P. Srinivas, Dr.R. V. Krishnaiah


To the rising storage costs of IT Enterprises, the cloud computing has been envisioned as the de-facto solution. For enterprises to frequently update their hardware with the high costs of data storage devices as well as the rapid rate at which data is being generated it proves costly. A part from decrease in storage costs data outsourcing to the cloud also helps in sinking the safeguarding. User does not have any control as they are remotely located and cloud storage moves the user’s data to large data centers. However, this exclusive feature of the cloud poses many new safety challenges which need to be clearly unspoken and resolved. To assure the customer of the integrity i.e. correctness of his data in the cloud is one of the important concerns that need to be addressed is. To check if the reliability of his data is maintained or is compromised as the data is physically not accessible to the user the cloud should provide a way for the user. In this paper, to check the correctness of data in the cloud, a scheme which gives a proof of data integrity in the cloud which the customer can employ is proposed here. Both the cloud and the customer and can be incorporated in the Service level agreement (SLA) and this proof can be agreed. This method ensures that the storage space at the client side is negligible which will be valuable for thin clients.


Data Validation, Reliability, Cloud Storage, Service Level Agreement, Data Centers.


E. Mykletun, M. Narasimha, and G. Tsudik, “Authentication and integrity in outsourced databases,” Trans. Storage, vol. 2, no. 2, pp. 107–138, 2006.

D. X. Song, D. Wagner, and A. Perrig, “Practical techniques for searches on encrypted data,” in SP ’00: Proceedings of the 2000 IEEE Symposium on Security and Privacy. Washington, DC, USA: IEEE Computer Society, 2000, p. 44.

A. Juels and B. S. Kaliski, Jr., “Pors: proofs of retrievability for large files,” in CCS ’07: Proceedings of the 14th ACM conference on Computer and communications security. New York, NY, USA: ACM, 2007, pp. 584–597.

G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable data possession at untrusted stores,” in CCS ’07: Proceedings of the 14th ACM conference on Computer and communications

security. New York, NY, USA: ACM, 2007, pp. 598–609

Data Integrity Proofs in Cloud Storage by Sravan Kumar R, Ashutosh Saxena

Full Text: PDF


  • There are currently no refbacks.

Copyright © 2012 - 2023, All rights reserved.|

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at