Skip to main content

Secure Data Integrity in Cloud Storage with Multi-level Hash Indexing Technique

  • Conference paper
  • First Online:
Sustainable Communication Networks and Application (ICSCN 2019)

Abstract

A growing technology which offers storage, compute and network resources over the internet on a pay-for-use basis can be named as cloud computing. Cloud Storage is one of computing and service model in which the system allows you to store, manage, maintained and backed up remotely over a network and made available to users to use. Data integrity implies that the accuracy, validity of data over its Life cycle has to be maintained and any violations are to be detected like if data is loss, altered or compromised. User money and time can be saved by using cloud services. So user loses control over the data as there are maintained, stored by the cloud and it can be hacked, tampered by the attacker. Now integrity of data has to be maintained in a cloud where data is present in cloud. Here the aim is to provide data integrity for which the data will be stored in the cloud by user. Here paper says, we need to have an auditing technique which must be efficient and check the data integrity using Third party auditor (TPA), the auditing schemes uses Advanced Encryption Standard (AES) and Secure hash algorithm for encryption and to generate verification meta data respectively and using multi-level hash indexing technique to eliminate duplicate files, reduce storage consumption of file which is stored in the cloud.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Govinda Ramaiah, Y., Vijaya Kumari, G.: Complete privacy preserving auditing for data integrity in cloud computing. In: 12th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 1559–1566. IEEE (2013)

    Google Scholar 

  2. Awad, A., Kadry, S., Lee, B., Maddodi, G., O’Meara, E.: Integrity assurance in the cloud by combined PBA and provenance. In: 10th International Conference on Next Generation Mobile Applications, Security and technologies, pp. 127–132. IEEE (2016)

    Google Scholar 

  3. Rukavitsyn, A.N., Borisenko, K.A., Holod, I.I., Shorov, A.V.: The method of ensuring confidentiality and integrity data in cloud computing, pp. 272–274. IEEE (2017)

    Google Scholar 

  4. Suganya, S., Durai Raj Vincent, P.M.: Improving cloud security by enhancing remote data integrity checking algorithm. In: International Conference on Innovations in Power and Advanced Computing Technologies, pp. 1–6. IEEE (2017)

    Google Scholar 

  5. Bansal, A., Agrawal, A.: Providing security, integrity and authentication using ECC algorithm in cloud storage. In: International Conference on Computer Communication and Informatics (ICCCI), pp. 1–5. IEEE (2017)

    Google Scholar 

  6. Chen, Y., Li, L., Chen, Z.: An approach to verifying data integrity for cloud storage. In: 13th International Conference on Computational Intelligence and Security, pp. 582–585. IEEE (2017)

    Google Scholar 

  7. Jianhong, Z., Hua, C.: Security storage in the cloud computing: a RSA-based assumption data integrity check without original data. In: International Conference on Educational and Information Technology, pp. 143–147. IEEE (2010)

    Google Scholar 

  8. Mahajan, M.J., Shetty, C.: In-line de-duplication technique using multi-level hash indexing. Imp. J. Interdiscip. Res. 3(7) (2017)

    Google Scholar 

  9. Morea, S., Chaudhari, S.: Third party public auditing scheme for cloud storage. Int. J. Procedia Comput. Sci. 79, 69–76 (2016)

    Article  Google Scholar 

  10. Amazon.com. Amazon Web Services (AWS) (2008). http://aws.amazon.com

  11. Allen, W., Aldossary, S.: Data security, privacy, availability and integrity in cloud computing. Int. J. Adv. Comput. Sci. Appl. 7(4), 485–498 (2016)

    Google Scholar 

  12. Yang, N.K., Jia, X.: Data storage auditing service in cloud computing: challenges, methods and opportunities. World Wide Web 15(4), 409–428 (2012)

    Article  Google Scholar 

  13. Wang, C., Chow, S.S.M., Wang, Q., Ren, K., Lou, W.: Privacy preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2) (2013)

    Google Scholar 

  14. Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for data storage security in cloud computing. In: 2010 Proceedings IEEE INFOCOM, pp. 1–9 (2010)

    Google Scholar 

  15. Tejaswini, K.S., Prashanth, S.K.: Privacy preserving public auditing service for data storage in cloud computing. Indian J. Res. PARIPEX 2(2), 131–133 (2013)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to T. P. Kavyashree .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kavyashree, T.P., Poornima, A.S. (2020). Secure Data Integrity in Cloud Storage with Multi-level Hash Indexing Technique. In: Karrupusamy, P., Chen, J., Shi, Y. (eds) Sustainable Communication Networks and Application. ICSCN 2019. Lecture Notes on Data Engineering and Communications Technologies, vol 39. Springer, Cham. https://doi.org/10.1007/978-3-030-34515-0_68

Download citation

Publish with us

Policies and ethics