Multi-agent Based Dynamic Data Integrity Protection in Cloud Computing

  • S. Venkatesan
  • Abhishek Vaish
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 142)


Cloud computing is the emerging worldwide technology to mitigate the burden of the users by providing different types of services. There are numerous of critical questions in data protection to answer before adopting this new cloud technology. Data integrity protection is one of the prime challenge in the cloud computing because the data is located in the third party server. This paper proposes an efficient multi-agent based static and dynamic data integrity protection by periodically verifying the hash value of the files stored in the enormous date storage. In order to provide optimized result we propose to take an adequate chunk of data in a randomized fashion, instead of the whole cumulative hash value to the data owner for integrity check. The matching process of the hash value by the agent can identify the malicious change on the data stored in the remote server and it will recover the data efficiently through its backup storage.


Cloud Computing Data Integrity Multi-Agent systems 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Wilson, L.F., Burroughs, D.J., Kumar, A., Sucharitaves, J.: A Framework for Linking Distributed Simulations Using Software Agents. Proceedings of the IEEE 89(2), 186–200 (2001) (invited paper)CrossRefGoogle Scholar
  2. 2.
    Lillibridge, M., Elnikety, S., Birrell, A., Burrows, M., Isard, M.: A Cooperative Internet Backup Scheme. In: Proceedings of the 2003 USENIX Annual Technical Conference (General Track), pp. 29–41 (2003)Google Scholar
  3. 3.
    Schwarz, T.S.J., Miller, E.L.: Store, Forget, and Check: Using Algebraic Signatures to Check Remotely Administered Storage. In: Proceedings of ICDCS 2006, p.12(2006)Google Scholar
  4. 4.
    Filho, D. L. G., Barreto, P. S. L. M.: Demonstrating Data Possession and Uncheatable Data Transfer. Cryptology ePrint Archive, Report 2006/150 (2006),
  5. 5.
    Shah, M.A., Baker, M., Mogul, J.C., Swaminathan, R.: Auditing to Keep Online Storage Services Honest. In: Proceedings of 11th USENIX Workshop on Hot Topics in Operating Systems (HOTOS 2007), pp. 1–6 (2007)Google Scholar
  6. 6.
    Juels, J., Kaliski, B.S.: PORs: Proofs of Retrievability for Large Files. In: Proceedings of CCS 2007, pp. 584–597 (2007)Google Scholar
  7. 7.
    Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable Data Possession at Untrusted Stores. In: Proceedings Of CCS 2007, pp. 598–609 (2007)Google Scholar
  8. 8.
    Bowers, K. D., Juels, A., Oprea, A.: Proofs of Retrievability: Theory and Implementation. Cryptology ePrint Archive, Report 2008/175 (2008),
  9. 9.
    Ateniese, G., Pietro, R.D., Mancini, L.V., Tsudik, G.: Scalable and Efficient Provable Data Possession. In: Proceedings of SecureComm. 2008, pp. 1–10 (2008)Google Scholar
  10. 10.
    Bowers, K. D., Juels, A., Oprea, A.: HAIL: A High-Availability and Integrity Layer for Cloud Storage. Cryptology ePrint Archive, Report 2008/489 (2008),
  11. 11.
    Wang, C., Wang, Q., Ren, K., Lou, W.: Ensuring Data Storage Security in Cloud Computing. In: Proceedings of 17th International Workshop on Quality of Service, IWQoS, pp. 1–9 (2009)Google Scholar
  12. 12.
    Urquhart, J.: The Biggest Cloud- 2. Computing Issue of 2009 is Trust. C-Net News (2009),
  13. 13.
    Whitney, L.: Air Force taps IBM for secure cloud,

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • S. Venkatesan
    • 1
  • Abhishek Vaish
    • 1
  1. 1.Indian Institute of Information TechnologyAllahabadIndia

Personalised recommendations