Abstract

In cloud environment, huge quantity of data has been generated at each and every second. In order to manage the data, cloud service provider makes use of multi-cloud platform to fulfill the requirement. The service provider cooperatively operates altogether for the accessibility of resources and are improvised by implementing the dynamic operation that can run at a time through the Multi-cloud environment. This paper presents a Dynamic Level Based Integrity Checking Protocol (DA-ICP) for storing data in multicloud environment. The proposed method introduces Provable Data Possession (PDP) approach which enables a user who outsources the data at an untrusted multi-cloud for ensuring that the server possesses the original data without downloading it. This model creates a probabilistic proof of possession by sampling an arbitrary collection of blocks from server that considerably minimizes the cost. The effective and secured outsourced data has been resolved using public key cryptography and undergo encryption using Efficient-PDP (EPDP). During experimentation, the presented DA-ICP shows a maximum accuracy of 96.78%. The proposed method uses Multi-cloud in DA-ICP which produces an efficient output than other existing techniques.

Highlights

  • In cloud environment, huge quantity of data has been generated at each and every second

  • The stake holder can make use of service on-demand high quality storage through shifting the data to cloud which offers through the cloud service providers

  • The stake holders save the data with a view to protect the data

Read more

Summary

Proposed data integrity checking protocol

A cloud storage system is assumed that has an un-trusted server and a user. The user stores the data in server with no local duplication. The user has to validate the data integrity which is store in un-trusted server that is remote and it is essentially significant one. The detection data is selected by probability which minimizes the computation at both verifier and server end. A set of five stages are comprised in the projected method: Setup, Linear congruential generation, Siggen, Agreement, Challenge, and Verification. The user chooses authentication index r and f (·) as Linear congruential generator function. The data blocks probability information is sent through the user to detect the{V , n, PX , t, Ma}C−1 verifier. The data is received through the verifier and employs client public key for decrypting the data. After decryption to estimation to be recognized for c data block, towards the client {C, n, PX , t, Na + 1, C}V−1 is sent.

Security analysis
Data dynamics
Performance validation
Conclusion
Author contributions
Findings
Additional information
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call