Cloud Computing Storage Accuracy and Quick Data Error Localization

Malapati Venkata Narayana


Recent days, many of the users and organizations store their data remotely in the cloud and they are enjoying the services provided by cloud service providers. Everything can be available as a service to users, for example Application-as-a-Service (AaaS), Software-as-a-Service (SaaS), Platform-as-a-Service (PaaS) etc. This paper mainly focuses on security concern under storage-as–a-service in cloud. Even though cloud technology has no of benefits, it poses some security risks towards cloud data storage. These risks ultimately results in lack of trust among users. In order to achieve secure cloud data storage, we propose a technique called flexible distributed storage integrity auditing mechanism which uses homomorphic token and distributed erasure-coded data. This technique not only ensures cloud data storage correctness, but also achieves fast data error localization i.e., identifying the misbehaving server. Here, users can perform dynamic operations on the data stored in the cloud. The above technique is highly efficient against Byzantine failures and malicious data modification attacks.

Full Text:



V. Vardharajan, U. Tupakula, "Security as a service model for cloud environment", IEEE Trans. Netw. Service Manage., vol11, no1, pp60to75, Mar. 2014.

Cong Wang and Kui Ren, Wenjing Lou, JinLi, “Toward Publicly Auditable Secure Cloud Data Storage Services”,IEEE Transactions on Network,pp-19-24,july-August 2010.

K. Yang and X. Jia, ``An efcient and secure dynamic auditing protocol for data storage in cloud computing,'' IEEE Trans. Prll Distrib. Syst.,vol24, no9, pp1717to1726, 2013.

M. Sookhak, A. Gania, M. K. Khanb, and R. Buyyac, ``Dynamic remote data auditing for securing big data storage in cloud computing,'' Inf. Sci., 2015.

M V Narayana, G Narsimha, SSVN Sarma, “Secure- ZHLS: Secure Zone Based Hierarchical Link State Routing Protocol using Digital Signature”, International Journal of Applied Engineering Research, ISSN 0973-4562 Volume 10, Number 9 (2015) pp. 22927-22940.

L. Carter and M. Wegman, “Universal Hash Functions,” Journal of Computer and System Sciences, vol. 18, no. 2, pp. 143– 154, 1979.



  • There are currently no refbacks.

© International Journals of Advanced Research in Computer Science and Software Engineering (IJARCSSE)| All Rights Reserved | Powered by Advance Academic Publisher.