International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 126 | Views: 283

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 7, July 2014 | Popularity: 6.8 / 10


     

Verifying Data Integrity in Amazon EC2 Cloud Storage by Privacy Preserving Third Party Audit

D. N. Rewadkar, Suchita Y. Ghatage


Abstract: Cloud Storage is evolving as a very economical option for both home and professional users for storing their large amount of data remotely on Cloud Server. Cloud storage gives wide range of advantages like user is billed based on usage, user do not need to maintain data as the data is maintained by the cloud service provider, though the data is stored remotely it can be worked and used as if it is present locally and many more. These advantages make cloud storage very appealing still it is facing wide range of internal and external threats. The data loss incidents may take place because of network and software bugs, the CSP (Cloud Service Provider) may reclaim the data storage of rarely accessed or not accessed at all for monetary reasons or may hide the data loss incidents. So gain trust of users in cloud storage in this paper a secure cloud storage system with privacy preserving Third Party Auditing is proposed and implemented. The data is stored on Amazon EC2 instance from Amazon Web Services. The results are extended to do batch auditing for multiple data files.


Keywords: Amazon EC2, Homomorphic Encryption, Data Integrity, Third Party Audit


Edition: Volume 3 Issue 7, July 2014


Pages: 1213 - 1216



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
D. N. Rewadkar, Suchita Y. Ghatage, "Verifying Data Integrity in Amazon EC2 Cloud Storage by Privacy Preserving Third Party Audit ", International Journal of Science and Research (IJSR), Volume 3 Issue 7, July 2014, pp. 1213-1216, https://www.ijsr.net/getabstract.php?paperid=20141323, DOI: https://www.doi.org/10.21275/20141323



Similar Articles

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 5, May 2024

Pages: 1490 - 1494

An Efficient Secure Data Aggregation Strategy in Wireless Sensor Network using MAC Authentication

Mamta, Dr. Shiva Prakash

Share this Article

Downloads: 3 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023

Pages: 1816 - 1822

Introduction: Cloud Storage Security and Homomorphic Encryption in Cloud Computing

Pushpjeet Cholkar, Dr. Margi Patel

Share this Article

Downloads: 5 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 2, February 2024

Pages: 1755 - 1759

Enhancement in Homomorphic Encryption Scheme of Cloud Computing to Isolate DOS Attack

Jaspreet Kaur, Dr. Gurjit Singh Bhathal

Share this Article

Downloads: 99

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2242 - 2246

Efficient and Secure Auditing of Cloud Data with Key -Updating

Niranjana S, Manjusha M S

Share this Article

Downloads: 100

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1058 - 1060

Data Integrity Proof in Cloud Computing using TPA with Privacy Preserving

Rushikesh P. Dhanokar

Share this Article



Top