Identification of corrupted cloud storage in batch auditing for multi-cloud environments

Sooyeon Shin, Seungyeon Kim, Taekyoung Kwon

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

In cloud storage services, users can store their data in remote cloud servers. Due to new and challenging security threats toward outsourced data, remote data integrity checking has become a crucial technology in cloud storage services. Recently, many integrity checking protocols have been proposed. Several protocols support batch auditing, but they do not support efficient identification when batch auditing fails. In this paper, we propose a new identification method for the corrupted cloud in multi-cloud environments without requiring any repeated auditing processes.

Original languageEnglish
Title of host publicationInformation and Communication Technology - 3rd IFIP TC 5/8 International Conference, ICT-EurAsia 2015 and 9th IFIP WG 8.9 Working Conference, CONFENIS 2015 Held as Part of WCC 2015, Proceedings
EditorsIlsun You, Li Da Xu, Erich Neuhold, A. Min Tjoa, Ismail Khalil
PublisherSpringer Verlag
Pages221-225
Number of pages5
ISBN (Print)9783319243146
DOIs
Publication statusPublished - 2015 Jan 1
Event3rd IFIP TC 5/8 International Conference on Information and Communication Technology, ICT-EurAsia 2015 and 9th IFIP WG 8.9 Working Conference on Research and Practical Issues of Enterprise Information Systems, CONFENIS 2015 - Daejeon, Korea, Republic of
Duration: 2015 Oct 42015 Oct 7

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume9357
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other3rd IFIP TC 5/8 International Conference on Information and Communication Technology, ICT-EurAsia 2015 and 9th IFIP WG 8.9 Working Conference on Research and Practical Issues of Enterprise Information Systems, CONFENIS 2015
CountryKorea, Republic of
CityDaejeon
Period15/10/415/10/7

    Fingerprint

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Cite this

Shin, S., Kim, S., & Kwon, T. (2015). Identification of corrupted cloud storage in batch auditing for multi-cloud environments. In I. You, L. D. Xu, E. Neuhold, A. M. Tjoa, & I. Khalil (Eds.), Information and Communication Technology - 3rd IFIP TC 5/8 International Conference, ICT-EurAsia 2015 and 9th IFIP WG 8.9 Working Conference, CONFENIS 2015 Held as Part of WCC 2015, Proceedings (pp. 221-225). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 9357). Springer Verlag. https://doi.org/10.1007/978-3-319-24315-3_22