Efficient and secure auditing scheme for privacy preserving data storage in cloud

An on-demand computing in which data is stored in a remote manner and provision of services is from a pool of resources of computing that is shared is known as Cloud computing. The cloud computing fulfills the need of store and oversee show. Though to get to and secure information, numerous exceptio...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Cluster computing 2019-07, Vol.22 (Suppl 4), p.9767-9775
Hauptverfasser: Anbuchelian, S., Sowmya, C. M., Ramesh, C.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:An on-demand computing in which data is stored in a remote manner and provision of services is from a pool of resources of computing that is shared is known as Cloud computing. The cloud computing fulfills the need of store and oversee show. Though to get to and secure information, numerous exceptional advancements like parallel and guide diminish strategies are accessible. The burden of usage from maintenance and storage of native data is eliminated and the owner additionally benefits from elimination of the responsibility of security and storage (Gourkhede and Theng, 2014 fourth international conference on communication systems and network technologies (CSNT), pp 677–680, 2014 ; Modi, J Supercomput 63(2):561–592, 2013 ; Smys and Bala, Clust Comput 15(3):211–222, 2012 ). In order to ensure modification of the accuracy of the on-demand data and its due verification on the cloud owners’ behalf, a methodology that is innovative is needed. The encryption and file split up is done using a novel secure cryptography hashing algorithm. Once the data is uploaded the user is provided with a private and public key for trustworthy retrieval of the data file. Those keys are generated using a proposed modified RSA cryptosystem algorithm. A multilevel hash tree algorithm is used to efficiently audit the data file occasionally. The implementation and therefore the results show the potency and efficiency of the proposed algorithm compared to the existing algorithm.
ISSN:1386-7857
1573-7543
DOI:10.1007/s10586-017-1486-z