Efficient and secure auditing scheme for privacy preserving data storage in cloud

An on-demand computing in which data is stored in a remote manner and provision of services is from a pool of resources of computing that is shared is known as Cloud computing. The cloud computing fulfills the need of store and oversee show. Though to get to and secure information, numerous exceptional advancements like parallel and guide diminish strategies are accessible. The burden of usage from maintenance and storage of native data is eliminated and the owner additionally benefits from elimination of the responsibility of security and storage (Gourkhede and Theng, 2014 fourth international conference on communication systems and network technologies (CSNT), pp 677–680, 2014; Modi, J Supercomput 63(2):561–592, 2013; Smys and Bala, Clust Comput 15(3):211–222, 2012). In order to ensure modification of the accuracy of the on-demand data and its due verification on the cloud owners’ behalf, a methodology that is innovative is needed. The encryption and file split up is done using a novel secure cryptography hashing algorithm. Once the data is uploaded the user is provided with a private and public key for trustworthy retrieval of the data file. Those keys are generated using a proposed modified RSA cryptosystem algorithm. A multilevel hash tree algorithm is used to efficiently audit the data file occasionally. The implementation and therefore the results show the potency and efficiency of the proposed algorithm compared to the existing algorithm.

[1]  Mingxiao Ma,et al.  Secure public-auditing cloud storage enabling data dynamics in the standard model , 2016, 2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC).

[2]  D. Pratiba,et al.  PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING , 2013 .

[3]  Cong Wang,et al.  Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.

[4]  Cong Wang,et al.  Dynamic Data Operations with Deduplication in Privacy-Preserving Public Auditing for Secure Cloud Storage , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).

[5]  Gail-Joon Ahn,et al.  Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.

[6]  S. Smys,et al.  Performance analysis of virtual clusters in personal communication networks , 2012, Cluster Computing.

[7]  P. Varalakshmi,et al.  A Novel Secured Cryptographic Hash (NSCH) Algorithm , 2014 .

[8]  Luis Miguel Vaquero Gonzalez,et al.  Locking the sky: a survey on IaaS cloud security , 2010, Computing.

[9]  Yucheng Zhang,et al.  A novel cluster computing technique based on signal clustering and analytic hierarchy model using hadoop , 2017, Cluster Computing.

[10]  Deepti P. Theng,et al.  Analysing Security and Privacy Management for Cloud Computing Environment , 2014, 2014 Fourth International Conference on Communication Systems and Network Technologies.

[11]  Joonsang Baek,et al.  A Secure Cloud Computing Based Framework for Big Data Information Management of Smart Grid , 2015, IEEE Transactions on Cloud Computing.

[12]  Cong Wang,et al.  Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.

[13]  Richard J. Enbody,et al.  Targeted Cyberattacks: A Superset of Advanced Persistent Threats , 2013, IEEE Security & Privacy.

[14]  Jin Li,et al.  Secure Deduplication with Efficient and Reliable Convergent Key Management , 2014, IEEE Transactions on Parallel and Distributed Systems.

[15]  S. Smys,et al.  Construction of virtual backbone to support mobility in MANET — A less overhead approach , 2009, 2009 International Conference on Application of Information and Communication Technologies.

[16]  Cong Wang,et al.  Toward publicly auditable secure cloud data storage services , 2010, IEEE Network.

[17]  Muttukrishnan Rajarajan,et al.  A survey on security issues and solutions at different layers of Cloud computing , 2012, The Journal of Supercomputing.

[18]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..

[19]  Cong Wang,et al.  Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.