Abstract
Cloud computing is the emerging worldwide technology to mitigate the burden of the users by providing different types of services. There are numerous of critical questions in data protection to answer before adopting this new cloud technology. Data integrity protection is one of the prime challenge in the cloud computing because the data is located in the third party server. This paper proposes an efficient multi-agent based static and dynamic data integrity protection by periodically verifying the hash value of the files stored in the enormous date storage. In order to provide optimized result we propose to take an adequate chunk of data in a randomized fashion, instead of the whole cumulative hash value to the data owner for integrity check. The matching process of the hash value by the agent can identify the malicious change on the data stored in the remote server and it will recover the data efficiently through its backup storage.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Wilson, L.F., Burroughs, D.J., Kumar, A., Sucharitaves, J.: A Framework for Linking Distributed Simulations Using Software Agents. Proceedings of the IEEE 89(2), 186–200 (2001) (invited paper)
Lillibridge, M., Elnikety, S., Birrell, A., Burrows, M., Isard, M.: A Cooperative Internet Backup Scheme. In: Proceedings of the 2003 USENIX Annual Technical Conference (General Track), pp. 29–41 (2003)
Schwarz, T.S.J., Miller, E.L.: Store, Forget, and Check: Using Algebraic Signatures to Check Remotely Administered Storage. In: Proceedings of ICDCS 2006, p.12(2006)
Filho, D. L. G., Barreto, P. S. L. M.: Demonstrating Data Possession and Uncheatable Data Transfer. Cryptology ePrint Archive, Report 2006/150 (2006), http://eprint.iacr.org/
Shah, M.A., Baker, M., Mogul, J.C., Swaminathan, R.: Auditing to Keep Online Storage Services Honest. In: Proceedings of 11th USENIX Workshop on Hot Topics in Operating Systems (HOTOS 2007), pp. 1–6 (2007)
Juels, J., Kaliski, B.S.: PORs: Proofs of Retrievability for Large Files. In: Proceedings of CCS 2007, pp. 584–597 (2007)
Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable Data Possession at Untrusted Stores. In: Proceedings Of CCS 2007, pp. 598–609 (2007)
Bowers, K. D., Juels, A., Oprea, A.: Proofs of Retrievability: Theory and Implementation. Cryptology ePrint Archive, Report 2008/175 (2008), http://eprint.iacr.org/
Ateniese, G., Pietro, R.D., Mancini, L.V., Tsudik, G.: Scalable and Efficient Provable Data Possession. In: Proceedings of SecureComm. 2008, pp. 1–10 (2008)
Bowers, K. D., Juels, A., Oprea, A.: HAIL: A High-Availability and Integrity Layer for Cloud Storage. Cryptology ePrint Archive, Report 2008/489 (2008), http://eprint.iacr.org/
Wang, C., Wang, Q., Ren, K., Lou, W.: Ensuring Data Storage Security in Cloud Computing. In: Proceedings of 17th International Workshop on Quality of Service, IWQoS, pp. 1–9 (2009)
Urquhart, J.: The Biggest Cloud- 2. Computing Issue of 2009 is Trust. C-Net News (2009), http://news.cnet.com/830119413_3-10133487-240.html
Whitney, L.: Air Force taps IBM for secure cloud, http://news.cnet.com/8301-1009_3-1447483-83.html
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Venkatesan, S., Vaish, A. (2011). Multi-agent Based Dynamic Data Integrity Protection in Cloud Computing. In: Das, V.V., Stephen, J., Chaba, Y. (eds) Computer Networks and Information Technologies. CNC 2011. Communications in Computer and Information Science, vol 142. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-19542-6_13
Download citation
DOI: https://doi.org/10.1007/978-3-642-19542-6_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-19541-9
Online ISBN: 978-3-642-19542-6
eBook Packages: Computer ScienceComputer Science (R0)