A Review On Cloud Data Security With MHT Based Integrity Authentication Framework
Keywords:
Cloud, Merkle Hash Tree, Thired Party, Auditor, Public AuditingAbstract
Cloud computing that concern the latest trend in application development for Internet services, relying on clouds of servers to manage multiple tasks that used by individual machines. So without the Internet Cloud is not for the use. The developers initiates special services, such as email, calendars, and word processing, and host them entirely online, also processing of different applications proposed by the cloud of special servers with cloud computing. Cloud storage for storing and sharing data across multiple users become more popular. Cloud computing is innovative trend that supposed to do data storing at data centres. But the limitations of cloud data security don’t prescribe cloud better. To improve data reliability and availability, cloud service providers mature strategies such as storing multiple replicas along with original datasets. Public data auditing schemes enable the users to verify their outsourced data storage without retrieving the whole dataset. Due to the efficiency and security problems the system communication overhead (bandwidth) didn’t maintains data integrity, and public auditing. The on-demand service provision with utilization of limited resources of client system benefits the client. However, data outsourcing paradigm in cloud is one of the biggest security concerns. Frequent integrity checking is needed to keep an eye on data. The proposed scheme makes use of Merkle Hash Tree (MHT) and AES algorithm to ensure data integrity at the unsecured server.
References
William stalling, A Handbook on “Cryptography & Network Security, Principles & Practices” Pearson Publisher, 5th edition-2011.
C. Erway, A. C. Papamanthou, and R. Tamassia, “Dynamic provable data possession” in Proc.16th ACM Conf.Comput.Commun. Security, Chicago, USA, 2009, pp. 213–222.
Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, “Enabling public audit ability and data dynamics for storage security in cloud computing,” IEEE Trans. Parallel Distrib. Syst., vol. 22, no. 5,pp. 847–859, May 2011.
C. Liu, J. Chen, L. T. Yang, X. Zhang, C. Yang, R. Ranjan, and K. Ramamohanarao, “Authorized public auditing of dynamic big data storage on cloud with efficient verifiable fine-grained updates,” IEEE Trans. Parallel Distrib. Syst. 2014.
Chang Liu, Rajiv Ranjan, Chi Yang, Xuyun Zhang, Lizhe Wang, Senior Member “ MuR-DPA: Top-Down Levelled Multi-Replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud ” IEEE Transactions On Computers, Vol. 64, No. 9, September 2015.
Yubin Xia, Yutao Liu, Haibing Guan, Yunji Chen, Tianshi Chen, Binyu Zang, Haibo Chen, “Secure Outsourcing of Virtual Appliance” IEEE Transactions on Cloud Computing DOI. 2015
Christina Delimitrou and Christos Kozyrakis Security Implications of Data Mining in Cloud Scheduling”, IEEE Computer Architecture Letters 2015.
Jin Li, Xiaofeng Chen, Xinyi Huang, Shaohua Tang and Yang Xiang Senior Member, IEEE and Mohammad Mehedi Hassan Member, IEEE and Abdulhameed Alelaiwi Member, IEEE “Secure Distributed Deduplication Systems with Improved Reliability” IEEE Transactions on Computers 2015.
Sumitra Samal, Barkha Agrawal, Richa Parija “A Study on Different Symmetric Key Cryptographic Algorithm” Vol. 8 No.4 Page no (1-5) Apr 2016.
IEEE Explore Abstract, http://ieeexplore.ieee.org March 11 2016.
Amazon Web Services, https://aws.amazon.com/, Feb 10 2016.
Data security in cloud computing, https://www.youtube.com/ March 20 2016.
Open Stack Open Source Cloud Software, http://openstack.org/
Feb 15 2016.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
