Secure Cloud Storage Auditing Using Hash-Code Technique

Authors

  • Zeba Masroor   M.Tech Scholar, Department of Computer Science & Engineering, Shadan College of Engineering & Technology, Hyderabad, Telangana, India
  • Md Ateeq Ur Rahman  Professor, Department of Computer Science & Engineering, Shadan College of Engineering & Technology, Hyderabad, Telangana, India

Keywords:

Hash-Table, Hash-Value, Cryptography, Dynamic Hash-Table, Merkel Hash Tree, Cloud Servers, Third Party Auditor, Secure Auditing.

Abstract

The Main objective of the project is to provide hash-value security to the data of the data owner. Every data dynamically generates some blocks of code then every block will have hash code. This hash code or value is totally dependent on the data it contains. First data will be encrypted at client side itself afterwards it will generate hash value of that block. With this technique we are aiming to provide high level security to the data in cloud. The Major problem lies in the security of the data in cloud where a user totally trusts on a remote server to store their data securely. There is numerous amount of studies have been conducted to address the issue of block level security. Untrusted servers need high level infrastructure to overcome the issue of data security in cloud. Hash Value based security is a well formed and clearly examined technique over a period of time in cloud. It converts the actual data with a secure unreadable code called as hash value. It is a key-value pair in which elements are arranged or organized in dictionary entry object.

References

  1. H. Dewan and R. C. Hansdah. Proposed a paper "A Survey of Cloud Storage Facilities ", Proc. 7th IEEE World Congress on Services, pp. 224‐231, July 2011.
  2. C. Wang, Q. Wang, K. Ren, N. Cao and W. Lou. Proposed a paper "Toward Secure and Dependable Storage Services in Cloud Computing", IEEE Trans. Service Computing, vol. 5, no. 2, pp. 220‐232, 2012.
  3. K. Ren, C. Wang and Q. Wang. Proposed a paper "Security Challenges for the Public Cloud," IEEE Internet Computing, vol. 16, no. 1, pp. 69– 73, 2012.
  4. J. Ryoo, S. Rizvi, W. Aiken and J. Kissell. Proposed a paper "Cloud Security Auditing: Challenges and Emerging Approaches", IEEE Security & Privacy, vol. 12, no. 6, pp. 68‐74, 2014.
  5. C. Wang, K. Ren, W. Lou and J. Li. Proposed a paper "Toward Publicly Auditable Secure Cloud Data Storage Services", IEEE network, vol. 24, no. 4, pp. 19‐24, 2010.
  6. Q. Wang, C. Wang, K. Ren, W. Lou and J. Li. Proposed a paper ‘‘Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing,’’ IEEE Trans. on Parallel and Distributed Systems, vol. 22, no. 5, pp. 847‐859, 2011.

Downloads

Published

2017-12-31

Issue

Section

Research Articles

How to Cite

[1]
Zeba Masroor , Md Ateeq Ur Rahman, " Secure Cloud Storage Auditing Using Hash-Code Technique , IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 6, pp.173-177, November-December-2017.