Vous êtes sur la page 1sur 1

Through detailed security and performance analysis, they show

that their scheme is highly efficient and resilient to Byzantine


failure, malicious data modification attack, and even server
colluding attacks. The computing power in a Cloud computing
environment is supplied by a collection of data centers, which are
typically installed with hundreds to thousands of servers (Buyya
R. & Murshed, M, 2002). The authors-built architecture of a typical
Cloud-based data center consisting of four layers. At the lowest
layers, there exist massive physical resources (storage servers
and application servers) that power the data centers. These
servers are transparently managed by the higher-level
virtualization services and toolkits that allow sharing of their
capacity among virtual instances of servers. These virtual
instances are isolated from each other, which aid in achieving
fault tolerant behavior and isolated security context (Smith J. E,
& Nair. R., 2005) (Juels et al., 2007) described a formal “proof of
retrievability” (POR) model for ensuring the remote data integrity.
Their scheme combines spot-checking and error-correcting code
to ensure both possession and retrievability of files on archive
service systems.

Vous aimerez peut-être aussi