scholarly journals A Survey on Data Integrity Methods in Cloud Storage

2020 ◽  
Author(s):  
Anil Kumar G

Cloud computing offers different kind of servicesto the end user, so that end user can store the data and access iton demand where ever they need it. Now days IT industries areoutsourcing their data by storing it remotely in cloud forreducing the load on local storage there by reducing thehardware, software and maintenance cost. In spite of thesebenefits, the major problem with data storage is that there is noguarantee of data consistency and integrity, which has become amajor hurdle for using the services offered by cloud. So thispaper surveys existing schemes that proves data integrity andretrievability.

Author(s):  
Neha Thakur ◽  
Aman Kumar Sharma

Cloud computing has been envisioned as the definite and concerning solution to the rising storage costs of IT Enterprises. There are many cloud computing initiatives from IT giants such as Google, Amazon, Microsoft, IBM. Integrity monitoring is essential in cloud storage for the same reasons that data integrity is critical for any data centre. Data integrity is defined as the accuracy and consistency of stored data, in absence of any alteration to the data between two updates of a file or record.  In order to ensure the integrity and availability of data in Cloud and enforce the quality of cloud storage service, efficient methods that enable on-demand data correctness verification on behalf of cloud users have to be designed. To overcome data integrity problem, many techniques are proposed under different systems and security models. This paper will focus on some of the integrity proving techniques in detail along with their advantages and disadvantages.


2018 ◽  
Vol 2018 ◽  
pp. 1-9 ◽  
Author(s):  
Ruoshui Liu ◽  
Jianghui Liu ◽  
Jingjie Zhang ◽  
Moli Zhang

Cloud computing is a new way of data storage, where users tend to upload video data to cloud servers without redundantly local copies. However, it keeps the data out of users' hands which would conventionally control and manage the data. Therefore, it becomes the key issue on how to ensure the integrity and reliability of the video data stored in the cloud for the provision of video streaming services to end users. This paper details the verification methods for the integrity of video data encrypted using the fully homomorphic crytosystems in the context of cloud computing. Specifically, we apply dynamic operation to video data stored in the cloud with the method of block tags, so that the integrity of the data can be successfully verified. The whole process is based on the analysis of present Remote Data Integrity Checking (RDIC) methods.


2021 ◽  
pp. 20-32
Author(s):  
admin admin ◽  

Recently, the security of heterogeneous multimedia data becomes a very critical issue, substantially with the proliferation of multimedia data and applications. Cloud computing is the hidden back-end for storing heterogeneous multimedia data. Notwithstanding that using cloud storage is indispensable, but the remote storage servers are untrusted. Therefore, one of the most critical challenges is securing multimedia data storage and retrieval from the untrusted cloud servers. This paper applies a Shamir Secrete-Sharing scheme and integrates with cloud computing to guarantee efficiency and security for sensitive multimedia data storage and retrieval. The proposed scheme can fully support the comprehensive and multilevel security control requirements for the cloud-hosted multimedia data and applications. In addition, our scheme is also based on a source transformation that provides powerful mutual interdependence in its encrypted representation—the Share Generator slices and encrypts the multimedia data before sending it to the cloud storage. The extensive experimental evaluation on various configurations confirmed the effectiveness and efficiency of our scheme, which showed excellent performance and compatibility with several implementation strategies.


2015 ◽  
pp. 1432-1449
Author(s):  
M. Sundaresan ◽  
D. Boopathy

Cloud storage systems can be considered to be a network of distributed datacenters that typically use cloud computing technology like virtualization and offer some kind of interface for storing data. To increase the availability of the data, it may be redundantly stored at different locations. Basic cloud storage is generally not designed to be accessed directly by users but rather incorporated into custom software using API. Cloud computing involves other processes besides storage. In this chapter, the authors discuss different viewpoints for cloud computing from the user, legal, security, and service provider perspectives. From the user viewpoint, the stored data creates a mirror of currently available local data. The backup feature allows users to recover any version of a previously stored data. Synchronization is the process of establishing consistency among the stored data. From the legal viewpoint, provisions regulating the user processing and storage of the data must have to be constant from when the data is stored in the cloud. The security viewpoint requires interaction with the Web application, data storage, and transmission. The service provider viewpoint requires the maximum level of cloud storage service at the minimum cost.


2018 ◽  
Vol 7 (3.6) ◽  
pp. 55
Author(s):  
Neha Narayan Kulkarni ◽  
Shital Kumar A. Jain ◽  
. .

Recently the technologies are growing fast, so they have become the point of source and also the sink for data. Data is generated in large volume introducing the concept of structured and unstructured data evolving "Big Data" which needs large memory for storage. There are two possible solutions either increase the local storage or use the Cloud Storage. Cloud makes data available to the user anytime, anywhere, anything. Cloud allows the user to store their data virtually without investing much. However, this data is on cloud raising a concern of data security and recovery. This attack is made by the untrusted or unauthorized user remotely. The attacker may modify, delete or replace the data. Therefore, different models are proposed for a data integrity check and proof of retrievability. This paper includes the literature review related to various techniques for data integrity, data recovery and proof of retrievability.  


2014 ◽  
Vol 556-562 ◽  
pp. 5395-5399
Author(s):  
Jian Hong Zhang ◽  
Wen Jing Tang

Data integrity is one of the biggest concerns with cloud data storage for cloud user. Besides, the cloud user’s constrained computing capabilities make the task of data integrity auditing expensive and even formidable. Recently, a proof-of-retrievability scheme proposed by Yuan et al. has addressed the issue, and security proof of the scheme was provided. Unfortunately, in this work we show that the scheme is insecure. Namely, the cloud server who maliciously modifies the data file can pass the verification, and the client who executes the cloud storage auditing can recover the whole data file through the interactive process. Furthermore, we also show that the protocol is vulnerable to an efficient active attack, which means that the active attacker is able to arbitrarily modify the cloud data without being detected by the auditor in the auditing process. After giving the corresponding attacks to Yuan et al.’s scheme, we suggest a solution to fix the problems.


2015 ◽  
Vol 6 (2) ◽  
pp. 249
Author(s):  
Asril Basry

ABSTRAK Mitigasi dalam mengurangi risiko kerusakan data dimana bencana yang dimaksud seperti terjadi kebakaran , bencana alam , perang dll sehingga dapat menyebabkan kerusakan pada infrastruktur teknologi informasi dalam hal ini adalah media penyimpanan data. Salah satu strategi yang dilakukan suatu perusahaan adalah membuat perencanaan mitigasi kerusakan dengan memanfaatkan teknologi penyimpanan data yang berbasiskan cloud. Adapun cloud storage merupakan salah satu bagian dari cloud computing yang dilakukan oleh pihak penyedia layanan ini atau internet provider. Perusahaan harus memiliki strategi penyimpanan data berbasiskan cloud dengan menyalin atau back up data kedalam cloud storage dengan diupdate atau dimutakhirkan secara berkala sehingga jika suatu kondisi terjadi bencana yang menyebabkan tidak berfungsinya fasilitas dan infrastruktur teknologi informasi dalam hal ini media penyimpanan data ( data storage ) , maka perusahan dapat melanjutkan pengolahan data dengan menggunakan data yang disimpan dalam penyimpanan data yang berbasiskan cloud, adapun dalam penyimpanan data yang berbasiskan cloud tetap menjamin terhadap keamanan dan kerahasian data perusahaan. Kata kunci: mitigasi, strategi, pemulihan, bencana, penyimpanan awan, keamanan.


Storing the data in cloud helps in satisfying the demand of data access at anyplace, anytime. In cloud storage, users authenticate whether the data has been stored to the cloud storage server correctly. In order to enhance the storage provision, an Effectual Homomorphic Tag based Block for Dynamic Provable Data Possession (EHTB-DPDP) framework has been designed. This framework checks for the data integrity in the cloud storage server. The existing PDP, DPDP schemes were analyzed and the drawbacks encountered in those systems have been reframed using the proposed methodology. The major benefit of the proposed EHTB-DPDP is that it offers an effectual dynamic provable data possession and data integrity. This scheme spotlights on the integrity of the remote data by reducing data storage space, so that users can retrieve data efficiently. This security enhancement is achieved by the block tagging methodology. In addition, converting the variable block size to the fixed block size using hash function is also investigated. The feasibility of the scheme is proved by aanlyzing the security and the performance


Sign in / Sign up

Export Citation Format

Share Document