© 2013, IJARCSSE All Rights Reserved Page | 381 Volume 3, Issue 6, June 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Data Storage and Data Integrity in Multi-Cloud Storage Priyanka V.Mogre Prof.Girish Agarwal Prof.Pragati Patil Department of CSE, RTMNU Department of CSE, RTMNU Department of CSE, RTMNU Nagpur, India Nagpur, India Nagpur, India Abstract Cloud computing is used to store data from various resources by the user. It is difficult for the user to store entire data within the system; therefore clouds are formed to store the user data. User can store as much large amount of the data as user wants. This data stored in the cloud must be integrated, the integrity of the data is thus has to be checked and maintain with the help of Trusted third party. Only trusted third party has the authority to check and to maintain the integrity f the data. The main approach of this paper is to check the integrity of the data stored and to maintain the security by using cryptography method. KeywordsMulti-cloud storage, data integrity, cloud privacy, TTP, Cryptography, proofs of retrievability . I. INTRODUCTION In Cloud computing storing and sharing of data is been done via trusted third party. The trusted third party have the authorized key which help to access data between the clouds these helps & maintains privacy via TTP .Data from the various users from various resources are stored in multi-cloud. Accordingly users can login into the cloud and feed the data, user have to buy the clouds as per the requirements on the amount of data to be stored. The only thing was the cloud computing lacks regarding the issues of data integrity, data privacy, and data accessed by unauthorized members. Data integrity: Data integrity refers to maintaining consistency of the data all over the cycle. Data integrity contains protocols for data retention specifying the length of data that can be retained. To achieve data integrity it specifies what can be done with data values when its validity expires. These protocols are consistently and routinely applied to all data entering the system and any enforcement of relaxation will cause error in the data. Strict enforcement of data integrity rules causes the error rates to be lower, resulting in time saved troubleshooting and tracing erroneous data and the errors it causes algorithms. Three types of integrity constraints are an inherent part of the relational data model: entity integrity, referential integrity and domain integrity Entity integrity: It concerns with concept of Primary keys. Referential integrity: It concerns the concept f foreign keys. Domain integrity: It specifies that all the columns in database must be declared upon a defined domain. Cloud storage: Cloud storage is an industry term for managed data storage through hosted network service. The most basic form of cloud storage allows users to upload individual files or folders from their personal computers to a central Internet server. This allows users to make backup copies of files in case their originals are lost. Users can also download their files from the cloud to other devices, and sometimes also enable remote access to the files for other people to share. Modern day cloud storage is base on highly visualized infrastructure and as the same characteristics as cloud computing in terms of elasticity, scalability and multi-tenancy, and is available on Amazon EC2 and ViON capacity service. Fig.a: Architecture of a cloud storage system including control severs and control storage servers. DB Storage DB Storage DB Storage Control node