Enable open Verifiability and Data Dynamics for Storage protection in Cloud Computing

  IJCOT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© - April Issue 2013 by IJCTT Journal
Volume-4 Issue-4                           
Year of Publication : 2013
Authors :G.RajaMohan, K.VenkataRaju, G.chaitanya

MLA

G.RajaMohan, K.VenkataRaju, G.chaitanya"Enable open Veri?ability and Data Dynamics for Storage protection in Cloud Computing"International Journal of Computer Trends and Technology (IJCTT),V4(4):823-827 April Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract: -Cloud Computing has been envision as the next-generation structural design of IT Enterprise. It moves the purpose software and databases to the centralized large data centers, where the organization of the data and services may not be fully reliable. This unique paradigm brings about many new protection challenges, which have not been well implicit. This work studies the problem of ensuring the integrity of data storage in Cloud Computing. In particular, we consider the task of allowing a third party auditor (TPA), on behalf of the cloud client, to verify the integrity of the dynamic data store in the cloud. The beginning of TPA eliminates the association of client through the auditing of whether his information stored in the cloud is indeed intact, which can be significant in achieving economies of scale for Cloud Computing. The support for data dynamics via the most universal forms of data operation, such as block modi?cation, addition and removal, is also a signi?cant step toward expediency, since services in Cloud Computing are not incomplete to archive or backup data only. While prior works on ensuring remote data reliability often lacks the support of either public veri?ability or dynamic data functions, this paper achieves both. We ?rst identify the di?culties and potential protection problems of direct extension with fully dynamic data updates from prior works and then show how to construct an elegant verifcation method for seamless integration of these two salient features in our protocol design.

 

References-

[1] Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, “Enabling public verifiability and data dynamics for storage security in cloud computing,” Cryptology ePrint Archive, Report 2009/281, 2009.
[2] C.Wang, Q.Wang, K. Ren, andW. Lou, “Ensuring data storage s ecurity in cloud computing,” in Proc. of IWQoS’09, July 2009, pp. 1–9.
[3]. C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-preserving public auditing for storage security in cloud computing,” in Proc. of IEEE INFOCOM’10, San Diego, CA, USA, March 2010
[4]. A. Juels and B. S. Kaliski, Jr., “Pors: proofs of retrievability for large files,” in Proc. of CCS’07. New York, NY, USA: ACM, 2007, pp. 584–597.
[5]. C. Wang, K. Ren, and W. Lou, “Towards secure cloud data storage,” Proc. Of IEEE GLOBECOM’09, submitted on March 2009.

Keywords — Data storage, data integrity privacy-preserving, public auditability, cryptographic protocols, cloud computing.