Abstract

In Cloud Storage Server, data integrity plays an important role, given cloud clients might not be aware whether the data is safe or has been tampered with. This system introduces identity-based signature algorithms to protect data that belongs to the data owner and gets the status of cloud data by means of verification through signatures. Since it is practically not possible for the data owner to be available online all the time for checking cloud data integrity, Third party auditor is tasked with verifying the data integrity every time instead of data owner. The Third party auditors should not read the cipher text data while verifying and must authenticate itself to cloud server by performing Proof of Knowledge operation; then cloud server can reveal the sensitive data as block wise and the third party auditor can verify the signature without knowledge of cipher text data. Finally, an audit report is sent to the data owner. This work demonstrates data security and integrity in the cloud..

Highlights

  • In cloud computing [1], the cloud service provider allows cloud users to store their sensitive data with less cost

  • Once the cloud user registers with a cloud storage server, users can access data remotely, provided they deploy an application in cloud and there is no need to maintain hardware and software

  • The cloud user can decrypt the cipher text with privileges keys which are recommended to store sensitive data in cloud storage

Read more

Summary

INTRODUCTION

In cloud computing [1], the cloud service provider allows cloud users to store their sensitive data with less cost. The cloud user can decrypt the cipher text with privileges keys which are recommended to store sensitive data in cloud storage In cryptography technology they have Symmetric and Asymmetric algorithms to transform the data into cipher text data. To overcome above limitations the proposed system contributes data integrity checking protocol with zero knowledge proof In this system data owner can select file and make it signature with Identity-based signature algorithm and store into cloud storage, he/she can verifying their data with sending request to third party auditor auditor first generate the challenge value with help of zero proof of knowledge, later send to cloud server it can verify the proof if it is valid cloud server can return signatures to third party auditor he can verify the signatures and return auditing report to cloud users or data owner if cloud data or signature is not matched it can generate corrupted status and replace that corrupted data with original data by data owner.

RELATED WORK
EXPERIMENTAL RESULTS
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call