Secure Cloud Storage Auditing Using Hash-Code Technique

Authors(2) :-Zeba Masroor , Md Ateeq Ur Rahman

The Main objective of the project is to provide hash-value security to the data of the data owner. Every data dynamically generates some blocks of code then every block will have hash code. This hash code or value is totally dependent on the data it contains. First data will be encrypted at client side itself afterwards it will generate hash value of that block. With this technique we are aiming to provide high level security to the data in cloud. The Major problem lies in the security of the data in cloud where a user totally trusts on a remote server to store their data securely. There is numerous amount of studies have been conducted to address the issue of block level security. Untrusted servers need high level infrastructure to overcome the issue of data security in cloud. Hash Value based security is a well formed and clearly examined technique over a period of time in cloud. It converts the actual data with a secure unreadable code called as hash value. It is a key-value pair in which elements are arranged or organized in dictionary entry object.

Authors and Affiliations

Zeba Masroor
M.Tech Scholar, Department of Computer Science & Engineering, Shadan College of Engineering & Technology, Hyderabad, Telangana, India
Md Ateeq Ur Rahman
Professor, Department of Computer Science & Engineering, Shadan College of Engineering & Technology, Hyderabad, Telangana, India

Hash-Table, Hash-Value, Cryptography, Dynamic Hash-Table, Merkel Hash Tree, Cloud Servers, Third Party Auditor, Secure Auditing.

  1. H. Dewan and R. C. Hansdah. Proposed a paper "A Survey of Cloud Storage Facilities ", Proc. 7th IEEE World Congress on Services, pp. 224?231, July 2011.
  2. C. Wang, Q. Wang, K. Ren, N. Cao and W. Lou. Proposed a paper "Toward Secure and Dependable Storage Services in Cloud Computing", IEEE Trans. Service Computing, vol. 5, no. 2, pp. 220?232, 2012.
  3. K. Ren, C. Wang and Q. Wang. Proposed a paper "Security Challenges for the Public Cloud," IEEE Internet Computing, vol. 16, no. 1, pp. 69 73, 2012.
  4. J. Ryoo, S. Rizvi, W. Aiken and J. Kissell. Proposed a paper "Cloud Security Auditing: Challenges and Emerging Approaches", IEEE Security & Privacy, vol. 12, no. 6, pp. 68?74, 2014.
  5. C. Wang, K. Ren, W. Lou and J. Li. Proposed a paper "Toward Publicly Auditable Secure Cloud Data Storage Services", IEEE network, vol. 24, no. 4, pp. 19?24, 2010.
  6. Q. Wang, C. Wang, K. Ren, W. Lou and J. Li. Proposed a paper ‘‘Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing,’’ IEEE Trans. on Parallel and Distributed Systems, vol. 22, no. 5, pp. 847?859, 2011.

Publication Details

Published in : Volume 2 | Issue 6 | November-December 2017
Date of Publication : 2017-12-31
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 173-177
Manuscript Number : CSEIT172669
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Zeba Masroor , Md Ateeq Ur Rahman, "Secure Cloud Storage Auditing Using Hash-Code Technique ", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 6, pp.173-177, November-December-2017.
Journal URL : http://ijsrcseit.com/CSEIT172669

Article Preview

Follow Us

Contact Us