An adaptive methodology for integrity checking in cloud storage

1Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Majority of the organization uses cloud for storage purpose in order to reduce the cost as well as maintenance. Due to increasing threat from internal and external sources, there would be possibility of corruption in the cloud storage files. Thus the storage must to be monitored periodically for integrity checking. Since most of the Data Owners have limited resources thus the responsibility of integrity checking goes to the Third Party Auditors (TPA). Usually the static way of deciding to use particular hash tree methodology to store the cloud storage meta-data, which is mainly used for integrity checking throughout is inappropriate for two main reasons, firstly, due to more fluctuated loss or corrupted cloud data, secondly, based on the variations in the number of files in the cloud users’ directory; Initially the static approach would be good but it may not be optimal solution at the later period. therefore, in this paper, we have proposed Adaptive Integrity Checking method (AIC), which would lead a way for adaptive dynamic hash tree methodology for holding the cloud storage meta-data; which would drastically increases the performance of integrity checking in terms of both time and space complexity besides the benefits obtained in the EDHT-n version and HEDHT methodologies of handling the cloud storage integrity checking.

Cite

CITATION STYLE

APA

Jambulingam, L., Ananthan, T. V., & Rajakumar, P. S. (2019). An adaptive methodology for integrity checking in cloud storage. International Journal of Engineering and Advanced Technology, 8(6), 4470–4475. https://doi.org/10.35940/ijeat.F8989.088619

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free