Filters








3,041 Hits in 4.6 sec

Security Analysis and Improvements on a Remote Integrity Checking Scheme for Regenerating-Coding-Based Distributed Storage

Guangjun Liu, Wangmei Guo, Ximeng Liu, Jinbo Xiong
2021 Security and Communication Networks  
Recently, an outstanding outsourced auditing scheme named NC-Audit was proposed for regenerating-coding-based distributed storage.  ...  With the properties of a lower repair bandwidth while preserving fault tolerance, regenerating coding and network coding (NC) have received much attention in the coding-based storage field.  ...  An Improved Remote Data Integrity Checking Scheme for Distributed Storage According to the algebraic analysis in Section 4, we can conclude that the security of NC-Audit depends on the security of the  ... 
doi:10.1155/2021/6652606 doaj:ada934814b604d56b056e0b448c5ede0 fatcat:vaayetv7bnbqjaxuqht4oi2jcu

Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage

Henry C.H. Chen, Patrick P.C. Lee
2012 2012 IEEE 31st Symposium on Reliable Distributed Systems  
Index Terms-remote data checking, secure and trusted storage systems, implementation, experimentation 2012 31st International Symposium on Reliable Distributed Systems  ...  Therefore, we study the problem of remotely checking the integrity of regenerating-coded data against corruptions under a real-life cloud storage setting.  ...  In this paper, we propose the design and implementation of a practical data integrity protection (DIP) scheme for regenerating-coding-based cloud storage.  ... 
doi:10.1109/srds.2012.24 dblp:conf/srds/ChenL12 fatcat:oiyx3xczsvgglklfflnulh24y4

A Recapitulation of Data Auditing Approaches for Cloud Data

Poonam Dabas, Divya Wadhwa
2014 International Journal of Computer Applications Technology and Research  
Integrity checking has been designed as a cloud security service by various protocols proposed by many researchers which are being discussed here in this paper.  ...  Cloud Computing, a buzzword, a technology, has been exploring over the years since 1990s and presently, being considered as a today's s era dependency for the interconnected users.  ...  [4] proposed a new data integrity check scheme based on the well known RSA security assumption.  ... 
doi:10.7753/ijcatr0306.1002 fatcat:mp35b7i7ijhy7l6rob4urscq6q

Proficient Justification of Data Accuracy for Cloud Storage Using Dual Protection

Deepika. N, Durga. P, Gayathri. N, Murugesan. M
2019 International Journal of Scientific Research in Science and Technology  
A novel public verification scheme for cloud storage using in distinguishability obfuscation, which requires a lightweight computation on the auditor and delegate most computation to the cloud.  ...  At the time of download key generated (code based key generation) and it will send to the file owner.  ...  From the two points, wepropose a novel remote data integrity checking model: ID-DPDP (identity-based distributed provable data possession) in multi-cloud storage.  ... 
doi:10.32628/ijsrst196250 fatcat:4b5txdyby5bbrirnxf2qu47zpu

Cloud Based Two Tier Security Scheme for Store, Share and Audit Our Data into Cloud

Priya Kharmate, Ranjeetsingh Suryawanshi
2016 2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)  
At the time of download key generated (code based key generation) and it will send to the file owner.  ...  The files will be stored into the cloud storage. In our system we provide the two tier security for our uploaded files.  ...  Our sincere thanks to TRINITY COLLEGE OF ENGINEERING AND RESEARCH, PUNE for providing a strong platform to develop our skill and capabilities.  ... 
doi:10.1109/icaecct.2016.7942566 fatcat:qzeqlbbmxveshg52jfavyctzo4

Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage: Theory and Implementation

Henry C. H. Chen, Patrick P. C. Lee
2014 IEEE Transactions on Parallel and Distributed Systems  
Therefore, we study the problem of remotely checking the integrity of regenerating-coded data against corruptions under a real-life cloud storage setting.  ...  We design and implement a practical data integrity protection (DIP) scheme for a specific regenerating code, while preserving its intrinsic properties of fault tolerance and repair traffic saving.  ...  Computing and Interface Technologies.  ... 
doi:10.1109/tpds.2013.164 fatcat:2y3obmwh2vaqhnidhqw77r4tbq

Integrity Check of Shared Data on Cloud with Various Mechanisms

Sarika Katkade, J. V.
2017 International Journal of Computer Applications  
These protocols have been proposed a model for ensuring the long-term security and availability of data stored at remote untrusted hosts.  ...  This new era of information storage service also introduces new security issues, because data is organized on third party which might not exactly be trust deserving always.  ...  System performance get improved [2] using dynamic code based storage. Collusion Problem tackled using sharing scheme [5] .  ... 
doi:10.5120/ijca2017912945 fatcat:kfahqjcyuvhnzngjgn3pnme46i

Auditing for Distributed Storage Systems

Anh Le, Athina Markopoulou, Alexandros G. Dimakis
2016 IEEE/ACM Transactions on Networking  
We propose NC-Audit, a novel cryptography-based remote data integrity checking scheme, designed specifically for network coding-based distributed storage systems.  ...  Independently, another body of work has proposed integrity checking schemes for cloud storage, none of which, however, is customized for coding-based storage or can efficiently support repair.  ...  Integrity Checking Schemes for NC-Based Storage Systems. There have been only a few number of work that provide remote data checking for NC-based storage. Dikialotis et al.  ... 
doi:10.1109/tnet.2015.2450761 fatcat:3xxldjnzizdv3e3y33mhat45h4

Cloud Data Integrity Checking Using Third Party Auditor

Prof. S. R. Nalamwar
2018 International Journal for Research in Applied Science and Engineering Technology  
Remote data integrity checking (RDIC) allows checking the data in-tegrity for the data stored on cloud.  ...  In this project, we propose a new con-struction of identity-based (ID-based) RDIC protocol by making use of security key primitives to reduce the system complexity and the cost for establishing and managing  ...  ACKNOWLEDGMENT It gives us great pleasure in presenting the preliminary project report on 'Cloud Data Integrity Checking Using Third Party Auditor'.  ... 
doi:10.22214/ijraset.2018.6094 fatcat:kqjsh5d3l5fibcage4je5mnfda

Verifying remote data integrity in peer-to-peer data storage: A comprehensive survey of protocols

Nouha Oualha, Jean Leneutre, Yves Roudier
2011 Peer-to-Peer Networking and Applications  
Externalizing data storage to multiple network hosts is becoming widely used in several distributed storage and P2P systems, which urges the need for new solutions that provide security properties for  ...  These protocols have been proposed as a primitive for ensuring the long-term integrity and availability of data stored at remote untrusted hosts.  ...  On the other hand, for distributed storage applications and file systems, data is generally very dynamic, thus it should be possible to perform dynamic operations on remote data in an efficient and secure  ... 
doi:10.1007/s12083-011-0117-3 fatcat:43ergxxnprabvi6yl3rhnta5rm

Auditing for Distributed Storage Systems [article]

Anh Le, Athina Markopoulou, Alexandros G. Dimakis
2014 arXiv   pre-print
We propose NC-Audit, a novel cryptography-based remote data integrity checking scheme, designed specifically for network coding-based distributed storage systems.  ...  Independently, another body of work has proposed integrity checking schemes for cloud storage, none of which, however, is customized for coding-based storage or can efficiently support repair.  ...  Integrity Checking Schemes for NC-Based Storage Systems. There have been only a few number of work that provide remote data checking for NC-based storage.  ... 
arXiv:1203.1730v5 fatcat:6nj4ymkzo5cljg6msjwsgnijoi

Remote Data Auditing in Cloud Computing Environments

Mehdi Sookhak, Abdullah Gani, Hamid Talebian, Adnan Akhunzada, Samee U. Khan, Rajkumar Buyya, Albert Y. Zomaya
2015 ACM Computing Surveys  
The RDA is a useful technique to check the reliability and integrity of data outsourced to a single or distributed servers.  ...  , namely, replication based, erasure coding based, and network coding based, to present a taxonomy.  ...  Chen and Lee [2013] devised a Data Integrity Protection (DIP) method against data corruption for network coding distributed cloud storage on the basis of Functional Minimum-Storage Regenerating (FMSR)  ... 
doi:10.1145/2764465 fatcat:4hcgmmwj7fe7jlsb3kqlimtzxe

BSS: block-based sharing scheme for secure data storage services in mobile cloud environment

Abdul Nasir Khan, M. L. Mat Kiah, Mazhar Ali, Sajjad A. Madani, Atta ur Rehman Khan, Shahaboddin Shamshirband
2014 Journal of Supercomputing  
In this regard, the study presents a novel energy-efficient block-based sharing scheme that provides confidentiality and integrity services for mobile users in the cloud environment.  ...  Khan et al. tal results show that the block-based sharing scheme consumes less energy, reduces the resources utilization, improves response time, and provides better security services to the mobile users  ...  Acknowledgments We would like to acknowledge the financial support of the BrightSparks Program at University of Malaya, Malaysia for carrying out these research experiments.  ... 
doi:10.1007/s11227-014-1269-8 fatcat:slsfie42mjckjnbgbbp47kga5e

Remote data checking for network coding-based distributed storage systems

Bo Chen, Reza Curtmola, Giuseppe Ateniese, Randal Burns
2010 Proceedings of the 2010 ACM workshop on Cloud computing security workshop - CCSW '10  
We propose RDC-NC, a novel secure and efficient RDC scheme for network coding-based distributed storage systems.  ...  Initially proposed in the context of a single server, RDC was later extended to verify data integrity in distributed storage systems that rely on replication and on erasure coding to store data redundantly  ...  REMOTE DATA CHECKING SCHEMES FOR NETWORK CODING-BASED DIS-TRIBUTED STORAGE SYSTEMS In this section, we present remote data checking (RDC) schemes for distributed storage systems based on network coding  ... 
doi:10.1145/1866835.1866842 dblp:conf/ccs/ChenCAB10 fatcat:6y2yymhw7nhwjoupiaqjq6lpiy

A Novel Approach for Data Privacy Using Attribute Based Scheme Algorithm for Cloud Computing

A. Nithya, B. Ramakrishnan, Resul Das
2016 International Journal of Computer Networks And Applications  
The data was securely stored in the cloud and if it is corrupted then the proxy is implemented to regenerate the corrupted data in the cloud. Thus security and integrity is successfully achieved.  ...  They are SaaS (Software as a Service), PaaS (Platform as a Service) and IaaS (Infrastructure as a Service) etc.  ...  It is a privacy preserving auditing mechanism used for checking privacy of data available in the cloud and also to check the integrity of data.  ... 
doi:10.22247/ijcna/2016/v3/i4/48567 fatcat:nefqmnp4bvh6hpxuhqm47u7euq
« Previous Showing results 1 — 15 out of 3,041 results