High Impact Factor : 4.396 icon | Submit Manuscript Online icon |

Active Inspection Services with Log Maintenance Scheme for Cloud Storage


Karthikkeyan.S , saveetha university


Storage security, provable data possession, audit service, cloud storage


In present days, the up-and-coming cloud-computing model is rapidly in advance force as an unconventional to traditional information technology. Cloud computing make available a scalability environment for emergent amounts of data and processes that work on a variety of services and applications by means of on-demand self-services. One fundamental aspect of this model shifting is that data are being centralized and outsourced into clouds. This category of outsourced storage space services in clouds have turn out to be a new profit growth point by given that a comparably low-cost, scalable, location-independent policy for managing clients' data. The cloud storage service (CSS) mitigates the load of maintenance and storage management. However, if such a significant service is weak to attacks or failures, it would take permanent losses to users since their data or records are stored into an unsure storage space pool outside the enterprises. These security risks move about in the direction of from the following reasons: the cloud infrastructures are much more authoritative and reliable than personal computing devices. If they are still susceptible to security threats both from inside and outside the cloud for the benefits of their control, there exist various motivations for cloud service providers (CSP) to behave falsely toward the cloud users in addition, the dispute infrequently suffers from the lack of trust on cloud service provider. As a result, their behaviors may not be known by the cloud users. Therefore, it is necessary for cloud service providers to offer a scalable audit service to check the integrity and accessibility of the stored data. While Cloud Computing makes these advantages more appealing than ever, it also brings new challenging security threats towards users' outsourced data. Since cloud service provider is separate administrative units, data outsourcing is actually resigning user's control over the destiny of their data. The correctness of the data in the cloud is being put at risk due to the subsequent reasons. First of all, although the infrastructures beneath the cloud are much more powerful and reliable than private computing devices, they are silent facing the broad range of both internal and external threats for data integrity.

Other Details

Paper ID: IJSRDV2I6070
Published in: Volume : 2, Issue : 6
Publication Date: 01/09/2014
Page(s): 703-708

Article Preview

Download Article