An Enhanced Data Integrity Technique for Cloud Storage with Integrated Archive Using PDP

  • Authors

    • C Saravana Kumar
    • K Vijaya Kumar
    https://doi.org/10.14419/ijet.v7i3.34.19586
  • .
  • The cloud storage plays vital role in the recent trend in information technology. Storage in cloud to be efficient and effective with compressed files method but it faces problem which are related to space and time complexity. There are various techniques are available such as ZIP, JAR, and TXT etc with various disadvantages are exits due to incompatible for recovery records, Unicode names, and strong AES encryption. This problem has been addressed byusing some high compressibility ratio capabilities like RAR using WAR technology. It is more convenient of multipart archives, tight compression multimedia, text modes, strong AES encryption, recovery records to repair an archive in case of physical damage to file. It also includes all work that is related to web application like Servlet, XML, JSP, Image, HTML, CSS, and JSetc. The main advantage in WAR file is, it takes less time to transfer the file as it does all web related work at one time. Therefore RAR format using WAR file is used to have the storage of file in cloud which is of more credential than JAR format using ZIP file. The common security issues like confidentiality, integrity, Privacy-Provable Data Possession technique have been applied for better reliability.

  • References

    1. [1] Ateniese, G.; Burns, R.; Curtmola, R.; Herring, J.; Kissner, L.; Peterson, Z. & Song, D., “Provable Data Possession at Untrusted Stores,†in Proc. of the 14th ACM Conference on Computer and Communications Security, pp. 598—609, 2007.

      [2] Ateniese, G.; Di Pietro, R.; Mancini, L. V. & Tsudik, G. (2008), “Scalable and Efficient Provable Data Possessionâ€, in Proc. of the 4th International Conference on Security and Privacy in Communication Network, pp. 9:1--9:10.

      [3] Erway, C.; Küpçü, A.; Papamanthou, C. & Tamassia, R. (2009), “Dynamic Provable Data Possession,†in Proc. of the 16th ACM Conference on Computer and Communications Security, ACM, New York, NY, USA, pp. 213—222.

      [4] Bowers, K. D.; Juels, A. &Opera, A., “HAIL: A High-availability and Integrity Layer for Cloud Storage,†in Proc. of the 16th ACM Conference on Computer and Communications Security, pp. 187—198, 2009

      [5] Curtmola, R.; Khan, O.; Burns, R. & Ateniese, G., “MR-PDP: Multiple-Replica Provable Data Possession,†in Proc. of Distributed Computing Systems, ICDCS '08. The 28th International Conference on', pp. 411-420, 2008

      [6] Shacham, H. & Waters, B. (2008), “Compact Proofs of Retrievability,†in Proc. of Josef Pieprzyk, ed., Advances in Cryptology - ASIACRYPT 2008, Springer Berlin Heidelberg, pp. 90-107.

      [7] Ateniese, G.; Kamara, S. & Katz, J., “Proofs of Storage from Homomorphic Identification Protocols,†in Proc. of the 15th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology', Springer-Verlag, Berlin, Heidelberg, pp. 319—333, 2009.

      [8] Bowers, K. D.; Juels, A. & Oprea, A., “Proofs of Retrievability: Theory and Implementation,†in Proc. of the 2009 ACM Workshop on Cloud Computing Security, pp. 43—54, 2009.

      [9] Wang, Q.; Wang, C.; Li, J.; Ren, K. & Lou, W., “Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing,†in Proc. of the 14th European Conference on Research in Computer Security, Springer-Verlag, Berlin, Heidelberg, pp. 355—370, 2009.

      [10] Wang, C.; Wang, Q.; Ren, K. & Lou, W., “Privacy-preserving Public Auditing for Data Storage Security in Cloud Computing,†in Proc. of the 29th Conference on Information Communications', IEEE Press, pp. 525—533, 2010.

      [11] R.Joseph Manoj, M.D.Anto Praveena, K.Vijayakumar, “An ACO–ANN based feature selection algorithm for big dataâ€, Cluster Computing the Journal of Networks, Software Tools and Applications, ISSN: 1386-7857 (Print), 1573-7543 (Online) DOI: 10.1007/s10586-018-2550-z, 2018.

      [12] K. Vijayakumar and C. Arun, “A Survey on Assessment of Risks in Cloud Migrationâ€, International Journal of Applied Engineering Research, ISSN 0973-4562 Vol. 10 No.66 May 2015.

      [13] K. Vijayakumar, C.Arun,Automated risk identification using NLP in cloud based development environments Ambient Intell Human Computing, DOI 10.1007/s12652-017-0503-7, Springer May 2017.

  • Downloads

  • How to Cite

    Saravana Kumar, C., & Vijaya Kumar, K. (2018). An Enhanced Data Integrity Technique for Cloud Storage with Integrated Archive Using PDP. International Journal of Engineering & Technology, 7(3.34), 905-907. https://doi.org/10.14419/ijet.v7i3.34.19586