Abstract
In cloud computing, data storage is the most important task. In cloud storage, security and privacy are the major issues. To avoid such issues, we proposed a new protocol called availability and integrity verification protocol (AIVP) to predict the available space in cloud and verify the integrity of the stored data. For availability verification, this protocol is used to learn the size of the available data before it starts the storing process. Based on the learning, can find available storage space, cloud service provider will allow to store the data. This reduces the latency, communication cost and computational cost. For integrity verification, we separate the public data and private data and this leads to avoid the privacy issues. Private data will be integrated by the cloud service providers and the public data will be integrated by the third-party verifier. By using this verification process, it can avoid the security issues. In simulation results, proposed AIVP has outperformed the high-efficiency and throughput and this will cut the latency, computational cost and communication cost.
Similar content being viewed by others
References
Al-Saffar AMH (2015) Identity-based approach for cloud data integrity in multi-cloud environment. Identity 4(8):505–509
Brandenburger M, Cachin C, Knežević N (2015) Don’t trust the cloud, verify: integrity and consistency for cloud object stores. In: Proceedings of the 8th ACM international systems and storage conference. ACM, p 16
Cai BL, Zhang RQ, Zhou XB (2017) Experience availability: tail-latency oriented availability in software-defined cloud computing. J Comput Sci Technol 32(2):250–257
Chen Y, Wang F, Zhu L, Zhang Z (2015) A survey of remote data integrity checking: techniques and verification structures. Int J Grid Distrib Comput 8(4):179–198
Chen F, Zhang T, Chen J, Xiang T (2016) Cloud storage integrity checking: going from theory to practice. In: Proceedings of the 4th ACM international workshop on security in cloud computing, pp 24–28
El-Booz SA, Attiya G, El-Fishawy N (2016) A secure cloud storage system combining time-based one-time password and automatic blocker protocol. EURASIP J Inf Secur 2016(1):1–13
Endo PT, Rodrigues M, Gonçalves GE, Kelner J, Sadok JH, Curescu C (2016) High availability in clouds: systematic review and research challenges. J Cloud Comput 5:16
Garg N, Bawa S (2016) Comparative analysis of cloud data integrity auditing protocols. J Netw Comput Appl 66:17–32
Glass S, Portmann M, Muthukkumarasamy V (2016) Securing route and path integrity in multihop wireless networks. In: Security of self-organizing networks: MANET, WSN, WMN, VANET
Jogdand RM, Goudar RH, Sayed GB (2015) Enabling public verifiability and availability for secure data storage in cloud computing. Evol Syst 6(1):55–65
Juels A, Oprea AM, Van Dijk ME, Stefanov EP (2016) Remote verification of file protections for cloud data storage. U.S. Patent 9,230,114
Karthiban K, Smys S (2018) Privacy preserving approaches in cloud computing. In: 2018 2nd international conference on inventive systems and control (ICISC). IEEE, pp 462–467
Liu C, Yang C, Zhang X, Chen J (2015) External integrity verification for outsourced big data in cloud and IoT: a big picture. Future Gen Comput Syst 49:58–67
Omar M, Boufaghes H, Mammeri L, Taalba A, Tari A (2016) Secure and reliable certificate chains recovery protocol for mobile ad hoc networks. J Netw Comput Appl 62:153–162
Piechotta C, Olsen MG, Jensen AE, Coleman JW, Larsen PG (2016) A secure dynamic collaboration environment in a cloud context. Future Gen Comput Syst 55:165–175
Pitchai R, Jayashri S, Raja J (2016) Searchable encrypted data file sharing method using public cloud service for secure storage in cloud computing. J Wirel Pers Commun 90(2):947–960
Song L, Zhao D, Chen X, Cao C, Niu X (2015) A secure and effective anonymous integrity checking protocol for data storage in multicloud. Math Prob Eng 2015. https://doi.org/10.1155/2015/614375
Sridhar S, Smys S (2016) A hybrid multilevel authentication scheme for private cloud environment. In: 2016 10th international conference on intelligent systems and control (ISCO). IEEE, pp 1–5
Srinivas J, Reddy KVS, Qyser AM (2012) Cloud computing basics. Int J Adv Res Comput Commun Eng 1:343–347
Talib AM, Atan R, Abdullah R, Murad MAA (2012) Ensuring security and availability of cloud data storage using multi agent system architecture. In: Lukose D, Ahmad AR, Suliman A (eds) Knowledge technology, vol 295. Communications in computer and information science. Springer, Berlin
Wang H, He D, Tang S (2016) Identity-based proxy-oriented data uploading and remote data integrity checking in public cloud. IEEE Trans Inf Forensics Secur 11(6):1165–1176
Wei J, Liu J, Zhang R, Niu X (2016) Efficient dynamic replicated data possession checking in distributed cloud storage systems. Int J Distrib Sensor Netw 12:1894713
Zhang Y, Ni J, Tao X, Wang Y, Yong Y (2016) Provable multiple replication data possession with full dynamics for secure cloud storage. Concurr Comput Pract Exp 28(4):1161–1173
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Ethical approval
This article does not contain any studies with human participants or animals performed by any of the authors.
Additional information
Communicated by Sahul Smys.
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Pitchai, R., Babu, S., Supraja, P. et al. Prediction of availability and integrity of cloud data using soft computing technique. Soft Comput 23, 8555–8562 (2019). https://doi.org/10.1007/s00500-019-04008-0
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00500-019-04008-0