Main Article Content

Abstract

Data integrity and security are the main concerns in cloud. In this paper we propose an adequate and impressive scheme by using dynamic data support to ensure that the data in cloud is correct and error less. The new scheme proposed in this paper supports modification, deletion and updating the data blocks present in the cloud server. The main problem is the efficiency and security to verify that the storage server is storing the client’s outsourced data. The necessary security and efficiency has to be provided to the server which can be small computing device with limited

Keywords

Outsourcing cloud storage homomorphism token cloud data.

Article Details

How to Cite
S, S., M, Y., & PR, S. (2015). FORTIFYING SECURITY AND INTEGRITY IN CLOUD. International Journal of Students’ Research in Technology & Management, 3(3), 313–316. https://doi.org/10.18510/ijsrtm.2015.3310

References

  1. M. Lillibridge, S. Elnikety, A. Birrell, M. Burrows, and M.
  2. Isard, “A Cooperative Internet Backup Scheme,†Proc. of the 2003 USENIX Annual Technical Conference (General Track), 29–41, 2003.
  3. K. D. Bowers, A. Juels, and A. Oprea, “HAIL: A High-Availability and Integrity Layer for Cloud Storage,†Cryptology ePrint Archive, Report 2008/489, 2008, http://eprint.iacr.org/.
  4. L. Carter and M. Wegman, “Universal Hash Functions,†Journal of Computer and System Sciences, vol. 18, no. 2, pp. 143–154, 1979. DOI: https://doi.org/10.1016/0022-0000(79)90044-8
  5. J. Hendricks, G. Ganger, and M. Reiter, “Verifying Distributed Erasure coded Data,†Proc. 26th ACM Symposium on Principles of Distributed Computing, pp. 139–146, 2007. DOI: https://doi.org/10.1145/1281100.1281122
  6. B. Sotomayor, R. S. Montero, I. M. Llorente, and I. T. Foster, “Virtual infrastructure management in private and hybrid clouds,†IEEE Internet omputing, vol. 13, no. 5, pp.14–22, 2009. DOI: https://doi.org/10.1109/MIC.2009.119
  7. G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, “Scalable and efficient provable data possession,†in Proceedings of the 4th international conference on Security and privacy in communication networks, Secure Comm., 2008, pp. 1–10. DOI: https://doi.org/10.1145/1460877.1460889
  8. Rajkumar Buyya, Chee Shin Yeo, and Srikumar Venugopal “Market- Oriented Cloud Computing:Vision, Hype, and Reality for Delivering IT Services as Computing
  9. Utilities†The 10th IEEE International Conference on HighPerformance Computing and Communications , pp.10 Table 1
  10. Christopher Moretti, Jared Bulosan, Douglas Thain, and Patrick J.Flynn, “All-Pairs: An Abstraction for Data-Intensive CloudComputingâ€, Parallel and Distributed Processing, 2008. IEEE International Symposium DOI: https://doi.org/10.1109/IPDPS.2008.4536311