Prashant Rajput - Academia.edu (original) (raw)

Uploads

Papers by Prashant Rajput

Research paper thumbnail of Ensuring Data Security In Cloud Using Auditor

— Cloud storage is a basic concept in which the data is stored in terms of logical pools on multi... more — Cloud storage is a basic concept in which the data is stored in terms of logical pools on multiple servers. PCs are generally used to process and store clients information utilizing cloud and can be found anywhere on the web by ensuring the security of the available data. Many organizations and communities utilize cloud storage for put away their helpful data because of some necessary elements of cloud computing [1]. The data and information stored on cloud can be put away remotely in the cloud by the clients and can be stored to utilizing customers as per their prerequisite. Cloud storage security is administration service given by Cloud computing. This service provides facilities such as data maintenance, data management, data back up and made accessible to users over a specific network. Data security is the main concern in cloud as the clients data can be attacked or modified by any third party. Therefore, the concept data auditing is introduced for checking and ensuring data security with the help of an entity called Third Party Auditor (TPA). The main aim of this work is to build up an auditing scheme which is more secure, efficient to use and possess the capabilities such as privacy conserving, public auditing along with maintaining the data security and data confidentiality. Therefore we have a tendency to develop a brand new auditing scheme by considering all the general prerequisites. Our proposed scheme consists of three basic entities named as data owner, TPA and cloud server. The data owner performs numerous tasks like dividing the data into blocks, encryption of data, generate a hash value for data, concatenating it and generate a signature on it. The auditor performs the most important task of checking the security of data by verifying both the signatures using hash maps of java. Generally, the auditor is used to perform tasks like hash value generation for encrypted blocks accepted from cloud, concatenate those blocks and provide signature on that. After that it compares both the signatures of data to verify whether the data stored on cloud is attacked by any third party or not. On the basis of demand of the users [2], it verifies the security and safety of data .The main purpose of cloud server is to save the encrypted blocks of data. This proposed examining scheme make use of RSA algorithm for encryption, SHA-1 for security check and RSA signature for digital signature matching of the data.

Research paper thumbnail of Ensuring Data Security In Cloud Using Auditor

— Cloud storage is a basic concept in which the data is stored in terms of logical pools on multi... more — Cloud storage is a basic concept in which the data is stored in terms of logical pools on multiple servers. PCs are generally used to process and store clients information utilizing cloud and can be found anywhere on the web by ensuring the security of the available data. Many organizations and communities utilize cloud storage for put away their helpful data because of some necessary elements of cloud computing [1]. The data and information stored on cloud can be put away remotely in the cloud by the clients and can be stored to utilizing customers as per their prerequisite. Cloud storage security is administration service given by Cloud computing. This service provides facilities such as data maintenance, data management, data back up and made accessible to users over a specific network. Data security is the main concern in cloud as the clients data can be attacked or modified by any third party. Therefore, the concept data auditing is introduced for checking and ensuring data security with the help of an entity called Third Party Auditor (TPA). The main aim of this work is to build up an auditing scheme which is more secure, efficient to use and possess the capabilities such as privacy conserving, public auditing along with maintaining the data security and data confidentiality. Therefore we have a tendency to develop a brand new auditing scheme by considering all the general prerequisites. Our proposed scheme consists of three basic entities named as data owner, TPA and cloud server. The data owner performs numerous tasks like dividing the data into blocks, encryption of data, generate a hash value for data, concatenating it and generate a signature on it. The auditor performs the most important task of checking the security of data by verifying both the signatures using hash maps of java. Generally, the auditor is used to perform tasks like hash value generation for encrypted blocks accepted from cloud, concatenate those blocks and provide signature on that. After that it compares both the signatures of data to verify whether the data stored on cloud is attacked by any third party or not. On the basis of demand of the users [2], it verifies the security and safety of data .The main purpose of cloud server is to save the encrypted blocks of data. This proposed examining scheme make use of RSA algorithm for encryption, SHA-1 for security check and RSA signature for digital signature matching of the data.

Log In