Published June 1, 2019 | Version v1
Journal article Open

Distributed scheme to authenticate data storage security in cloud computing

  • 1. Sree Vidyanikethan Engineering College (Autonomus)
  • 2. VIT University

Description

Cloud computing is the revolution in current generation IT enterprise displaces database and application software to the large data centers for IT services. In this paper, we designed and simulated an adaptable and efficient scheme to guarantee the correctness of user data stored in the cloud and also with some prominent features. Homomorphic token is used for distributed verification of erasure–coded data. By using this scheme, we can identify misbehaving servers. In spite of past works, our scheme supports effective and secure dynamic operations on data blocks such as data insertion, deletion and modification. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centers, where the data management and services may not be absolutely truthful. This effective security and performance analysis describes that the proposed scheme is extremely flexible against malicious data modification, convoluted failures and server clouding attacks.

Files

40 1475.pdf

Files (479.4 kB)

Name Size Download all
md5:15264f30594ba049f0b274c948f8d60f
479.4 kB Preview Download