Abstract
The cloud environment provided the cloud storage services to allow the users for storing, managing and accessing their data through the internet. The user worried about the integrity of data because of their data can be modified by external hackers due to the limited control. The new auditing technology is required for allowing the user to use local storage without worrying about the integrity of the data. An independent entity called Third Party Auditor (TPA) is presented for auditing task rather than putting the burden of task to the user themselves. In our proposed work, the Cloud Auditor (CA) plays the role of monitoring the modifications done to the block by any external hacker if it happens; original data is recovered from its cache log. Every data that transacts between the storage, user and the CA are encrypted with Merkle Hellman Knapsack Cryptosystem based Cloud Auditing Protocol (MHKC-CAP) algorithm. Thus the proposed methodology outperforms the existing algorithms like Message Digest 5 (MD5) algorithm and Advanced Encryption Standard (AES) by means of auditing time around 13 milliseconds and accuracy in terms of False Positive Rate (FPR) and False Negative Rate (FNR) are around 0.67% and 0.5%.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Innovative Technology and Exploring Engineering
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.