Downloading: Efficient Methods for Data Integrity Protection and Fault Tolerant Storage System in Cloud
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



To prevent Server Overload, Your Article PDF will be Downloaded in Next Seconds

Efficient Methods for Data Integrity Protection and Fault Tolerant Storage System in Cloud

Dr. M. Ramanan, Dr. G. Ganesh Kumar

Abstract: Cloud computing is a paradigm that provides computing, communication and storage resources as a service over internet. Cloud Storage constitutes data that is mostly heterogeneous and dynamic in nature. In Cloud storage systems the data is to be protected from corruptions, redundant data to tolerate failures of storage and lost data should be repaired when storage fails. By distributing data across several servers, traditional code regeneration techniques for failure recovery are effective only in the case of using less network traffic. Also remotely checking the integrity of the data using code regenerated corruption methods is a complicated process in real time cloud storage. To overcome the problem of reducing data corruption and data retrieval, a novel method is proposed which implements a Integrity Protection Scheme (IPS). Unlike other approaches, we have considered both proof of integrity of data as well as proof of data possession. This makes only a fraction of data needed to analyzed for any corruption and not the entire file has to be reviewed. Therefore this IPS effectively protects the properties of the data stored in cloud and regardless of bandwidth of the cloud storage, the availability of data is improved. This proposed method when compared with other methods shows 17.27 % average recovery time for 250 nodes, 12.12 % average recovery time for 500 nodes and 8.57 % average recovery time for 500 nodes.

Keywords: Data Integrity, Fault Tolerance, Cloud Integrity Management, Replica Creation, Data Corruption



Top