Public Auditing Scheme for Integrity Verification in Distributed Cloud Storage System (original) (raw)
Related papers
A New Digital Signature Algorithm for Ensuring the Data Integrity in Cloud using Elliptic Curves
The International Arab Journal of Information Technology
In this paper, we propose an Enhanced Digital Signature Algorithm (EDSA) for verifying the data integrity while storing the data in cloud database. The proposed EDSA is developed by using the Elliptic Curves that are generated by introducing an improved equation. Moreover, the proposed EDSA generates two elliptic curves by applying the upgraded equation in this work. These elliptic curve points were used as a public key which is used to perform the signing and verification processes. Moreover, a new base formula is also introduced for performing digital signature operations such as signing, verification and comparison. From the base formula, we have derived two new formulas for performing the signing process and verification process in EDSA. Finally, the proposed EDSA compares the resultant values of the signing and verification processes and it checks the document originality. The experimental results proved that the efficiency of the proposed EDSA in terms of key generation time, ...
Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic Curves
2013
Cloud computing is a computing paradigm that involves outsourcing of computing resources with the capabilities of expendable resource scalability, on-demand provisioning with little or no up-front IT infrastructure investment costs. It has recently emerged as a promising hosting platform that performs an intelligent usage of a collection of services, applications, information and infrastructure comprised of pools of computer, network, information and storage resources. However along with these advantages, storing a large amount of data including critical information on the cloud motivates highly skilled hackers thus creating a need for the security to be considered as one of the top issues while considering Cloud Computing. In the cloud storage model, data is stored on multiple virtualized servers. Physically the resources will span multiple servers and can even span storage sites. We have proposed an effective scheme to ensure the correctness of user's data on cloud data storage and public verifiability without demanding user's time, feasibility or resources. Whenever data corruption is detected during the storage correctness verification, this scheme can almost guarantee the simultaneous localization of data errors and the identification of the misbehaving server(s).
Citation/Export MLA Vanitha.M, Jayapratha.T ,Subramani.K, Pradeepa.T, “Elliptic Curve Cryptography Digital Signature Algorithm For Privacy-Preserving Public Auditing For Shared Data In The Cloud”, March 15 Volume 3 Issue 3 , International Journal on Recent and Innovation Trends in Computing and Communication (IJRITCC), ISSN: 2321-8169, PP: 1497 - 1502, DOI: 10.17762/ijritcc2321-8169.1503130 APA Vanitha.M, Jayapratha.T ,Subramani.K, Pradeepa.T, March 15 Volume 3 Issue 3, “Elliptic Curve Cryptography Digital Signature Algorithm For Privacy-Preserving Public Auditing For Shared Data In The Cloud”, International Journal on Recent and Innovation Trends in Computing and Communication (IJRITCC), ISSN: 2321-8169, PP: 1497 - 1502, DOI: 10.17762/ijritcc2321-8169.1503130
An Efficient Auditing for Data Sharing over Public Clouds using Signature based Elliptic Curve
International Journal of Engineering and Technology, 2017
Cloud computing enables allocation of Data and resources over internet. During allocation of information over cloud storage, security is of significant concern; hence, various security algorithms are implemented to provide security from various attacks. Here in this broadside an efficient Data Sharing using Hard Logarithmic based Signcryption and Unsigncryption is implemented which provides security from various attacks and also provides low computational cost and time.
Secure Cloud Data Audit using Protocol and Digital Signature Techniques
International Journal of Recent Technology and Engineering (IJRTE), 2019
Cloud computing is one of the important business models in the modern Information Technology. It provides various services (hardware, software) to the users with minimal interaction and low-cost. Storage service is one of the most useful services in cloud computing, which move data owners data from local computing system to the cloud. In this paradigm, once the data moves from the local computing system to the cloud, the data owner lost the physical control of the outsourced data on the cloud. So that, storage service creates data security challenges. Therefore, the integrity of the outsourced data has to be verified frequently using public or private verification method. In this paper we focus on two data security concern such as data confidentiality and remote data integrity on cloud storage system. In order to ensure the data integrity and reduce the data owners computational resources, in this work we have proposed a remote data integrity auditing methods such as Remote Data Aud...
Data Integrity on the Cloud Computing using Algebraic Signature
International Journal for Research in Applied Science & Engineering Technology (IJRASET), 2022
The Trends of Cloud Computing, the cloud security work must be important because the huge number of data with specialized connections to distribute data processing among the various servers. Client stores their data on cloud server to maintain their data privacy and data security. The popular data security method which is called cryptography taking more time and space to encrypt and decrypt for data auditing processes. The existing method is Provable Data Possession which is dynamically operates the data and gives the high computation space and time complexity. So to avoid that complexity the proposed method is called as Algebraic Signature to used low computation performance time and low data space for large data set. It is based on data integrity method for providing good data security on the cloud for large organization also. This proposed method is used the Third Party Auditing method which is to provide large data file security with the Hashing technique using Algebraic Signature method. The conclusion of this paper is providing the data integrity and time efficiency of the process using TPA method also provides the dynamic operation.
IJERT-Secure and Efficient Audit Service for Data Integrity in Cloud Storage
International Journal of Engineering Research and Technology (IJERT), 2019
https://www.ijert.org/secure-and-efficient-audit-service-for-data-integrity-in-cloud-storage https://www.ijert.org/research/secure-and-efficient-audit-service-for-data-integrity-in-cloud-storage-IJERTCONV7IS01027.pdf Cloud-based outsourced storage relieves the client's burden for storage management and maintenance by providing a comparably low-cost, scalable, location-independent platform. Cloud computing is an emergent paradigm to provide reliable and resilient infrastructure enabling the users (data owners) to store their data and the data consumers (users) can access the data from cloud servers. However, the fact that clients no longer have physical possession of data indicates that they are facing a potentially formidable risk for missing or corrupted data. The Cloud Storage Service (CSS) relieves the burden of storage management and maintenance. To avoid the securityrisks, audit services are critical to ensure the integrity and availability of outsourced data and to achieve digital forensics and credibility on cloud computing. Provable Data Possession (PDP), which is a cryptographic technique for verifying the integrity of data without retrieving it at an untrusted server, can be used to realize audit services. The profiting from the interactive zero-knowledge proof system, address the construction of an interactive PDP protocol to prevent the fraudulence of proven (soundness property) and the leakage of verified data (zero-knowledge property). One fundamental aspect of this paradigm shifting is that data are being centralized and outsourced into clouds. Therefore, it isnecessary for cloud service providers to offer an efficient audit serviceto check the integrity and availability of the stored data.Traditional cryptographic technologies for data integrity and availability, based on hash functions and signature scheme, cannot work on theoutsourced data without a local copy of data.
Improvement in Cloud Storage Auditing with Verifiable Outsourcing of Secure Key
2018
Presentation Cloud registering is a current mechanical advancement in the processing field in which for the most part centered around outlining of administrations which can be given to the clients in the same route as the fundamental utilities like nourishment, water, gas, power, and communication. Cloud storage services have become increasingly popular. Because of the importance of privacy, many cloud storage encryption schemes have been proposed to protect data from those who do not have access. In Existing system, there are following associate problems which are worked on our proposed work AES-256 is quite common and easily available for hacker activity in case it desire to break. Highly indexed data structure is not taken in the Existing system. In this paper we are using a stander SHA-2 algorithm for message key generation and for data encryption used optimized Bluefish algorithm after the completed of these process we also find the proxy server in cloud system. For simulation ...
International Journal of Applied Engineering Research, 2016
In recent days, the cloud data storage becomes a rising trend that promotes the secure remote data auditing. The existing works consider the problem secure and efficient public integrity auditing for shared dynamic data storage. But, it is not secure against the collusion of cloud data and it revokes the group of users during the user revocation in cloud system. Thus, this paper proposed a new public integrity auditing mechanism with the help of Message Authentication Code (MAC) generation and symmetric cryptographic techniques. The main intention of this paper is to design a secure and an efficient cloud data storage system to reduce the bandwidth and to improve the data integrity. The proposed system supports an effective user revocation and public checking processes. Moreover, it supports some properties such as, confidentiality, countability, efficiency and traceability for secure data storage. The experimental results are analyzed and evaluated in terms of computation time, block size, key size, number of rounds and cycles per block.
Performance Analysis of Cloud Data Verification Using MD5 and ECDSA Method
2017
Cloud computing enable the users to outsource and access data economically using storage as a service. In this storage model, the data owner doesnot have any control of the data once its stores on cloud server. Therefore, privacy and security of the data is a challenging issue in cloud computing. To provide the integrity of the outsourced data, we have proposed a lightweight data auditing technique such as MD5 and ECDSA signature method using third party auditor. The result analysis of the proposed method shows that, ECDSA has better security performance than the computation as compared to MD5 method for larger data size. The selection of the signature method depends on the priority of the data size and frequency of accessing.