CFP last date
20 May 2024
Reseach Article

A Comparative Study on Cloud based Data Integrity Verification Schemes

Published on April 2016 by Sonali Ghule, Pratibha Yalagi
National Seminar on Recent Trends in Data Mining
Foundation of Computer Science USA
RTDM2016 - Number 2
April 2016
Authors: Sonali Ghule, Pratibha Yalagi
1678d79f-e2e8-49f3-9892-d3303fb271b6

Sonali Ghule, Pratibha Yalagi . A Comparative Study on Cloud based Data Integrity Verification Schemes. National Seminar on Recent Trends in Data Mining. RTDM2016, 2 (April 2016), 24-27.

@article{
author = { Sonali Ghule, Pratibha Yalagi },
title = { A Comparative Study on Cloud based Data Integrity Verification Schemes },
journal = { National Seminar on Recent Trends in Data Mining },
issue_date = { April 2016 },
volume = { RTDM2016 },
number = { 2 },
month = { April },
year = { 2016 },
issn = 0975-8887,
pages = { 24-27 },
numpages = 4,
url = { /proceedings/rtdm2016/number2/24688-2579/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Seminar on Recent Trends in Data Mining
%A Sonali Ghule
%A Pratibha Yalagi
%T A Comparative Study on Cloud based Data Integrity Verification Schemes
%J National Seminar on Recent Trends in Data Mining
%@ 0975-8887
%V RTDM2016
%N 2
%P 24-27
%D 2016
%I International Journal of Computer Applications
Abstract

Cloud computing is the delivery of cloud services over the Internet. Cloud services becoming popular because people are able to access their email, social networking site from anywhere in the world, at any time, at minimal charge or no charge. Cloud storage allows users to store their data remotely and use the on-demand high quality cloud applications without load of local hardware and software management. It moves the application software, databases and the important data to the centralized huge data centers, where the management of the data and services may not be fully secure. When user store their data on the cloud, there may be a risk of losing the data, or sometimes data may be modified or updated. It may not be fully secure because the client does not have copies of all stored data. To protect outsourced data against corruption enabling data integrity protection, fault tolerance and efficient recovery for cloud storage is required. This paper delivers a survey about, different data integrity techniques and their limitation. The data integrity techniques for privacy preservation are POR (Proof of Retrivability), PDP (Provable Data Possession), HAIL (High Availability and Integrity Layer for Cloud Storage), erasure codes etc.

References
  1. A. Jules and B. Kaliski Jr. , "PORs: Proofs of Retrievability for Large Files," Proc. 14th ACM Conf. Computer and Comm. Security (CCS '07), 2007.
  2. G. Ateniese, R. Burns, R. Curtmola, J. Herring, O. Khan, L. Kissner, Z. Peterson, and D. Song, "Remote Data Checking Using Provable Data Possession," ACM Trans. Information and System Security, vol. 14, article 12, May 2011.
  3. M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, "A View of Cloud Computing," Comm. ACM, vol. 53, no. 4, pp 50-58, 2010.
  4. H. Abu-Libdeh, L. Princehouse, and H. Weatherspoon, "RACS: A Case for Cloud Storage Diversity," Proc. First ACM Symp. Cloud Computing (SoCC '10), 2010.
  5. R. Curtmola, O. Khan, R. Burns, and G. Ateniese, "MR-PDP: Multiple-Replica Provable Data Possession," Proc. IEEE 28th Int'l Conf. Distributed Computing Systems (ICDCS '08), 2008.
  6. K. Bowers, A. Juels, and A. Oprea, "HAIL: A High-Availability and Integrity Layer for Cloud Storage," Proc. 16th ACM Conf. Computer and Comm. Security (CCS '09), 2009.
  7. I. Reed and G. Solomon, "Polynomial Codes over Certain Finite Fields," J. Soc. Industrial and Applied Math. , vol. 8, no. 2, pp. 300-304, 1960.
  8. Y. Hu, H. Chen, P. Lee, and Y. Tang, "NCCloud: Applying Network Coding for the Storage Repair in a Cloud-of-Clouds," Proc. 10th USENIX Conf. File and Storage Technologies (FAST'12),2012.
  9. R. Li, J. Lin, and P. Lee. CORE: Augmenting Regenerating-Coding-Based Recovery for Single and Concurrent Failures in Distributed Storage Systems. arXiv, preprint arXiv:1302. 3344, 2013.
  10. Sravan Kumar R, Ashutosh Saxena, Data Integrity Proofs in Cloud Storage, 978-1-4244-ss8953-4/11/@ 2011 IEEE.
  11. Ayad F. Barsoum and M. Anwar Hasan, Provable Possession and Replication of Data over Cloud Servers
Index Terms

Computer Science
Information Sciences

Keywords

Data Integrity Proof Of Retrievability Provable Data Possession Replication Based System