Skip to main content
Log in

A proficient remote information responsibility check protocol in multi-cloud environment

  • Special Issue
  • Published:
Evolutionary Intelligence Aims and scope Submit manuscript


Remote information respectability is one of the testing issues in the distributed storage framework which guarantees to deal with the re-appropriating information securely without downloading the entire information. Because of some useful circumstances, there is a need to spare the customer’s information is distributed over multi-cloud servers. In the interim, the information honesty confirmation convention ought to viable for diminishing the verifier cost. Existing information respectability approaches depend on hash capacities and advanced marks which are not fitting for the remote multi-cloud condition because of high computational over-burden and remote in nature. Furthermore, another current issue is that aggressors can hack the information in few occasions from the cloud regardless of the way that information respectability checking convention was presented. Remembering these issues, in this work, we anticipate a multi-cloud confined information respectability checking convention. The proposed technique offers consistent assertion towards the customer and assesses the data, which is immovably settled with the help of the new information respectability checking convention. At the point when an aggressor attempts to take the data in multi-cloud, the proposed continuous reviewing system will help the verifier to execute square dimension checking to ensure the information respectability through the one-round test-response or test reaction technique. A multi-cloud data integrity verification protocol is presented in test plan that depends on signature and symmetric keys. Using the proposed method, the clients can test the engaged information in one phase test reaction interaction with little transmission cost. In addition, it empowers public auditing and helps dynamic information preservation that enables the clients to adjust and erase the data with minimized execution overhead. For evaluating the execution of the proposed technique interms of information trustworthiness, a broad arrangement of experimentation happens. The proposed work enables various clients to manage remote cloud information. The execution of the proposed method is verified concerning update, verify, and inquiry time cost. From the accomplished outcomes, it is discovered that the proposed technique ensures the nature of administration and fixed security by having reasonable refresh time and a strict confirmation rule separate.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others


  1. Sotomayor B, Montero RS, Llorente IM, Foster I (2009) Virtual infrastructure management in private and hybrid clouds. IEEE Internet Comput 13(5):14–22

    Article  Google Scholar 

  2. Kumar K, Lu YH (2010) Cloud computing for mobile users: can offloading computation save energy? Computer 43(4):51–56

    Article  Google Scholar 

  3. Zhu Y, Hu H, Ahn GJ, Yu M (2012) Cooperative provable data possession for integrity verification in multicloud storage. IEEE Trans Parallel Distrib Syst 23(12):2231–2244

    Article  Google Scholar 

  4. Li A, Tan S, Jia Y (2019) A method for achieving provable data integrity in cloud computing. J Supercomput 75(1):92–108

    Article  Google Scholar 

  5. Tian H, Nan F, Chang CC, Huang Y, Lu J, Du Y (2019) Privacy-preserving public auditing for secure data storage in fog-to-cloud computing. J Netw Comput Appl 127:59–69

    Article  Google Scholar 

  6. Parwekar P (2011) From internet of things towards cloud of things. In: 2011 2nd international conference on computer and communication technology (ICCCT-2011). IEEE, pp 329–333

  7. Parwekar P, Kumar P, Saxena M, Saxena S (2014) Public auditing: cloud data storage. In: 2014 5th international conference-confluence the next generation information technology summit (confluence). IEEE, pp 169–173

  8. Jiang T, Chen X, Ma J (2016) Public integrity auditing for shared dynamic cloud data with group user revocation. IEEE Trans Comput 65(8):2363–2373

    Article  MathSciNet  Google Scholar 

  9. Wang B, Li B, Li H (2015) Panda: public auditing for shared data with efficient user revocation in the cloud. IEEE Trans Serv Comput 8(1):92–106

    Article  Google Scholar 

  10. Yuan J, Yu S (2014) Efficient public integrity checking for cloud data sharing with multi-user modification. In: INFOCOM, 2014 Proceedings IEEE. IEEE, pp 2121–2129

  11. Raghavendra S, Geeta CM, Buyya R, Venugopal KR, Iyengar SS, Patnaik LM (2015) MSIGT: most significant index generation technique for cloud environment. In: India conference (INDICON), 2015 annual IEEE. IEEE, pp 1–6

  12. Li J, Li J, Chen X, Jia C, Lou W (2015) Identity-based encryption with outsourced revocation in cloud computing. IEEE Trans Comput 64(2):425–437

    Article  MathSciNet  Google Scholar 

  13. Geeta CM, Raghavendra S, Buyya R, Venugopal KR, Iyengar SS, Patnaik LM (2018) Data auditing and security in cloud computing: issues, challenges and future directions. Int J Comput (IJC) 28(1):8–57

    Google Scholar 

  14. Ni J, Yu Y, Mu Y, Xia Q (2014) On the security of an efficient dynamic auditing protocol in cloud storage. IEEE Trans Parallel Distrib Syst 25(10):2760–2761

    Article  Google Scholar 

  15. Yang K, Jia X (2013) An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Trans Parallel Distrib Syst 24(9):1717–1726

    Article  Google Scholar 

  16. Dara US, Chandra MS (2013) Integrity verification in multiple cloud storage using cooperative PDP method. Int J Eng Trends Technol 4(9):132–138

    Google Scholar 

  17. Yuan J, Yu S (2015) Public integrity auditing for dynamic data sharing with multiuser modification. IEEE Trans Inf Forensics Secur 10(8):1717–1726

    Article  Google Scholar 

  18. Hao Z, Zhong S, Yu N (2011) A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability. IEEE Trans Knowl Data Eng 23(9):1432–1437

    Article  Google Scholar 

  19. Yu Y, Au MH, Mu Y, Tang S, Ren J, Susilo W, Dong L (2015) Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage. Int J Inf Secur 14(4):307–318

    Article  Google Scholar 

  20. Fan X, Yang G, Mu Y, Yu Y (2013) On indistinguishability in remote data integrity checking. Comput J 58(4):823–830

    Article  Google Scholar 

  21. Wang H, Zhang Y (2014) On the knowledge soundness of a cooperative provable data possession schemein multicloud storage. IEEE Trans Parallel Distrib Syst 25(1):264–267

    Article  Google Scholar 

  22. Wang H, He D, Tang S (2016) Identity-based proxy-oriented data uploading and remote data integritychecking in public cloud. IEEE Trans Inf Forensics Secur 11(6):1165–1176

    Article  Google Scholar 

  23. Wang H (2015) Identity-based distributed provable data possession in multicloud storage. IEEE Trans Serv Comput 2:328–340

    Article  Google Scholar 

  24. Begam OR, Manjula T, Manohar TB, Susrutha B (2012) Cooperative schedule data possession for integrityverification in multi-cloud storage. Int J Modern Eng Res (IJMER) 3:2726–2741

    Google Scholar 

Download references

Author information

Authors and Affiliations


Corresponding author

Correspondence to H. AnwarBasha.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.



See Figs. 7, 8, 9, 10, 11, 12, 13 and 14.

Fig. 7
figure 7

Cloud starting window

Fig. 8
figure 8

Data owner page and multi-cloud storage

Fig. 9
figure 9

Owner file uploading

Fig. 10
figure 10

Multi cloud environment (Uploading data owner file to split and store the different cloud environment)

Fig. 11
figure 11

Modification process (Malicious operations performed on the data owner file i.e., misbehave to the original file like delete, insert, modification)

Fig. 12
figure 12

TPA login window

Fig. 13
figure 13

Auditing process

Fig. 14
figure 14

Auditing result

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

AnwarBasha, H., SasiKumar, S., Dhanasekaran, D. et al. A proficient remote information responsibility check protocol in multi-cloud environment. Evol. Intel. 14, 453–467 (2021).

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: