Skip to main content
Log in

Enabling public verifiability and availability for secure data storage in cloud computing

  • Original Paper
  • Published:
Evolving Systems Aims and scope Submit manuscript

Abstract

The use of cloud computing has increased rapidly in many organizations. Cloud computing provides many benefits in terms of low cost and accessibility of data. Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centers, where the management of the data and services may not be fully trustworthy. The major advantage with this technology is it is cost efficient. But there follows a key disadvantage associated with it, the disadvantage with it is the security issues related to the data stored on clouds. We have first identified the potential security problems and the difficulties with fully extension of data dynamics in the cloud and service availability. While prior works ensure remote data integrity, they lack public verifiability and data availability. Hence the aim here is to ensure data integrity with public verifiability and availability. We have constructed an elegant verification with access rights scheme for seamless integration of these two salient features in our protocol design. This paper in particular tries to achieve public verifiability by manipulating the classic Merkle Hash Tree and moving towards multi clouds or in other words inter-clouds which has emerged recently. We have tried to assure data availability by adopting DepSky System model for multi-clouds.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  • AlZain MA, Pardede E, Soh B, Thom JA (2012) Cloud computing security: from single to multi-clouds. In: Proceedings of the 45th international Hawaii conference on system sciences

  • Andre FM (2010) Availability and confidentiality in storage clouds. MS in Information Technology-Information Security, Information networking Institute, Carnegie Mellon University, December 2010

  • Bessani A, Correia M, Quaresma B, André F, Sousa P (2011) DEPSKY: Dependable and secure storage in a cloud-of-clouds. University of Lisbon, Faculty of Sciences, Portugal

  • Cachin C, Keidar I, Shraer A (2009) Trusting the cloud. ACM SIGACT News 40:81–86

    Article  Google Scholar 

  • Ederov B (2007) Merkle tree traversal techniques. Bachelor Thesis, Darmstadt University of Technology, Department of Computer Science Cryptography and Computer Algebra, April 2007

  • JaisonVimalraj T, Manoj M (2012) Enabling public verifiability and data dynamics for storage security in cloud computing. Dhanalakshmi Srinivasan Engineering College, India

  • Kamara S, Lauter K (2010) Cryptographic cloud storage. In: C’10: Proceedings of the 14th international conference on financial cryptography and data security, pp 136–149

  • Rocha F, Correia M (2011) Lucy in the sky without diamonds: stealing confidential data in the cloud. In: Proceedings of the 1st international workshop of dependability of clouds, data centers and virtual computing environments, pp 1–6

  • Singh Y, Kandah F, Zhang W (2011) A secured cost-effective multi-cloud storage in cloud computing. Department of Computer Science, North Dakota State University, Fargo, ND 58105 IEEE INFOCOM 2011 Workshop on cloud computing

  • Subashini S, Kavitha V (2011) A survey on security issues in service delivery models of cloud computing. J Netw Comput Appl 34(1):1–11

    Article  Google Scholar 

  • Tribhuwan MR, Bhuyar VA, Pirzade S (2010) Ensuring data storage security in cloud computing through two way handshake based on token management. In: 2010 International conference on advances in recent technologies in communication computing. IEEE Society

  • Wang Q, Wang C, Li J, Ren K, Lou W (2009a) Enabling public verifiability and data dynamics for storage security in cloud computing. Supported in part by the US National Science Foundation under grant CNS-0831963, CNS-0626601, CNS-0716306, CNS-0831628 and CNS-0716302

  • Wang Q, Wang C, Li J, Ren K, Lou W (2009b) Enabling public verifiability and data dynamics for storage security in cloud computing. In: Proceedings of US national science foundation under Grant CNS-0831963, CNS-0626601, CNS-0716306, CNS-0831628 and CNS-0716302

  • Wang C, Wang Q, Ren K, Lou W (2010) Ensuring data storage security in cloud computing. In: ARTCOM’10: Proceedings of the international conference on advances in recent technologies in communication and computing, pp 1–9

  • NIST. http://www.nist.gov/itl/cloud/. Accessed 15 Nov 2012

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rashmi M. Jogdand.

Appendix

Appendix

See Figs. 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15 and 16.

Fig. 4
figure 4

View of home page

Fig. 5
figure 5

Window to browse the file to upload on the virtual cloud/server

Fig. 6
figure 6

Browse and click on Upload Button to upload files

Fig. 7
figure 7

View of the Uploads folder in the virtual server after uploading file

Fig. 8
figure 8

View of Store folder after zipping the folder in the virtual server

Fig. 9
figure 9

View of Archives folder where files are merged on retrieval request

Fig. 10
figure 10

Click the “Owned Files” Button list of owned files is displayed to view/update/delete/verifyScreen after clicking “View” button

Fig. 11
figure 11

Screen after clicking “Update” button

Fig. 12
figure 12

Screen after clicking “Verify” Button

Fig. 13
figure 13

Console Window showing Verification Result

Fig. 14
figure 14

Screen after clicking the “delete” button

Fig. 15
figure 15

Console window showing the deletion result

Fig. 16
figure 16

Screen displayed after clicking “Other Files” button

Rights and permissions

Reprints and permissions

About this article

Cite this article

Jogdand, R.M., Goudar, R.H., Sayed, G.B. et al. Enabling public verifiability and availability for secure data storage in cloud computing. Evolving Systems 6, 55–65 (2015). https://doi.org/10.1007/s12530-013-9095-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12530-013-9095-4

Keywords

Navigation