This document discusses cloud computing and proposes a scheme for proof of data integrity in the cloud. It begins by defining cloud computing and describing the infrastructure needed to run applications over the internet. It then discusses security issues with cloud storage, where users do not have control over remotely stored data. The proposed scheme generates encrypted metadata for files and allows users to verify integrity by challenging the data center to provide specific bits, proving the file was not illegally modified. The scheme is best suited for encrypted static files stored in the cloud.
Related topics: