Academic Journals Database
Disseminating quality controlled scientific knowledge

A Scalable Privacy-Preserving Verification Correctness Protocol to Identify Corrupted Data in Cloud Storage

ADD TO MY LIST
 
Author(s): Neethu Mariam Joseph | Esther Daniel | Vasanthi N A

Journal: International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
ISSN 2278-1323

Volume: 2;
Issue: 3;
Start page: 951;
Date: 2013;
VIEW PDF   PDF DOWNLOAD PDF   Download PDF Original page

Keywords: Auditing | Cloud Computing | Cloud Storage | Privacy

ABSTRACT
Cloud computing prevails over the whole world which makes the mankind to rely more on a number of online storage systems to back up data or for using it in real time which gives an anywhere, anytime access. Thus lot of sensitive data will be stored into the cloud. As the user’s data are stored and maintained out of user’s premises, these services bring with it, concerns of security vulnerabilities for all the services provided by them. There is a lot of research being done to point out the issues with the service providers and cloud security in general. This paper provides a privacy-preserving data integrity protection by enabling public auditability for cloud storage and implements a scalable framework that addresses the construction of an interactive audit protocol to prevent the fraudulence of prover and the leakage of verified data in cloud storage by reducing the overhead in computation, communication and storage. Thus it provides a lightweight, efficient and privacy –preserving auditing scheme which will also identifies the corrupted data. The framework is based on an interactive PDP protocol that uses the challenge – response algorithms and a verification protocol. The protocol supports dynamic operation that allows the granted users to perform insertion, deletion and updation. The protocol allows a Third party Auditor who works on behalf of the Data owner who has a large amount of data to be stored in the cloud, to manage or monitor outsourced data. The experimental results show that the protocol is efficient, lightweight and privacy-preserving.
Save time & money - Smart Internet Solutions      Why do you need a reservation system?