):  
Mandar Kadam ◽  
Stewyn Chaudhary ◽  
Bony Carvalho

2019 ◽  
Vol 7 (2) ◽  
pp. 144-147
Author(s):  
Manoj V. Bramhe ◽  
Dr. Milind V. Sarode ◽  
Dr. Meenakshi S. Arya

Author(s):  
Mohammed A. AlZain ◽  
Alice S. Li ◽  
Ben Soh ◽  
Mehedi Masud

Cloud computing is considered a great paradigm that enables access to large scale, on demand, flexible computing infrastructure. Lower infrastructure cost and better application performance are some of the benefits of utilizing a cloud computing model. With the appearance of the new generation of multi-cloud computing, clients can benefit from a diversity of services. However, data security has become an important requirement for clients when dealing with clouds that may fail due to faults in the software or hardware, or attacks from malicious insiders. Hence, building a highly dependable and reliable cloud system has become a critical research problem. To that end, this chapter investigates and presents the results in relation to that how Byzantine fault tolerance (BFT) and secure cloud data storage and sharing techniques can be deployed to manage multi-cloud data dependability faults.


Author(s):  
Naresh Vurukonda ◽  
B. Thirumala Rao ◽  
B. Tirapathi Reddy

<p>In proposed framework client source information reinforcements off-site to outsider distributed storage benefits to decrease information administration costs. In any case, client must get protection ensure for the outsourced information, which is currently safeguarded by outsiders. To accomplish such security objectives, FADE is based upon an arrangement of cryptographic key operations that are self-kept up by a majority of key supervisors that are free of outsider mists. In unmistakable, FADE goes about as an overlay framework that works flawlessly on today's distributed storage administrations. Actualize a proof-of-idea model of FADE on Amazon S3, one of today's distributed storage administrations. My work oversee, esteem included security highlights acclimatize were today's distributed storage administration. our research work proceeds in ensuring the file access control and assured deletion in multi cloud environment and reducing the meta data management, there by the cloud storage become more attractive and many users will adopt the cloud space in order to diminish the data storage cost.</p>


Author(s):  
Naresh Vurukonda ◽  
B. Thirumala Rao ◽  
B. Tirapathi Reddy

<p>In proposed framework client source information reinforcements off-site to outsider distributed storage benefits to decrease information administration costs. In any case, client must get protection ensure for the outsourced information, which is currently safeguarded by outsiders. To accomplish such security objectives, FADE is based upon an arrangement of cryptographic key operations that are self-kept up by a majority of key supervisors that are free of outsider mists. In unmistakable, FADE goes about as an overlay framework that works flawlessly on today's distributed storage administrations. Actualize a proof-of-idea model of FADE on Amazon S3, one of today's distributed storage administrations. My work oversee, esteem included security highlights acclimatize were today's distributed storage administration. our research work proceeds in ensuring the file access control and assured deletion in multi cloud environment and reducing the meta data management, there by the cloud storage become more attractive and many users will adopt the cloud space in order to diminish the data storage cost.</p>


Sign in / Sign up

Export Citation Format

Share Document