Corpus ID: 212468852

Data Storage and Data Integrity in Multi-Cloud Storage

  title={Data Storage and Data Integrity in Multi-Cloud Storage},
  author={Priyanka V. Mogre and Girish Agarwal and Pragati N. Patil},
Cloud computing is used to store data from various resources by the user. It is difficult for the user to store entire data within the system; therefore clouds are formed to store the user data. User can store as much large amount of the data as user wants. This data stored in the cloud must be integrated, the integrity of the data is thus has to be checked and maintain with the help of Trusted third party. Only trusted third party has the authority to check and to maintain the integrity f the… Expand


Data integrity proofs in cloud storage
  • R. Kumar, A. Saxena
  • Computer Science
  • 2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011)
  • 2011
This paper provides a scheme which gives a proof of data integrity in the cloud which the customer can employ to check the correctness of his data in thecloud and can be incorporated in the Service level agreement (SLA). Expand
Data Security And Its Techniques In Cloud Storage – A Review
This review paper will study, analyse and review techniques for data security, which could be beneficial for the platform cloud computing by providing security in cloud storage. Expand
Efficient Integrity Checking Technique for Securing Client Data in Cloud Computing
This paper introduces a model for the integrity checking over the cloud computing with the support of the TPA using digital signature technique and the proposed model result was shown efficiently with a number of situations that performed by unauthorized attackers. Expand
Survey Paper on Security & Privacy Issues in Cloud Storage Systems
We are increasingly relying on a number of online file storage systems to back up our data or use it as a collaborative tool in real time. All these services bring with it a fair share of securityExpand
Ensuring User Security and Data Integrity in Multi- Cloud
The most common method used for user security is textual passwords. But they are vulnerable to eves dropping, dictionary attack, shoulder surfing etc. To address this problem, text can be combinedExpand
Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage
This paper addresses the construction of an efficient PDP scheme for distributed cloud storage to support the scalability of service and data migration, in which it considers the existence of multiple cloud service providers to cooperatively store and maintain the clients' data. Expand
Scalable and efficient provable data possession
This paper constructs a highly efficient and provably secure PDP technique based entirely on symmetric key cryptography, while not requiring any bulk encryption, and allows outsourcing of dynamic data, i.e, it efficiently supports operations, such as block modification, deletion and append. Expand
A Security Protocol for Self-Organizing Data Storage
The proposed verification protocol, which goes beyond simple integrity checks and proves data conservation, is deterministic, efficient, and scalable, and makes it possible to personalize replicas and to delegate verification without revealing any secret information. Expand
Provable data possession at untrusted stores
The model generates probabilistic proofs of possession by sampling random sets of blocks from the server, which drastically reduces I/O costs and the overhead at the server is low (or even constant), as opposed to linear in the size of the data. Expand
Zero-knowledge proofs of retrievability
This paper proposes the first interactive POR scheme to prevent the fraudulence of prover and the leakage of verified data, and gives full proofs of soundness and zero-knowledge properties by constructing a polynomialtime rewindable knowledge extractor under the computational Diffie-Hellman assumption. Expand