A Novel Data Auditing Approach to Achieve Data Privacy and Data Integrity in Cloud Computing

被引:0
|
作者
Hiremath, Shivarajkumar [1 ]
Kunte, Sanjeev [2 ]
机构
[1] SKSVM Agadi Coll Engn & Tech, Dept ISE, Laxmeshwar, India
[2] JNN Coll Engn, Dept CSE, Shivamogga, India
关键词
Cloud Computing; Public Auditing; Cloud Service Provider (CSP); Data Integrity; Third Party Auditor (TPA);
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing is a general term for the delivery of hosted services over the internet. Using the cloud services saves both users time and money. However, there are some security issues to be solved for personal users and enterprises to store data in the cloud. The fact is that users will not have any physical control over the outsourced data. The cloud user is concerned about the integrity of his data stored in the cloud as it can be attacked by attacker. The purpose of this paper is to suggest an efficient public auditing technique using Third Party Auditor (TPA) to verify the integrity of data stored in the cloud. The proposed auditing scheme makes use of AES algorithm for encryption and Secure Hash Algorithm (SHA-2) algorithm to generate verification metadata or message digest for data integrity check. The analysis shows that the proposed scheme is provably secure and TPA takes a constant time to audit files of different sizes.
引用
收藏
页码:306 / 310
页数:5
相关论文
共 50 条
  • [1] A Survey on Data Auditing Approaches to Preserve Privacy and Data Integrity in Cloud Computing
    Kavya, V
    Sumathi, R.
    Shwetha, A. N.
    [J]. SUSTAINABLE COMMUNICATION NETWORKS AND APPLICATION, ICSCN 2019, 2020, 39 : 108 - 118
  • [2] Complete Privacy Preserving Auditing for Data Integrity in Cloud Computing
    Ramaiah, Y. Govinda
    Kumari, G. Vijaya
    [J]. 2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 1559 - 1566
  • [3] An efficient data integrity auditing protocol for cloud computing
    Garg, Neenu
    Bawa, Seema
    Kumar, Neeraj
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 109 : 306 - 316
  • [4] Data Integrity and Privacy Model in Cloud Computing
    Al-Jaberi, Mohammed Faez
    Zainal, Anazida
    [J]. 2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2014, : 280 - 284
  • [5] Data integrity verification: a novel approach for cloud computing
    Rajat Saxena
    Somnath Dey
    [J]. Sādhanā, 2019, 44
  • [6] Data integrity verification: a novel approach for cloud computing
    Saxena, Rajat
    Dey, Somnath
    [J]. SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2019, 44 (03):
  • [7] Privacy-preserving public auditing for data integrity in cloud
    Saleem, M. Shaik
    Murali, M.
    [J]. PROCEEDINGS OF THE 10TH NATIONAL CONFERENCE ON MATHEMATICAL TECHNIQUES AND ITS APPLICATIONS (NCMTA 18), 2018, 1000
  • [8] Provable Cloud Data Transfer with Efficient Integrity Auditing for Cloud Computing
    Yang, Changsong
    Xiao, Jun
    Liu, Yueling
    Liu, Yang
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [9] AUDITING OF DATA INTEGRITY OVER DYNAMIC DATA IN CLOUD
    Kumar, P. Santhosh
    Parthiban, Latha
    Jegatheeswari, V.
    [J]. 2017 SECOND INTERNATIONAL CONFERENCE ON RECENT TRENDS AND CHALLENGES IN COMPUTATIONAL MODELS (ICRTCCM), 2017, : 43 - 48
  • [10] A Novel approach to Secure Cloud Data Storage and Dynamic Data Auditing in a Cloud
    Brindha, K.
    Jeyanthi, N.
    [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, DATA AND CLOUD COMPUTING (ICC 2017), 2017,