Identity Based Distributed Provable Data Possession in Multi Cloud Storage
DOI:
https://doi.org/10.26438/ijcse/v5i8.1721Keywords:
Cloud computing, Provable data possession, Identity-Based Distributed ProvableAbstract
Online data integrity checking is very main in cloud storage space. It can make the users verify whether their outsourced data is kept intact without downloading the whole data. In some application scenarios, the clients have to store their data on multi-cloud servers. At the same time, the integrity examination protocol must be efficient in order to save the verify cost. Thus a novel remote data integrity checking model: identity-based distributed provable data possession (ID-DPDP) is proposed for a multi-cloud storage. Based on the bilinear pairing, a concrete ID-DPDP protocol is design. The current paper proposed ID-DPDP protocol is provably protected under the hardness assumption of the standard computational diffie-hellman (CDH) problem. In addition to the structural to the advantages of elimination of certificate management, the ID-DPDP protocol is efficient and flexible. Based on the user authorization, the proposed ID-DPDP protocols perform private verification, delegated verification, and public verification.
References
. P. Ranjima, Sumathi. D , M. Mathew, P. Sivaprakash, "Secure Cloud Storage with Access Control: A Survey", International Journal of Computer Sciences and Engineering, Vol.2, Issue.8, pp.124-126, 2014.
. Erway C.C., Kupcu A., C. Papamanthou “Dynamic Provable Data Possession in multicloud storage”, CCS’09, pp. 2136-233, 2014.
. Seb´e F., Domingo-Ferrer J., Mart´ınez-Ballest´e A., DeswarteY., “Remote Data Integrity checking in Critical Information Infrastructures”, IEEE Transactions on Knowledge and Data Engineering, 2015(8), pp.1-6, 2015.
. Zhu Y., Hu H., Ahn G.J., Yu M., “Cooperative Provable for Integrity Verification in Multi cloud Storage”, IEEE Transactions on Parallel and Distributed Systems, 23(12), pp. 2251-2234, 2015
. Curtmola R., Khan O., Burns R., Ateniese G., “MR-PDP: Multiple- Replica Provable Data Possession”, ICDCS’09, pp. 415-460, 2016.
. Barsoum A. F., Hasan M. A., “Replication of Data over Cloud Servers”, CACR, University of Waterloo, Report2010/32, 2016.
. Shivlal Mewada, Umesh Kumar Singh and Pradeep Sharma, "Security Enhancement in Cloud Computing (CC)", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.1, pp.31-37. 2013.
. Bincy Paul and M. Azath, "Survey on Preserving Data Privacy in Cloud", International Journal of Computer Sciences and Engineering, Vol.2, Issue.12, pp.57-61, 2014.
. Wang, Q., et al., “Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing”, in Computer Security – ESORICS 2014, M. Backes and P. Ning, Editors. 2009, Springer Berlin/Heidelberg. p.355-370.
. Mohd.A. Salam, A.C. Pandey, "Mobile Cloud Computing: Taking Web-Based Mobile Applications to the Cloud", International Journal of Computer Sciences and Engineering, Vol.2, Issue.1, pp.35-42, 2014.
. S. Tamilarasan, P.K. Sharma, “A Survey on Dynamic Resource Allocation in MIMO Heterogeneous Cognitive Radio Networks based on Priority Scheduling”, International Journal of Computer Sciences and Engineering, Vol.5, No.1, pp.53-59, 2017.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
