DocumentCode :
1924179
Title :
Data integrity and data dynamics with secure storage service in cloud
Author :
Nithiavathy, R.
fYear :
2013
fDate :
21-22 Feb. 2013
Firstpage :
125
Lastpage :
130
Abstract :
The current utilization of the spectrum is quite inefficient; consequently, if properly used, there is no shortage of the spectrum that is presently available. Therefore, it is anticipated that more flexible use of spectrum and spectrum sharing between radio systems will be key enablers to facilitate the successful implementation of future systems. Cognitive radio, however, is known as the most intelligent and promising technique in solving the problem of spectrum sharing. In this paper, we consider the technique of spectrum sharing among users of service providers to share the licensed spectrum of licensed service providers. It is shown that the proposed technique rCloud computing is upcoming technology which has gained a lot of hype in the current world of I. T. Cloud computing is said to be the next big thing in the computer world after the internet. Though the benefits are huge, such a service is also relinquishing users´ physical possession of their outsourced data, which inevitably poses new security risks towards the correctness of the data in cloud. In order to address this new problem and further achieve a secure and dependable cloud storage service. We propose in this paper a flexible distributed storage integrity auditing mechanism, utilizing the homomorphic token and distributed erasure-coded data for dynamically storing data. The proposed design allows users or third party auditor to audit the cloud storage with very lightweight communication and less computation cost. The auditing result ensures reliable cloud storage correctness, and simultaneously achieves fast data error localization, i.e., finding which server is misbehaving in the fast rapidly changing its data in the cloud and the user´s application stored in cloud, it also supports efficient dynamic operations on outsourced data which is secured, including, deletion, and append, block modification and resilient against Byzantine failure, malicious data modification attack, and even server col- uding attacks.
Keywords :
cloud computing; data integrity; security of data; Byzantine failure; Internet; append operation; block modification operation; cloud storage service; cognitive radio; data dynamics; data integrity; deletion operation; distributed erasure-coded data; homomorphic token; malicious data modification attack; rCloud computing; security risk; server colluding attack; service provider; spectrum sharing; spectrum utilization; storage integrity auditing mechanism; Cloud computing; Distributed databases; Memory; Protocols; Security; Servers; Vectors; Audit; Cloud Computing; Data Integrity; Error localization; data dynamics; storage;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Pattern Recognition, Informatics and Mobile Engineering (PRIME), 2013 International Conference on
Conference_Location :
Salem
Print_ISBN :
978-1-4673-5843-9
Type :
conf
DOI :
10.1109/ICPRIME.2013.6496459
Filename :
6496459
Link To Document :
بازگشت