Multi-Replica Dynamic Data Verification for Cloud Computing

2012 ◽  
Vol 263-266 ◽  
pp. 2939-2944
Author(s):  
Wen Jun Luo ◽  
Lu Liu

In this paper, we propose a Multi-Copy Dynamic Data Possession (MC-DDP) protocols based on index hash-table, which extends DPDP model to support provable update to outsourced multi-copy data and timely anomaly detection. Through security analysis, the proposed protocol is shown to be secure and very suitable for cloud storage systems.

2018 ◽  
Vol 2018 ◽  
pp. 1-12
Author(s):  
Wenqi Chen ◽  
Hui Tian ◽  
Chin-Chen Chang ◽  
Fulin Nan ◽  
Jing Lu

Cloud storage, one of the core services of cloud computing, provides an effective way to solve the problems of storage and management caused by high-speed data growth. Thus, a growing number of organizations and individuals tend to store their data in the cloud. However, due to the separation of data ownership and management, it is difficult for users to check the integrity of data in the traditional way. Therefore, many researchers focus on developing several protocols, which can remotely check the integrity of data in the cloud. In this paper, we propose a novel public auditing protocol based on the adjacency-hash table, where dynamic auditing and data updating are more efficient than those of the state of the arts. Moreover, with such an authentication structure, computation and communication costs can be reduced effectively. The security analysis and performance evaluation based on comprehensive experiments demonstrate that our protocol can achieve all the desired properties and outperform the state-of-the-art ones in computing overheads for updating and verification.


2013 ◽  
Vol 709 ◽  
pp. 603-610
Author(s):  
Wen Zhe Jiao ◽  
Guo Qing Wang ◽  
Xiao Xue Ye ◽  
Zheng Jun Zhai

Cloud computing has been envisioned as a next generation information technology (IT) paradigm. The risk of losing data stored with any untrustworthy service provider is the key barrier to widespread uptake of cloud computing. This paper proposes an algebraic signature based remote data possession checking (RPDP) scheme to verify the integrity of the data stored in the cloud. This scheme uses skip-list to support fully dynamic data operation, including insertion, modification and deletion. The scheme allows verification without the need for the auditor to compare against the original data, which reduces the communication complexity dramatically. The storage complexity of cloud user is reduced to several bytes information. Extensive security analysis shows that the proposed scheme is highly provably secure.


Biometric verification of has turned out to be progressively well known as of late. With the improvement of cloud computing, database owners are enthused to outsource the enormous size of biometric information and verification activity to the cloud to dispose of the costly capacity and calculation costs, which anyway carries potential dangers to clients' security. This article presents an proficient and protection saving biometric verification outsourcing plan. In particular, the biometric information is encoded and redistributed to the cloud server. To execute a biometric verification, the database owner encodes the query information and submits it to the cloud. The cloud performs verification tasks over the encoded database and returns the outcome to the database owner. A careful security examination shows the proposed plan is secure regardless of whether aggressors can produce verification demands and intrigue with the cloud. Contrasted and past conventions, trial results demonstrate the proposed plan accomplishes a better presentation in both preparation and verification systems.


2021 ◽  
Vol 11 (2) ◽  
pp. 193-199
Author(s):  
Anuj Kumar Yadav ◽  
Ritika ◽  
Madan Garg

Cloud computing has emerged as a potential substitute over traditional computing systems during the time of the COVID-19 pandemic. Almost all organizations shift their working from conventional ways to the online form of working. Most of the organizations are planning to permanently change some % of their work to online WFH (Work from Home) mode. There are numerous benefits of using cloud services in terms of cost, portability, platform independence, accessibility, elasticity, etc. But security is the biggest barrier when one wants to move towards cloud computing services, especially the cloud storage service. To overcome the problem of security in cloud storage systems, we have presented an approach for data security in cloud storage. The proposed approach uses the cryptographic methods and provides security and monitoring features to the user data stored in cloud storage systems. The proposed approach continuously monitors user’s data for any kind of modification by attackers. Thus, approach not only provides data security but also improves user’s trust on cloud based storage services.


Sign in / Sign up

Export Citation Format

Share Document