Data Integrity Verification in Cloud Computing

Authors

  • Rajesh Sada  Information Technology Department, NRI Institute of Information Science and Technology, Bhopal, Madhya Pradesh, India
  • Shatendra Dubey  Information Technology Department, NRI Institute of Information Science and Technology, Bhopal, Madhya Pradesh, India

DOI:

https://doi.org//10.32628/CSEIT2390221

Keywords:

Third Party Auditing, Cross check , Paillier Cryptosystem

Abstract

High security is one of the major obstacles for opening up the new era of the long dreamed vision of Cloud computing as a utility. In today’s trend of cloud computing, all the sensitive applications and data are moved towards cloud infrastructure and data center that run on virtual computing resources in the form of virtual machine. These attributes poses many security challenges such as accessibility vulnerabilities, virtualization vulnerabilities and web application vulnerabilities. We primarily aim to achieve better data integrity verification technique for Data Storage as a Service (Daas) in cloud computing and help users to recognize the threats associated with their uses.

References

  1. F. Sebe, J. Domingo-Ferrer, A. Martinez-Balleste, Y. Deswarte, and J. J. Quisquater. Efficient Remote Data Possession Checking in Critical Information Infrastructures. IEEE Trans. Knowledge and Data Eng,vol. 20, no. 8, pages. 1034-1038, Aug. 2008.
  2. Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou. ”Enabling Public Verifi- ability and Data Dynamics for Storage Security in Cloud Computing,”. Proc. 14th European Conf. Research in Computer Security (ESORICS), IEEE, 2009.
  3. C. Wang, S.S.-M. Chow, Q. Wang, K. Ren, and W. Lou ”Privacy- Preserving Public Auditing for Secure Cloud Storage”. In Cryptology ePrint Archive, Report 2009/579, 2009.
  4. C. Wang, Q. Wang, K. Ren, and W. Lou ”Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing”. In Proc. IEEE INFOCOM, IEEE, 2010.
  5. K.D. Bowers, A. Juels, and A. Oprea ”HAIL: A high-availability and integrity layer for cloud storage,” ,” Proc. 16th ACM conference On Computer and communications security,, pages 187-198, 2009.
  6. Zhuo Hao, Sheng Zhong and Nenghai Yu. ”A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability,” IEEE Transection on Knowledge and Data Engineering, VOL. 23, NO. 9, September 2011.
  7. Pascal Paillier ”Public-Key Cryptosystems Based on Composite Degree Residuosity Classes” , Published in J. Stern, Ed., Advances in Cryptology EUROCRYPT’99, vol. 1592 of Lecture Notes in Computer Science, pp. 223-238, Springer-Verlag, 1999.
  8. Pascal Paillier and David Pointcheval. ”Efficient Public-Key Cryp- tosystems Provably Secure Against Active Adversaries,” Advances in Cryptology Proceedings of ASIACRYPT , Springer-Verlag, LNCS 1716, pages 165-179,1999.
  9. Dan Boneh and Hovav Shacham. ”CryptoBytes”, RSA Laboratories, Volume 5, No. 1 Winter/Spring 2002
  10. Dario Catalano, Rosario Gennaro , Nick Howgrave-Graham and Phong Q. Nguyen. ”Paillier’s cryptosystem revisited”, published in Proceeding CCS ’01 Proceedings of the 8th ACM conference on Computer and Communications Security Pages 206-214 , 2001

Downloads

Published

2023-04-30

Issue

Section

Research Articles

How to Cite

[1]
Rajesh Sada, Shatendra Dubey, " Data Integrity Verification in Cloud Computing, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 9, Issue 2, pp.208-213, March-April-2023. Available at doi : https://doi.org/10.32628/CSEIT2390221