Cooperative Integrity Verification Schemes for Cloud Storage Data

نویسنده

  • Kishor Kumar Reddy
چکیده

This paper proposes two integrity verification schemes based on Schnorr Signature Scheme, which are named Safety Integrity Verification Scheme (SIVS) and Efficient Integrity Verification Scheme (EIVS). In the two verification schemes, for the user’s each challenge, the cloud storage server chooses randomly the sets of file blocks and verification blocks to generate response values, and the user uses the set of signatures to verify response values. That is to check whether the cloud storage server preserves perfectly the user’s file or not. SIVS gives double integrity verification guarantee to cloud storage data. EIVS has more efficient verification guarantee in computational costs than SIVS. According to the different needs of users, EIVS cooperates with SIVS to improve efficiency when checking the integrity of cloud storage data. Compared with other schemes, at the same level of security, the two cooperative schemes get better integrity verification guarantee, and pay lower computational costs.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Double-Efficient Integrity Verification Scheme to Cloud Storage Data

This paper proposed two integrity verification schemes based on Schnorr Signature Scheme. One is safety integrity verification scheme (SIVS). Another is efficient integrity verification scheme (EIVS). They are difference in characteristics. EIVS has good computational costs while SIVS has high security guarantee. However, they are similar in work. The cloud storage server will choose a set of f...

متن کامل

Ensuring User Security and Data Integrity in Multi- Cloud

The most common method used for user security is textual passwords. But they are vulnerable to eves dropping, dictionary attack, shoulder surfing etc. To address this problem, text can be combined with colors to generate session passwords called hybrid textual authentication for authentication in multi – cloud. Provable data possession is a technique for ensuring data integrity. We present a co...

متن کامل

Proving Possession and Retrievability within a Cloud Environment: A Comparative Survey

Outsourcing data to a remote Cloud Service Provider (CSP) is a growing trend for numerous organizations alleviating the burden of local data storage and maintenance. While Cloud computing makes these advantages more appealing than ever, it also brings new challenging security threats towards user’s outsourced data. It’s of crucial importance to customers to have strong evidence that they actual...

متن کامل

Fuzzy retrieval of encrypted data by multi-purpose data-structures

The growing amount of information that has arisen from emerging technologies has caused organizations to face challenges in maintaining and managing their information. Expanding hardware, human resources, outsourcing data management, and maintenance an external organization in the form of cloud storage services, are two common approaches to overcome these challenges; The first approach costs of...

متن کامل

A Novel Framework for Cloud Environment Using CPDP for Data Integrity and Security

In recent years, cloud storage service has become a faster profit growth point by providing a comparably scalable, position-independent,low -cost platform for client’s data. Since cloud computing environment is constructed based on open architectures and interfaces. It has the capability to incorporate multiple internal and external cloud services together to provide high interoperability there...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016