Abstract
The use of cloud computing has increased rapidly in many organizations. Cloud computing provides many benefits in terms of low cost and accessibility of data. Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centers, where the management of the data and services may not be fully trustworthy. The major advantage with this technology is it is cost efficient. But there follows a key disadvantage associated with it, the disadvantage with it is the security issues related to the data stored on clouds. We have first identified the potential security problems and the difficulties with fully extension of data dynamics in the cloud and service availability. While prior works ensure remote data integrity, they lack public verifiability and data availability. Hence the aim here is to ensure data integrity with public verifiability and availability. We have constructed an elegant verification with access rights scheme for seamless integration of these two salient features in our protocol design. This paper in particular tries to achieve public verifiability by manipulating the classic Merkle Hash Tree and moving towards multi clouds or in other words inter-clouds which has emerged recently. We have tried to assure data availability by adopting DepSky System model for multi-clouds.
Similar content being viewed by others
References
AlZain MA, Pardede E, Soh B, Thom JA (2012) Cloud computing security: from single to multi-clouds. In: Proceedings of the 45th international Hawaii conference on system sciences
Andre FM (2010) Availability and confidentiality in storage clouds. MS in Information Technology-Information Security, Information networking Institute, Carnegie Mellon University, December 2010
Bessani A, Correia M, Quaresma B, André F, Sousa P (2011) DEPSKY: Dependable and secure storage in a cloud-of-clouds. University of Lisbon, Faculty of Sciences, Portugal
Cachin C, Keidar I, Shraer A (2009) Trusting the cloud. ACM SIGACT News 40:81–86
Ederov B (2007) Merkle tree traversal techniques. Bachelor Thesis, Darmstadt University of Technology, Department of Computer Science Cryptography and Computer Algebra, April 2007
JaisonVimalraj T, Manoj M (2012) Enabling public verifiability and data dynamics for storage security in cloud computing. Dhanalakshmi Srinivasan Engineering College, India
Kamara S, Lauter K (2010) Cryptographic cloud storage. In: C’10: Proceedings of the 14th international conference on financial cryptography and data security, pp 136–149
Rocha F, Correia M (2011) Lucy in the sky without diamonds: stealing confidential data in the cloud. In: Proceedings of the 1st international workshop of dependability of clouds, data centers and virtual computing environments, pp 1–6
Singh Y, Kandah F, Zhang W (2011) A secured cost-effective multi-cloud storage in cloud computing. Department of Computer Science, North Dakota State University, Fargo, ND 58105 IEEE INFOCOM 2011 Workshop on cloud computing
Subashini S, Kavitha V (2011) A survey on security issues in service delivery models of cloud computing. J Netw Comput Appl 34(1):1–11
Tribhuwan MR, Bhuyar VA, Pirzade S (2010) Ensuring data storage security in cloud computing through two way handshake based on token management. In: 2010 International conference on advances in recent technologies in communication computing. IEEE Society
Wang Q, Wang C, Li J, Ren K, Lou W (2009a) Enabling public verifiability and data dynamics for storage security in cloud computing. Supported in part by the US National Science Foundation under grant CNS-0831963, CNS-0626601, CNS-0716306, CNS-0831628 and CNS-0716302
Wang Q, Wang C, Li J, Ren K, Lou W (2009b) Enabling public verifiability and data dynamics for storage security in cloud computing. In: Proceedings of US national science foundation under Grant CNS-0831963, CNS-0626601, CNS-0716306, CNS-0831628 and CNS-0716302
Wang C, Wang Q, Ren K, Lou W (2010) Ensuring data storage security in cloud computing. In: ARTCOM’10: Proceedings of the international conference on advances in recent technologies in communication and computing, pp 1–9
NIST. http://www.nist.gov/itl/cloud/. Accessed 15 Nov 2012
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Jogdand, R.M., Goudar, R.H., Sayed, G.B. et al. Enabling public verifiability and availability for secure data storage in cloud computing. Evolving Systems 6, 55–65 (2015). https://doi.org/10.1007/s12530-013-9095-4
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12530-013-9095-4