2018 8th International Conference on Computer Science and Information Technology (CSIT) 2018
DOI: 10.1109/csit.2018.8486274
|View full text |Cite
|
Sign up to set email alerts
|

A data integrity verification service for cloud storage based on building blocks

Abstract: Cloud storage is a popular solution for organizations and users to store data in ubiquitous and cost-effective manner. However, violations of confidentiality and integrity are still issues associated to this technology. In this context, there is a need for tools that enable organizations/users to verify the integrity of their information stored in cloud services. In this paper, we present the design and implementation of an efficient service based on provable data possession cryptographic model, which enables … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2
1

Relationship

3
4

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 10 publications
0
7
0
Order By: Relevance
“…The primary objective of big data transfer frameworks is to ensure the accuracy of transferred data. To accomplish this, extensive research has been conducted on the design and optimization of data integrity verification systems in different contexts, including storage systems [29,30], cloud-based storage [31,32], file systems [33,34], and data transfer systems [35][36][37][38].…”
Section: Data Integritymentioning
confidence: 99%
“…The primary objective of big data transfer frameworks is to ensure the accuracy of transferred data. To accomplish this, extensive research has been conducted on the design and optimization of data integrity verification systems in different contexts, including storage systems [29,30], cloud-based storage [31,32], file systems [33,34], and data transfer systems [35][36][37][38].…”
Section: Data Integritymentioning
confidence: 99%
“…Ensuring the correctness of the transferred data is one of the primary concerns of data transfer frameworks. Many studies have been performed on the design and implementation of data integrity verification and their optimization in data storage [34,36,37], cloud storage [38][39][40][41][42], file systems [32][33][34][35]43], databases [32,44,45], and data transfer systems [18,19,46,47].…”
Section: Related Workmentioning
confidence: 99%
“…This scheme was deployed in a prototype where the components such as the deduplication system, the IDA component, and the hash algorithm h (SHA-3-256 [18]) were implemented mainly in C language. The clients implementing the data preparation and retrieval schemes were also developed in C. The integrity verification metadata service was developed as a web service and uses a Mongo database deployed in the cloud [23]. The building blocks and the parallel patterns were created by using a framework based on Kulla [24].…”
Section: Prototype Implementation Detailsmentioning
confidence: 99%