CFP last date
22 April 2024
Reseach Article

Framework to Improve Data Integrity in Multi Cloud Environment

by Anandita Singh Thakur, P. K. Gupta
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 87 - Number 10
Year of Publication: 2014
Authors: Anandita Singh Thakur, P. K. Gupta
10.5120/15245-3788

Anandita Singh Thakur, P. K. Gupta . Framework to Improve Data Integrity in Multi Cloud Environment. International Journal of Computer Applications. 87, 10 ( February 2014), 28-32. DOI=10.5120/15245-3788

@article{ 10.5120/15245-3788,
author = { Anandita Singh Thakur, P. K. Gupta },
title = { Framework to Improve Data Integrity in Multi Cloud Environment },
journal = { International Journal of Computer Applications },
issue_date = { February 2014 },
volume = { 87 },
number = { 10 },
month = { February },
year = { 2014 },
issn = { 0975-8887 },
pages = { 28-32 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume87/number10/15245-3788/ },
doi = { 10.5120/15245-3788 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:05:34.770656+05:30
%A Anandita Singh Thakur
%A P. K. Gupta
%T Framework to Improve Data Integrity in Multi Cloud Environment
%J International Journal of Computer Applications
%@ 0975-8887
%V 87
%N 10
%P 28-32
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing is a network based environment where resources, information and software's are shared and provided to the users according to their demands. Though cloud computing is being widely used in various fields, it has certain drawbacks. Security issue is a concern in cloud computing. The confidentiality and data integrity should be guaranteed to the user who is putting their data over the cloud. This paper proposes a framework that would provide integrity of data of multiple users through Third Party Auditor (TPA) and proposes various algorithms to implement this framework. In the proposed framework concept of multi cloud has been used to provide best cost optimization for various requirements of user. The framework is also divided into three platforms namely: platinum for sensitive data storage, gold for less level of security and silver for least level of security on the data. Finally we have implemented different algorithms for the various platforms in the proposed framework. In the obtained results, we can find that the proposed framework is easy to implement and provides better performance by using the traditional algorithms of network security over the various issues of cloud computing.

References
  1. Heena I. Syed, Naghma A. Baig "Survey On Cloud Computing," International Journal of Emerging Technology and Advanced Engineering, vol. 3, issue 4, April, 2013, pp. 308-312.
  2. Nirmala V. , Sivanandhan R. K. , and Lakshmi R. S. "Data confidentiality and Integrity Verification using Authenticator scheme in cloud," Proc. of 2013 International Conference on Green High Performance Computing, Nagercoil, March 2013, pp. 1-5.
  3. Raju et al. "Data Integrity using Encryption in Cloud Computing," Journal of Global Research in Computer Science, vol. 4, no. 5, pp. 40-43, May 2013.
  4. Dalia Attas and Omar Batrafi, "Efficient Integrity checking technique for or securing client data in Cloud computing," International Journal of Electrical & Computer Sciences, vol. 11, no 5, pp. 43-48, 20.
  5. Pardeep Kumar, Vivek Kumar Sehgal, Durg Singh Chauhan, P. K. Gupta, and Manoj Diwakar, "Effective Ways of Secure, Private and Trusted Cloud Computing," IJCSI International Journal of Computer Science Issues, vol. 8, issue 3, no. 2, pp. 412-421, May 2011
  6. Metri P. and Sarote G. , "Privacy Issues and Challenges in Cloud computing," International Journal of Advanced Engineering Sciences and Technologies, vol. 5, no. 1, pp. 5-6, 2011.
  7. A. Juels and B. S. Kaliski "PORs: Proofs of retrievability for large files," Cryptology ePrint archive, June 2007. Report 2007/243.
  8. A. M. Talib, R. Atan, and R. Abdullah, "CloudZone: Towards an Integrity Layer of Cloud Data Storage Based on Multi Agent System Architecture," 2011 IEEE Conference on Open Systems (ICOS2011), September 25 - 28, 2011.
  9. Giuseppe Ateniese, Randal Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary Peterson, and Dawn Song "Provable Data Possession at Untrusted Stores," Proc. of the 14th ACM conference on computer and communications security, pp. 598-609, 2007.
  10. Poonam Rana, P. K. Gupta and Rajesh Siddavatam, "Combined and Improved Framework of Infrastructure as a Service and Platform as a Service in Cloud Computing," Proceedings of the Second International Conference on Soft Computing for Problem Solving (SocProS 2012), December 28–30, 2012, Advances in Intelligent Systems and Computing 236, DOI: 10. 1007/978-81-322-1602-5_89, Springer India 2014, pp. 1-8.
  11. Pradeep Bhosale, Priyanka Deshmukh, Girish Dimbar, and Ashwini Deshpande, "Enhancing Data Security in Cloud Computing Using 3D Framework & Digital Signature with Encryption," International Journal of Engineering Research & Technology (IJERT) Vol. 1 Issue 8, October – 2012, pp. 1-8.
  12. S. B. Shivakumar, B. E. Ramesh, G. M. Kavitha, and M. Mala, "Multi Cloud Architecture for Improved User Experience," International Journal of Inventive Engineering and Sciences (IJIES), vol. 1, issue 7, June 2013, pp. 14-17.
Index Terms

Computer Science
Information Sciences

Keywords

AES Bcrypt Churning Cloud computing data integrity RSA security third party auditor