کد مقاله | کد نشریه | سال انتشار | مقاله انگلیسی | نسخه تمام متن |
---|---|---|---|---|
4955963 | 1444376 | 2017 | 13 صفحه PDF | دانلود رایگان |
عنوان انگلیسی مقاله ISI
RITS-MHT: Relative indexed and time stamped Merkle hash tree based data auditing protocol for cloud computing
دانلود مقاله + سفارش ترجمه
دانلود مقاله ISI انگلیسی
رایگان برای ایرانیان
کلمات کلیدی
موضوعات مرتبط
مهندسی و علوم پایه
مهندسی کامپیوتر
شبکه های کامپیوتری و ارتباطات
پیش نمایش صفحه اول مقاله

چکیده انگلیسی
Cloud computing is a recent phrase in marketing for a concept which has been known for years: Outsourcing. Cloud computing provides cornucopian of gratuities for both individual users and business organizations. 'Cloud' is more of a notion where files and data are hosted online and can be accessed when required via a number of methods, anywhere, and at any time. That is the gist of it. Providing storage space to cloud users is an appealing service of cloud computing. Although cloud storage provides benefits of location independence access to data, reduced burden for hardware and software maintenance and many more, yet this service has several challenges in the range of security and preserving data. Cloud servers may exist in white puffy shapes in the azure, but these are not immune to temporal errors. To ensure that outsourced data is secure and is not tampered, cloud provider must allow data proprietor to periodically audit data integrity. Numerous Remote Data Auditing (RDA) protocols have been proposed by researchers so far. In presented work, to cope with this problem we analyze the efficiency issues of a current protocol for data integrity auditing in cloud storage and propose an approach based on Relative Index and Time Stamped Merkle Hash Tree (RITSââMHT) which integrates MHT with relative index of a node resulting in reduction of computation cost of searching a data block from O(n) in Wang's protocol to O(log n) and time of last modification to data, thereby guarantying freshness of data respectively. RITSââMHT ensures that the outsourced data has not been polluted as well as it assures that the recent copy of data is reclaimed. This protocol supports public auditing of data, and efficiently supports data dynamic operations like insertion, modification, deletion of outsourced data at minimal computational cost. The security of proposed protocol has been proved in Random Oracle Model (ROM). As compared to Wang's protocol, RITSââMHT is more efficient in terms of computation cost.
ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Journal of Network and Computer Applications - Volume 84, 15 April 2017, Pages 1-13
Journal: Journal of Network and Computer Applications - Volume 84, 15 April 2017, Pages 1-13
نویسندگان
Neenu Garg, Seema Bawa,