Abstract

Cloud storage is one of Cloud's infrastructures that preserves, handles, centrally backs up data and makes it available to users through a network (normally the Internet). When data may be assaulted or modified by unauthorised attackers, the cloud owner may be interested in the privacy of data contained within the cloud. A new idea known as Data Auditing is therefore being applied with the assistance of a third party auditor (TPA) firm to check data integrity. The main goal of this work is the creation of a stable and efficient audit scheme based on the trust architecture that guarantees the safety and confidentiality of records, including the security of privacy, public audits and other capable functions. Therefore, all these requirements have been taken up with the new method for auditing. The data owner, TPA and the cloud provider contain three organisations. The data owner performs a variety of operations, such as separating the file into blocks, encryption, hash value, combination and signature. The TPA conducts the core feature of data integrity checks and performs functions, including the generation, concatenating and signature generation of hash values for encrypted blocks retrieved from the cloud server. It then tests whether the data stored in the cloud is corrupted or not by matching all signatures. On demand of customers, it tests the quality of the results. Only encrypted data blocks are processed by the cloud provider. This proposed audit scheme and the confidence architecture facilitates complex encryption of complex, integrity assurance and digital signature computing by means of sophisticated cryptographic algorithms. This article introduces the faith architecture, which is the core basis for complex crypto graphing and forensic analyzer cloud auditing programmes.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call