Results 1 -
2 of
2
Mirror: Enabling Proofs of Data Replication and Retrievability in the Cloud Mirror: Enabling Proofs of Data Replication and Retrievability in the Cloud
, 2016
"... Abstract Proofs of Retrievability (POR) and Data Possession (PDP) are cryptographic protocols that enable a cloud provider to prove that data is correctly stored in the cloud. PDP have been recently extended to enable users to check in a single protocol that additional file replicas are stored as w ..."
Abstract
- Add to MetaCart
(Show Context)
Abstract Proofs of Retrievability (POR) and Data Possession (PDP) are cryptographic protocols that enable a cloud provider to prove that data is correctly stored in the cloud. PDP have been recently extended to enable users to check in a single protocol that additional file replicas are stored as well. To conduct multi-replica PDP, users are however required to process, construct, and upload their data replicas by themselves. This incurs additional bandwidth overhead on both the service provider and the user and also poses new security risks for the provider. Namely, since uploaded files are typically encrypted, the provider cannot recognize if the uploaded content are indeed replicas. This limits the business models available to the provider, since e.g., reduced costs for storing replicas can be abused by users who upload different files-while claiming that they are replicas. In this paper, we address this problem and propose a novel solution for proving data replication and retrievability in the cloud, Mirror, which allows to shift the burden of constructing replicas to the cloud provider itself-thus conforming with the current cloud model. We show that Mirror is secure against malicious users and a rational cloud provider. Finally, we implement a prototype based on Mirror, and evaluate its performance in a realistic cloud setting. Our evaluation results show that our proposal incurs tolerable overhead on the users and the cloud provider.
An Effective & Secure Data Sharing using Elliptic Curve with MD-5 in Cloud Computing
"... Abstract — Here an efficient technique is implemented for the dynamic possession of data at the data centers. The algorithm implemented here starts with the creation of cloud and allots various users and data centers at the virtual machine to send their information in a protected manner. First of al ..."
Abstract
- Add to MetaCart
(Show Context)
Abstract — Here an efficient technique is implemented for the dynamic possession of data at the data centers. The algorithm implemented here starts with the creation of cloud and allots various users and data centers at the virtual machine to send their information in a protected manner. First of all the data from various users are set up and load is computed at each end of the records centers then setup and key generation takes place and finally encryption and decryption of the data is done. The planned tactic implemented here provides less computational time for the various Dynamic Operations to perform on Multiple Copies. The methodology also proofs to be more secure since it resolves the problem of User Revocation and Escrow Problem. It also provides less Computational time for Verification and Proof.