IMPLEMENTATION OF EFFECTIVE SYSTEM FOR CONSISTENT DATA VERIFICATION

D.Venkat Nikhil Kumar, D.Koteswara Rao, Dr. J.Sasi Kiran

Abstract


The environment of cloud computing has developed into an essential subject in quite a lot of areas. The distributed storage as well as integrity checking is necessary for a common situation, when client build up his information on the servers of multi-cloud.  Procedure of integrity checking has to be practical to make it appropriate in support of capacity-limited end devices thus, based on distributed computation, we will learn distributed model of remote data integrity checking and put forward the corresponding concrete procedure in multi-cloud storage. Hence in our work we initiate novel confirmation model of remote data integrity known identity-based distributed provable data possession within multi-cloud storage. A concrete identity-based protocol of distributed provable data possession protocol is considered based on bilinear pairings. On the basis of client’s authorization, proposed procedure can understand private verification, delegated verification as well as public verification. The projected method is provably resourceful and protected. Besides structural advantage of elimination of certificate management, identity-based protocol of distributed provable data possession is additionally proficient and flexible. To enhance the efficacy, identity-based provable data possession is more striking and thus, more helpful to study.

Keywords


Cloud computing, Integrity checking, Multi-cloud, Identity-basis distributed provable data possession.

References


Z. Hao, N. Yu, “A Multiple-Replica Remote Data Possession Checking Protocol with Public Verifiability”, 2010 Second International Symposium on Data, Privacy, and E-Commerce, pp. 84-89, 2010.

A. F. Barsoum, M. A. Hasan, “On Verifying Dynamic Multiple Data Copies over Cloud Servers”, IACR eprint report 447, 2011. Available at http://eprint.iacr.org/2011/447.pdf.

A. Juels, B. S. Kaliski Jr., “PORs: Proofs of Retrievability for Large Files”, CCS’07, pp. 584-597, 2007.

Y. Zhu, H. Wang, Z. Hu, G. J. Ahn, H. Hu, “Zero-Knowledge Proofs of Retrievability”, Sci China Inf Sci, 54(8), pp. 1608-1617, 2011.

C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing”, INFOCOM 2010, IEEE, March 2010.

Q. Wang, C. Wang, K. Ren, W. Lou, J. Li, “Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing”, IEEE Transactions on Parallel And Distributed Systems , 22(5), pp. 847-859, 2011.


Full Text: PDF

Refbacks

  • There are currently no refbacks.




Copyright © 2012 - 2018, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.