Open Access   Article Go Back

Identity Based Distributed Provable Data Possession in Multi Cloud Storage

A. Abinaya1 , K. Fathima Bibi2

  1. Dept. of Computer Science Rajah Serfoji Govt. College(Autonomous), Thanjavur, India.
  2. Dept. of Computer Science Rajah Serfoji Govt. College(Autonomous), Thanjavur, India.

Correspondence should be addressed to: abinayaanbazhagan93@gmail.com.

Section:Research Paper, Product Type: Journal Paper
Volume-5 , Issue-8 , Page no. 17-21, Aug-2017

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v5i8.1721

Online published on Aug 30, 2017

Copyright © A. Abinaya, K. Fathima Bibi . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: A. Abinaya, K. Fathima Bibi, “Identity Based Distributed Provable Data Possession in Multi Cloud Storage,” International Journal of Computer Sciences and Engineering, Vol.5, Issue.8, pp.17-21, 2017.

MLA Style Citation: A. Abinaya, K. Fathima Bibi "Identity Based Distributed Provable Data Possession in Multi Cloud Storage." International Journal of Computer Sciences and Engineering 5.8 (2017): 17-21.

APA Style Citation: A. Abinaya, K. Fathima Bibi, (2017). Identity Based Distributed Provable Data Possession in Multi Cloud Storage. International Journal of Computer Sciences and Engineering, 5(8), 17-21.

BibTex Style Citation:
@article{Abinaya_2017,
author = {A. Abinaya, K. Fathima Bibi},
title = {Identity Based Distributed Provable Data Possession in Multi Cloud Storage},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {8 2017},
volume = {5},
Issue = {8},
month = {8},
year = {2017},
issn = {2347-2693},
pages = {17-21},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1382},
doi = {https://doi.org/10.26438/ijcse/v5i8.1721}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v5i8.1721}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1382
TI - Identity Based Distributed Provable Data Possession in Multi Cloud Storage
T2 - International Journal of Computer Sciences and Engineering
AU - A. Abinaya, K. Fathima Bibi
PY - 2017
DA - 2017/08/30
PB - IJCSE, Indore, INDIA
SP - 17-21
IS - 8
VL - 5
SN - 2347-2693
ER -

VIEWS PDF XML
1239 1073 downloads 567 downloads
  
  
           

Abstract

Online data integrity checking is very main in cloud storage space. It can make the users verify whether their outsourced data is kept intact without downloading the whole data. In some application scenarios, the clients have to store their data on multi-cloud servers. At the same time, the integrity examination protocol must be efficient in order to save the verify cost. Thus a novel remote data integrity checking model: identity-based distributed provable data possession (ID-DPDP) is proposed for a multi-cloud storage. Based on the bilinear pairing, a concrete ID-DPDP protocol is design. The current paper proposed ID-DPDP protocol is provably protected under the hardness assumption of the standard computational diffie-hellman (CDH) problem. In addition to the structural to the advantages of elimination of certificate management, the ID-DPDP protocol is efficient and flexible. Based on the user authorization, the proposed ID-DPDP protocols perform private verification, delegated verification, and public verification.

Key-Words / Index Term

Cloud computing, Provable data possession, Identity-Based Distributed Provable

References

[1]. P. Ranjima, Sumathi. D , M. Mathew, P. Sivaprakash, "Secure Cloud Storage with Access Control: A Survey", International Journal of Computer Sciences and Engineering, Vol.2, Issue.8, pp.124-126, 2014.
[2]. Erway C.C., Kupcu A., C. Papamanthou “Dynamic Provable Data Possession in multicloud storage”, CCS’09, pp. 2136-233, 2014.
[3]. Seb´e F., Domingo-Ferrer J., Mart´ınez-Ballest´e A., DeswarteY., “Remote Data Integrity checking in Critical Information Infrastructures”, IEEE Transactions on Knowledge and Data Engineering, 2015(8), pp.1-6, 2015.
[4]. Zhu Y., Hu H., Ahn G.J., Yu M., “Cooperative Provable for Integrity Verification in Multi cloud Storage”, IEEE Transactions on Parallel and Distributed Systems, 23(12), pp. 2251-2234, 2015
[5]. Curtmola R., Khan O., Burns R., Ateniese G., “MR-PDP: Multiple- Replica Provable Data Possession”, ICDCS’09, pp. 415-460, 2016.
[6]. Barsoum A. F., Hasan M. A., “Replication of Data over Cloud Servers”, CACR, University of Waterloo, Report2010/32, 2016.
[7]. Shivlal Mewada, Umesh Kumar Singh and Pradeep Sharma, "Security Enhancement in Cloud Computing (CC)", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.1, pp.31-37. 2013.
[8]. Bincy Paul and M. Azath, "Survey on Preserving Data Privacy in Cloud", International Journal of Computer Sciences and Engineering, Vol.2, Issue.12, pp.57-61, 2014.
[9]. Wang, Q., et al., “Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing”, in Computer Security – ESORICS 2014, M. Backes and P. Ning, Editors. 2009, Springer Berlin/Heidelberg. p.355-370.
[10]. Mohd.A. Salam, A.C. Pandey, "Mobile Cloud Computing: Taking Web-Based Mobile Applications to the Cloud", International Journal of Computer Sciences and Engineering, Vol.2, Issue.1, pp.35-42, 2014.
[11]. S. Tamilarasan, P.K. Sharma, “A Survey on Dynamic Resource Allocation in MIMO Heterogeneous Cognitive Radio Networks based on Priority Scheduling”, International Journal of Computer Sciences and Engineering, Vol.5, No.1, pp.53-59, 2017.