Introduction of cloud storage service has made the users to access their data anywhere anytime without any trouble. Available systems that provide support for the remote data integrity are useful for quality of service testing but do not deal with server failure or handling misbehaving servers. The proposed system ensures storage integrity in the server where the cloud user's data is stored. It achieves strong cloud storage security and fast data error localization with the results provided by the auditing mechanism that is carried out by the Third Party Auditor. Also it further supports secure and efficient dynamic operations on outsourced data. Third Party Auditor carries out the public auditing in-order to maintain the integrity for the data stored in cloud. The user delegates the integrity checking tasks of the data stored in the cloud storage to the Third Party Auditor, who then does the auditing process. Reed Solomon Erasure correcting code is used in the file distribution and dependability against Byzantine failure. Data integrity in ensured with the help of verification key along with erasure coded data which also allows handling of storage correctness and identification of misbehaving cloud server. The audit protocol blocker is introduced to monitor the correctness of the user and Third Party Auditor. It prevents the cloud users from misusing the privileges that are provided to them by the cloud server.
[1]
Cong Wang,et al.
Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
,
2011,
IEEE Transactions on Parallel and Distributed Systems.
[2]
Cong Wang,et al.
Security Challenges for the Public Cloud
,
2012,
IEEE Internet Computing.
[3]
D. Pratiba,et al.
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
,
2013
.
[4]
Mary Baker,et al.
Auditing to Keep Online Storage Services Honest
,
2007,
HotOS.
[5]
Ari Juels,et al.
Proofs of retrievability: theory and implementation
,
2009,
CCSW '09.
[6]
Cong Wang,et al.
Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing
,
2009,
ESORICS.
[7]
Yevgeniy Dodis,et al.
Proofs of Retrievability via Hardness Amplification
,
2009,
IACR Cryptol. ePrint Arch..
[8]
Cong Wang,et al.
Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing
,
2010,
2010 Proceedings IEEE INFOCOM.
[9]
Cong Wang,et al.
Toward publicly auditable secure cloud data storage services
,
2010,
IEEE Network.
[10]
Zoe L. Jiang,et al.
Privacy-Preserving Public Auditing for Secure Cloud Storage
,
2013,
IEEE Transactions on Computers.