Privacy of Cloud Data using Public Audit

Abstract

Data stored in the cloud is a storage shared by multiple users. Regrettably, Error caused by human in data security and in software makes the security of data in the cloud to be a question for the end users. However, the integrity of the data for public disclosure is already shared with the method of the audit identify the privacy of data from the auditors must be disclosed. In this article we propose a policy to maintain and support the data in cloud using the privacy policy in a public. In this proposed system we use a ring scheme to derive the data shared with the help of metadata which is an authentication signature for maintaining accuracy od data. With our system, for execution and verifying the integrity of the shared data by ruining the signer's identity in private and checking for the execution of multiple tasks simultaneously. In the audit experiment which results in the integrity and demonstrate the effectiveness and efficiency of our system.

Country : India

1 Prasanthi Gundabattini

  1. Associate Professor, Department of Computer Science and Engineering, Malla Reddy College of Engineering for Women, Hyderabad -500100, Telangana, India

IRJIET, Volume 3, Issue 6, June 2019 pp. 49-51

.

References

  1. B. Wang, B. Li, and H. Li, “Oruta: Privacy- Preserving PublicAuditing for Shared Data in the Cloud,” Proc. IEEE Fifth Int’l Conf.Cloud Computing, pp. 295-302, 2012.
  2. M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, A.Konwinski, G. Lee, D.A. Patterson, A. Rabkin, I. Stoica, andM. Zaharia, “A View of Cloud Computing,” Comm. ACM, vol. 53, no. 4, pp. 50-58, Apr. 2010.
  3. K. Ren, C. Wang, and Q. Wang, “Security Challenges for the PublicCloud,” IEEE Internet Computing, vol. 16, no. 1, pp. 69-73, 2012.
  4. D. Song, E. Shi, I. Fischer, and U. Shankar, “Cloud Data Protectionfor the Masses,”Computer, vol. 45, no. 1, pp. 39-45, 2012.
  5. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy- PreservingPublic Auditing for Data Storage Security in Cloud Computing,”Proc. IEEE INFOCOM, pp. 525- 533, 2010.
  6. B. Wang, M. Li, S.S. Chow, and H. Li, “Computing EncryptedCloud Data Efficiently under Multiple Keys,” Proc. IEEE Conf.Comm. and Network Security (CNS ’13), pp. 90-99, 2013.
  7. R. Rivest, A. Shamir, and L. Adleman, “A Method or ObtainingDigital Signatures and Public Key Cryptosystems,” Comm. ACM, vol. 21, no. 2, pp. 120-126, 1978.
  8. The MD5 Message-Digest Algorithm (RFC1321). https://tools.ietf.org/html/rfc1321, 2014.
  9. G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner,Z. Peterson, and D. Song, “Provable Data Possession atUntrusted Stores,” Proc. 14th ACM Conf. Computer and Comm. Security (CCS ’07), pp. 598-610, 2007.
  10. H. Shacham and B. Waters, “Compact Proofs of Retrievability,”Proc. 14th Int’l Conf. Theory and Application of Cryptology and InformationSecurity: Advances in Cryptology (ASIACRYPT ’08), pp. 90- 107, 2008.