Preserving a Fine-grained Access Control and Data Integrity on Cloud Storage

U. DEEPIKA, Y. G. Deepa, Dr. K. Ramakrishna

Abstract


Cloud storage empowers users to store their data remotely and enjoy the on -demand high quality cloud applications without the burden on local hardware and software management. The data compromise can occur because attack by nodes in the cloud and other users. Therefore, high security area required protecting data in the cloud; we introduce secure and optimal performance approach for data manipulation in cloud. In this methodology, when data owner wants to send file on cloud server first file is dividing into fragments and it then encrypted. These encrypted fragments data over the cloud nodes. Each node stores only one fragment of a particular data file to make ensure even in case that successful attack, no meaningful information is catching to the attacker. We use T-coloring concept for storing the fragments in nodes and separated with certain distance to prevent an attacker is predicting the fragments locations. To maintain integrity we are using the Third Party Auditor (TPA) which makes the audit report stored file on cloud and sent it to the data owner by mail. If attacker modified the file then TPA sends audit report as changed file to data owner and Proxy Agent. Finally proxy Agent which replace the modified code with original contents. 


Full Text:

PDF




Copyright (c) 2016 U. DEEPIKA, Y. G. Deepa

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

 

All published Articles are Open Access at  https://journals.pen2print.org/index.php/ijr/ 


Paper submission: ijr@pen2print.org