Data Integrity Check

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 3618 Experts worldwide ranked by ideXlab platform

Wenfeng Zhou - One of the best experts on this subject based on the ideXlab platform.

  • Zero knowledge proofs for cloud storage Integrity Checking
    arXiv: Cryptography and Security, 2019
    Co-Authors: Faen Zhang, Xinyu Fan, Pengcheng Zhou, Wenfeng Zhou
    Abstract:

    With the wide application of cloud storage, cloud security has become a crucial concern. Related works have addressed security issues such as Data confidentiality and Integrity, which ensure that the remotely stored Data are well maintained by the cloud. However, how to define zero-knowledge proof algorithms for stored Data Integrity Check has not been formally defined and investigated. We believe that it is important that the cloud server is unable to reveal any useful information about the stored Data. In this paper, we introduce a novel definition of Data privacy for Integrity Checks, which describes very high security of a zero-knowledge proof. We found that all other existing remote Integrity proofs do not capture this feature. We provide a comprehensive study of Data privacy and an Integrity Check algorithm that captures Data Integrity, confidentiality, privacy, and soundness.

Krathika A - One of the best experts on this subject based on the ideXlab platform.

  • Approved TPA along with Integrity Verification in Cloud
    2016
    Co-Authors: Krathika A
    Abstract:

    Abstract Cloud computing is new model that helps cloud user to access resources in pay-as-you-go fashion. This helped the firm to reduce high capital investments in their own IT organization. Data security is one of the major issues in cloud computing environment. The cloud user stores their Data on cloud storage will have no longer direct control over their Data. The existing systems already supported the Data Integrity Check without possessions of actual Data file. The Data Auditing is the method of verification of the user Data which is stored on cloud and is done by the TTP called as TPA. There are many drawbacks of existing techniques. First, in spite some of the recent works which supports updates on fixed-sized Data blocks which are called coarse-grained updates, do not support for variablesized block operations. Second, an essential authorization is missing between CSP, the cloud user and the TPA. The newly proposed scheme will support for Fine-grained Data updates on dynamic Data using RMHT algorithm and also supports for authorization of TPA

Faen Zhang - One of the best experts on this subject based on the ideXlab platform.

  • Zero knowledge proofs for cloud storage Integrity Checking
    arXiv: Cryptography and Security, 2019
    Co-Authors: Faen Zhang, Xinyu Fan, Pengcheng Zhou, Wenfeng Zhou
    Abstract:

    With the wide application of cloud storage, cloud security has become a crucial concern. Related works have addressed security issues such as Data confidentiality and Integrity, which ensure that the remotely stored Data are well maintained by the cloud. However, how to define zero-knowledge proof algorithms for stored Data Integrity Check has not been formally defined and investigated. We believe that it is important that the cloud server is unable to reveal any useful information about the stored Data. In this paper, we introduce a novel definition of Data privacy for Integrity Checks, which describes very high security of a zero-knowledge proof. We found that all other existing remote Integrity proofs do not capture this feature. We provide a comprehensive study of Data privacy and an Integrity Check algorithm that captures Data Integrity, confidentiality, privacy, and soundness.

R S Lakshmi - One of the best experts on this subject based on the ideXlab platform.

  • Data confidentiality and Integrity verification using user authenticator scheme in cloud
    IEEE International Conference on High Performance Computing Data and Analytics, 2013
    Co-Authors: V Nirmala, R K Sivanandhan, R S Lakshmi
    Abstract:

    Cloud computing is the one which offers infrastructure to the client on a pay as you use model by leveraging on the Internet technology. As this model depicts the electricity billing it is often termed as utility computing. It offers various services to the client based on the need. The need of the resources can be scaled up or down on the basis of the requirement. The IT sectors started using cloud service models. As the use of cloud increases day by day the concerns of cloud also gets increased. There are number of Data breaches that are happening day by day that affect the cloud growth. The major concern in adapting cloud is its security. The companies have lot of Data that gets increased each day enlarges the complication of Data privacy and security. The Data that we talk can be classified as either stagnant Data i.e., for simple storage as offered by Amazon's Simple Storage Service (S3) or it can be vibrant that changes often. The solution available to protect the stagnant Data will be to simply encrypt the Data before it gets stored in the server. In order to solve the issues of vibrant Data the techniques are being proposed to work out on the encrypted. This paper is a survey of different security issues that affects the cloud environment and related work that are carried out in the area of Integrity. The technique proposed combines the encrypting mechanism along with the Data Integrity Check mechanism. The Data are double wrapped to ensure no Data leakage happens at the server side. The Data are also shared with users with proper access mechanism.

Xinyu Fan - One of the best experts on this subject based on the ideXlab platform.

  • Zero knowledge proofs for cloud storage Integrity Checking
    arXiv: Cryptography and Security, 2019
    Co-Authors: Faen Zhang, Xinyu Fan, Pengcheng Zhou, Wenfeng Zhou
    Abstract:

    With the wide application of cloud storage, cloud security has become a crucial concern. Related works have addressed security issues such as Data confidentiality and Integrity, which ensure that the remotely stored Data are well maintained by the cloud. However, how to define zero-knowledge proof algorithms for stored Data Integrity Check has not been formally defined and investigated. We believe that it is important that the cloud server is unable to reveal any useful information about the stored Data. In this paper, we introduce a novel definition of Data privacy for Integrity Checks, which describes very high security of a zero-knowledge proof. We found that all other existing remote Integrity proofs do not capture this feature. We provide a comprehensive study of Data privacy and an Integrity Check algorithm that captures Data Integrity, confidentiality, privacy, and soundness.