We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

Article:Efficient Data Integrity and Reliable Storage Accesses in Cloud using Space Comparison Algorithm

by Dinesh.C, Prasanna.S
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 31 - Number 6
Year of Publication: 2011
Authors: Dinesh.C, Prasanna.S
10.5120/3829-5320

Dinesh.C, Prasanna.S . Article:Efficient Data Integrity and Reliable Storage Accesses in Cloud using Space Comparison Algorithm. International Journal of Computer Applications. 31, 6 ( October 2011), 27-32. DOI=10.5120/3829-5320

@article{ 10.5120/3829-5320,
author = { Dinesh.C, Prasanna.S },
title = { Article:Efficient Data Integrity and Reliable Storage Accesses in Cloud using Space Comparison Algorithm },
journal = { International Journal of Computer Applications },
issue_date = { October 2011 },
volume = { 31 },
number = { 6 },
month = { October },
year = { 2011 },
issn = { 0975-8887 },
pages = { 27-32 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume31/number6/3829-5320/ },
doi = { 10.5120/3829-5320 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:17:26.563556+05:30
%A Dinesh.C
%A Prasanna.S
%T Article:Efficient Data Integrity and Reliable Storage Accesses in Cloud using Space Comparison Algorithm
%J International Journal of Computer Applications
%@ 0975-8887
%V 31
%N 6
%P 27-32
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

It is very challenging part to keep safely all required data that are needed in many applications for user in cloud. Storing our data in cloud may not be fully trustworthy. Since client doesn’t have copy of all stored data, he has to depend on Cloud Service Provider. But dynamic data operations, Read-Solomon and verification token construction methods don’t tell us about total storage capacity of server allocated space before and after the data addition in cloud. So we have to introduce a new proposed system of efficient storage measurement and space comparison algorithm with time management for measuring the total allocated storage area before and after the data insertion in cloud. So by using our proposed scheme, the value or weight of stored data before and after is measured by client with specified time in cloud storage area with accuracy. And here we also have proposed the multi-server restore point in server failure condition. If there occurs any server failure, by using this scheme the data can be recovered automatically in cloud server. Our proposed scheme efficiently checks space for the in-outsourced data to maintain integrity. Here the TPA necessarily doesn’t have the delegation to audit user’s data.

References
  1. Towards Secure and Dependable Storage Services in Cloud Computing Cong Wang, Student Member, IEEE, Qian Wang, Student Member, IEEE, Kui Ren, Member, IEEE, Ning Cao, Student Member, IEEE, and Wenjing Lou, Senior Member, IEEE-2011.
  2. A privacy preserving remote data integrity checking protocol with data dynamics and public verifiability” Qian Wang, Student Member, IEEE, Cong Wang, Student Member, IEEE, Kui Ren, Member, IEEE, Wenjing Lou, Senior Member, IEEE, and Jin Li ” MAY- 2011.
  3. Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing Qian Wang1, Cong Wang1, Jin Li1, Kui Ren1, and Wenjing Lou2-Springer-Verlag Berlin Heidelberg- 2009.
  4. Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks, Ashley,YangXiangn, WanleiZhou, AlessioBonti, Elsevier- 2010.
  5. A Multiple-Replica Remote Data Possession Checking Protocol with Public Verifiability- Second International Symposium on Data, Privacy, and E-Commerce- 2010.
  6. Addressing cloud computing security issues. Future generation computer systems- www.elsevier.com/locate/fgcs-2011
  7. Identifying the security risks associated with governmental use of cloud computing Scott Paquette, Paul T. Jaeger, Susan C.Wilson-www.elsevier.com/locate/govinf-2010.
  8. Data Integrity Proofs in Cloud Storage-, Saravan Kumar.R, Software Engineering and Technology labs Infosys Technologies Ltd Hyderabad, India-2011.
  9. Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud Daniel Warneke and Odej Kao-JANUARY- 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Storage measurement Space comparison algorithm Restore access point Time management Cloud server