scispace - formally typeset
Open AccessJournal Article

Replicated Data Integrity Verification in Cloud

Reads0
Chats0
TLDR
Some ideas under a Dynamic Multi-Replica Provable Data Possession scheme (DMR-PDP) that prevents the CSP from cheating; for example, by maintaining fewer copies than paid for are proposed.
Abstract
Cloud computing is an emerging model in which computing infrastructure resources are provided as a service over the Internet. Data owners can outsource their data by remotely storing them in the cloud and enjoy on-demand high quality applications and services from a shared pool of configurable computing resources. However, since data owners and cloud servers are not in the same trusted domain, the outsourced data may be at risk as the cloud server may no longer be fully trusted. Therefore, data integrity is of critical importance in such a scenario. Cloud should let either the owners or a trusted third party to audit their data storage without demanding a local copy of the data from owners. Replicating data on cloud servers across multiple data centers provides a higher level of scalability, availability, and durability. When the data owners ask the Cloud Service Provider (CSP) to replicate data at different servers, they are charged a higher fee by the CSP. Therefore, the data owners need to be strongly convinced that the CSP is storing all the data copies that are agreed upon in the service level contract, and the data-update requests issued by the customers have been correctly executed on all the remotely stored copies. To deal with such problems, previous multi copy verification schemes either focused on static files or incurred huge update costs in a dynamic file scenario. In this paper, we propose some ideas under a Dynamic Multi-Replica Provable Data Possession scheme (DMR-PDP) that prevents the CSP from cheating; for example, by maintaining fewer copies than paid for. DMR-PDP also supports efficient dynamic operations like block modification, insertion and deletion on data replicas over cloud servers.

read more

Citations
More filters
Journal ArticleDOI

Remote Data Auditing in Cloud Computing Environments: A Survey, Taxonomy, and Open Issues

TL;DR: This survey aims to investigate similarities and differences of such a framework on the basis of the thematic taxonomy to diagnose significant and explore major outstanding issues in the domain of the distributed clouds.
Journal ArticleDOI

Efficient integrity verification of replicated data in cloud using homomorphic encryption

TL;DR: In this article, the authors proposed a dynamic multi-replica provable data possession scheme (DMR-PDP) that while maintaining data confidentiality prevents the CSP from cheating, by maintaining fewer copies than paid for and/or tampering data.
Journal ArticleDOI

Overview of current techniques in remote data auditing

TL;DR: A comprehensive survey on techniques of remote data auditing in cloud server is presented and more and more remote auditing approaches are categorized into the three different classes, that is, replication-based, erasure coding- based, and network coding-based to present a taxonomy.
Journal ArticleDOI

A brief survey on replica consistency in cloud environments

TL;DR: In this paper, the authors present a survey of the major aspects related to consistency issues in cloud data storage systems, categorizing recently proposed methods into three categories: fixed consistency methods, configurable consistency methods and consistency monitoring methods.
Book ChapterDOI

Formal Modelling of Resilient Data Storage in Cloud

TL;DR: This paper formally derive a model of the proposed architectural solution and verify data integrity and consistency properties under possible failure scenarios and allows the designers to formally define and verify essential characteristics of architectures for handling large data stores.
References
More filters
Book ChapterDOI

Short Signatures from the Weil Pairing

TL;DR: A short signature scheme based on the Computational Diffie-Hellman assumption on certain elliptic and hyperelliptic curves is introduced, designed for systems where signatures are typed in by a human or signatures are sent over a low-bandwidth channel.
Proceedings ArticleDOI

Provable data possession at untrusted stores

TL;DR: The provable data possession (PDP) model as discussed by the authors allows a client that has stored data at an untrusted server to verify that the server possesses the original data without retrieving it.
Posted Content

Provable Data Possession at Untrusted Stores.

TL;DR: Ateniese et al. as discussed by the authors introduced the provable data possession (PDP) model, which allows a client that has stored data at an untrusted server to verify that the server possesses the original data without retrieving it.
Proceedings ArticleDOI

Scalable and efficient provable data possession

TL;DR: In this article, a provably secure storage outsourced data possession (PDP) technique based on symmetric key cryptography was proposed, which allows outsourcing of dynamic data, such as block modification, deletion and append.
Posted Content

Enabling Public Verifiability and Data Dynamics for Storage Security.

TL;DR: The task of allowing a third party auditor (TPA), on behalf of the cloud client, to verify the integrity of the dynamic data stored in the cloud is considered, and an elegant verification scheme is constructed for seamless integration of these two salient features in the protocol design.
Related Papers (5)