Abstract

Cloud storage is considered to be the most critical factor in decision making for users as it largely scales down the infrastructure in terms of size, cost and design. Considering factors such as local storage c ost, maintenance a single server model can support multi ple users on a needed basis. This raises concerns f or integrity verification i.e., assuring the correctne ss of the data stored available in cloud. The propo sed auditing algorithm suggests and investigates digita l signature for integrity verification. A Modified Version of Elliptic curve digital Signature Algorit hm is proposed for auditing the task. The main focu s of this study is to address problems such as privacy p reserving, public auditing. In addition, the perfor mance of the auditing task is optimized. Data dynamics ha ve been modeled through various data operations suc h as block insertion, deletion and block modification . Extensive theoretical and experimental analysis presented in the paper shows that security, perform ance of the proposed algorithm are improved in term s of verification time of the auditing process.

Highlights

  • Methods have been proposed for data correctness verification on behalf of cloud users

  • The Third Party Auditor (TPA) acts as a representative of cloud users who can often check the integrity of the data stored in the cloud

  • Pujeri / Journal of Computer Science 10 (10): 2077-2087, 2014 considered to be an important factor because the auditing task is done by a third party auditor (Ateniese et al, 2007; Marshal, 2013; Erway et al, 2009; Hao et al, 2011) and the data may be exposed to the TPA

Read more

Summary

Introduction

Methods have been proposed for data correctness verification on behalf of cloud users Pujeri / Journal of Computer Science 10 (10): 2077-2087, 2014 considered to be an important factor because the auditing task is done by a third party auditor (Ateniese et al, 2007; Marshal, 2013; Erway et al, 2009; Hao et al, 2011) and the data may be exposed to the TPA. This kind of complication affects the security of the protocols in cloud computing. Privacy against verifier: The representative of the cloud user audits the outsourced data and reports to the cloud user without acquiring any knowledge of the content that has been verified

Results
Discussion
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.