Securing Cloud Data Storage
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2012, Vol 1, Issue 6
Abstract
Innovations are necessary to ride the inevitable tide of change. Most of enterprises are striving to reduce their computing cost through the means of virtualization. This demand of reducing the computing cost has led to the innovation of Cloud Computing. One fundamental aspect of this new computing is that data is being centralized or outsourced into the cloud. From the data owners perspective, including both individuals and IT enterprises, storing data remotely in a cloud in a flexible on-demand manner brings appealing benefits: relief of the burden of storage management, universal data access with independent geographical locations, and avoidance of capital expenditure on hardware, software, personnel maintenance, and so on although the infrastructures under the cloud are much more powerful and reliable than personal computing devices, they still face a broad range of both internal and external threats to data integrity. Outsourcing data into the cloud is economically attractive for the cost and complexity of long-term large scale data storage, it does not offer any guarantee on data integrity and availability. We propose a distributed scheme to ensure users that their data are indeed stored appropriately and kept intact all the time in the cloud. We are using erasure correcting code in the file distribution preparation to provide redundancies. We are relaying on challenge response protocol along with pre-computed tokens to verify the storage correctness of user’s data & to effectively locate the malfunctioning server when data corruption has been detected. Our scheme maintains the same level of storage correctness assurance even if users modify, delete or append their data files in the cloud.
Authors and Affiliations
S. P Jaikar
Performance Evaluation of Ipv4, Ipv6 Migration Techniques
Abstract: The Internet Protocol Version 6 (IPv6) has gained popularity with companies,organizations andInternet service providers (ISPs) due to its enhancements over IPv4 such as (IPv6 128bit compared to ofipv4(32...
A New Approach to Compressed Image Steganography Using Wavelet Transform
Abstract : This paper proposes a novel steganographic technique that embeds compressed payload image within cover image. The pixel adjustment of the cover image is done optimally using Fourier Transform, so that visual c...
Educational Robot Task Virtual Model Transformation Into Real Environment
Abstract: We propose to extend the learning of programming basics in secondary school, creating an educational environment based on using virtual modelling of educational robot task and model’s transformation into real e...
Optimized Fuzzy Routing for MANET
temporary network without the aid of any established infrastructure of centralized administration. In suchenvironment, the nodes operate both as hosts as well as routers. Due to mobility, the topology of the networ...
Fixed-Rank Representation for Image Classification Using ANN and KNN
Abstract: This study is focused on development an application of an efficient algorithm for subspace clustering and feature extraction that used for classification. Some previous techniques for subspace clustering...