Downloads: 134 | Views: 263
Research Paper | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014 | Popularity: 6.8 / 10
Privacy Preserving Auditing Protocol Using Cryptography for Cloud Storage Systems
Anuradha Appasaheb Jagadale, Shilpa Gite
Abstract: Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. Now days lots of data owners outsourcing their data on cloud servers. Due to the data outsourcing, this new paradigm of data hosting service also introduces new security challenges, which requires an auditing service to check the data integrity in the cloud. This work studies the problem of ensuring the integrity of cloud data storage. In particular, we consider the task of allowing a third party auditor (TPA), on behalf of the data owner, to verify the integrity of the data stored in the cloud. Some existing integrity checking methods can only be useful for static data and, thus, cannot be applied to the auditing service since the data in the cloud can be dynamically updated. Thus, secure dynamic auditing protocol is desired to ensure data owners that their data is correctly stored in the cloud storage systems. In this paper, we design an auditing framework for cloud data storage systems and propose privacy-preserving and dynamic auditing protocol. Also, proposed auditing protocol doesnt require any trusted organizer to support batch auditing for multiple clouds. The analysis and results show that our proposed auditing protocols are secure and efficient, especially it reduce the computation overhead of the auditor.
Keywords: Storage auditing, dynamic auditing, privacy-preserving auditing, batch auditing, cloud computing
Edition: Volume 3 Issue 12, December 2014
Pages: 144 - 148
Make Sure to Disable the Pop-Up Blocker of Web Browser
Downloads: 656 | Views: 2000
Computer Science & Engineering, India, Volume 9 Issue 7, July 2020
Pages: 1454 - 1458Heart Disease Prediction with Machine Learning Approaches
Megha Kamboj
Downloads: 401 | Views: 717
Computer Science & Engineering, India, Volume 7 Issue 11, November 2018
Pages: 1951 - 1955Hadoop Performance Improvement using Metadata and Securing with Oauth Token
Swapnali A. Salunkhe, Amol B. Rajmane
Downloads: 386 | Views: 697
Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1 - 3Comparative Study of Conventional Desktop Computer and Compute Stick
Aadarsh Sooraj, Sooraj G.
Downloads: 354 | Views: 697
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 629 - 632Review Paper on Secure Hashing Algorithm and Its Variants
Priyanka Vadhera, Bhumika Lall
Downloads: 336 | Views: 686
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2148 - 2152The Impact and Application of 3D Printing Technology
Thabiso Peter Mpofu, Cephas Mawere, Macdonald Mukosera