A Review On Cloud Data Security With MHT Based Integrity Authentication Framework

Authors

  • Sajjan RS Department of Computer Science and Engineering, University of Solapur, Solapur
  • Vijay R Ghorpade Department of Computer Science & Engineering, University of Kolhapur, Kolhapur
  • Arkas BD Department of Computer Science and Engineering, University of Solapur, Solapur

Keywords:

Cloud, Merkle Hash Tree, Thired Party, Auditor, Public Auditing

Abstract

Cloud computing that concern the latest trend in application development for Internet services, relying on clouds of servers to manage multiple tasks that used by individual machines. So without the Internet Cloud is not for the use. The developers initiates special services, such as email, calendars, and word processing, and host them entirely online, also processing of different applications proposed by the cloud of special servers with cloud computing. Cloud storage for storing and sharing data across multiple users become more popular. Cloud computing is innovative trend that supposed to do data storing at data centres. But the limitations of cloud data security don’t prescribe cloud better. To improve data reliability and availability, cloud service providers mature strategies such as storing multiple replicas along with original datasets. Public data auditing schemes enable the users to verify their outsourced data storage without retrieving the whole dataset. Due to the efficiency and security problems the system communication overhead (bandwidth) didn’t maintains data integrity, and public auditing. The on-demand service provision with utilization of limited resources of client system benefits the client. However, data outsourcing paradigm in cloud is one of the biggest security concerns. Frequent integrity checking is needed to keep an eye on data. The proposed scheme makes use of Merkle Hash Tree (MHT) and AES algorithm to ensure data integrity at the unsecured server.

References

William stalling, A Handbook on “Cryptography & Network Security, Principles & Practices” Pearson Publisher, 5th edition-2011.

C. Erway, A. C. Papamanthou, and R. Tamassia, “Dynamic provable data possession” in Proc.16th ACM Conf.Comput.Commun. Security, Chicago, USA, 2009, pp. 213–222.

Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, “Enabling public audit ability and data dynamics for storage security in cloud computing,” IEEE Trans. Parallel Distrib. Syst., vol. 22, no. 5,pp. 847–859, May 2011.

C. Liu, J. Chen, L. T. Yang, X. Zhang, C. Yang, R. Ranjan, and K. Ramamohanarao, “Authorized public auditing of dynamic big data storage on cloud with efficient verifiable fine-grained updates,” IEEE Trans. Parallel Distrib. Syst. 2014.

Chang Liu, Rajiv Ranjan, Chi Yang, Xuyun Zhang, Lizhe Wang, Senior Member “ MuR-DPA: Top-Down Levelled Multi-Replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud ” IEEE Transactions On Computers, Vol. 64, No. 9, September 2015.

Yubin Xia, Yutao Liu, Haibing Guan, Yunji Chen, Tianshi Chen, Binyu Zang, Haibo Chen, “Secure Outsourcing of Virtual Appliance” IEEE Transactions on Cloud Computing DOI. 2015

Christina Delimitrou and Christos Kozyrakis Security Implications of Data Mining in Cloud Scheduling”, IEEE Computer Architecture Letters 2015.

Jin Li, Xiaofeng Chen, Xinyi Huang, Shaohua Tang and Yang Xiang Senior Member, IEEE and Mohammad Mehedi Hassan Member, IEEE and Abdulhameed Alelaiwi Member, IEEE “Secure Distributed Deduplication Systems with Improved Reliability” IEEE Transactions on Computers 2015.

Sumitra Samal, Barkha Agrawal, Richa Parija “A Study on Different Symmetric Key Cryptographic Algorithm” Vol. 8 No.4 Page no (1-5) Apr 2016.

IEEE Explore Abstract, http://ieeexplore.ieee.org March 11 2016.

Amazon Web Services, https://aws.amazon.com/, Feb 10 2016.

Data security in cloud computing, https://www.youtube.com/ March 20 2016.

Open Stack Open Source Cloud Software, http://openstack.org/

Feb 15 2016.

Downloads

Published

2025-11-11

How to Cite

[1]
R. Sajjan, G. Vijay R, and B. Arkas, “A Review On Cloud Data Security With MHT Based Integrity Authentication Framework”, Int. J. Comp. Sci. Eng., vol. 4, no. 4, pp. 47–50, Nov. 2025.