We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Security and Verification of Data in Multi-Cloud Storage with Provable Data Possession

by Vrushali K Gaikwad, Ramesh Kagalkar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 117 - Number 5
Year of Publication: 2015
Authors: Vrushali K Gaikwad, Ramesh Kagalkar
10.5120/20549-2924

Vrushali K Gaikwad, Ramesh Kagalkar . Security and Verification of Data in Multi-Cloud Storage with Provable Data Possession. International Journal of Computer Applications. 117, 5 ( May 2015), 10-13. DOI=10.5120/20549-2924

@article{ 10.5120/20549-2924,
author = { Vrushali K Gaikwad, Ramesh Kagalkar },
title = { Security and Verification of Data in Multi-Cloud Storage with Provable Data Possession },
journal = { International Journal of Computer Applications },
issue_date = { May 2015 },
volume = { 117 },
number = { 5 },
month = { May },
year = { 2015 },
issn = { 0975-8887 },
pages = { 10-13 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume117/number5/20549-2924/ },
doi = { 10.5120/20549-2924 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:59:05.593445+05:30
%A Vrushali K Gaikwad
%A Ramesh Kagalkar
%T Security and Verification of Data in Multi-Cloud Storage with Provable Data Possession
%J International Journal of Computer Applications
%@ 0975-8887
%V 117
%N 5
%P 10-13
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Data integrity verification is one of the biggest security issue in cloud. To check integrity of data Provable data possession is one of the method available. In this paper, we have created an efficient PDP method for distributed cloud storage, in which we multiple cloud service providers are maintaining and storing client's data in cooperative way. This cooperatively working PDP method is based on indexing hierarchy & homomorphic variable response method. The security of our scheme is based on trusted third party auditor and structure of zero-awareness proof , which can fulfill reliability of awareness, completeness, and properties.

References
  1. Yan Zhu, Hongxin Hu, Gail-Joon Ahn, "Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage" IEEE, Mengyang Yu, Dec-2012
  2. B. Sotomayor, R. S. Montero, I. M. Llorente, and I. T. Foster, "Virtual infrastructure management in private and hybrid Clouds," IEEE Internet Computing, vol. 13, no. 5, pp. 14–22, 2009.
  3. G. Ateniese, R. C. Burns, R. Curtmola, J. Herring, L. Kissner, Z. N. J. Peterson, and D. X. Song, "Provable data possession at untrusted stores," in ACM Conference on Computer and Communications Security, P. Ning, S. D. C. di Vimercati, and P. F. Syverson, Eds. ACM, 2007, pp. 598–609.
  4. A. Juels and B. S. K. Jr. , "Pors: proofs of retrievability for Large files," in ACM Conference on Computer and Communications Security, P. Ning, S. D. C. di Vimercati, and P. F. Syverson, Eds. ACM, 2007, pp. 584–597.
  5. G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, "Scalable and efficient provable data possession," in Proceedings of the 4th international conference on Security and privacy in Communication networks, Secure Comm, 2008, pp. 1–10.
  6. Y. Zhu, H. Wang, Z. Hu, G. -J. Ahn, H. Hu, and S. S. Yau, "Dynamic audit services for integrity verification of outsourced Storages in clouds," in SAC, W. C. Chu, W. E. Wong, M. J. Palakal, and C. -C. Hung, Eds. ACM, 2011, pp. 1550–1557.
  7. C. C. Erway, A. K¨upc¸ ¨u, C. Papamanthou, and R. Tamassia, "Dynamic provable data possession," in ACM Conference on Computer and Communications Security, E. Al-Shaer, S. Jha, and A. D. Keromytis, Eds. ACM, 2009, pp. 213–222.
  8. L. Fortnow, J. Rompel, and M. Sipser, "On the power of multiprover Interactive protocols," in Theoretical Computer Science, 1988, pp. 156–161.
  9. D. Boneh and M. Franklin, "Identity-based encryption from the weil pairing," in Advances in Cryptology (CRYPTO'2001), vol. 2139 of LNCS, 2001, pp. 213–229.
Index Terms

Computer Science
Information Sciences

Keywords

Multiple Cloud Cooperative Provable Data Possession Homomorphic Variable Reply Zero awareness Cloud Storage Security.