Securing Cloud Data Storage

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2012, Vol 1, Issue 6

Abstract

 Innovations are necessary to ride the inevitable tide of change. Most of enterprises are striving to reduce their computing cost through the means of virtualization. This demand of reducing the computing cost has led to the innovation of Cloud Computing. One fundamental aspect of this new computing is that data is being centralized or outsourced into the cloud. From the data owners perspective, including both individuals and IT enterprises, storing data remotely in a cloud in a flexible on-demand manner brings appealing benefits: relief of the burden of storage management, universal data access with independent geographical locations, and avoidance of capital expenditure on hardware, software, personnel maintenance, and so on although the infrastructures under the cloud are much more powerful and reliable than personal computing devices, they still face a broad range of both internal and external threats to data integrity. Outsourcing data into the cloud is economically attractive for the cost and complexity of long-term large scale data storage, it does not offer any guarantee on data integrity and availability. We propose a distributed scheme to ensure users that their data are indeed stored appropriately and kept intact all the time in the cloud. We are using erasure correcting code in the file distribution preparation to provide redundancies. We are relaying on challenge response protocol along with pre-computed tokens to verify the storage correctness of user’s data & to effectively locate the malfunctioning server when data corruption has been detected. Our scheme maintains the same level of storage correctness assurance even if users modify, delete or append their data files in the cloud.

Authors and Affiliations

S. P Jaikar

Keywords

Related Articles

Dynamic and transparent seat allocation using QR Code in a Mobile Application

Abstract: Indian Railway is world’s largest human transport system which is currently dealing with a lot of problems, such as availability of confirming seat to waiting list passengers after its departure. Moreover, ther...

 Enhanced Decision Tree Algorithm for Data Streams using adaptation of Concept Drift

 Abstract: Construction of a decision tree is a well researched problem in data mining. Mining of streaming data is a very useful and necessary application. Algorithms such as VFDT and CVFDT are used for decision tr...

 Secure Transmission of Record after Record Linkage for Crime Detection Using AES

 Abstract:In many applications like crime detection, health sector, taxation sector etc… record linkage is used to find out the matched data items from different data sources. Finding matched records from different...

A Critical Analysis of Knowledge Management in E-Learning

The integration of knowledge management (Klick) and e-encyclopaedism (Altitude) become inevitable day by day. KM coating focuses in providing institutions with prick to enrich knowledge, while the EL focuses on managing...

 Computational Method for Forensic Verification of offline Signatures

 Signature verification models based on personal model have been reported by many researchers in past but the method proposed here is a forensic document examination approach using computational methods, unlike ot...

Download PDF file
  • EP ID EP141064
  • DOI -
  • Views 97
  • Downloads 0

How To Cite

S. P Jaikar (2012).  Securing Cloud Data Storage. IOSR Journals (IOSR Journal of Computer Engineering), 1(6), 43-49. https://europub.co.uk/articles/-A-141064