Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Enabling Data Reliability Security in Regenerating-Coding-based Cloud Storage

International Journal of Computer Applications
© 2015 by IJCA Journal
Volume 122 - Number 2
Year of Publication: 2015
S. Palani
V. Divya Bharathi
V. Mounika

S.palani, V.divya Bharathi and V.mounika. Article: Enabling Data Reliability Security in Regenerating-Coding-based Cloud Storage. International Journal of Computer Applications 122(2):24-26, July 2015. Full text available. BibTeX

	author = {S.palani and V.divya Bharathi and V.mounika},
	title = {Article: Enabling Data Reliability Security in Regenerating-Coding-based Cloud Storage},
	journal = {International Journal of Computer Applications},
	year = {2015},
	volume = {122},
	number = {2},
	pages = {24-26},
	month = {July},
	note = {Full text available}


To protect outsourced information in cloud storage con to corruptions, adding defect acceptance to cloud storage, along side well-organized information responsibleness read-through and recovery procedures, becomes crucial. Make codes offer defect acceptance by marking information across multiple servers, whereas mistreatment less restore transfer than established removal codes throughout failure recovery. Therefore, we tend to study the matter of remotely checking the responsibleness of regenerating-coded information con to corruptions underneath a real-life cloud storage setting. we tend to style and implement a sensible information responsibleness security (DRS) theme for a particular make code, whereas conserving its integral properties of defect acceptance and repair-traffic saving. Our DRS theme is intended underneath a mobile sophisticated adversarial model, and permits a consumer to feasibly verify the responsibleness of random subsets of outsourced information con to general or malicious corruptions. It works underneath the straightforward assumption of thin-cloud storage and permits totally different parameters to be fine-tuned for a performance-security trade-off. we tend to implement and judge the overhead of our DRS theme in a very real cloud storage workplace underneath totally different parameter selections. we tend to more analyze the safety strengths of our DRS theme via mathematical models. we tend to show that remote integrity checking are often presumably incorporated into make codes in sensible operation.


  • H. Abu-Libdeh, L. Princehouse, and H. Weatherspoon, "RACS: A Case for Cloud Storage Diversity," Proc. First ACM Symp. Cloud Computing (SoCC '10), 2010.
  • M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, "A View of Cloud Computing," Comm. ACM, vol. 53, no. 4, pp 50-58, 2010.
  • G. Ateniese, R. Burns, R. Curtmola, J. Herring, O. Khan, L. Kissner, Z. Peterson, and D. Song, "Remote Data Checking Using Provable Data Possession," ACM Trans. Information and System Security, vol. 14, article 12, May 2011.
  • K. Bowers, A. Juels, and A. Oprea, "HAIL: A High-Availability and Integrity Layer for Cloud Storage," Proc. 16th ACM Conf. Computer and Comm. Security (CCS '09), 2009.
  • K. Bowers, A. Juels, and A. Oprea, "Proofs of Retrievability: Theory and Implementation," Proc. ACM Workshop Cloud Computing Security (CCSW '09), 2009.
  • B. Chen, R. Curtmola, G. Ateniese, and R. Burns, "Remote Data Checking for Network Coding-Based Distributed Storage Systems," Proc. ACM Workshop Cloud Computing Security (CCSW'10), 2010.
  • H. C. H. Chen and P. P. C. Lee, "Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage," Proc. IEEE 31st Symp. Reliable Distributed Systems (SRDS '12), 2012.
  • L. Chen, "NIST Special Publication 800-108," Recommendation for Key Derivation Using Pseudorandom Functions (Revised), http://csrc. nist. gov/publications/nistpubs/800-108/sp800-108. pdf, Oct. 2009.
  • R. Curtmola, O. Khan, and R. Burns, "Robust Remote Data Checking," Proc. ACM Fourth Int'l Workshop Storage Security and Survivability (StorageSS '08), 2008.
  • R. Curtmola, O. Khan, R. Burns, and G. Ateniese, "MR-PDP: Multiple-Replica Provable Data Possession," Proc. IEEE 28th Int'l Conf. Distributed Computing Systems (ICDCS '08), 2008.