z-logo
open-access-imgOpen Access
An Efficient Methodologies for Data Integrity in Cloud Storage
Author(s) -
L Jambulingam*,
T V Ananthan,
Sumathy Eswaran
Publication year - 2019
Publication title -
international journal of innovative technology and exploring engineering
Language(s) - English
Resource type - Journals
ISSN - 2278-3075
DOI - 10.35940/ijitee.i8621.078919
Subject(s) - cloud storage , computer science , merkle tree , data integrity , cloud computing , directory , hash function , database , computer data storage , computer security , distributed computing , operating system , hash chain
Majority of the organization uses cloud for storage purpose in order to reduce the cost as well as maintenance. Due to increasing threat from internal and external sources, there would be possibility of corruption in the cloud storage files. Thus the storage must to be monitored periodically for integrity checking. Since most of the Data Owners have limited resources thus the responsibility of integrity checking goes to the Third Party Auditors (TPA). In this paper, we have proposed 2 methodologies of Integrity Checking in Cloud Storage (1) Enhanced Dynamic Hash Tree – n Versions (EDHT-n), which has best performance in term of time and space complexity compared to the existing methods.(2) Hybrid Enhanced Dynamic Hash Tree (HEDHT), which is best suited for very huge number of files in a directory

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here