Skip to main content

Multi-agent Based Dynamic Data Integrity Protection in Cloud Computing

  • Conference paper

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 142))

Abstract

Cloud computing is the emerging worldwide technology to mitigate the burden of the users by providing different types of services. There are numerous of critical questions in data protection to answer before adopting this new cloud technology. Data integrity protection is one of the prime challenge in the cloud computing because the data is located in the third party server. This paper proposes an efficient multi-agent based static and dynamic data integrity protection by periodically verifying the hash value of the files stored in the enormous date storage. In order to provide optimized result we propose to take an adequate chunk of data in a randomized fashion, instead of the whole cumulative hash value to the data owner for integrity check. The matching process of the hash value by the agent can identify the malicious change on the data stored in the remote server and it will recover the data efficiently through its backup storage.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Wilson, L.F., Burroughs, D.J., Kumar, A., Sucharitaves, J.: A Framework for Linking Distributed Simulations Using Software Agents. Proceedings of the IEEE 89(2), 186–200 (2001) (invited paper)

    Article  Google Scholar 

  2. Lillibridge, M., Elnikety, S., Birrell, A., Burrows, M., Isard, M.: A Cooperative Internet Backup Scheme. In: Proceedings of the 2003 USENIX Annual Technical Conference (General Track), pp. 29–41 (2003)

    Google Scholar 

  3. Schwarz, T.S.J., Miller, E.L.: Store, Forget, and Check: Using Algebraic Signatures to Check Remotely Administered Storage. In: Proceedings of ICDCS 2006, p.12(2006)

    Google Scholar 

  4. Filho, D. L. G., Barreto, P. S. L. M.: Demonstrating Data Possession and Uncheatable Data Transfer. Cryptology ePrint Archive, Report 2006/150 (2006), http://eprint.iacr.org/

  5. Shah, M.A., Baker, M., Mogul, J.C., Swaminathan, R.: Auditing to Keep Online Storage Services Honest. In: Proceedings of 11th USENIX Workshop on Hot Topics in Operating Systems (HOTOS 2007), pp. 1–6 (2007)

    Google Scholar 

  6. Juels, J., Kaliski, B.S.: PORs: Proofs of Retrievability for Large Files. In: Proceedings of CCS 2007, pp. 584–597 (2007)

    Google Scholar 

  7. Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable Data Possession at Untrusted Stores. In: Proceedings Of CCS 2007, pp. 598–609 (2007)

    Google Scholar 

  8. Bowers, K. D., Juels, A., Oprea, A.: Proofs of Retrievability: Theory and Implementation. Cryptology ePrint Archive, Report 2008/175 (2008), http://eprint.iacr.org/

  9. Ateniese, G., Pietro, R.D., Mancini, L.V., Tsudik, G.: Scalable and Efficient Provable Data Possession. In: Proceedings of SecureComm. 2008, pp. 1–10 (2008)

    Google Scholar 

  10. Bowers, K. D., Juels, A., Oprea, A.: HAIL: A High-Availability and Integrity Layer for Cloud Storage. Cryptology ePrint Archive, Report 2008/489 (2008), http://eprint.iacr.org/

  11. Wang, C., Wang, Q., Ren, K., Lou, W.: Ensuring Data Storage Security in Cloud Computing. In: Proceedings of 17th International Workshop on Quality of Service, IWQoS, pp. 1–9 (2009)

    Google Scholar 

  12. Urquhart, J.: The Biggest Cloud- 2. Computing Issue of 2009 is Trust. C-Net News (2009), http://news.cnet.com/830119413_3-10133487-240.html

  13. Whitney, L.: Air Force taps IBM for secure cloud, http://news.cnet.com/8301-1009_3-1447483-83.html

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Venkatesan, S., Vaish, A. (2011). Multi-agent Based Dynamic Data Integrity Protection in Cloud Computing. In: Das, V.V., Stephen, J., Chaba, Y. (eds) Computer Networks and Information Technologies. CNC 2011. Communications in Computer and Information Science, vol 142. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-19542-6_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-19542-6_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-19541-9

  • Online ISBN: 978-3-642-19542-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics