IJERT-A System of Privacy Preserving Public Auditing for Secure Cloud Storage System (original) (raw)
Related papers
IJERT-Secure Auditing of the User Data in Cloud Storage System
International Journal of Engineering Research and Technology (IJERT), 2014
https://www.ijert.org/secure-auditing-of-the-user-data-in-cloud-storage-system https://www.ijert.org/research/secure-auditing-of-the-user-data-in-cloud-storage-system-IJERTV3IS060335.pdf Cloud computing because of its wide range of applications and shared pool of resources, it has become a next generation IT technology, user stores their data in the cloud and enjoy the cloud resources involving on demand applications and services. Although Cloud has a full-fledged security resources there are so many security issues because of its distributed manner. The user does not having any control of their outsourced data. In this paper in order check the correctness of their outsourced data user takes the assistance of the Third Party Auditor who verifies of the data and sends the desired results to the requested user. In particularly maintaining privacy in the TPA verification so that he should not read the actual content of the user data which is outsourced in the cloud.
IJERT-Secure and Efficient Audit Service for Data Integrity in Cloud Storage
International Journal of Engineering Research and Technology (IJERT), 2019
https://www.ijert.org/secure-and-efficient-audit-service-for-data-integrity-in-cloud-storage https://www.ijert.org/research/secure-and-efficient-audit-service-for-data-integrity-in-cloud-storage-IJERTCONV7IS01027.pdf Cloud-based outsourced storage relieves the client's burden for storage management and maintenance by providing a comparably low-cost, scalable, location-independent platform. Cloud computing is an emergent paradigm to provide reliable and resilient infrastructure enabling the users (data owners) to store their data and the data consumers (users) can access the data from cloud servers. However, the fact that clients no longer have physical possession of data indicates that they are facing a potentially formidable risk for missing or corrupted data. The Cloud Storage Service (CSS) relieves the burden of storage management and maintenance. To avoid the securityrisks, audit services are critical to ensure the integrity and availability of outsourced data and to achieve digital forensics and credibility on cloud computing. Provable Data Possession (PDP), which is a cryptographic technique for verifying the integrity of data without retrieving it at an untrusted server, can be used to realize audit services. The profiting from the interactive zero-knowledge proof system, address the construction of an interactive PDP protocol to prevent the fraudulence of proven (soundness property) and the leakage of verified data (zero-knowledge property). One fundamental aspect of this paradigm shifting is that data are being centralized and outsourced into clouds. Therefore, it isnecessary for cloud service providers to offer an efficient audit serviceto check the integrity and availability of the stored data.Traditional cryptographic technologies for data integrity and availability, based on hash functions and signature scheme, cannot work on theoutsourced data without a local copy of data.
Implementation of Public Auditing for Privacy Preserving in Secure Cloud Storage
Cloud computing area provides solution to the problem of limited storage using which a user can remotely store his or her data and enjoy the on demand high quality applications and services from a shared pool of configurable computing resources without handling the burden of local data that is being stored and maintained but the major fact is a user no longer possess the outsourced data that makes the data integrity protection in cloud computing environment as a formidable task for the users who posses constrained computing resources which pretends to use the cloud storage as if it is local without worrying about the need to verifying the data integrity by enabling public audit ability for cloud storage as it is considered to be critical where a user can resort to a third party auditor (TPA) to check the integrity of the outsourced data and be worry free. The vulnerabilities toward user data privacy introduce no additional online burden to user and in this paper we propose a secure cloud storage system that supports privacy preserving public auditing technique which is further extended to perform audits for multiple users simultaneously and efficiently by implementing extensive security and performance analysis which is proved in the proposed scheme which is provably secure and highly efficient.
Providing a Public Auditing Cryptographic Approach in Cloud Computing
International Journal of Electronic Business, 2020
Cloud computing provides data storage facility to its users in cloud storage servers based on the required payment. Using public auditability, we can check the behaviour of data in the cloud. The auditing protocol must measure less communication cost incurred by the auditor and the cloud server. Third party auditor is responsible for the authentication of secret files in cloud system on behalf of the data owner. This paper describes an auditing system for secure cloud storage systems using privacy preservation scheme. The data auditability technique allows the user to make the data integrity check using a third party. The public auditability system permits the TPA to check the cloud information without downloading the original data from the user. This process involves profiling the data and evaluating the impact of inadequate quality data which results in the performance of the organisation.
IJERT-Secured Data Storage in Cloud Computing
International Journal of Engineering Research and Technology (IJERT), 2014
https://www.ijert.org/secured-data-storage-in-cloud-computing https://www.ijert.org/research/secured-data-storage-in-cloud-computing-IJERTV3IS20478.pdf Cloud computing is a model for enabling ubiquitous, convenient, on demand network access to a shared pool of configurable computing resources such as storage, network applications and services that can be rapidly provisioned and released with minimal management effort. Users can enjoy the benefits of cloud computing once the they are sure about their data security. Since users data are stored in remote locations-which is not under direct control and visibility of users or data owners .So ensuring the security at the remote storage is a big challenge. There are variety of algorithms for ensuring security and integrity. Among them RSA for digital signature generation and SHA for hash code generation are used here efficient in public cryptosystems. Here to provide additional security the sentinels added to the data. Though cloud provides efficient services, the main challenge service providers and customers facing is data security, integrity maintenance, storage maintenance. For the better public auditing users go in need to the Third Party Providers (TPA).By using the multiple TPA's the invalid responses overcomed.
Cloud Storage Security Using Encryption and Third-Party Storage Auditing Service
2014
Cloud computing aims to enable end-users to easily create and use software without a need to worry about the technical implementations and the software's physical hosting location, hardware specifications, efficiency of data processing. Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage applications and services) .User can store that data remotely without maintaining local copy of data So the integrity of the data is major problem in cloud storage. Recently many works focuses on providing data dynamics and public verifiability for checking the remote integrity with the help of third party verifiers. Integrity in cloud computing is achieved by the Boneh-Lynn-Shacham (BLS) Signing algorithm that signing the data block before sending data to the cloud. To remove online burden of user we have public audit ability for cloud data storage. For that we use external audit party to check integrity of outsource data. We introduce third party auditor (TPA) for audit outsourced data without demanding local copy of user. No additional online burden for the cloud user and that can achieved by using Privacy-Preserving Public key based Homomorphic authenticator. Homomorphic authenticator efficiently supports public key based audit ability without having retrieval of the data blocks.
Public Auditing for Secure and Efficient Cloud Data Storage: A Comprehensive Survey
IJARIIE, 2021
Nowadays storage of data is big problem because the huge generation of multimedia data likes images, audio, video etc. whose size is very large. For storing of these data size of conventional storage is not sufficient so we need remote storage such as cloud which is resilient infrastructure, reliable and high quality performance for the cloud users. In the cloud there is no direct physical control over the records because the cloud uses its resource pool for storing. Consequently data reliability fortification and auditing is not a modest task. The user prerequisites to depend on a Third Party Auditor (TPA) who is working as a public auditor for authenticating the data integrity and privacy. This paper presents the various auditing techniques of cloud computing for improving security and then future research challenges which need to be adopt by researchers to make system obvious.
A Comprehensive Survey on Public Auditing for Secure Cloud Storage
International Journal of Engineering & Technology
Cloud computing is the most popular paradigms used today by Industries & individual users to store data. This outsourcing releases user from capital as well as maintenance cost to own their data. But it brings new security challenges such as data integrity & privacy since user has no power of control on his own data. Advances in encryption & authentication techniques has improved security of data at cloud server(CS) but still it is not providing any certificate or assurance about cloud data to user. Most of the times users are not aware of the different controls employed by CS to protect integrity of data. Due to this lack of transparency in system, the user may lose trust on CS. Hence it is a need of user to check integrity of his data at regular intervals. Most of the researchers have given solutions to this problem with the help of cryptography techniques. External parties such as Third-Party Auditors (TPA) are performing audit to verify this remote data on behalf of user. This p...
2015
Cloud computing has been imagined as the cutting edge building design of big business IT. Lamentably, the integrity of cloud information is liable to issues because of the presence of programming disappointments and human lapses. The data should be kept confidential and should be kept private to the public verifier. We extend this architecture by introducing consistency as well as security. We introduce a hybrid encryption algorithm to effectively encrypt the data files of users in cloud server. The hybrid algorithm supports the data confidentiality, privacy preserving of data. Together with this, system supports data sharing by maintaining consistency.
2014
Cloud computing is an internet based computing which enables sharing of services. Cloud computing allows users to use applications without installation any application and access their personal files and application at any computer with internet or intranet access. Many users place their data in the cloud, so correctness of data and security is a prime concern. Cloud Computing is technology for next generation Information and Software enabled work that is capable of changing the software working environment. It is interconnecting the large-scalecomputing resources to effectively integrate, and to computing resources as a service to users. To ensure the correctness of data, we consider the task of allowing a third party auditor (TPA), on behalf of the cloud client, to verify the integrity of the data stored in the cloud, the auditing process should bring in no new vulnerabilities towards user data privacy, and introduce no additional online burden to user. In this research paper, we ...