TCLOUD: A New Model of Data Storage Providing Public Verifiability and Dynamic Data Recovery for Cloud Computing


Cloud computing is a new paradigm of computing and is considered to be the next generation of information technology infrastructure for an enterprise. The distributed architecture of cloud data storage facilitates the customer to get benefits from the greater quality of storage and minimized the operating cost. This technology also brought numerous possible threats including data confidentiality, integrity and availability. A homomorphic based model of storage is proposed, which enable the customer and a third party auditor to perform the authentication of data stored on the cloud storage. This model performs the verification of huge file’s integrity and availability with less consumption of computation, storage and communication resources. The proposed model also supports public verifiability and dynamic data recovery.

Share and Cite:

S. Ullah, X. Zheng and F. Zhou, "TCLOUD: A New Model of Data Storage Providing Public Verifiability and Dynamic Data Recovery for Cloud Computing," Journal of Software Engineering and Applications, Vol. 6 No. 3B, 2013, pp. 23-28. doi: 10.4236/jsea.2013.63B006.

Conflicts of Interest

The authors declare no conflicts of interest.


[1] Kamara, Seny, and Kristin Lauter. "Cryptographic cloud sto-rage." Financial Cryptography and Data Security (2010): 136-149.
[2] Ullah, Sultan, and Xuefeng Zheng. "Cloud Computing Research Challenges." In Biomedical Enginnering and Informatics, 2012. BMEI12. fifth International Conference on, pp. 1397-1401. IEEE, 2012.
[3] Ullah, Sultan, Zheng Xuefeng, Zhou Feng, and Zhao Haichun. "Tcloud: Challenges And Best Practices For Cloud Computing." International Journal of Engineering 1, no. 9 (2012).
[4] Kaufman, Lori M. "Data security in the world of cloud computing." Security & Privacy, IEEE 7, no. 4 (2009): 61-64.
[5] Mykletun, Einar, Maithili Narasimha, and Gene Tsudik. "Authentication and integrity in outsourced databases." ACM Transactions on Sto-rage (TOS) 2, no. 2 (2006): 107-138.
[6] Shacham, Hovav, and Brent Waters. "Compact proofs of retrievability." Advances in Cryptology-ASIACRYPT 2008 (2008): 90-107.
[7] Ateniese, Giuseppe, Roberto Di Pietro, Luigi V. Mancini, and Gene Tsudik. "Scalable and efficient provable data possession." In Proceedings of the 4th international conference on Security and privacy in communication netowrks, p. 9. ACM, 2008.
[8] Wang, Qian, Cong Wang, Jin Li, Kui Ren, and Wenjing Lou. "Enabling public verifiability and data dynamics for storage security in cloud computing." Computer Securi-ty–ESORICS 2009 (2009): 355-370.
[9] Hao, Zhuo, and Nenghai Yu. "A multiple-replica remote data possession checking protocol with public verifiability." In Data, Privacy and E-Commerce (ISDPE), 2010 Second International Symposium on, pp. 84-89. IEEE, 2010.
[10] Ateniese, Giuseppe, Randal Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary Peterson, and Dawn Song. "Provable data possession at untrusted stores." In Proceedings of the 14th ACM conference on Computer and communications security, pp. 598-609. ACM, 2007.
[11] Juels, Ari, and Burton S. Kaliski Jr. "PORs: Proofs of retrievability for large files." In Proceedings of the 14th ACM conference on Computer and communications security, pp. 584-597. ACM, 2007.
[12] Sebé, Francesc, Josep Domingo-Ferrer, Antoni Martinez-Balleste, Yves Deswarte, and J-J. Quisquater. "Efficient remote data possession checking in critical information infrastructures." Knowledge and Data Engineering, IEEE Transactions on 20, no. 8 (2008): 1034-1038.
[13] Erway, Chris, Alptekin Küp?ü, Charalampos Papamanthou, and Roberto Tamassia. "Dynamic provable data possession." In Proceedings of the 16th ACM conference on Computer and communications security, pp. 213-222. ACM, 2009.
[14] Oualha, Nouha, Melek ?nen, and Yves Roudier. "A security protocol for self-organizing data storage." In Proceed-ings of The Ifip Tc 11 23 rd International Information Security Conference, pp. 675-679. Springer Boston, 2008. (6)
[15] Duminuco, Alessandro, and Ernst Biersack. "Hierar-chical codes: How to make erasure codes attractive for peer-to-peer storage systems." In Peer-to-Peer Computing, 2008. P2P'08. Eighth International Conference on, pp. 89-98. IEEE, 2008.

Copyright © 2022 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.