It has been widely observed that the concept of cloud computing is become one of major theory in the world of IT industry. It involves storing the user's data to be able to use the applications and services that the clouds introduce. There is a significant numbers of risks can be occurred. One of these risks that can attack the cloud computing is the integrity of the data stored in the cloud (2). In order to overcome the threat of integrity of the data, the user must be able to use the assistance of a Third Party Auditor (TPA). The TPA has an experience that clouds users does not have, and checks over the integrity that is difficult for the users to check. The user can handout the integrity checking mission to the TPA, in such a way that the TPA will not be able to manipulate with the client data with one way or another (5). In this paper, we will introduce a model for the integrity checking over the cloud computing with the support of the TPA using digital signature technique. The proposed model result was shown efficiently with a number of situations that performed by unauthorized attackers. The checking done over two parts the CSP and TPA, without giving any secure data that void the integrity definition and without uploading any secure data to the cloud.
[1]
P. Mell,et al.
The NIST Definition of Cloud Computing
,
2011
.
[2]
Mridula Angepat,et al.
Cloud Computing : Analysing the risks involved in cloud computing environments
,
2010
.
[3]
Mary Baker,et al.
Auditing to Keep Online Storage Services Honest
,
2007,
HotOS.
[4]
Radia J. Perlman,et al.
Network security - private communication in a public world
,
2002,
Prentice Hall series in computer networking and distributed systems.
[5]
Reza Curtmola,et al.
Provable data possession at untrusted stores
,
2007,
CCS '07.