Effective Multiple Verification Process Ensuring Security And Data Accuracy In Cloud Environment Storage

International Journal of Computer Science and Engineering
© 2019 by SSRG - IJCSE Journal
Volume 6 Issue 7
Year of Publication : 2019
Authors : Dr. M E Purushoththaman, Dr. Bhavani Buthtkuri

pdf
How to Cite?

Dr. M E Purushoththaman, Dr. Bhavani Buthtkuri, "Effective Multiple Verification Process Ensuring Security And Data Accuracy In Cloud Environment Storage," SSRG International Journal of Computer Science and Engineering , vol. 6,  no. 7, pp. 1-4, 2019. Crossref, https://doi.org/10.14445/23488387/IJCSE-V6I7P101

Abstract:

Cloud Computing is evolving and considered next generation architecture for computing. Typically cloud computing is a combination of computing recourses accessible via internet. However in cloud computing, since the data is stored anywhere across the globe, the client organizations have less control over the stored data. One technique could be encrypting the data on client side before storing it in cloud storage, A trusted 3rd party cloud provider be used to provide security services, while the other cloud provider would be data storage provider. The trusted 3rd party security service provider would not store any data at its end, and its only confined to providing security service. The application or software will provide data integrity verification by using hashing algorithm like SHA-1,provide encryption/decryption using symmetric algorithm like AES, and defining band of people who can access the shared data securely can be achieved by defining access list. The encrypted data along and original data hash are stored in Separate Cloud (Security Cloud), therefore even if the storage cloud system administrator has access user data, since the data is encrypted it will be difficult for the system administrator to understand the encrypted data. While the user downloads the data from Storage Cloud, it is decrypted first and then new hash is calculated which is then compared with hash of original data stored in Security Cloud. Finally, this software/application provides the user with the ability to store the encrypted data in Storage cloud and hash and encryption/decryption keys in security cloud service, and no single cloud service provider has access to both.

Keywords:

Cloud computing; Hash service; encryption and decryption service; data protection
and integrity.

References:

[1] K.Govinda, V.Gurunathaprasad, H.Sathishkumar, “Third Party Auditing for Secure Data Storage in Cloud through Digital Signature using RSA” International Journal of Advanced Scientific and Technical Research Vol.4(1), 2012.
[2] S. Sivachitralakshmi,T. Judgi, “A Flexible Distributed Storage Integrity Auditing Mechanism in Cloud Computing”, International Conference on Computing and Control Engineering,April, 2012.
[3] Qian Wang, Cong Wang, Kui Ren, Wenjing Lou and Jin Li, “Enabling Public Auditabilityand Data Dynamics for Storage Security in Cloud Computing”
[4] K.Govinda, V.Gurunathaprasad, H.Sathishkumar, “Third Party Auditing for Secure Data Storage in Cloud through Digital Signature using RSA” International Journal of Advanced Scientific and Technical Research, Vol.4(2), 2012.
[5] Nandeesh.B.B, Ganesh Kumar R, Jitendranath Mungara, “Secure and Dependable Cloud Services for TPA in Cloud Computing”, International Journal of Innovative Technology and Exploring Engineering (IJITEE) , Vol.1(3), 2012.
[6] Boyang Wang,Baochun Li,Hui Li, “Public Auditing for Shared Data with Efficient User Revocation in the Cloud”.
[7] R.Ushadevi, V. Rajamani, “A Modified Trusted Cloud Computing Architecture based on Third Party Auditor (TPA) Private Key Mechanism”, International Journal of Computer Applications, Vol.58(22), 2012.
[8] Balakrishnan.S, Saranya.G, Shobana.S, Karthikeyan.S, “Introducing Effective Third Party Auditing (TPA) for Data Storage Security in Cloud”, IJCST Vol. 2(2), 2011.
[9] Tharam Dillon, Chen Wu and Elizabeth Chang. Cloud Computing: Issues and Challenges.2010 24th IEEE International Conference on Advanced Information Networking and Applications.
[10] M. A. Shah, R. Swaminathan, and M. Baker, “Privacypreserving audit and extraction of digital contents”, Cryptology, Report, 2008.
[11] R. C.Merkle, “Protocols for public key cryptosystems,” IEEE Symposium on Security and Privacy, USA, 1980.
[12] Akhil Behl, Emerging Security Challenges in Cloud Computing . Congress on Information and Communication Technologies (WICT), 2011.
[13] Mohammed A. AlZain, Ben Soh, Eric Pardede AlZain, M.A. Soh, B. and Pardede, E. A New Approach Using Redundancy Technique to Improve Security in Cloud Computing.International Conference on Cyber Security and Digital Forensic (Cybersex), 2012.
[14] Kan Yang and Xiaohua jia, “An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing”, 2013.