Abstract
High security is one of leading restriction for shining up bright eras and vision of Cloud computing. In latest trend of Cloud, all the sensitive applications and data are moved towards cloud infrastructure and data center which run on virtual computing resources in the form of virtual machine. The large scale usage of virtualization to achieve cloud infrastructure brings additional security burden for tenants of a public cloud service. In this paper, we primarily aim to achieve better data integrity verification technique and help users to utilize Data as a Service (Daas) in Cloud computing. The experimental results are included in order to show the effectiveness of the proposed method for data integrity verification.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
Keywords
References
Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable Data Possession at Untrusted Stores. In: Proc. 14th ACM Conf. Computer and Comm. Security, pp. 598–609. ACM (2007)
Ateniese, G., Pietro, R.D., Mancini, L.V., Tsudik, G.: Scalable and efficient provable data possession. In: ACM SecureCom (2008)
Sebe, F., Domingo-Ferrer, J., Martinez-Balleste, A., Deswarte, Y., Quisquater, J.-J.: Efficient Remote Data Possession Checking in Critical Information Infrastructures. IEEE Trans. Knowledge and Data Eng. 20(8), 1034–1038 (2008)
Erway, C., Kupcu, A., Papamanthou, C., Tamassia, R.: Dynamic Provable Data Possession. In: Proc. 16th ACM Conf. Computer and Communication Security (CCS 2009), pp. 213–222 (2009)
Chen, L.: Using algebraic signatures to check data possession in cloud storage. Future Generation Computer Systems (December 2012)
Juels, A., Kaliski, B.S.: PORs: Proofs of retrievability for large files. In: ACM Conf. Computer and Comm. Security (2007)
Shacham, H., Waters, B.: Compact Proofs of Retrievability. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 90–107. Springer, Heidelberg (2008)
Dodis, Y., Vadhan, S.P., Wichs, D.: Proofs of retrievability via hardness amplification. In: ACM TCC-2009, pp. 109–127 (2009)
Bowers, K.D., Juels, A., Oprea, A.: Proofs of retrievability: Theory and implementation. In: ACM Workshop on Cloud Computing Security, pp. 43–45 (2009)
Bowers, K.D., Juels, A., Oprea, A.: HAIL: A high-availability and integrity layer for cloud storage. In: Proc. 16th ACM Conference on Computer and Communications Security, pp. 187–198 (2009)
Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing. In: Proc. IEEE INFOCOM. IEEE (2010)
Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing. IEEE Transactions on Parallel and Distributed Systems 22(5), 847–859 (2011)
Hao, Z., Zhong, S., Yu, N.: A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability. IEEE Transactions on Knowledge and Data Engineering 23(9) (September 2011)
Zhu, Y., Wang, H., Hu, Z., Ahn, G.-J., Hu, H., Yau, S.S.: Cooperative Provable Data Possession. In: Cryptology ePrint Archive, Report 2012/234, pp. 257–265 (2012)
Schwarz, T.J.E., Miller, E.L.: Store, forget, and check: using algebraic signatures to check remotely administered storage. In: Proc. of ICDCS 2006, p. 12 (2006)
Litwin, W., Schwarz, T.J.E.: Algebraic signatures for scalable, distributed data structures. In: ICDE 2004, Boston, MA, pp. 412–423 (2004)
Chen, L., Guo, G.: An efficient remote data possession checking in cloud storage. JDCTA: International Journal of Digital Content Technology and its Applications 5(4), 43–50 (2011)
Saxena, R., Ruj, S., Sarma, M.: Collaborative Model for Privacy Preservation and Data Integrity Verification in Cloud Computing. In: Proceedings of the Security and Privacy Symposium, IIT Kanpur, Kanpur, India, February 28-March 2 (2013)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Saxena, R., Dey, S. (2014). Collaborative Approach for Data Integrity Verification in Cloud Computing. In: Martínez Pérez, G., Thampi, S.M., Ko, R., Shu, L. (eds) Recent Trends in Computer Networks and Distributed Systems Security. SNDS 2014. Communications in Computer and Information Science, vol 420. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-54525-2_1
Download citation
DOI: https://doi.org/10.1007/978-3-642-54525-2_1
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-54524-5
Online ISBN: 978-3-642-54525-2
eBook Packages: Computer ScienceComputer Science (R0)