A Scalable Privacy-Preserving Verification Correctness Protocol to Identify Corrupted Data in Cloud Storage

Abstract

Cloud computing prevails over the whole world which makes the mankind to rely more on a number of online storage systems to back up data or for using it in real time which gives an anywhere, anytime access. Thus lot of sensitive data will be stored into the cloud. As the user’s data are stored and maintained out of user’s premises, these services bring with it, concerns of security vulnerabilities for all the services provided by them. There is a lot of research being done to point out the issues with the service providers and cloud security in general. This paper provides a privacy-preserving data integrity protection by enabling public auditability for cloud storage and implements a scalable framework that addresses the construction of an interactive audit protocol to prevent the fraudulence of prover and the leakage of verified data in cloud storage by reducing the overhead in computation, communication and storage. Thus it provides a lightweight, efficient and privacy –preserving auditing scheme which will also identifies the corrupted data. The framework is based on an interactive PDP protocol that uses the challenge – response algorithms and a verification protocol. The protocol supports dynamic operation that allows the granted users to perform insertion, deletion and updation. The protocol allows a Third party Auditor who works on behalf of the Data owner who has a large amount of data to be stored in the cloud, to manage or monitor outsourced data. The experimental results show that the protocol is efficient, lightweight and privacy-preserving

Authors and Affiliations

Neethu Mariam Joseph, , Esther Daniel, , Vasanthi N A

Keywords

Related Articles

Evaluating QOSMOS Using Markov Decision Process Model  

Service discovery has been recognized as an important aspect in the development of service centric systems, i.e., software systems which deploy web services. To develop such systems, it is necessary to identify ser...

P300 based Brain Computer Interface for Disabled 

A Brain Computer Interface (BCI) is a communication system that translates brain signals into commands for a computer. BCI is a communication system that recognizes user’s command only from his or her brainwaves...

Biclustering for Microarray Data: A Short and Comprehensive Tutorial  

This paper presents a quick and very comprehensive tutorial on biclustering for the analysis of gene expression data obtained from microarray experiments. The results obtained from the conventional clustering methods...

Remote Monitoring, Controlling and Lost Hardware Detecting through GSM

The project aims to develop various network utilities which are required to effectively monitor, control via GSM and to provide security to a LAN network. It aims to develop an integrated software solution that allows a...

Determination of optimum coefficients of IIR Digital Butterworth Band-Stop Filter 

Infinite Impulse Response(IIR) filter is of recursive type i.e. the present output sample depends on the present input samples, past input samples and past output samples. There are a number of methods available...

Download PDF file
  • EP ID EP156965
  • DOI -
  • Views 90
  • Downloads 0

How To Cite

Neethu Mariam Joseph, , Esther Daniel, , Vasanthi N A (2013). A Scalable Privacy-Preserving Verification Correctness Protocol to Identify Corrupted Data in Cloud Storage. International Journal of Advanced Research in Computer Engineering & Technology(IJARCET), 2(3), 951-956. https://europub.co.uk/articles/-A-156965