A Secure Storage Management & Auditing Scheme for Cloud Storage (original) (raw)

Enhancing Confidentiality and Integrity in Cloud Computing using RSA Encryption Standard and MD5 Hashing Algorithm

International Journal of Computer Applications, 2018

Cloud computing has revolutionized how services are rendered and used by some many people in the world like providing hardware, software and infrastructural storage to many users at any time. This is in terms of software as a service, platform as a service and infrastructure as a service, hence providing room for convinience to the cloud consumers to choose what they want presently and catering for their future needs since its elastic. With the company's or individual's data held by a third party that is the cloud provider, it brings out the security issues in respose to confidentiality, availability and integrity of the data at the cloud provider's side. In this reseach paper solution is provided to maintain confidentiality of data and integrity of data at the cloud provider's side. This framework contains RSA encryption standard and MD5 hashing alogorithm. In this solution data is encrypted using RSA which generates both public and private keys used in the encryption and the decryption then using MD5 to generate the hash value which is stored before the data is sent to the cloud provider. The hash value is checked upon retriving of data from the cloud and if its still the same then the data was not modified or tempered with if else then the cloud provider has bleeched the contract. All these approaches undergo through the following steps Encryption, Hashing, Data uploading on a cloud, Verification and Decryption.

Enhancing Data Security in Cloud Computing Using RSA Encryption and MD5 Algorithm

Eighth Sense Research Group

ABSTRACT Cloud computing is the technology through which people can share resources, services and information among the people through use of internet. Since we share the data through the internet, security is considered as a major issue. In Cloud computing several security issues arises like confidentiality, integrity and authentication. In this paper a new security model have been proposed. The architecture provides a mechanism through which we can get secure communication as well as hiding the information from unauthorized users. In this model we have implemented a combination of RSA encryption and digital signature technique which can easily with all types of cloud computing features like: PaaS, SaaS and IaaS. This combination mechanism provides three way security i.e. data security, authentication and verification. In this paper, we have proposed RSA encryption algorithm for confidentiality of data and for authentication MD 5 algorithm have been implemented. Keywords: - Cloud Computing, data security, MD5, RSA, encryption and digital signature.

Cloud Computing: Ensuring Data Storage Security in Cloud

International Journal of Engineering Development and Research, 2016

Cloud computing is a rising computing standard in which the computing framework is given as a service over the Internet. The Cloud computing tool gives facility of data storage and access for cloud users, but when outsourcing the data to a third party causes safety issue of cloud data so data are protected by restricting the data. We propose a new decentralized access control scheme for secure data storage in the clouds that supports anonymous authentication where identity of the user is protected from the cloud during authentication. The architecture is decentralized, meaning that there can be several KDCs for key management. Revoked users cannot access data after they have been revoked. The proposed scheme is resilient to replay attacks. In addition to this a new symmetric key cryptographic method called Modern encryption Standard (MES)-II presents method which can be effective to encrypt various types of plain text files and the method is free from standard cryptography attacks n...

Study and improved data storage in cloud computing using cryptography

2021

Cloud computing is becoming a powerful network architecture to perform computing that is both large and complex. We present a cloud computing survey which outlines its core concepts, architectural principles, state-ofthe art deployment and research challenges. Due to security issues, information over the Internet is becoming important. We have suggested a method to protect critical file data. Cryptography algorithms are an efficient way to encrypt sensitive data. It is a retrieval and transmission system that is readable only by intended users. The low cost and data usability of cloud computing is advantageous. Cloud storage has many advantages at low cost and data connectivity through the Internet. Ensured cloud data protection is an important part of the cloud computing environment because customers often store sensitive information with cloud storage services but they are not secure services. So, it remains a challenge to exchange data in a safe way while storing data from an unc...

Improve Security of Cloud Storage using Digital Signature

Cloud computing is the pertinent technology for the decade. The cloud computing is Internet based computer, shared software information and resource to world. These cloud environment resources are shared to all servers, and separate users. The cloud computing chains distributed services multi-domain Infrastructure, and multi-users. It certifies user to store large amount of data in cloud storage and use as and when essential, from wherever in the world, via any terminal equipment. Since cloud computing is rest on internet, security issues like privacy, data security, confidentiality, and authentication is faced. In order to get free from the alike, a variation of encryption algorithms and mechanisms are used. On the similar terms, this paper is carrying out the implementation of Digital Signature.

IJERT-Data Security and Cryptography in Cloud Environment

International Journal of Engineering Research and Technology (IJERT), 2015

https://www.ijert.org/data-security-and-cryptography-in-cloud-environment https://www.ijert.org/research/data-security-and-cryptography-in-cloud-environment-IJERTV4IS061013.pdf Cloud is an intelligent computing delivery service. It provides unlimited service provisioning to users based on their demand. Services are processed by automated APIs(Application Programming Interface) without human interaction. Storage is one of the main services from the Cloud. Users could outsource their data to cloud. Cloud provides reliable storage. Data outsource to cloud are stored in different cloud datacenter located in different geographical location to maintain the reliable storage. Cloud has many challenges like scalability, resource allocation, virtualization, security, trust, service level agreement and etc. Among these challenges, security is the top level concern in cloud storage. Cloud storage has many security related issues. Traditionally, Security is addressed by cryptography techniques. This paper describes the data security challenges, importance of security and security mechanism for cloud storage. Different security mechanisms are addressed in this paper, among them confidentiality, integrity and authentication are important for data security in cloud. An efficient cryptography technique might protect the cloud environment from unauthorized usage.

Strong and Secure Mechanism for Data Storage in Cloud Environment

World Academy of Research in Science and Engineering, 2019

This present research paper proposes the security is frequently referred to as a standout among the most unlimited issues in the cloud processing as distributed computing gives a helpful and huge measure of capacity information at extremely low and effective expense so searching for a legitimate wellbeing measures is basic. It is contended that the Cloud is proposed to deal with a lot of information, along these lines aggressors can be search for taking out the information as it includes different data's being put away. A many customers are surfing cloud for diverse purposes hence they need profoundly protected & persevering administrations. The developing of cloud is growing day by day which utilizes the additional level of protection and validation. We propose a basic information assurance model where information is encoded utilizing MD5 with RSA and Authenticated by Diffie-Hellman calculation prior to it is propelled in the cloud, therefore guaranteeing data privacy and security.

Performance Analysis of Cloud Data Verification Using MD5 and ECDSA Method

2017

Cloud computing enable the users to outsource and access data economically using storage as a service. In this storage model, the data owner doesnot have any control of the data once its stores on cloud server. Therefore, privacy and security of the data is a challenging issue in cloud computing. To provide the integrity of the outsourced data, we have proposed a lightweight data auditing technique such as MD5 and ECDSA signature method using third party auditor. The result analysis of the proposed method shows that, ECDSA has better security performance than the computation as compared to MD5 method for larger data size. The selection of the signature method depends on the priority of the data size and frequency of accessing.

Digital Sign Enabled Secure Scalable Private Cloud for Data Storage: A Survey

Journal of emerging technologies and innovative research, 2021

Cloud Computing is now a worldwide concept which is being utilized by majority of internet users. The number of institutions, companies and other personal users relying on the resources provided by the cloud and as well storing the critical information in the cloud has increased drastically over the years due to the simplistic and attractive features it possesses. One of the main challenging issues that needs to be tackled in the cloud computing is the security of data stored in the service providers' site. When storing data on cloud, one might want to make sure if the data is correctly stored and can be retrieved later. As the amount of data stored by the cloud for a client can be enormous, it is impractical OR might also be very costly to retrieve all the data, just to make sure that it is stored correctly. Hence there is a need to provide such guarantees to a client. Hence, it is very important for both the cloud provider and the user to have mutual trust such that the cloud provider can be assured that the user is not some malicious hacker and the user can be assured of data consistency, data storage and the instance he/she is running is not malicious. In this paper, thorough study and analysis is done on some of the research papers that has been written and published in this field. This paper presents literature survey on variety of approaches for implementing data security in cloud computing. The proposed system gives the concept of digital signature to maintain the trust worthiness. I.

Public Auditing for Secure Cloud Storage using MD5 Algorithm

International Journal of Recent Technology and Engineering, 2019

Cloud computing has become a significant technology trend, and plenty of consultants expect that cloud computing can reshape data technology (IT) and also the IT marketplace. In this paper, we are suggesting a safety mechanism that provides open analysis on shared knowledge within the cloud. During this mechanism, the individual of the underwriter on every sq. in shared statistics are going to be hold on in private from open verifies, who can proficiently verify the shared records without improving the entire report. This mechanism can play out numerous comparing undertakings at the identical time instead of checking them separately. This framework provides a security saving options of open inspecting part for shared facts at intervals the cloud. we have a tendency to area unit mistreatment ring marks to make homomorphy authentication, so thereto, AN open verify will offer an summary on shared data while not obtaining the entire facts, but it cannot be understanding that who is the ...