Open Access Open Access  Restricted Access Subscription or Fee Access

Enabling Data Storage Security by Multiple Auditing Mechanism in Cloud Computing

B. Santhosh, M. Suguna

Abstract


Storing in cloud enables users to store their data remotely and retrieve on-demand whenever they needed without the burden of local hardware and software management. Though this computing technique is clear, such a service is also relinquishing users in the manner of security risks for their stored data, where they worry about correctness of data in cloud. In order to overcome this new problem and further achieve a secure and dependable storage service, In this paper we have proposed a flexible distributed storage with multiple third party auditing mechanism and utilizing the dynamic token computation, correctness verification, error localization algorithms to ensure the integrity of data stored. The auditing result not only ensures strong cloud storage, but also achieves the identification of misbehaving server.


Keywords


Data Integrity, Dependable Distributed Storage, Error Localization, Cloud Computing, Multiple Third Party Auditors

Full Text:

PDF

References


Cong Wang, Qian Wang, Kui Ren, “Towards Secure and Dependable Storage Services in Cloud Computing” in Proc. of IWQoS’09, July 2009.

C.Wang, Q.Wang, K.Ren and W.Lou, “Ensuring data storage security in cloud computing” in Proc. of IWQoS’09, July 2009,pp.1-9.

G.Ateniese, R.Burns, J.Herring, L.Kissner, Z.Peterson and D.Song, “Provable data possession at untrusted stores,” in Proc. Of CCS’07, Alexandria,VA, October 2007,pp. 598-609.

Q.Wang, C.Wang, J.Li,K.Ren and W.Lou, “Enabling public verifiability and data dynamics for storage security in cloud computing,” in Proc. Of ESORICS’09,volume 5789 of LNCS.Springer-Verlag,Sep.2009,pp.355-370.

M.A.Shah, M.Baker, J.C.Mogul and R.Swaminathan, “Auditing to keep online storage services honest,” in Proc. Of otOS’07. Berkeley, CA, USA:USENIX.

M.A.Shah, R.Swaminathan and M.Baker “Privacy-preserving audit and extraction of digital contents” Cryptology ePrint Archive, Report 2008/186,2008,http://eprint.iacr.org/.

Amazon.com, “Amazon web services (aws),” Online at http://aws.amazon.com/, 2009.

M. Arrington, “Gmail disaster: Reports of mass email deletions,” Online at http://www.techcrunch.com/2006/12/ 28/gmail-disaster reports-of-mass-email-deletions/, December 2006.

Amazon.com, “Amazon s3 availability event: July 20, 2008,” Online at http://status.aws.amazon.com/s3-20080720.html, July 2008.

S. Wilson, “Appengine outage,” Online at http://www.cio-weblog.com/50226711/appengine outage.php, June 2008.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.