Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/4676
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSaxena, Rajaten_US
dc.contributor.authorDey, Somnathen_US
dc.date.accessioned2022-03-17T01:00:00Z-
dc.date.accessioned2022-03-17T15:35:08Z-
dc.date.available2022-03-17T01:00:00Z-
dc.date.available2022-03-17T15:35:08Z-
dc.date.issued2016-
dc.identifier.citationSaxena, R., & Dey, S. (2016). Cloud audit: A data integrity verification approach for cloud computing. Paper presented at the Procedia Computer Science, , 89 142-151. doi:10.1016/j.procs.2016.06.024en_US
dc.identifier.issn1877-0509-
dc.identifier.otherEID(2-s2.0-84986537204)-
dc.identifier.urihttps://doi.org/10.1016/j.procs.2016.06.024-
dc.identifier.urihttps://dspace.iiti.ac.in/handle/123456789/4676-
dc.description.abstractCloud computing is the fastest growing and promising field in the sector of service provision. It is a very trendy situation for security implementation in the Cloud. Thus, security restrictions are increasing on users and service providers as the growth of Cloud environment. The purpose of this paper is to suggest a better and efficient integrity verification technique for data (referred as "Cloud Audit"). The building blocks of our technique are a variant of the Paillier homomorphic cryptography system with homomorphic tag and combinatorial batch codes. A Paillier Homomorphic Cryptography (PHC) system used to obtain homomorphic encryption on data blocks. Homomorphic tags along with the Paillier cryptography system assigns a special verifiable value to each data block, which helps us in unleashing data operations on this block. Combinatorial batch codes are used to assign and store integral data into different distributed cloud sever. To demonstrate our approach, we have implemented an application based on Hadoop and MapReduce framework. We have tested this application based on various parameters. Effectiveness of the proposed method has been shown by the experimental results. Our method has shown large improvement over the other modern methods. © 2016 The Authors. Published by Elsevier B.V. This is an open access article under the CC BY-NC-ND license.en_US
dc.language.isoenen_US
dc.publisherElsevier B.V.en_US
dc.sourceProcedia Computer Scienceen_US
dc.subjectCloud computingen_US
dc.subjectCodes (symbols)en_US
dc.subjectCryptographyen_US
dc.subjectData miningen_US
dc.subjectImage processingen_US
dc.subjectWarehousesen_US
dc.subjectCombinatorial Batch Codes (CBC)en_US
dc.subjectHomomorphic cryptographyen_US
dc.subjectHomomorphic Tagen_US
dc.subjectProof of retrievabilityen_US
dc.subjectProvable data possessionsen_US
dc.subjectThird party auditingen_US
dc.subjectSignal processingen_US
dc.titleCloud Audit: A Data Integrity Verification Approach for Cloud Computingen_US
dc.typeConference Paperen_US
dc.rights.licenseAll Open Access, Gold-
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: