JOURNAL ARTICLE

Third Party Public Auditing Scheme for Cloud Storage

Mr. Vaishnav P. Surwase

Year: 2021 Journal:   International Journal for Research in Applied Science and Engineering Technology Vol: 9 (11)Pages: 1087-1093   Publisher: International Journal for Research in Applied Science and Engineering Technology (IJRASET)

Abstract

Abstract: Thus the new auditing scheme has been developed by considering all these requirements. It consist of three entities: data owner, TPA and cloud server. The data owner performs various operations such as splitting the file to blocks, encrypting them, generating a hash value for each, concatenating it and generating a signature on it. The TPA performs the main role of data integrity check. It performs activities like generating hash value for encrypted blocks received from cloud server, concatenating them and generates signature on it. It later compares both the signatures to verify whether the data stored on cloud is tampered or not. It verifies the integrity of data on demand of the users. The cloud server is used only to save the encrypted blocks of data. This proposed auditing scheme make use of AES algorithm for encryption, SHA-2 for integrity check and RSA signature for digital signature calculation. In this philosophy, users of cloud storage services no longer physically maintain direct control over their data, which makes data security one of the major concerns of using cloud. Existing research work already allows data integrity to be verified without possession of the actual data file. When the verification is done by a trusted third party, this verification process is also called data auditing, and this third party is called an auditor. As a result, every small update will cause re-computation and updating of the authenticator for an entire file block, which in turn causes higher storage and communication overheads. In this paper, we provide a formal analysis for possible types of fine-grained data updates and propose a scheme that can fully support authorized auditing and fine-grained update requests. Basedon our scheme, we also propose an enhancement that can dramatically reduce communication overheads for verifying small updates Keywords: Cloud computing, big data, data security, authorized auditing, fine-grained dynamic data update

Keywords:
Computer science Cloud computing Encryption Data integrity Cloud storage Hash function Computer security Digital signature Database Audit Computer network Operating system Accounting

Metrics

1
Cited By
0.29
FWCI (Field Weighted Citation Impact)
13
Refs
0.65
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Cloud Data Security Solutions
Physical Sciences →  Computer Science →  Information Systems
Cryptography and Data Security
Physical Sciences →  Computer Science →  Artificial Intelligence
Privacy-Preserving Technologies in Data
Physical Sciences →  Computer Science →  Artificial Intelligence

Related Documents

JOURNAL ARTICLE

Third Party Public Auditing Scheme for Cloud Storage

Swapnali S. MoreSangita Chaudhari

Journal:   Procedia Computer Science Year: 2016 Vol: 79 Pages: 69-76
JOURNAL ARTICLE

Third Party Public Auditing Scheme for Security in Cloud Storage

Heeth ShahJill ShahUshma Desai

Journal:   International Journal of Trend in Scientific Research and Development Year: 2019 Vol: Volume-3 (Issue-3)Pages: 179-184
JOURNAL ARTICLE

Developing Third Party Auditing Scheme for Secure Cloud Storage Service

Manasi DoshiSwapnaja Hiray

Journal:   International Journal of Computer Applications Year: 2013 Vol: 81 (18)Pages: 1-3
JOURNAL ARTICLE

Review on Public Auditing for Cloud Storage using Third Party Auditors

Priyanka BhorSumedh Pundkar

Journal:   International Journal of Computer Applications Year: 2016 Vol: 142 (10)Pages: 9-12
© 2026 ScienceGate Book Chapters — All rights reserved.