What are you looking for ?
Infinidat
Articles_top

R&D: Improved Multi-Party Verification Protocol With Reduced Computational Overhead in Cloud Storage

Proposed scheme can be implemented on semi-trusted cloud environments and allows set of server nodes called ingestion nodes to compute on private inputs thus preserving privacy and soundness of computing data.

Concurrency and Computation Practice and Experience has published an article written by Anju Susan George, and A. Shajin Nargunam, Department of Computer Science and Engineering, Noorul Islam Centre for Higher Education, Thuckalay, India.

Abstract: Although in industry and academia cloud computing provides several services, cloud storage is the most unavoidable one. Cloud storage allows remote data validation of the deployed user’s data without keeping a local copy. A third-party auditor is delegated by the users in order to examine the remote data integrity thereby reducing the burden of the users. Data integrity checking protects the user’s data from tinkering and illicit access especially when they store data in public clouds such as AWS. Various schemes were proposed by several scholars which possess computational overhead and communication overhead during the integrity checking. Most of the schemes proposed were possessing computational overhead in the cloud server side which increases the financial overwhelming of the clients. In this article an improved multiparty computation architecture is proposed to minimize the computational overhead in the cloud server side while generating the proof of the data blocks in public clouds. The proposed scheme can be implemented on semi-trusted cloud environments and allows a set of server nodes called ingestion nodes to compute on private inputs thus preserving the privacy and soundness of the computing data. The improved protocol also uses an indistinguishability obfuscation program with a message authentication code tag to minimize the verification overhead of the third-party auditor as well as preserves the privacy and security of the stored data.

Articles_bottom
AIC
ATTO
OPEN-E