Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Data Integrity Checking in Dynamic Cloud

Author : R. Vinoth 1 R.Vimalraj 2 R. Sathishkumar 3 R. Sarathkumar 4

Date of Publication :22nd March 2018

Abstract: Cloud storage is a model of data storage in which the digital data is stored in logical pools, the cloud providers are responsible for keeping data available, accessible with security. A public auditing protocol allows a TPA (Third Party Auditor) to check the integrity protection in cloud computing a formidable task. In fact, the end devices may have low computational capabilities. The trusted third party auditing process should take in no new vulnerabilities towards user data privacy. The proposed work for improving the data integrity and data security by implementing the double encryption algorithm to encrypt the data twice and stored in the cloud server. The trusted third party auditing for the data modification happened on the first level encrypted layer of the file. The first level encryption key would be secure on the user side. In this project work, double encryption approach with public auditing protocol, we can enhance the data privacy preserving in the public cloud without leakage of data.

Reference :

    1. Ateniese, Giuseppe, Antonio Faonio, and Seny Kamara. "Leakage-resilient identification schemes from zero-knowledge proofs of storage."
    2. Cisco visual networking index: Global mobile data traffic forecast update, 2013–2018, February 5, 2014.
    3. Hao, Zhuo, Sheng Zhong, and Nenghai Yu. "A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability."
    4. Secure Hash Standard (SHS), National Institute of Standards and Technology (NIST), FIPS PUB 180
    5. Liu, Joseph K., et al. "Fine-grained two-factor access control for web-based cloud computing services
    6. Sebé, F., Domingo-Ferrer, J., Martinez-Balleste, A., Deswarte, Y., & Quisquater, J. J. (2008). Efficient remote data possession checking in critical information infrastructures.
    7. Wang, Q., Wang, C., Li, J., Ren, K., & Lou, W. (2009, September). Enabling public verifiability and data dynamics for storage security in cloud computing
    8. PauloS.L.M. Barreto and Michael Naehrig. Pairingfriendly elliptic-curves of prime order. In Bart Preneel and Stafford Tavares, editors, Selected Areas in Cryptography, volume 3897 of Lecture Notes in Computer Science, pages 319–331. Springer Berlin Heidelberg,2006
    9.  A. Barsoum and A. Hasan. Enabling dynamic data and indirectmutual trust for cloud computing storage systems. Parallel andDistributed Systems, IEEE Transactions on, 24(12):2375–2385, Dec2013.
    10. Matt Blaze, GerritBleumer, and Martin Strauss. Divertible protocols and atomic proxy cryptography. In Kaisa Nyberg, editor, Advances in Cryptology - EUROCRYPT’98, volume 1403 of LNCS,pages 127– 144. Springer Berlin / Heidelberg, 1998
    11. Dan Boneh and Xavier Boyen. Efficient selective identity-based encryption without random oracles. Journal of Cryptology (JoC), 24(4):659–693, 2011. early version in Eurocrypt 2004.
    12. Dan Boneh, Ben Lynn, and HovavShacham. Short signatures from the Weil pairing. In Colin Boyd, editor, Advances in Cryptology– ASIACRYPT 2001, volume 2248 of Lecture Notes in Computer Science, pages 514– 532. Springer Berlin Heidelberg, 2001.
    13. Towards Secure Data Distribution Systems inMobile Cloud ComputingJiang Zhang, Zhenfeng Zhang, and Hui Guo
    14. A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability Author: Z. Hao, S. Zhong
    15. Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement Author: Z. Fu, K. Ren
    16. Leakage-Resilient Identification Schemes from ZeroKnowledge Proofs of Storage Author: G. Ateniese, A. Faonio, and S. Kamara

Recent Article