Loading

To Assure Factual Information Storage Security in Cloud Computing
Archana M1, Shirisha K2, Bhavani V3
1Archana M, Computer Science and Engineering, Jawaharlal Nehru Technological University, Hyderabad, India.
2Shirisha K, Computer Science and Engineering, Jawaharlal Nehru Technological University, Hyderabad, India.
3Bhavani V, Computer Science and Engineering, Jawaharlal Nehru Technological University, Hyderabad, India.
Manuscript received on July 24, 2013. | Revised Manuscript received on August 17, 2013. | Manuscript published on August 30, 2013. | PP: 410-414 | Volume-2, Issue-6, August 2013.  | Retrieval Number: F2124082613/2013©BEIESP

Open Access | Ethics and Policies | Cite
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Cloud computing has evolved from virtualization, utility computing and client-server architectures and is an extension of service oriented architectures. It has been referred to as a disruptive technology which has implications on a host of issues such as licensing, scalability, cost and performance measures, privacy and security. We propose in this paper a flexible distributed storage integrity auditing mechanism, utilizing the homomorphic token and distributed erasure-coded data. Our method achieves the integrity of storage correctness guaranty and identification of misbehaving servers i.e. whenever data modifications or deletions have been detected during the storage correctness verification and error localization across cloud servers. The performance analysis shows that our scheme is more secure than existing system against Byzantine failure, unauthorized data modification attacks, and even cloud server colluding attacks.
Keywords: Cloud Computing, Data Storage Security, Error Localization, Pseudorandom Data.