This paper is published in Volume-3, Issue-3, 2017
Area
Cloud Computing
Author
Manisha L. Narad
Co-authors
Prof. Amruta Amune
Org/Univ
G H Raisoni College of Engineering and Management Ahmednagar, Maharashtra, India
Pub. Date
21 June, 2017
Paper ID
V3I3-1577
Publisher
Keywords
Cloud Storage Auditing, Network Coding, Security, User Anonymity, Third-Party Public Auditing, Deduplication, Confidentiality

Citationsacebook

IEEE
Manisha L. Narad, Prof. Amruta Amune. Implementing Secure And Efficient Auditing Protocol For Cloud Storage, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.

APA
Manisha L. Narad, Prof. Amruta Amune (2017). Implementing Secure And Efficient Auditing Protocol For Cloud Storage. International Journal of Advance Research, Ideas and Innovations in Technology, 3(3) www.IJARIIT.com.

MLA
Manisha L. Narad, Prof. Amruta Amune. "Implementing Secure And Efficient Auditing Protocol For Cloud Storage." International Journal of Advance Research, Ideas and Innovations in Technology 3.3 (2017). www.IJARIIT.com.

Abstract

In cloud storage environment, data owners host their data on cloud servers and users can access the data from cloud servers. Due to the data outsourcing, this process of data hosting service introduces new security challenges, which requires an independent auditing service to check the data integrity in the cloud. Because, owner need to be convinced that the data are correctly stored in the cloud. Two-Party storage auditing system could not be guaranteed to provide proper auditing result thus Third-Party auditing is the better choice for the storage auditing in cloud computing. In this we try to evaluate ECC algorithm for encryption and decryption.A Third-Party auditor is capable to do a more efficient work and convinces both the cloud serviceproviders and the owner. There are chances of data being lost or get misplaced in cloud storage environment. For this we propose replication mechanism to third party auditing such that it will enhance the data availability. We divide a data file into fragments and replicate the fragmented data over the cloud nodes. Each of the nodes stores only a single fragment of a particular data file that ensures that even in case of a successful attack, no meaningful information is revealed to the attacker.Furthermore, the nodes storing the fragments are separated with certain distance to prohibit an attacker of guessing the locations of the fragments. Hence user will get the belief that his data is safely stored on the cloud and could retrieve data without any modification.To better protect data security, the first attempt to formally address the problem of authorized data deduplication.
Paper PDF