Survey on Efficient Data Integrity Techniques for Distributed Cloud Storage
Citations
622 |
A view of cloud computing
- Armbrust
- 2010
(Show Context)
Citation Context ...sproofs that match the metadata on the client side.sThese both schemes are single server storage scheme.sSo in these methods whole the data are stored on assingle server in which single-point-failure =-=[11]-=-. Andsvendor-lock-ins [10]. Problems are arises. Tosovercome these problems one possible solution is tosstripe data across multiple servers. Thus, to repair asfailed server, we can (i) read data from ... |
611 |
Polynomial codes over certain finite fields
- Reed, Solomon
- 1960
(Show Context)
Citation Context ...o a multi-server settingsusing replication and erasure coding, respectively. Inserasure coding based system (e.g. Reed SolomonsCode) requires less storage overhead compare tosReplication based system =-=[14]-=-. For the same faulttolerance level.sA.sReplication Based systemsEnsuring reliability requires the introduction ofsredundancy. The simplest form of redundancy issreplication, which is adopted in many ... |
251 | Pors: proofs of retrievability for large files
- Juels, Kaliski
(Show Context)
Citation Context ...lishing a two way communicationsbetween a sender and a receiver.sAvailability ensures that an organization has its fullsset of computing resources available and usable at allstimes for its real users =-=[8]-=-. In this paper we willsdiscuss about the integrity of data in cloud storage.sData integrity proving schemessJuels and Kaliski [8]. Proposed a scheme called Proofsof Retrievability (POR). Proof of ret... |
194 | Hail: a highavailability and integrity layer for cloud storage
- Bowers, Juels, et al.
- 2009
(Show Context)
Citation Context ...iled server, we can (i) read data from otherssurviving servers, (ii) reconstruct the corrupted datasof the failed server, and (iii) write the reconstructedsdata to a new server. MR-PDP [13]. And HAIL =-=[12]-=-.sExtend integrity checks to a multi-server settingsusing replication and erasure coding, respectively. Inserasure coding based system (e.g. Reed SolomonsCode) requires less storage overhead compare t... |
121 | Dynamic provable data possession
- Erway, Kupcu, et al.
- 2009
(Show Context)
Citation Context ...ofsDIP scheme. Our scheme will preserves the faultstolerance and also less repair traffic.sIn addition, we may exploit certain inherentsproperties of such combination to further reduce thes[8]. [19]. =-=[20]-=-. [9]. [21]. [22]. [23].sDATA POSSESSIONsno No yes yes yes yes yessSUPPORTsSAMPLINGsno No no yes yes yes yessTYPE OFsGUARANTEEsDeterministicsProbabilisticsSERVERsBLOCK ACCESSsO(n) O(logn) O(n) O(1) O(... |
112 | Enabling public auditability and data dynamics for storage security in cloud computing
- Wang, Wang, et al.
- 2011
(Show Context)
Citation Context ...me. Our scheme will preserves the faultstolerance and also less repair traffic.sIn addition, we may exploit certain inherentsproperties of such combination to further reduce thes[8]. [19]. [20]. [9]. =-=[21]-=-. [22]. [23].sDATA POSSESSIONsno No yes yes yes yes yessSUPPORTsSAMPLINGsno No no yes yes yes yessTYPE OFsGUARANTEEsDeterministicsProbabilisticsSERVERsBLOCK ACCESSsO(n) O(logn) O(n) O(1) O(logn) O(log... |
64 | RACS: A Case for Cloud Storage Diversity
- Abu-Libdeh, Princehouse, et al.
- 2010
(Show Context)
Citation Context ...adata on the client side.sThese both schemes are single server storage scheme.sSo in these methods whole the data are stored on assingle server in which single-point-failure [11]. Andsvendor-lock-ins =-=[10]-=-. Problems are arises. Tosovercome these problems one possible solution is tosstripe data across multiple servers. Thus, to repair asfailed server, we can (i) read data from otherssurviving servers, (... |
63 |
The Analysis of Directional Time Series: Applications to Wind Speed and Direction.
- BRECKLING
- 1989
(Show Context)
Citation Context ...k bandwidth issoften a critical resource. This has motivated thesdevelopment of family of codes, referred assregenerating codes, designed to carry out thesregeneration efficiently. Regenerating codes =-=[15]-=-.sHave been proposed to minimize this repair traffics(i.e., the amount of data being read from survivingsservers). In essence, they achieve this by not readingsand reconstructing the whole file during... |
30 | Remote data checking using provable data possession
- Ateniese, Burns, et al.
(Show Context)
Citation Context ...rksThere are various study performed to check thesintegrity of data, which are typical in long-termsarchival storage systems. This problem is firstsconsidered by Juels et al. [8]. And Ateniese et al. =-=[9]-=-.,sgiving rise to the similar notions proof ofsretrievability [8]. (POR) and proof of data possessions(PDP) [9]., respectively, which are proposed to verifysthe integrity of a large file by spot-check... |
28 | NCCloud: Applying Network Coding for the Storage Repair in a Cloud-of-Clouds
- Hu, Chen, et al.
- 2012
(Show Context)
Citation Context ... 0.75M, i.e., 25% less than that ofsconventional repair of Reed-Solomon codes. Insgeneral, the repair bandwidth of FMSRscodes for k = n − 2 is M (n-1)s, and its saving compared tos2(n-2)sRAID-6 codes =-=[17]-=-. (Which are also double-faultstolerant) is up to 50% if n is large.sProperty 3: FMSR codes use uncoded repairsDuring repair, each surviving node under FMSRscodes transfers one parity chunk, without a... |
23 |
Research on Cloud Computing Security Problem and Strategy”,
- Liu
- 2012
(Show Context)
Citation Context ...antee by which the data issprotected from accidental or deliberates(malicious)modification. Hashing techniques, digitalssignatures and message authentication codes are usedsto preserve data integrity =-=[3]-=-. Integrity problems aresin big scale due to the multi-tenancy characteristic ofscloud [4].sAuthentication is the mechanism by which thessystems may securely identify their users.sAuthorizationdetermi... |
11 |
Time-bounded remote file integrity checking,
- Sebe, Martinez-Balleste, et al.
- 2004
(Show Context)
Citation Context ...rhead ofsDIP scheme. Our scheme will preserves the faultstolerance and also less repair traffic.sIn addition, we may exploit certain inherentsproperties of such combination to further reduce thes[8]. =-=[19]-=-. [20]. [9]. [21]. [22]. [23].sDATA POSSESSIONsno No yes yes yes yes yessSUPPORTsSAMPLINGsno No no yes yes yes yessTYPE OFsGUARANTEEsDeterministicsProbabilisticsSERVERsBLOCK ACCESSsO(n) O(logn) O(n) O... |
8 | LT codes-based secure and reliable cloud storage service
- Cao, Yu, et al.
- 2012
(Show Context)
Citation Context ...which repair traffic is 0.75Mswhich is less than the Reed Solomon Erasure codingsbased system.sFig. 3 Regenerating Code based systemsPreliminariessA.sFunctional Minimum Storage Regenerating CodesFMSR =-=[16]-=-.Belongs to Maximum DistancesSeparable (MDS) codes. An MDS code is definedsby the parameters (n, k), where k < n. It encodes asfile F of size |F| into n pieces of size |F|/k each. Ans(n, k)-MDS code s... |
7 | CORE: Augmenting RegeneratingCoding-Based Recovery for Single and Concurrent Failures in Distributed Storage Systems.
- Li, Lin, et al.
- 2013
(Show Context)
Citation Context ... to repair asfailed server, we can (i) read data from otherssurviving servers, (ii) reconstruct the corrupted datasof the failed server, and (iii) write the reconstructedsdata to a new server. MR-PDP =-=[13]-=-. And HAIL [12].sExtend integrity checks to a multi-server settingsusing replication and erasure coding, respectively. Inserasure coding based system (e.g. Reed SolomonsCode) requires less storage ove... |
6 |
Rituparna Chaki, Nabendu Chaki and Sugata Sanyal
- Bhadauria
- 2011
(Show Context)
Citation Context ....sAuthentication is the mechanism by which thessystems may securely identify their users.sAuthorizationdetermines the level of access to systemsresources attributed to a particular authenticated users=-=[5]-=-.sNon-repudiation is an extension to the identificationsand authentication service. It is used to ensure thatthesmessages sent are properly received andsacknowledgements are sent back to the sender. I... |
4 |
Santhana Vijayan, Bineet KumarJoshi,―Securing Cloud computing Environment against DDoS
- Joshi, A
(Show Context)
Citation Context ...e popularity of Cloud Computing is mainly due tosthe fact that many enterprise applications and data aresmoving into cloud platforms; however, lack ofssecurity is the major barrier for cloud adoption =-=[1]-=-.sAccording to a recent survey by International DatasCorporation (IDC), 87.5% of the masses belonging tosvaried levels starting from IT executives to CEOsshave said that security is the top most chall... |
3 | Qiaoyan Wen,” A view about cloud data security From data life cycle”, - Yu - 2010 |
2 |
Chauhan and Ashutosh Saxena. ―Energy Analysis of Security for Cloud Application
- Singh
(Show Context)
Citation Context .... Hashing techniques, digitalssignatures and message authentication codes are usedsto preserve data integrity [3]. Integrity problems aresin big scale due to the multi-tenancy characteristic ofscloud =-=[4]-=-.sAuthentication is the mechanism by which thessystems may securely identify their users.sAuthorizationdetermines the level of access to systemsresources attributed to a particular authenticated users... |
2 |
On Providing Integrity for Dynamic Data Based on the Third-party Verifier
- Ni-Na, Hai-Yan
- 2011
(Show Context)
Citation Context ...r scheme will preserves the faultstolerance and also less repair traffic.sIn addition, we may exploit certain inherentsproperties of such combination to further reduce thes[8]. [19]. [20]. [9]. [21]. =-=[22]-=-. [23].sDATA POSSESSIONsno No yes yes yes yes yessSUPPORTsSAMPLINGsno No no yes yes yes yessTYPE OFsGUARANTEEsDeterministicsProbabilisticsSERVERsBLOCK ACCESSsO(n) O(logn) O(n) O(1) O(logn) O(logn) O(l... |