Enabling Data Integrity Check and Corruption Prevention in Thin Cloud Storage

International Journal of Computer Trends and Technology (IJCTT)          
© 2015 by IJCTT Journal
Volume-21 Number-1
Year of Publication : 2015
Authors : N. Kamaladheepan, A. Marimuthu


N. Kamaladheepan,A. Marimuthu "Enabling Data Integrity Check and Corruption Prevention in Thin Cloud Storage". International Journal of Computer Trends and Technology (IJCTT) V21(1):46-49, March 2015. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
Cloud Computing has evolved and matured, it gets growing interest in the enterprise market where economic pressures are challenging traditional IT operations. Many IT organizations face inefficiency in areas like funding projects, and resource utilization. Cloud Computing is focused on addressing these issues by cutting costs through better standardization, higher utilization, greater agility, and faster responsiveness of IT services . A main concern on Cloud journey is security of the infrastructure and the information stored in the infrastructure. To support these requirements, most organizations emphasis to move from maintaining tied infrastructure to a loosely coupled service oriented model. Data integrity became one critical factor. This paper aims to give solution to protect cloud data by dividing and storing the data in encrypted form. The data integrity is checked by the client and corrupted data is regenerated. This enables high data integrity in cloud storage.

[1] Henry C. H. and Patrick P. C. Lee, “Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage”, 31st International Symposium on Reliable Distributed Systems, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 25, NO. 2, FEBRUARY 2014
[2] K. Bowers, A. Juels, and A. Oprea, “HAIL: A High-Availability and Integrity Layer for Cloud Storage,” Proc. 16th ACM Conf.Computer and Comm. Security (CCS ’09), 2009.H. Abu-Libdeh, L. Princehouse, and H. Weatherspoon, “RACS: A Case for Cloud Storage Diversity,” Proc. First ACM Symp. Cloud Computing (SoCC ’10), 2010.
[3] M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “A View of Cloud Computing,” Comm. ACM, vol. 53, no. 4, pp 50-58, 2010.
[4] Cloud Security- A comprehensive guide to secure cloud computing by Ronald L. Krutz, Russell Dean Vines, Wiley India Pvt. Ltd. Edition 2010, ISBN: 978-81-265-2809-7
[5] Cloud Computing by David cookers, Tata McGraw Hill 2012 edition, ISBN-13:978-1-25-906104-2
[6] Gupta Sarika, Sangita Rani Satapathy, Mehta Piyush and TripathyAnupam, “A Secure and Searchable Data Storage in Cloud Computing”, 3rd IEEE International Advance Computing Conference (IACC), 2013, page 106-109.
[7] Taeho Jung, Xiang-Yang, Zhiguo Wan, Meng Wan, “Privacy Preserving Cloud Data AccessWith Multi- Authorities”, Proceedings IEEE INFOCOM, 2013, page 2625-2633.
[8] Amazon.com. Amazon simple storage service (Amazon S3), 2008. Referenced 2008 at aws.amazon.com/s3.
[9] https://www.dropbox.com/
[10] Cloud Computing Implementation, Management, and Security by John W. Rittinghouse, James F. Ransome, Third Indian Reprint 2014 by CRC Press. ISBN 978-1-4398-0680-7
[11] Cloud Computing Principles and Paradigms edited by RajkumarBuyya, James Broberg, Andrej Goscinski, Authorized reprint by Willey India Pvt. Ltd, ISBN 978-81-265-4125-6

Cloud computing, Data Integrity, Multi-server, Data Corruption, Regeneration.