Abstract

Cloud computing is a service which provides storage space for the users in which data is maintained, managed, backed up remotely and made available to users over a network (typically the Internet). The user is worried about the integrity of the data stored in the cloud as the user's data can be stolen or modified by unauthorized person. So the data auditing mechanism is used to check the integrity of data with the use of Third Party Auditor (TPA). The use of this work is to develop an auditing scheme which is secure, efficient to use and possess the capabilities such as privacy preserving, public auditing, maintaining the data integrity along with confidentiality. Thus the new auditing scheme has been developed by considering all these requirements. It consists of three entities namely data owner, TPA and cloud server. TPA verifies the integrity of data on demand of the users. Thus no additional burden is provided on the cloud server. It is used only to save the encrypted blocks of data. All the task for the scheme is performed by the TPA and data owner. The introduced auditing scheme make use of AES algorithm for encryption, hash value to verify the integrity of the data and code regenerator when the data is corrupted.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call