Crowdsourced Data Integrity Verification for Key-Value Stores in the Cloud

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations

    Abstract

    Thanks to their high availability, scalability, and usability, cloud databases have become one of the dominant cloud services. However, since cloud users do not physically possess their data, data integrity may be at risk. In this paper, we present a novel protocol that utilizes crowdsourcing paradigm to provide practical data integrity assurance in key-value cloud databases. The main advantage of our protocol over previous work is its high applicability-as opposed to existing approaches, our scheme does not require any system changes on the cloud side and thus can be applied directly to any existing system. We demonstrate the feasibility of our scheme by a prototype implementation and its evaluation.

    Original languageEnglish
    Title of host publicationProceedings - 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, CCGRID 2017
    PublisherInstitute of Electrical and Electronics Engineers
    Pages498-503
    Number of pages6
    ISBN (Electronic)9781509066100
    DOIs
    StatePublished - 10 Jul 2017
    Event17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, CCGRID 2017 - Madrid, Spain
    Duration: 14 May 201717 May 2017

    Publication series

    NameProceedings - 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, CCGRID 2017

    Conference

    Conference17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, CCGRID 2017
    Country/TerritorySpain
    CityMadrid
    Period14/05/1717/05/17

    Keywords

    • Cloud
    • Data integrity
    • Key-value stores
    • NoSQL
    • Secure storage

    ASJC Scopus subject areas

    • Computer Networks and Communications
    • Hardware and Architecture

    Fingerprint

    Dive into the research topics of 'Crowdsourced Data Integrity Verification for Key-Value Stores in the Cloud'. Together they form a unique fingerprint.

    Cite this