An Efficient Methodologies for Data Integrity in Cloud Storage
L Jambulingam1, T V Ananthan2, Sumathy Eswaran3

1L Jambulingam, Research Scholar, Department of Computer Science and Engineering, Dr. M. G.R. Educational and Research Institute University, Chennai, India.
2T V Ananthan, Professor, Department of Computer Science and Engineering, Dr. M.G.R. Educational and Research Institute University, Chennai, India.
3Sumathy Eswaran, Professor, Department of Computer Science and Engineering, Dr. M.G.R. Educational and Research Institute University, Chennai, India.

Manuscript received on 24 June 2019 | Revised Manuscript received on 05 July 2019 | Manuscript published on 30 July 2019 | PP: 2029-2033 | Volume-8 Issue-9, July 2019 | Retrieval Number: I8621078919/19©BEIESP | DOI: 10.35940/ijitee.I8621.078919

Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Majority of the organization uses cloud for storage purpose in order to reduce the cost as well as maintenance. Due to increasing threat from internal and external sources, there would be possibility of corruption in the cloud storage files. Thus the storage must to be monitored periodically for integrity checking. Since most of the Data Owners have limited resources thus the responsibility of integrity checking goes to the Third Party Auditors (TPA). In this paper, we have proposed 2 methodologies of Integrity Checking in Cloud Storage (1) Enhanced Dynamic Hash Tree – n Versions (EDHT-n), which has best performance in term of time and space complexity compared to the existing methods.(2) Hybrid Enhanced Dynamic Hash Tree (HEDHT), which is best suited for very huge number of files in a directory.
Keywords: Third Party Auditor (TPA), Hybrid Enhanced Dynamic Hash Tree, Enhanced Dynamic Hash Tree, Meta Data, Meta Data Server (MDS). Cloud Service Provider (CSP), Business Continuity Planning (BCP), Service Discovery.

Scope of the Article: Cloud, Sensor Cloud and Mobile Cloud Security