Proficient Justification of Data Accuracy for Cloud Storage Using Dual Protection

Authors(4) :-Deepika. N, Durga. P, Gayathri. N, Murugesan. M

The cloud security is one of the essential roles in cloud, here we can preserve our data into cloud storage. More and more clients would like to keep their data to PCS (public cloud servers) along with the rapid development of cloud computing. Cloud storage services allow users to outsource their data to cloud servers to save local data storage costs. Multiple verification tasks from different users can be performed efficiently by the auditor and the cloud-stored data can be updated dynamically. It makes the clients check whether their outsourced data is kept intact without downloading the whole data. In our system we are using the own auditing based on the token generation. Using this key generation technique compare the key values from original keys we can find out the changes about the file. A novel public verification scheme for cloud storage using in distinguishability obfuscation, which requires a lightweight computation on the auditor and delegate most computation to the cloud. Not only stored also the content will be encrypted in the cloud server. If anyone try to hack at the cloud end is not possible to break the two different blocks. The security of our scheme under the strongest security model. They need first decrypt the files and also combine the splitted files from three different locations. This is not possible by anyone. Anyone can download the files from the server with file holder permission. At the time of download key generated (code based key generation) and it will send to the file owner. We can download the file need to use the key for authentication and some other users want to download file owner permission is necessary.

Authors and Affiliations

Deepika. N
UG Scholar, Dhanalakshmi College of Engineering, Tamilnadu, India
Durga. P
UG Scholar, Dhanalakshmi College of Engineering, Tamilnadu, India
Gayathri. N
UG Scholar, Dhanalakshmi College of Engineering, Tamilnadu, India
Murugesan. M
Associate Professor, Dhanalakshmi College of Engineering, Tamilnadu, India

Key Generation Technique, File Auditing, Token Generation, Public Verification Key.

  1. J. Yu, K. Ren, C. Wang, et al, “Enabling Cloud Storage Auditing with Key-Exposure Resistance,” IEEE Transactions on Information Forensics and Security, vol.10, no.6, pp. 1167-1179, 2015.
  2. Q. Wang, C. Wang, K. Ren, et al, “Enabling public auditability and data dynamics for storage security in cloud computing,” IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 5, pp. 847-859, 2011.
  3. C. Wang, Q. Wang, K. Ren, et al, “Privacy-preserving public auditing for data storage security in cloud computing,” Proceedings of IEEE INFOCOM, pp. 1-9, 2010.
  4. B. Wang, B. Li, and H. Li, “Oruta: privacy-preserving public auditing for shared data in the cloud,” IEEE Transactions on Cloud Computing, vol.2, no.1, pp.43-56, 2014.
  5. B. Wang, B. Li, and H. Li, “Public auditing for shared data with efficient user revocation in the cloud,” Proceedings of IEEE INFOCOM, pp. 2904- 2912, 2013.
  6. B. Wang, B. Li, and H. Li, “Panda: Public auditing for shared data with efficient user revocation in the cloud,” IEEE Transactions on Services Computing, vol.8, no.1, pp. 92-106, 2015.
  7. H. Wang, and Y. Zhang, “On the Knowledge Soundness of a Cooperative Provable Data Possession Scheme in Multi cloud Storage,” IEEE Transactions on Parallel and Distributed Systems, vol.25, no.1, pp. 264-267, 2014.
  8. H. Wang, “Identity-based distributed provable data possession in multi cloud storage,” IEEE Transactions on Services Computing, vol.8, no.2, pp.328-340, 2015.
  9. T. Jiang, X. Chen, and J. Ma, “Public integrity auditing for shared dynamic cloud data with group user revocation,” IEEE Transactions on Computers, vol.65, no.8, pp.2363-2373, 2016.
  10. K. Yang and X. Jia, “An efficient and secure dynamic auditing protocol for data storage in cloud computing,” IEEE Trans. Parallel and Distributed Systems, Vol. 24, No. 9, pp. 1717-1726, 2013.

Publication Details

Published in : Volume 6 | Issue 2 | March-April 2019
Date of Publication : 2019-04-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 287-299
Manuscript Number : IJSRST196250
Publisher : Technoscience Academy

Print ISSN : 2395-6011, Online ISSN : 2395-602X

Cite This Article :

Deepika. N, Durga. P, Gayathri. N, Murugesan. M, " Proficient Justification of Data Accuracy for Cloud Storage Using Dual Protection", International Journal of Scientific Research in Science and Technology(IJSRST), Print ISSN : 2395-6011, Online ISSN : 2395-602X, Volume 6, Issue 2, pp.287-299, March-April-2019. Available at doi : https://doi.org/10.32628/IJSRST196250    
Journal URL : https://ijsrst.com/IJSRST196250
Citation Detection and Elimination     |      | | BibTeX | RIS | CSV

Article Preview