A Novel Data Auditing Approach to Achieve Data Privacy and Data Integrity in Cloud Computing

Authors

  • Soumya Shinde  Department of ISE, SKSVM Agadi College of Engg. & Tech, Laxmeshwar, India
  • Ramya V. Shinde  Department of ISE, SKSVM Agadi College of Engg. & Tech, Laxmeshwar, India
  • Priyanka Kamadhenu  Department of ISE, SKSVM Agadi College of Engg. & Tech, Laxmeshwar, India

Keywords:

Cloud Computing, Public Auditing, Cloud Service Provider (CSP), Data Integrity, Third Party Auditor (TPA)

Abstract

Cloud computing is a general term for the delivery of hosted services over the internet. Using the cloud services saves both users time and money. However, there are some security issues to be solved for personal users and enterprises to store data in the cloud. The fact is that users will not have any physical control over the outsourced data. The cloud user is concerned about the integrity of his data stored in the cloud as it can be attacked by attacker. The purpose of this paper is to suggest an efficient public auditing technique using Third Party Auditor (TPA) to verify the integrity of data stored in the cloud. The proposed auditing scheme makes use of AES algorithm for encryption and Secure Hash Algorithm (SHA-2) algorithm to generate verification metadata or message digest for data integrity check. The analysis shows that the proposed scheme is provably secure and TPA takes a constant time to audit files of different sizes.

References

  1. Swapnali Morea, Sangita Chaudhari , “Third Party Public Auditing Scheme for Cloud Storage”, International Journal of Procedia Computer Science, Volume 79, pp. 69-76, 2016.
  2. Amazon.com, “Amazon Web Services (AWS),” Online at http://aws. amazon.com, 2008.
  3. W. A. Sultan Aldossary, “Data Security, Privacy, Availability and Integrity in Cloud Computing”, International Journal of Advanced Computer Science and Applications,Volume 7, Issue 4, pp. 485-498, 2016.
  4. N. K. Yang and X. Jia, “Data Storage Auditing Service in Cloud Computing: Challenges, Methods and Opportunities”, World Wide Web, Volume 15, Issue 4, pp. 409–428, 2012.
  5. Abhishek Mohta, Ravikant Sahu, Lalit Kumar. “ Robust Data Security for Cloud While Using Third Party Auditor”. International journal of Advanced research in CSE (IJARCSE), Volume 2, Issue 2, February 2012.
  6. S Ezhil Arasu, B Gowri, and S Ananthi. “Privacy-Preserving Public Auditing in cloud using HMAC Algorithm”. International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277, 3878, Volume 2, Issue 1, pp. 149-152, March 2013.
  7. Pratiksha M, Roshani T, Rajesh B. “A System of Privacy Preserving Public Auditing for Secure Cloud Storage System”. International Journal of Engineering Research and Technology (IJERT), Volume 3, Issue 8, pp. 1031-1035, August 2014.

Downloads

Published

2018-04-14

Issue

Section

Research Articles

How to Cite

[1]
Soumya Shinde, Ramya V. Shinde, Priyanka Kamadhenu, " A Novel Data Auditing Approach to Achieve Data Privacy and Data Integrity in Cloud Computing, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 4, Issue 5, pp.73-80, March-April-2018.