ensuring data storage security in cloud computing
4.0
Abstract - cloud computing is regarded as the architecture of the next generation of IT enterprises. On the contrary, traditional solutions, where it services are under proper physical, logical and personnel control, cloud computing mobile applications and databases to large data centers, may not be able to manage data and services completely trustworthy. This unique feature, however, will cause many new security challenges that are not well understood. In this article, we focus on the data storage security of cloud computing, which has always been an important aspect of service quality. Since ensuring the correctness of users' data in the cloud, we propose an effective and flexible distributed scheme with two prominent features against its predecessors. By using homomorphic token and distributed verification, erasing encoded data, our plan realizes the correctness of vault and error location of data integration, that is, the identification of misbehaving servers. Unlike most previous works, the new plan further supports data blocks for secure and efficient dynamic operation, including data update, deletion and addition. Extensive security and performance analysis shows that the algorithm is efficient and resistant to Byzantine failure, malicious data modification attacks, and even server collusion attacks.