Public Auditing of Data Stored in Cloud By Preserving Privacy
Shima V M1, Lekshmy D Kumar2
1Shima V M, Match. Student, Sree Chitra Thirunal College of Engineering, Pappanamcode, Trivandrum (Kerala), India.
2Lekshmy D Kumar, Assistant Professor, Department of Computer Science, Sree Chitra Thirunal College of Engineering, Pappanamcode, Trivandrum (Kerala), India.
Manuscript received on 15 August 2015 | Revised Manuscript received on 25 August 2015 | Manuscript Published on 30 August 2015 | PP: 230-233 | Volume-4 Issue-6, August 2015 | Retrieval Number: F4223084615/15©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: In cloud computing users can store their data into a cloud server which is located remotely so that users can use high quality applications and services by using available computing resources. The overhead of storing and maintaining local data can be avoided. The problem is that the users no control over their outsourced data makes the integrity of data in cloud server a difficult task. The task is very difficult for users with constrained computing resources. The benefit of cloud computing are those users can use the cloud storage as if it is local. For providing integrity to the data that stored in cloud, users can enable public auditability for cloud storage. Users can resort to a third party auditor (TPA) to check the correctness of their outsourced data and no need to worry about their data integrity. For effective auditing TPA should not introduce any vulnerability. That is user require privacy from the TPA. The auditing method uses homomorphic encryption with random masking technique which provides greater privacy. This paper is based on a secure cloud storage system supporting privacy preserving public auditing.
Keywords: Cloud Computing, Auditing, Batch Signature, Multicast Authentication Etc.
Scope of the Article: Cloud Computing