##plugins.themes.academic_pro.article.main##

Abstract

The cloud computing is the emerging technology growing rapidly with its services. Cloud storage is one of the many services it is rendering. This cloud storage not only allows the clients to store their huge volume of precious data, also provides a facility to move the data out to the other cloud storage or data centers .In these cases, the data may be corrupted or may be compromised by data centers. Hence the clients must be alert to assure the integrity and correctness of their data.

This paper aims to provide assurance of integrity, hence DIP is put forth. The issues fault tolerance and recovery procedures are addressed as additional features.  Regenerating codes are introduced to give the above said features by distributing the chunks of data among different servers randomly and only the lost part of data is regenerated in to new server. Thus repair traffic is minimized and fault tolerance is provided. The tests are conducted under different parameters for the efficiency.

Keywords: Cloud storage, Data integrity, fault tolerance, regenerating codes, repair traffic

##plugins.themes.academic_pro.article.details##

Author Biographies

Bhavyashree K P, Shridevi Institute of Engineering and Tech., Tumkur

Master of Technology, Dept of Computer Science

GuruPrakash C D, Shridevi Institute of Engineering and Tech., Tumkur

Head & Professor, Dept of Computer science,
How to Cite
K P, B., & C D, G. (2015). Assuring Data Integrity in Cloud Using Regenerating Codes. International Journal of Emerging Trends in Science and Technology, 2(06). Retrieved from http://igmpublication.org/ijetst.in/index.php/ijetst/article/view/749

References

1. A. Juels and B. Kaliski Jr., “PORs: Proofs of Retrievability for Large Files,” Proc. 14th ACM Conf. Computer and Comm. Security (CCS ’07), 2007.
2. G. Ateniese, R. Burns, R. Curtmola, J. Herring, O. Khan, L. Kissner, Z. Peterson, and D. Song, “Remote Data Checking Using Provable Data Possession,” ACM Trans. Information and System Security, vol. 14, article 12, May 2011.
3. R. Curtmola, O. Khan, R. Burns, and G. Ateniese, “MR-PDP: Multiple- Replica Provable Data Possession,” Proc. IEEE 28th Int’l Conf. Distributed Computing Systems (ICDCS ’08), 2008.
4. K. Bowers, A. Juels, and A. Oprea, “HAIL: A High-Availability and Integrity Layer for Cloud Storage,” Proc. 16th ACM Conf. Computer & Comm. Security (CCS ’09), 2009.
5. Y. Hu, Chen, P. Lee, and Y. Tang, “NCCloud: Applying Network Coding for the Storage Repair in a Cloud-of-Clouds,” Proc.10th USENIX Conf. File and Storage Technologies (FAST ’12),2012.
6. H.C.H. Chen and P.P.C. Lee, “Enabling Data Integrity Protection in Regenerating Coding-Based Cloud Storage”, Proc. IEEE 31 st Symp. Reliable Distributed Systems (SRDS’12),2012.