08-07-2017, 10:12 AM
Cloud computing is an important application for storing data in the cloud. Cloud computing platform prevent the Burdon from storing local data and also reduce maintenance cost. In cloud storage, data is transferred to a remotely located cloud server on which the user has no control. Cloud faithfully stores the data and returns it to the owner whenever necessary, but there is no guarantee that the data store in the cloud is secure or can not be modified by the cloud.
Outsourcing data to cloud storage servers is increasing the trend among many businesses and users because of their economic advantages. This essentially means that the owner (client) of the data moves their data to a third party cloud storage server which is supposed to - presumably by a fee - faithfully store the data with it and return it to the owner when necessary. Storing user data in the cloud despite its advantages has many interesting security concerns that should be thoroughly investigated to be a reliable solution to the problem of avoiding local storage of data. In this article, we discuss the problem of implementing a protocol to obtain a cloud data possession test, sometimes called the Recoverability Test (POR). This problem tries to obtain and verify a proof that the data stored by a user in a remote data storage in the cloud (called cloud storage files or simply files) is not modified by the file and therefore integrity Of the data is insured. Such verification systems prevent cloud storage files from forging or modifying data stored on it without the consent of the data owner by frequent monitoring of storage files. Such checks should allow the data owner to efficiently, frequently, quickly and safely verify that the file in the cloud is not cheating the owner. Cheating, in this context, means that the storage file can delete some of the data or you can modify some of the data. Reduced costs, accelerated processes and simplified management are vital to the success of an effective IT infrastructure.
Increasingly, companies are becoming more flexible to provide more flexible IT environments to help them achieve these goals. One such solution is Cloud Computing. Cloud Computing lets you assign tasks to a combination of software and services over a network. For example, storing large data in the cloud reduces costs and maintenance. But the customer is not aware of the storage location. Here the risk involved is the modification of data or manipulation of data. Because the client has no control over the data, the cloud provider must assure the customer that the data is not modified. In this article we propose a data correction scheme in which a third party can audit the data stored in the cloud and assure the client that the data is safe. This scheme ensures that storage on the client side is minimal, which will be beneficial to light clients. A POR is a protocol in which a server / file demonstrates to a client that a destination file F is intact, in the sense that the client can retrieve the entire F from the server with high probability. In a POR protocol, a file is encoded by a client before being transmitted to a storage provider for archiving. A POR allows bandwidth-efficient challenge response protocols to probabilistically ensure that a file is available from a remote storage provider.