TPA Ensuring Data Integrity in Cloud Environment
Keywords:
audit, cloud, integrity, station to station protocol, SHA-2, third party auditor, XOR
Abstract
Cloud computing is an internet based computing where virtual shared servers provide software, infrastructure, platform and other resources to customers on a pay-as-you-use basis. In one of the services offered by cloud viz. Storage as a Service, users outsource their data to cloud without having direct possession or control on it. Storage of large data in cloud reduces costs and maintenance. But the customer is unaware of the storage location. Here risk involved is modification of data or tampering of data. In this paper we propose a data correctness scheme in which Third Party can audit the data stored in the cloud and assure the customer that the data is safe. Hence we implemented a scheme for verifying integrity of data. Such verification systems prevent the cloud storage archives (storage) from misrepresenting or modifying the data stored by using frequent checks on the storage archives.
Downloads
- Article PDF
- TEI XML Kaleidoscope (download in zip)* (Beta by AI)
- Lens* NISO JATS XML (Beta by AI)
- HTML Kaleidoscope* (Beta by AI)
- DBK XML Kaleidoscope (download in zip)* (Beta by AI)
- LaTeX pdf Kaleidoscope* (Beta by AI)
- EPUB Kaleidoscope* (Beta by AI)
- MD Kaleidoscope* (Beta by AI)
- FO Kaleidoscope* (Beta by AI)
- BIB Kaleidoscope* (Beta by AI)
- LaTeX Kaleidoscope* (Beta by AI)
How to Cite
References
Published
2013-07-15
Issue
Section