Integrated Approach for Providing Data Security and Integrity over Encrypted Cloud Data

Jami Rama Satya Nookalu, Somayajula Yamini Anupama, Koilada Bharathi, Mrs. J.Santoshi Kumari

Abstract


In current days cloud domain gained a tremendous increase of user’s attention by several small and large scale companies including software, BPO, healthcare, schools, colleges and a lot more. All these organizations try to adopt this centralized cloud server for their data storage and accessing from the remote locations connected all together from a centralized server with the help of internet. All the data is stored remotely and retrieved from the remote machines not from the local machines, hence the secrecy of data plays a vital role by the cloud service providers. As we all know that till now no cloud service provider is providing privacy for the data in terms of encryption and message digest in order to provide data authorization. Almost all companies try to search the data in a secure manner over encrypted cloud data, which will allow an untrusted user to query data files of interest by submitting encrypted keywords as a search query to the cloud server. In general, the returned query results may be some times correct or incorrect or incomplete in this dishonest cloud environment. As we all know that in current days cloud servers are almost dishonest in nature by omitting intentionally some qualified results to save computational resources and communication overhead. In this paper, we proposed and analyzed a secure, easily integrated, and fine-grained query results verification mechanism, by which, given an encrypted query results set, the query user not only can verify the quality of each data file but also checks the total number of qualified data files, which are not returned if the set is not completed before decryption process. This mainly motivated us to design a novel secure verification object for the encrypted cloud storage. Here we also used a message digest algorithm MD5 in which the short signature key is generated and used for verifying the data authentication. By conducting various experiments on our proposed model, our result clearly tells that our proposed system is practical and efficient.


Full Text:

PDF




Copyright (c) 2019 Edupedia Publications Pvt Ltd

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

 

All published Articles are Open Access at  https://journals.pen2print.org/index.php/ijr/ 


Paper submission: ijr@pen2print.org