Abstract
In cloud environment, huge quantity of data has been generated at each and every second. In order to manage the data, cloud service provider makes use of multi-cloud platform to fulfill the requirement. The service provider cooperatively operates altogether for the accessibility of resources and are improvised by implementing the dynamic operation that can run at a time through the Multi-cloud environment. This paper presents a Dynamic Level Based Integrity Checking Protocol (DA-ICP) for storing data in multicloud environment. The proposed method introduces Provable Data Possession (PDP) approach which enables a user who outsources the data at an untrusted multi-cloud for ensuring that the server possesses the original data without downloading it. This model creates a probabilistic proof of possession by sampling an arbitrary collection of blocks from server that considerably minimizes the cost. The effective and secured outsourced data has been resolved using public key cryptography and undergo encryption using Efficient-PDP (EPDP). During experimentation, the presented DA-ICP shows a maximum accuracy of 96.78%. The proposed method uses Multi-cloud in DA-ICP which produces an efficient output than other existing techniques.
Highlights
In cloud environment, huge quantity of data has been generated at each and every second
The stake holder can make use of service on-demand high quality storage through shifting the data to cloud which offers through the cloud service providers
The stake holders save the data with a view to protect the data
Summary
A cloud storage system is assumed that has an un-trusted server and a user. The user stores the data in server with no local duplication. The user has to validate the data integrity which is store in un-trusted server that is remote and it is essentially significant one. The detection data is selected by probability which minimizes the computation at both verifier and server end. A set of five stages are comprised in the projected method: Setup, Linear congruential generation, Siggen, Agreement, Challenge, and Verification. The user chooses authentication index r and f (·) as Linear congruential generator function. The data blocks probability information is sent through the user to detect the{V , n, PX , t, Ma}C−1 verifier. The data is received through the verifier and employs client public key for decrypting the data. After decryption to estimation to be recognized for c data block, towards the client {C, n, PX , t, Na + 1, C}V−1 is sent.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.