Storage Data Security of Data in Cloud Computing

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 4

Abstract

 Abstract: Cloud Computing refers to the many different types of services and applications being delivered in the internet cloud, and the fact that, in many cases, the devices used to access these services and applications do not require any special applications. Cloud Computing has been moves the application software and databases to the centralized large data centers, where the management of the data and services may not be fully trustworthy. This brings the problem of ensuring the integrity of data storage in Cloud. Cloud computing share distributed resources via network in the open environment thus it makes security problem. we consider the task of allowing a third party auditor (TPA), on behalf of the cloud client, to verify the integrity of the dynamic data stored in the cloud. The introduction of TPA eliminates the involvement of the client through the auditing of whether his data stored in the cloud are indeed intact, which can be important in achieving economies of scale for Cloud Computing. The support for data dynamics via the most general forms of data operation, such as block modification, insertion, and deletion, is also a significant step toward practicality, since services in Cloud Computing are not limited to archive or backup data only. While prior works on ensuring remote data integrity often lacks the support of either public auditability or dynamic data operations, this paper achieves both. We first identify the difficulties and potential security problems of direct extensions with fully dynamic data updates from prior works and then show how to construct an elegant verification scheme for the seamless integration of these two salient features in our protocol design. In particular, to achieve efficient data dynamics, we improve the existing proof of storage models by manipulating the classic Merkle Hash Tree construction for block tag authentication.

Authors and Affiliations

Srinivasulu. B, , M M M Kumar Varma, , H. Swapna Rekha

Keywords

Related Articles

 Automatic Face Recognition Using Gabor Wavelet and Robust Structured Spares Representation

 Automatically facial recognition has become more and more important today. But FR still remains a challenge problem in computer vision .so in this paper we proposed a new approach that use Gabor wavelet for facial...

 Version Control in Open Source Software

 Abstract: open source software is software whose source code is freely available for anyone. The Open source software can be redistributed to others users and they can use it according to their own needs. Version C...

 Workflow Scheduling for Public Cloud Using Genetic Algorithm (WSGA

  Workflow scheduling is a challenging issue in Cloud Computing. Though there are popularschedulers available for workflow scheduling in Grid and other distributed environments, they are notapplicable to Cloud. Clou...

 A review of High Performance Computing

 Current high performance computing (HPC) applications are found in many consumers, industrial and research fields. There is a great deal more to remote sensing data than meets the eye, and extracting that inform...

 Towards a new ontology of the Moroccan Post-baccalaureatelearner profile for the E-orientation system “MMSyOrientation”

Abstract: Today E-orientation systems are interested in helping learners to choose a suitable branch to theirskills and preferences. In this context the research center within the University Hassan II Mohammedia AinChock...

Download PDF file
  • EP ID EP126737
  • DOI 10.9790/0661-16467177
  • Views 116
  • Downloads 0

How To Cite

Srinivasulu. B, , M M M Kumar Varma, , H. Swapna Rekha (2014).  Storage Data Security of Data in Cloud Computing. IOSR Journals (IOSR Journal of Computer Engineering), 16(4), 71-77. https://europub.co.uk./articles/-A-126737