Cloud Data Security Using Third Party Auditor

Authors

  • Aman Bhimrao Kamble  ME CNIS, MGM COE NANDED, Maharashtra, India
  • Dr. M. Y. Joshi  Associate Professor Department of CSE, MGM COE NANDED, Maharashtra, India

Keywords:

Data storage, public auditability, data dynamics, cloud computing.

Abstract

Recently, cloud computing changed rapidly the way computing takes place. without any investment the user use cloud storage and other facilities. The user store data on remote server in the data center so there is a security problem concern to the cloud server. This work studies the problem of ensuring the integrity of data storage in Cloud Computing. we also focused on third party auditor (TPA), on the side of the cloud client for verifying the integrity of dynamically stored data on the cloud. Through the auditing eliminates the involvement of the client. General forms of data operation supports the data dynamics such as insertion, and deletion, block modification. Cloud Computing services are not limited to archive or backup data only. so the prior work on remote data integrity frequently lacks the support of either public auditability or dynamic data operations, this paper achieves both. In this firstly we identity the direct extensions security problems with the updated data. and then show how to construct an elegant verification scheme for the seamless integration of these two salient features in our protocol design. For archiving the data dynamic efficiently, manipulating the classic Merkle Hash Tree construction for block tag authentication to improve the storage model of existing system. To support efficient handling of multiple auditing tasks, we further explore the technique of bilinear aggregate signature to extend our main result into a multiuser setting, where TPA can perform multiple auditing tasks simultaneously. Extensive security and performance analysis show that the proposed schemes are highly efficient and provably secure.

References

  1. C Wang, Q. Wang, J. Li, K. Ren, and W. Lou, "Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing " 2009.
  2. Liang Duan, Charu Aggarwal, Shuai Ma, Tiejun Ma, Jinpeng Huai, "An Ensemble Approach to Link Prediction " 2017
  3. H Pang, J. Shen, and R. Krishnan, "Privacy-preserving similarity based text retrieval "2010.
  4. R Burns, G. Ateniese, J. Herring, L. Kissner, R. Curtmola, Z. Peterson, and D. Song, "Provable Data Possession at Untrusted Stores " 2007
  5. Yi-Cheng Zhang ,Hao Liao1, Mingyang Zhou1, Zong-wen Wei1, Rui Mao1, Alexandre Vidmer1, "Hidden space reconstruction inspires link prediction in complex networks" March 2017
  6. EL. Miller, T. Schwarz "Store Forget and Check: Using Algebraic Signatures to Check Remotely Administered Storage " 2006
  7. C Erway, C. Papamanthou, A. Kupcu, and R. Tamassia, "Dynamic Provable Data Possession" 2009
  8. A Juels, K.D. Bowers, and A. Oprea, "Hail: A High Availability and Integrity Layer for Cloud Storage" 2009
  9. D Boneh, B. Lynn, and H. Shacham "Short Signatures from the Weil Pairing " 2001
  10. R.C. Merkle "Protocols for Public Key Cryptosystems " 1980.

Downloads

Published

2018-06-30

Issue

Section

Research Articles

How to Cite

[1]
Aman Bhimrao Kamble, Dr. M. Y. Joshi, " Cloud Data Security Using Third Party Auditor , International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 4, Issue 8, pp.340-344, May-June-2018.