Preview

Data Integrity Proofs in Cloud Computing

Powerful Essays
Open Document
Open Document
3120 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Data Integrity Proofs in Cloud Computing
Data Integrity Proofs in Cloud Storage
Sravan Kumar R

Ashutosh Saxena

Software Engineering and
Technology labs
Infosys Technologies Ltd
Hyderabad, India
Email: sravan r@infosys.com

Software Engineering and
Technology labs
Infosys Technologies Ltd
Hyderabad, India
Email: ashutosh saxena01@infosys.com

Abstract—Cloud computing has been envisioned as the de-facto solution to the rising storage costs of IT Enterprises. With the high costs of data storage devices as well as the rapid rate at which data is being generated it proves costly for enterprises or individual users to frequently update their hardware. Apart from reduction in storage costs data outsourcing to the cloud also helps in reducing the maintenance. Cloud storage moves the user’s data to large data centers, which are remotely located, on which user does not have any control. However, this unique feature of the cloud poses many new security challenges which need to be clearly understood and resolved.
One of the important concerns that need to be addressed is to assure the customer of the integrity i.e. correctness of his data in the cloud. As the data is physically not accessible to the user the cloud should provide a way for the user to check if the integrity of his data is maintained or is compromised. In this paper we provide a scheme which gives a proof of data integrity in the cloud which the customer can employ to check the correctness of his data in the cloud. This proof can be agreed upon by both the cloud and the customer and can be incorporated in the Service level agreement (SLA). This scheme ensures that the storage at the client side is minimal which will be beneficial for thin clients.

I. I NTRODUCTION
Data outsourcing to cloud storage servers is raising trend among many firms and users owing to its economic advantages. This essentially means that the owner (client) of the data moves its data to a third party cloud storage server which
is

You May Also Find These Documents Helpful

  • Satisfactory Essays

    | This is customer support and technical support, and the people who do the customer billing. They are also the designers of the sites and responsible for creating sites that match the needs of the customers.…

    • 281 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    users, but if you were on a different operating system products or services would cost more.…

    • 500 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    user’s account. By signing in, the user automatically tells the website to keep track of all…

    • 273 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    * Composed of customers or clients and those who work in other organizations similar to yours…

    • 422 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    U2 Assessment

    • 5321 Words
    • 18 Pages

    b) Identify the external and/or internal customers who buy / use these products / services.…

    • 5321 Words
    • 18 Pages
    Good Essays
  • Better Essays

    Org 581

    • 1304 Words
    • 6 Pages

    On the outside are the clients that are loyal and are given ownership in that the…

    • 1304 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    The individual customer who does not feel comfortable preparing his or her own taxes and would trust this service to a professional.…

    • 4326 Words
    • 18 Pages
    Powerful Essays
  • Powerful Essays

    b) Identify the external and/or internal customers who buy / use these products / services.…

    • 5799 Words
    • 24 Pages
    Powerful Essays
  • Powerful Essays

    administration

    • 3312 Words
    • 14 Pages

    b) Identify the external and/or internal customers who buy / use these products / services.…

    • 3312 Words
    • 14 Pages
    Powerful Essays
  • Satisfactory Essays

    customers, and that is their point of contact with customers, they could be at an advantage…

    • 265 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    A Digital Proof

    • 503 Words
    • 3 Pages

    This is he incorrect to do this because there is a one in box two and more than one two is used in the boxes. Likewise, there is a…

    • 503 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    owner. A phone is a personal possession that should not be used for the benefit of others. This…

    • 625 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Abstract—This paper discusses the security issues that arise in a cloud computing framework. We concentrate on what is typically called the metering problem or “proof of work” where the client can ascertain that the amount it is being billed for by the cloud service is in accordance with the amount of work done by it. We define many different attack scenarios and propose counter schemes for each. Our simulation and theoretical analysis show that the schemes require a reasonably low verification effort at the client side, and provide non-repudiation property.…

    • 4041 Words
    • 17 Pages
    Powerful Essays
  • Good Essays

    Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that users' data are usually processed remotely in unknown machines that users do not own or operate. While enjoying the convenience brought by this new emerging technology, users' fears of losing control of their own data (particularly, financial and health data) can become a significant barrier to the wide adoption of cloud services. To address this problem, in this project, we propose a novel highly decentralized information accountability framework to keep track of the actual usage of the users' data in the cloud. Our proposed CIA framework provides end-toend accountability in a highly distributed fashion. One of the main innovative features of the CIA framework lies in its ability of maintaining lightweight and powerful accountability that combines aspects of access control, usage control and authentication In particular, we propose an object-centered approach that enables enclosing our logging mechanism together with users' data and policies. By means of the CIA, data owners can track not only whether or not the service-level agreements are being honored, but also enforce access and usage control rules as needed. Associated with the accountability feature, We leverage the JAR programmable capabilities to both create a dynamic and traveling object, and to ensure that any access to users' data will trigger authentication and automated logging local to the JARs. To strengthen user's control, we also provide distributed auditing mechanisms. We provide extensive experimental studies that demonstrate the efficiency and effectiveness of the proposed approaches.Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis.…

    • 300 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Cloud computing has been envisioned as the de-facto solution to the rising storage costs of IT Enterprises. With the high costs of data storage devices as well as the rapid rate at which data is being generated it proves costly for enterprises or individual users to frequently update their hardware. Apart from reduction in storage costs data outsourcing to the cloud also helps in reducing the maintenance. Cloud storage moves the user’s data to large data centers, which are remotely located, on which user does not have any control. However, this unique feature of the cloud poses many new security challenges which need to be clearly understood and resolved. We provide a scheme which gives a proof of data integrity in the cloud which the customer can employ to check the correctness of his data in the cloud. This proof can be agreed upon by both the cloud and the customer and can be incorporated in the Service level agreement (SLA).…

    • 6658 Words
    • 27 Pages
    Powerful Essays