Distributed scheme to authenticate data storage security in cloud computing
- 1. Sree Vidyanikethan Engineering College (Autonomus)
- 2. VIT University
Description
Cloud computing is the revolution in current generation IT enterprise displaces database and application software to the large data centers for IT services. In this paper, we designed and simulated an adaptable and efficient scheme to guarantee the correctness of user data stored in the cloud and also with some prominent features. Homomorphic token is used for distributed verification of erasure–coded data. By using this scheme, we can identify misbehaving servers. In spite of past works, our scheme supports effective and secure dynamic operations on data blocks such as data insertion, deletion and modification. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centers, where the data management and services may not be absolutely truthful. This effective security and performance analysis describes that the proposed scheme is extremely flexible against malicious data modification, convoluted failures and server clouding attacks.
Files
40 1475.pdf
Files
(479.4 kB)
Name | Size | Download all |
---|---|---|
md5:15264f30594ba049f0b274c948f8d60f
|
479.4 kB | Preview Download |