Abstract

The majority data are now kept in the cloud. There are many Cloud storage applications used to exchange data that range from normal to highly sensitive. Among the most essential security measures in cloud is Cloud auditing. It is the process of validating the reliability of data stored in the cloud. As of the inevitability of hardware problems, system failures and errors by people these data may be corrupted or lost. An efficient auditing system to determine whether or not the data is corrupted is a challenging task among the recent research. This paper proposes a third-party enabled auditing methodology to ensure data integrity, privacy data sharing and protect against outside attackers in the public cloud. In this proposed method, the record / data owner generates signatures or add sanitizer before importing sensitive data blocks into the cloud. The record blocks that report sensitive data are sanitized, and the signatures of those records blocks are converted into legitimate ones for the sanitized report. As a result, the records saved in the cloud have the identical signature. Then a third-party auditor is implemented to confirm the cloud's storage accuracy by validating the reliability of the cloud records on the person's behalf.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call