Research Article | Open Access | Download PDF
Volume 4 | Issue 4 | Year 2013 | Article Id. IJCTT-V4I4P134 | DOI : https://doi.org/10.14445/22312803/IJCTT-V4I4P134
Dependable and Secure Storage Services in Cloud Computing
D.Veena Sanjitha, M.Himaswanthi, T.V.N.Sai Sindhura, K.V.V. Satyanarayana
Citation :
D.Veena Sanjitha, M.Himaswanthi, T.V.N.Sai Sindhura, K.V.V. Satyanarayana, "Dependable and Secure Storage Services in Cloud Computing," International Journal of Computer Trends and Technology (IJCTT), vol. 4, no. 4, pp. 608-612, 2013. Crossref, https://doi.org/10.14445/22312803/IJCTT-V4I4P134
Abstract
Cloud storage allows users to remotely store their information and revel in the on-demand prime quality cloud applications while not the burden of native hardware and software system management although the advantages are clear, such a service is additionally relinquishing users’ physical possession of their outsourced information, that inevitably poses new security risks towards the correctness of the info in cloud. In order to handle this new downside and any deliver the goods a secure and dependable cloud storage service, we tend to propose during this paper a flexible distributed storage integrity auditing mechanism, utilizing the homomorphic token and distributed erasure-coded information. The proposed style permits users to audit the cloud storage with terribly light-weight communication and computation price. The auditing result not solely ensures robust cloud storage correctness guarantee, however additionally at the same time achieves quick information error localization, i.e., the identification of misbehaving server. Considering the cloud information are dynamic in nature, the projected style any supports secure and economical dynamic operations on outsourced information, as well as block modification, deletion, and append. Analysis shows the projected scheme is extremely economical and resilient against Byzantine failure, malicious information modification attack, and even server colluding attacks
Keywords
Data integrity, dependable distributed storage, error localization, data dynamics, Cloud Computing .
References
[1] C. Wang, Q. Wang, K. Ren, and W. Lou, “Ensuring data storage security in cloud computing,” in Proc. of IWQoS’09, July 2009, pp. 1–9.
[2] Amazon.com, “Amazon web services (aws),” Online at http:// aws.amazon.com/, 2009.
[3] Sun Microsystems, Inc., “Building customer trust in cloud computing with transparent security,” Online at https://www.sun. com/offers/details/sun transparency.xml, November 2009.
[4] M. Arrington, “Gmail disaster: Reports of mass email deletions,” Online at http://www.techcrunch.com/2006/12/ 28/gmail-disasterreports-of-mass-email-deletions/, December 2006.
[5] J. Kincaid, “MediaMax/TheLinkup Closes Its Doors,” Online at http://www.techcrunch.com/2008/07/10/ mediamaxthelinkup-closes-its-doors/, July 2008.
[6] Amazon.com, “Amazon s3 availability event: July 20, 2008,” Online at http://status.aws.amazon.com/s320080720.html, July 2008.
[7] S. Wilson, “Appengine outage,” Online at http://www. cio-weblog.com/50226711/appengine outage.php, June 2008.
[8] B. Krebs, “Payment Processor Breach May Be Largest Ever,” Online at http://voices.washingtonpost.com/securityfix/2009/01/ payment processor breach may b.html, Jan. 2009.
[9] A. Juels and J. Burton S. Kaliski, “Pors: Proofs of retrievability for large files,” in Proc. of CCS’07, Alexandria, VA, October 2007, pp. 584–597.
[10] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable data possession at untrusted stores,” in Proc. of CCS’07, Alexandria, VA, October 2007, pp. 598609.
[11] M. A. Shah, M. Baker, J. C. Mogul, and R. Swaminathan, “Auditing to keep online storage services honest,” in Proc. of