skip to main content
10.1145/2513228.2513251acmconferencesArticle/Chapter ViewAbstractPublication PagesracsConference Proceedingsconference-collections
research-article

Efficient integrity auditing services for cloud computing using raptor codes

Published:01 October 2013Publication History

ABSTRACT

Cloud Computing is a technology that allows the users to store their data at a remote place without the need of physical possession. There are a number of cloud service providers (CSPs) available to provide storage services. But, the problems that need to be addressed in a cloud environment are the security and integrity of the data. Ultimately, it is the task of the CSPs to ensure that the data has not been modified and free from security risks. Also the data may be lost because of a server failure. In order to address these problems, a security scheme is proposed that integrates both erasure code and raptor code. The data integrity is ensured using the token values based on erasure and raptor codes. The same codes are used to recover the original data from the cloud server in case of a server failure, as these schemes help to distribute files across several servers.

References

  1. Cong Wang, Qian Wang, "Toward Secure and Dependable Storage Services in Cloud Computing", IEEE Transactions on Services Computing, No. 2, Vol. 5, June. 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. J. Li, C. Wang, K. Ren, and W. Lou, "Towards Publicly Auditable Secure Cloud Data Services", IEEE Network Magazine, Vol. 24, No. 4, pp. 19--24, July/August. 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. C. Wang, Q. Wang, K. Ren, and W. Lou, "Privacy -- Preserving Public Auditing for Storage Security in Cloud Computing", Proc. IEEE INFOCOM, Mar. 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Yan Zhu, Hongxin Hu, Gail John Ahn, S. Yau, "Efficient Audit Service Outsourcing for Data Integrity in Clouds", IEEE 2012 Transactions on Cloud Computing, Vol. 85, Issue 5. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Yan Zhu, Hongxin Hu, Gail John Ahn, S. Yau, "Dynamic Audit Services for Outsourced Storages in Clouds", IEEE Transactions on Services Computing. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Amin Shokrollahi, "Raptor Codes", IEEE Transactions on Information Theory, Vol. 52, No. 6, June. 2006.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. C. Erway, A. Kupcu, C. Papamanothu and R. Tamassia, "Dynamic Provable Data Possession", Proc. 16th ACM Conf. Computer and Comm. Security (CCS'09), pp. 213--222, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. "Why DF Raptor is better than Reed Solomon for streaming applications", Digital Fountain Incorporated, A Qualcomm Company, 2010.Google ScholarGoogle Scholar
  9. M. A. Shah, M. Baker, J. C. Mogul, and R. Swaminathan, "Auditing to Keep Online Storage Services Honest," Proc. 11th USENIX Workshop Hot Topics in Operating Systems (HotOS '07), pp. 1--6, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Efficient integrity auditing services for cloud computing using raptor codes

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      RACS '13: Proceedings of the 2013 Research in Adaptive and Convergent Systems
      October 2013
      529 pages
      ISBN:9781450323482
      DOI:10.1145/2513228

      Copyright © 2013 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 1 October 2013

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      RACS '13 Paper Acceptance Rate73of317submissions,23%Overall Acceptance Rate393of1,581submissions,25%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader