Skip to main content
Log in

Prediction of availability and integrity of cloud data using soft computing technique

  • Focus
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

In cloud computing, data storage is the most important task. In cloud storage, security and privacy are the major issues. To avoid such issues, we proposed a new protocol called availability and integrity verification protocol (AIVP) to predict the available space in cloud and verify the integrity of the stored data. For availability verification, this protocol is used to learn the size of the available data before it starts the storing process. Based on the learning, can find available storage space, cloud service provider will allow to store the data. This reduces the latency, communication cost and computational cost. For integrity verification, we separate the public data and private data and this leads to avoid the privacy issues. Private data will be integrated by the cloud service providers and the public data will be integrated by the third-party verifier. By using this verification process, it can avoid the security issues. In simulation results, proposed AIVP has outperformed the high-efficiency and throughput and this will cut the latency, computational cost and communication cost.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  • Al-Saffar AMH (2015) Identity-based approach for cloud data integrity in multi-cloud environment. Identity 4(8):505–509

    Google Scholar 

  • Brandenburger M, Cachin C, Knežević N (2015) Don’t trust the cloud, verify: integrity and consistency for cloud object stores. In: Proceedings of the 8th ACM international systems and storage conference. ACM, p 16

  • Cai BL, Zhang RQ, Zhou XB (2017) Experience availability: tail-latency oriented availability in software-defined cloud computing. J Comput Sci Technol 32(2):250–257

    Article  Google Scholar 

  • Chen Y, Wang F, Zhu L, Zhang Z (2015) A survey of remote data integrity checking: techniques and verification structures. Int J Grid Distrib Comput 8(4):179–198

    Article  Google Scholar 

  • Chen F, Zhang T, Chen J, Xiang T (2016) Cloud storage integrity checking: going from theory to practice. In: Proceedings of the 4th ACM international workshop on security in cloud computing, pp 24–28

  • El-Booz SA, Attiya G, El-Fishawy N (2016) A secure cloud storage system combining time-based one-time password and automatic blocker protocol. EURASIP J Inf Secur 2016(1):1–13

    Article  Google Scholar 

  • Endo PT, Rodrigues M, Gonçalves GE, Kelner J, Sadok JH, Curescu C (2016) High availability in clouds: systematic review and research challenges. J Cloud Comput 5:16

    Article  Google Scholar 

  • Garg N, Bawa S (2016) Comparative analysis of cloud data integrity auditing protocols. J Netw Comput Appl 66:17–32

    Article  Google Scholar 

  • Glass S, Portmann M, Muthukkumarasamy V (2016) Securing route and path integrity in multihop wireless networks. In: Security of self-organizing networks: MANET, WSN, WMN, VANET

  • Jogdand RM, Goudar RH, Sayed GB (2015) Enabling public verifiability and availability for secure data storage in cloud computing. Evol Syst 6(1):55–65

    Article  Google Scholar 

  • Juels A, Oprea AM, Van Dijk ME, Stefanov EP (2016) Remote verification of file protections for cloud data storage. U.S. Patent 9,230,114

  • Karthiban K, Smys S (2018) Privacy preserving approaches in cloud computing. In: 2018 2nd international conference on inventive systems and control (ICISC). IEEE, pp 462–467

  • Liu C, Yang C, Zhang X, Chen J (2015) External integrity verification for outsourced big data in cloud and IoT: a big picture. Future Gen Comput Syst 49:58–67

    Article  Google Scholar 

  • Omar M, Boufaghes H, Mammeri L, Taalba A, Tari A (2016) Secure and reliable certificate chains recovery protocol for mobile ad hoc networks. J Netw Comput Appl 62:153–162

    Article  Google Scholar 

  • Piechotta C, Olsen MG, Jensen AE, Coleman JW, Larsen PG (2016) A secure dynamic collaboration environment in a cloud context. Future Gen Comput Syst 55:165–175

    Article  Google Scholar 

  • Pitchai R, Jayashri S, Raja J (2016) Searchable encrypted data file sharing method using public cloud service for secure storage in cloud computing. J Wirel Pers Commun 90(2):947–960

    Article  Google Scholar 

  • Song L, Zhao D, Chen X, Cao C, Niu X (2015) A secure and effective anonymous integrity checking protocol for data storage in multicloud. Math Prob Eng 2015. https://doi.org/10.1155/2015/614375

  • Sridhar S, Smys S (2016) A hybrid multilevel authentication scheme for private cloud environment. In: 2016 10th international conference on intelligent systems and control (ISCO). IEEE, pp 1–5

  • Srinivas J, Reddy KVS, Qyser AM (2012) Cloud computing basics. Int J Adv Res Comput Commun Eng 1:343–347

    Google Scholar 

  • Talib AM, Atan R, Abdullah R, Murad MAA (2012) Ensuring security and availability of cloud data storage using multi agent system architecture. In: Lukose D, Ahmad AR, Suliman A (eds) Knowledge technology, vol 295. Communications in computer and information science. Springer, Berlin

    Chapter  Google Scholar 

  • Wang H, He D, Tang S (2016) Identity-based proxy-oriented data uploading and remote data integrity checking in public cloud. IEEE Trans Inf Forensics Secur 11(6):1165–1176

    Article  Google Scholar 

  • Wei J, Liu J, Zhang R, Niu X (2016) Efficient dynamic replicated data possession checking in distributed cloud storage systems. Int J Distrib Sensor Netw 12:1894713

    Article  Google Scholar 

  • Zhang Y, Ni J, Tao X, Wang Y, Yong Y (2016) Provable multiple replication data possession with full dynamics for secure cloud storage. Concurr Comput Pract Exp 28(4):1161–1173

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to R. Pitchai.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

Communicated by Sahul Smys.

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Pitchai, R., Babu, S., Supraja, P. et al. Prediction of availability and integrity of cloud data using soft computing technique. Soft Comput 23, 8555–8562 (2019). https://doi.org/10.1007/s00500-019-04008-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-019-04008-0

Keywords

Navigation