Research Article Open Access

Data Integrity Proof and Secure Computation in Cloud Computing

Veeralakshmi Ponnuramu1 and Latha Tamilselvan1
  • 1 B.S. Abdur Rahman University, India
Journal of Computer Science
Volume 8 No. 12, 2012, 1987-1995

DOI: https://doi.org/10.3844/jcssp.2012.1987.1995

Submitted On: 9 August 2012 Published On: 5 December 2012

How to Cite: Ponnuramu, V. & Tamilselvan, L. (2012). Data Integrity Proof and Secure Computation in Cloud Computing. Journal of Computer Science, 8(12), 1987-1995. https://doi.org/10.3844/jcssp.2012.1987.1995

Abstract

Cloud computing is an emerging computing paradigm in which information technology resources and capacities are provided as services over the internet. The users can remotely store their data into the cloud so that the users can be relieved from the burden of local data storage and maintenance. The user does not have any control on the remotely located data. This unique feature possess many security challenges. One of the important concern is the integrity of data and computations. To ensure correctness of user’s data in the cloud, an effective scheme assuring the integrity of the data stored in the cloud is proposed. We try to obtain and prove that the data stored in the cloud is not modified by the provider, thereby ensuring the integrity of data. To ensure secure computation our scheme uses the Merkle hash tree for checking the correctness of computations done by the cloud service provider. Algorithms are implemented using java core concepts and java Remote Method Invocation (RMI) concepts for client-server communication by setting up the private cloud environment with eucalyptus tool. This method is used to assure data integrity and secured computations with reduced computational and storage overhead of the client.

  • 1,706 Views
  • 2,600 Downloads
  • 2 Citations

Download

Keywords

  • Cloud Computing Security
  • Data Storage
  • Merkle Hash Tree
  • Commitment Generation