Secure Technique to Achieve Data Privacy and Data Integrity in Cloud Computing
Shraddha Saxena1 , Manish Sharma2
Section:Research Paper, Product Type: Journal Paper
Volume-6 ,
Issue-10 , Page no. 545-548, Oct-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i10.545548
Online published on Oct 31, 2018
Copyright © Shraddha Saxena, Manish Sharma . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Shraddha Saxena, Manish Sharma, “Secure Technique to Achieve Data Privacy and Data Integrity in Cloud Computing,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.545-548, 2018.
MLA Style Citation: Shraddha Saxena, Manish Sharma "Secure Technique to Achieve Data Privacy and Data Integrity in Cloud Computing." International Journal of Computer Sciences and Engineering 6.10 (2018): 545-548.
APA Style Citation: Shraddha Saxena, Manish Sharma, (2018). Secure Technique to Achieve Data Privacy and Data Integrity in Cloud Computing. International Journal of Computer Sciences and Engineering, 6(10), 545-548.
BibTex Style Citation:
@article{Saxena_2018,
author = {Shraddha Saxena, Manish Sharma},
title = {Secure Technique to Achieve Data Privacy and Data Integrity in Cloud Computing},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {10 2018},
volume = {6},
Issue = {10},
month = {10},
year = {2018},
issn = {2347-2693},
pages = {545-548},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3061},
doi = {https://doi.org/10.26438/ijcse/v6i10.545548}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i10.545548}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3061
TI - Secure Technique to Achieve Data Privacy and Data Integrity in Cloud Computing
T2 - International Journal of Computer Sciences and Engineering
AU - Shraddha Saxena, Manish Sharma
PY - 2018
DA - 2018/10/31
PB - IJCSE, Indore, INDIA
SP - 545-548
IS - 10
VL - 6
SN - 2347-2693
ER -
VIEWS | XML | |
463 | 391 downloads | 192 downloads |
Abstract
Cloud services are increasing day by day over the Internet. Using the cloud services both time and money will be saved for user. However, there are some security problems to be solved for users and enterprises for data storing in secure way in the cloud. The real fact is that when users will have not any kind of physical control on outsourced data. Cloud user is concerned about the security and integrity of data stored in the cloud environment as it can be attacked by attacker. The purpose of this research paper using Third Party Auditor an efficient public data auditing technique works for verify the security and integrity of data. Which data is stored in the cloud. The proposed auditing technique makes use of Secure Hash Algorithm (SHA-2) for generating verification meta data and message digest for data integrity authentication and AES algorithm for encryption. Analysis of proposed technique shows provably more secure and TPA takes a constant time to audit files of different sizes.
Key-Words / Index Term
Cloud Computing, Public Auditing, Data Integrity, Data Privacy, Third Party Auditor (TPA).Cloud Service Provider (CSP).
References
[1] W. A. Sultan Aldossary, “Data Security, Privacy, Integrity and Availability in Cloud Computing”, International Journal of Advanced Computer Science and Applications,Volume 7, Issue 4, pp. 485- 498, 2016.
[2] Amazon.com, “Amazon Web Services (AWS).
[3] X. Jia and N. K. Yang, “Data Storage Auditing Service in Cloud Computing: Challenges, Methods and Opportunities”, World Wide Web, Volume 15, Issue 4, pp. 409–428, 2012.
[4]. Cong Wang , Sherman S M Chow, Qian Wang, Kui Ren, and Wen jing Lou. “Privacy Preserving Public Auditing for Secure Cloud Storage.” IEEE Transactions on Computers, Volume 62, Issue 2, February 2013.
[5] . Sangita Chaudhari, Swapnali More, , “Third Party Public Auditing Scheme for Cloud Storage”, International Journal of Procedia Computer Science, Volume 79, pp. 69-76, 2016.
[6] Tejaswini, K. Sunitha, and S. K. Prashanth. “Privacy Preserving Public Auditing Service for Data Storage in Cloud Computing”. Indian Journal of Research PARIPEX, Volume 2, Issue 2, pp. 131- 133, February 2013.
[7] S Ezhil Arasu, B Gowri, and S Ananthi. “Privacy Preserving Public Auditing in cloud using HMAC Algorithm”. International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277, 3878, Volume 2, Issue 1, pp. 149-152, March 2013.
[8]. Cong Wang, Qian Wang, Kui Ren, Ning Cao, and Wenjing Lou. “Towards Secure and Dependable Storage Services in Cloud Computing”. IEEE Transactions on Services Computing, Volume 5, Issue 2, pp. 220–232, May 2011.
[9] Wang, C., Wang, Q., Ren, K., Lou, W., 2010. “Privacy-Preserving Public Auditing for Data Security in Cloud Computing”. In: INFOCOM, 2010 Proceedings IEEE, pp. 1–9, 2010.
[10]. Solomon GuadieWorku, Jining Zhao, Chunxiang Xu, and Xiaohu.“Secure and Efficient Privacy-Preserving Public Auditing Scheme for Cloud Storage”. Computers & Electrical Engineering, Volume 40, Issue 5, pp. 1703-1713, July 2014.