A Scalable Privacy-Preserving Verification Correctness Protocol to Identify Corrupted Data in Cloud Storage

Abstract

Cloud computing prevails over the whole world which makes the mankind to rely more on a number of online storage systems to back up data or for using it in real time which gives an anywhere, anytime access. Thus lot of sensitive data will be stored into the cloud. As the user’s data are stored and maintained out of user’s premises, these services bring with it, concerns of security vulnerabilities for all the services provided by them. There is a lot of research being done to point out the issues with the service providers and cloud security in general. This paper provides a privacy-preserving data integrity protection by enabling public auditability for cloud storage and implements a scalable framework that addresses the construction of an interactive audit protocol to prevent the fraudulence of prover and the leakage of verified data in cloud storage by reducing the overhead in computation, communication and storage. Thus it provides a lightweight, efficient and privacy –preserving auditing scheme which will also identifies the corrupted data. The framework is based on an interactive PDP protocol that uses the challenge – response algorithms and a verification protocol. The protocol supports dynamic operation that allows the granted users to perform insertion, deletion and updation. The protocol allows a Third party Auditor who works on behalf of the Data owner who has a large amount of data to be stored in the cloud, to manage or monitor outsourced data. The experimental results show that the protocol is efficient, lightweight and privacy-preserving

Authors and Affiliations

Neethu Mariam Joseph, , Esther Daniel, , Vasanthi N A

Keywords

Related Articles

Data mining with Improved and efficient mechanism to detect the Vulnerabilities using intrusion detection system 

Intrusion detection system must be capable of known and unknown vulnerabilities. We already studied the previous problems which includes detection of known vulnerabilities and unknown vulnerabilities. In order to obtai...

A SURVEY ON CLOUD DATA SECURITY USING ENCRYPTIOIN TECHNIQUE 

Cloud computing is an emerging computing paradigm in which resources of the computing infrastructures are provided as services of the internet. It allows consumers and business to use application without installation a...

Multipurpose Smartcard System  

To carry several cards one card can simultaneously be an ID, a credit card, a stored-value cash card, and a repository of personal information such as telephone numbers or medical history. Currently smart card im...

E- Commerce impact on Indian Market: a Survey on social impact

As 1991, once economic reforms unambiguously obtain place in India as a result of opening-up of the economy with a analysis to incorporate itself with the global economy, the require to assist international deal both dur...

Attacks & Preventions of Cognitive Radio Network-A Survey

In this paper we analyze and surveyed a latest communication technology named “Cognitive Radio Network”. Cognitive radio network is a network in which an un-licensed user can use an empty channel in a spectrum band of li...

Download PDF file
  • EP ID EP156965
  • DOI -
  • Views 68
  • Downloads 0

How To Cite

Neethu Mariam Joseph, , Esther Daniel, , Vasanthi N A (2013). A Scalable Privacy-Preserving Verification Correctness Protocol to Identify Corrupted Data in Cloud Storage. International Journal of Advanced Research in Computer Engineering & Technology(IJARCET), 2(3), 951-956. https://europub.co.uk/articles/-A-156965