全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

A Scalable Privacy-Preserving Verification Correctness Protocol to Identify Corrupted Data in Cloud Storage

Keywords: Auditing , Cloud Computing , Cloud Storage , Privacy

Full-Text   Cite this paper   Add to My Lib

Abstract:

Cloud computing prevails over the whole world which makes the mankind to rely more on a number of online storage systems to back up data or for using it in real time which gives an anywhere, anytime access. Thus lot of sensitive data will be stored into the cloud. As the user’s data are stored and maintained out of user’s premises, these services bring with it, concerns of security vulnerabilities for all the services provided by them. There is a lot of research being done to point out the issues with the service providers and cloud security in general. This paper provides a privacy-preserving data integrity protection by enabling public auditability for cloud storage and implements a scalable framework that addresses the construction of an interactive audit protocol to prevent the fraudulence of prover and the leakage of verified data in cloud storage by reducing the overhead in computation, communication and storage. Thus it provides a lightweight, efficient and privacy –preserving auditing scheme which will also identifies the corrupted data. The framework is based on an interactive PDP protocol that uses the challenge – response algorithms and a verification protocol. The protocol supports dynamic operation that allows the granted users to perform insertion, deletion and updation. The protocol allows a Third party Auditor who works on behalf of the Data owner who has a large amount of data to be stored in the cloud, to manage or monitor outsourced data. The experimental results show that the protocol is efficient, lightweight and privacy-preserving.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133