Affording Greater Privacy in Cloud Storage Auditing with Random Masking Technique

N. Venkatesh Naik, D. Priyanka

Abstract


As data is energetically modernized in today’s world, the existing remote integrity checking methods which served as persistence for static data can no longer be enforced to authenticate the integrity of dynamic data in the cloud. Auditing is an important service to verify the data in the cloud. Most of the auditing protocols are based on the assumption that the client’s secret key for auditing is secure. The security is not fully achieved, because of the low security parameters of the client. The task is very difficult for users with constrained computing resources. The advantage of cloud computing are those users can use the cloud storage as if it is local. For providing integrity to the data that stored in cloud, users can enable public auditability for cloud storage. Users can recourse to a third party auditor to check the correctness of their outsourced data and no need to worry about their data integrity. For operative auditing TPA should not introduce any vulnerability. That is user need privacy from the TPA. The auditing method uses homomorphic encryption with random masking technique which provides greater privacy. This paper is based on a secure cloud storage system supporting privacy preserving public auditing.


Full Text:

PDF




Copyright (c) 2016 N. Venkatesh Naik, D. Priyanka

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

 

All published Articles are Open Access at  https://journals.pen2print.org/index.php/ijr/ 


Paper submission: ijr@pen2print.org