{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,16]],"date-time":"2026-05-16T15:10:01Z","timestamp":1778944201573,"version":"3.51.4"},"reference-count":23,"publisher":"IGI Global","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,7,1]]},"abstract":"<p>Cloud computing is the fastest growing and most promising field in the service provisioning segment. It has become a challenging task to provide security in the cloud. The purpose of this article is to suggest a better and efficient integrity verification technique for data referred to as cloud audit. The deployment of cloud storage services has significant benefits in the management of data for users. However, this raises many security concerns, and one of them is data integrity. Though public verification techniques serve the purpose they are vulnerable to procrastinating auditors who may not perform verifications on time. In this article, a cloud data auditing system is proposed. The proposed cloud data auditing system integrates Merkle Tree-based Cloud audit and the blockchain-based audit recording system, thus the core idea is to record each verification result into a blockchain as a transaction. Utilizing the time-sensitive nature of blockchain, the verifications are time-stamped after the corresponding transaction is recorded into the blockchain, which enables users to check whether auditors have performed the verifications at the prescribed time. The proposed cloud data auditing system is experimentally validated. The investigations with varied dataset size revealed less time taken, on an average of 0.25 milliseconds with the use of Merkle Tree. Further results reveal consistency of the data integrity checking.<\/p>","DOI":"10.4018\/ijcac.2020070103","type":"journal-article","created":{"date-parts":[[2020,6,11]],"date-time":"2020-06-11T14:29:12Z","timestamp":1591885752000},"page":"54-66","source":"Crossref","is-referenced-by-count":35,"title":["Merkle Tree and Blockchain-Based Cloud Data Auditing"],"prefix":"10.4018","volume":"10","author":[{"given":"Arun Prasad","family":"Mohan","sequence":"first","affiliation":[{"name":"Anna University, India"}]},{"family":"Mohamed Asfak R.","sequence":"additional","affiliation":[{"name":"Anna University, India"}]},{"given":"Angelin","family":"Gladston","sequence":"additional","affiliation":[{"name":"Anna University, India"}]}],"member":"2432","reference":[{"key":"IJCAC.2020070103-0","doi-asserted-by":"publisher","DOI":"10.4018\/IJCAC.2018010103"},{"key":"IJCAC.2020070103-1","unstructured":"Ashraf, M., Clifford, L., Michael, W., Yuan, X. G., & Andrew, W. (2011). A New Perspective on Providing Cloud Computing Security. In Proceedings of the 1st International Conference on Cloud Computing and Services Science (pp. 650\u2013655). SciTePress - Science and Technology Publications."},{"key":"IJCAC.2020070103-2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.11.031"},{"key":"IJCAC.2020070103-3","author":"B. B.Gupta","year":"2018","journal-title":"Computer and cyber security: principles, algorithm, applications, and perspectives"},{"key":"IJCAC.2020070103-4","first-page":"1","article-title":"DNS rule-based schema to botnet detection.","volume":"\u25aa\u25aa\u25aa","author":"K.Alieyan","year":"2019","journal-title":"Enterprise Information Systems"},{"key":"IJCAC.2020070103-5","doi-asserted-by":"crossref","unstructured":"Duncan, R. A. K., & Mark, W. (2016). Enhancing Cloud Security and Privacy: The Cloud Audit Problem. In Proceedings of theSeventh International Conference on Cloud Computing, GRIDs, and Virtualization. (pp. 131-136). Academic Press.","DOI":"10.1109\/INTECH.2016.7845113"},{"key":"IJCAC.2020070103-6","doi-asserted-by":"crossref","DOI":"10.4018\/978-1-5225-8407-0","author":"B. B.Gupta","year":"2019","journal-title":"Handbook of Research on Cloud Computing and Big Data Applications in IoT"},{"key":"IJCAC.2020070103-7","doi-asserted-by":"publisher","DOI":"10.4018\/IJCAC.2018010107"},{"key":"IJCAC.2020070103-8","unstructured":"Pooja, C., Shashank, G., & Gupta, B. B. (2016). Auditing defense against XSS worms in online social network-based web applications. In Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security. Hershey, PA: IGI-Global."},{"key":"IJCAC.2020070103-9","doi-asserted-by":"publisher","DOI":"10.4018\/IJCAC.2018070102"},{"issue":"4","key":"IJCAC.2020070103-10","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1109\/MIC.2011.50","article-title":"Security issues in online social networks.","volume":"15","author":"H.Gao","year":"2011","journal-title":"IEEE Internet Computing"},{"key":"IJCAC.2020070103-11","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2016.2647718"},{"key":"IJCAC.2020070103-12","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2017.2784423"},{"key":"IJCAC.2020070103-13","doi-asserted-by":"crossref","first-page":"1415","DOI":"10.4018\/978-1-4666-8111-8.ch066","article-title":"Privacy preserving text analytics: research challenges and strategies in name analysis","author":"S.Veluru","year":"2015","journal-title":"Standards and standardization: concepts, methodologies, tools, and applications"},{"key":"IJCAC.2020070103-14","doi-asserted-by":"publisher","DOI":"10.1109\/ICICES.2016.7518926"},{"key":"IJCAC.2020070103-15","article-title":"Enabling Ternary Hash Tree based Integrity Verification for Secure Cloud Data Storage.","author":"M.Thangavel","year":"2019","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"IJCAC.2020070103-16","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2011.245"},{"key":"IJCAC.2020070103-17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04444-1_22"},{"key":"IJCAC.2020070103-18","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.09.020"},{"key":"IJCAC.2020070103-19","doi-asserted-by":"crossref","unstructured":"Zhanga, Y., Xua, C., Yub, S., Lia, H., & Zhanga, X. (2015). SCLPV: Secure Certificateless Public Verification for Cloud Storage in Cyber-physical-social System.","DOI":"10.1109\/TCSS.2016.2517205"},{"key":"IJCAC.2020070103-20","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.09.013"},{"key":"IJCAC.2020070103-21","unstructured":"Zhang, Y., Xu, C., Lin, X., & Shen, X. S. (2019). Blockchain-Based Public Integrity Verification for Cloud Storage against Procrastinating Auditors. IEEE Transactions on Cloud Computing."},{"key":"IJCAC.2020070103-22","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2016.94"}],"container-title":["International Journal of Cloud Applications and Computing"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=256864","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T21:07:28Z","timestamp":1651871248000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJCAC.2020070103"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2020,7,1]]},"references-count":23,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,7]]}},"URL":"https:\/\/doi.org\/10.4018\/ijcac.2020070103","relation":{},"ISSN":["2156-1834","2156-1826"],"issn-type":[{"value":"2156-1834","type":"print"},{"value":"2156-1826","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,7,1]]}}}