A Novel Data Auditing Approach to Achieve Data Privacy and Data Integrity in Cloud Computing

Authors(3) :-Soumya Shinde, Ramya V. Shinde, Priyanka Kamadhenu

Cloud computing is a general term for the delivery of hosted services over the internet. Using the cloud services saves both users time and money. However, there are some security issues to be solved for personal users and enterprises to store data in the cloud. The fact is that users will not have any physical control over the outsourced data. The cloud user is concerned about the integrity of his data stored in the cloud as it can be attacked by attacker. The purpose of this paper is to suggest an efficient public auditing technique using Third Party Auditor (TPA) to verify the integrity of data stored in the cloud. The proposed auditing scheme makes use of AES algorithm for encryption and Secure Hash Algorithm (SHA-2) algorithm to generate verification metadata or message digest for data integrity check. The analysis shows that the proposed scheme is provably secure and TPA takes a constant time to audit files of different sizes.

Authors and Affiliations

Soumya Shinde
Department of ISE, SKSVM Agadi College of Engg. & Tech, Laxmeshwar, India
Ramya V. Shinde
Department of ISE, SKSVM Agadi College of Engg. & Tech, Laxmeshwar, India
Priyanka Kamadhenu
Department of ISE, SKSVM Agadi College of Engg. & Tech, Laxmeshwar, India

Cloud Computing, Public Auditing, Cloud Service Provider (CSP), Data Integrity, Third Party Auditor (TPA)

  1. Swapnali Morea, Sangita Chaudhari , “Third Party Public Auditing Scheme for Cloud Storage”, International Journal of Procedia Computer Science, Volume 79, pp. 69-76, 2016.
  2. Amazon.com, “Amazon Web Services (AWS),” Online at http://aws. amazon.com, 2008.
  3. W. A. Sultan Aldossary, “Data Security, Privacy, Availability and Integrity in Cloud Computing”, International Journal of Advanced Computer Science and Applications,Volume 7, Issue 4, pp. 485-498, 2016.
  4. N. K. Yang and X. Jia, “Data Storage Auditing Service in Cloud Computing: Challenges, Methods and Opportunities”, World Wide Web, Volume 15, Issue 4, pp. 409–428, 2012.
  5. Abhishek Mohta, Ravikant Sahu, Lalit Kumar. “ Robust Data Security for Cloud While Using Third Party Auditor”. International journal of Advanced research in CSE (IJARCSE), Volume 2, Issue 2, February 2012.
  6. S Ezhil Arasu, B Gowri, and S Ananthi. “Privacy-Preserving Public Auditing in cloud using HMAC Algorithm”. International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277, 3878, Volume 2, Issue 1, pp. 149-152, March 2013.
  7. Pratiksha M, Roshani T, Rajesh B. “A System of Privacy Preserving Public Auditing for Secure Cloud Storage System”. International Journal of Engineering Research and Technology (IJERT), Volume 3, Issue 8, pp. 1031-1035, August 2014.

Publication Details

Published in : Volume 4 | Issue 5 | March-April 2018
Date of Publication : 2018-04-14
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 73-80
Manuscript Number : CSEIT184508
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Soumya Shinde, Ramya V. Shinde, Priyanka Kamadhenu, "A Novel Data Auditing Approach to Achieve Data Privacy and Data Integrity in Cloud Computing", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 4, Issue 5, pp.73-80, March-April-2018.
Journal URL : http://ijsrcseit.com/CSEIT184508

Article Preview

Follow Us

Contact Us