Abstract
A growing technology which offers storage, compute and network resources over the internet on a pay-for-use basis can be named as cloud computing. Cloud Storage is one of computing and service model in which the system allows you to store, manage, maintained and backed up remotely over a network and made available to users to use. Data integrity implies that the accuracy, validity of data over its Life cycle has to be maintained and any violations are to be detected like if data is loss, altered or compromised. User money and time can be saved by using cloud services. So user loses control over the data as there are maintained, stored by the cloud and it can be hacked, tampered by the attacker. Now integrity of data has to be maintained in a cloud where data is present in cloud. Here the aim is to provide data integrity for which the data will be stored in the cloud by user. Here paper says, we need to have an auditing technique which must be efficient and check the data integrity using Third party auditor (TPA), the auditing schemes uses Advanced Encryption Standard (AES) and Secure hash algorithm for encryption and to generate verification meta data respectively and using multi-level hash indexing technique to eliminate duplicate files, reduce storage consumption of file which is stored in the cloud.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Govinda Ramaiah, Y., Vijaya Kumari, G.: Complete privacy preserving auditing for data integrity in cloud computing. In: 12th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 1559–1566. IEEE (2013)
Awad, A., Kadry, S., Lee, B., Maddodi, G., O’Meara, E.: Integrity assurance in the cloud by combined PBA and provenance. In: 10th International Conference on Next Generation Mobile Applications, Security and technologies, pp. 127–132. IEEE (2016)
Rukavitsyn, A.N., Borisenko, K.A., Holod, I.I., Shorov, A.V.: The method of ensuring confidentiality and integrity data in cloud computing, pp. 272–274. IEEE (2017)
Suganya, S., Durai Raj Vincent, P.M.: Improving cloud security by enhancing remote data integrity checking algorithm. In: International Conference on Innovations in Power and Advanced Computing Technologies, pp. 1–6. IEEE (2017)
Bansal, A., Agrawal, A.: Providing security, integrity and authentication using ECC algorithm in cloud storage. In: International Conference on Computer Communication and Informatics (ICCCI), pp. 1–5. IEEE (2017)
Chen, Y., Li, L., Chen, Z.: An approach to verifying data integrity for cloud storage. In: 13th International Conference on Computational Intelligence and Security, pp. 582–585. IEEE (2017)
Jianhong, Z., Hua, C.: Security storage in the cloud computing: a RSA-based assumption data integrity check without original data. In: International Conference on Educational and Information Technology, pp. 143–147. IEEE (2010)
Mahajan, M.J., Shetty, C.: In-line de-duplication technique using multi-level hash indexing. Imp. J. Interdiscip. Res. 3(7) (2017)
Morea, S., Chaudhari, S.: Third party public auditing scheme for cloud storage. Int. J. Procedia Comput. Sci. 79, 69–76 (2016)
Amazon.com. Amazon Web Services (AWS) (2008). http://aws.amazon.com
Allen, W., Aldossary, S.: Data security, privacy, availability and integrity in cloud computing. Int. J. Adv. Comput. Sci. Appl. 7(4), 485–498 (2016)
Yang, N.K., Jia, X.: Data storage auditing service in cloud computing: challenges, methods and opportunities. World Wide Web 15(4), 409–428 (2012)
Wang, C., Chow, S.S.M., Wang, Q., Ren, K., Lou, W.: Privacy preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2) (2013)
Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for data storage security in cloud computing. In: 2010 Proceedings IEEE INFOCOM, pp. 1–9 (2010)
Tejaswini, K.S., Prashanth, S.K.: Privacy preserving public auditing service for data storage in cloud computing. Indian J. Res. PARIPEX 2(2), 131–133 (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Kavyashree, T.P., Poornima, A.S. (2020). Secure Data Integrity in Cloud Storage with Multi-level Hash Indexing Technique. In: Karrupusamy, P., Chen, J., Shi, Y. (eds) Sustainable Communication Networks and Application. ICSCN 2019. Lecture Notes on Data Engineering and Communications Technologies, vol 39. Springer, Cham. https://doi.org/10.1007/978-3-030-34515-0_68
Download citation
DOI: https://doi.org/10.1007/978-3-030-34515-0_68
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-34514-3
Online ISBN: 978-3-030-34515-0
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)