%0 Conference Proceedings %T Identification of Corrupted Cloud Storage in Batch Auditing for Multi-Cloud Environments %+ Yonsei University %A Shin, Sooyeon %A Kim, Seungyeon %A Kwon, Taekyoung %Z Part 7: Dependable Systems and Applications %< avec comité de lecture %( Lecture Notes in Computer Science %B 3rd International Conference on Information and Communication Technology-EurAsia (ICT-EURASIA) and 9th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS) %C Daejon, South Korea %Y Ismail Khalil %Y Erich Neuhold %Y A Min Tjoa %Y Li Da Xu %Y Ilsun You %I Springer %3 Information and Communication Technology %V LNCS-9357 %P 221-225 %8 2015-10-04 %D 2015 %R 10.1007/978-3-319-24315-3_22 %K Cloud computing %K Provable data possession %K Public auditing %K Batch auditing %K Identification for the corrupted clouds %Z Computer Science [cs] %Z Humanities and Social Sciences/Library and information sciencesConference papers %X In cloud storage services, users can store their data in remote cloud servers. Due to new and challenging security threats toward outsourced data, remote data integrity checking has become a crucial technology in cloud storage services. Recently, many integrity checking protocols have been proposed. Several protocols support batch auditing, but they do not support efficient identification when batch auditing fails. In this paper, we propose a new identification method for the corrupted cloud in multi-cloud environments without requiring any repeated auditing processes. %G English %Z TC 5 %Z TC 8 %Z WG 8.9 %2 https://inria.hal.science/hal-01466223/document %2 https://inria.hal.science/hal-01466223/file/978-3-319-24315-3_22_Chapter.pdf %L hal-01466223 %U https://inria.hal.science/hal-01466223 %~ SHS %~ IFIP-LNCS %~ IFIP %~ IFIP-TC %~ IFIP-TC5 %~ IFIP-WG %~ IFIP-TC8 %~ IFIP-ICT-EURASIA %~ IFIP-WG8-9 %~ IFIP-LNCS-9357 %~ IFIP-CONFENIS