This paper is published in Volume-5, Issue-2, 2019
Area
Cloud Computing
Author
Hari Kumar P.
Co-authors
Chandra Sekar S., Dinesh Kumar V., Gopikrishna G.
Org/Univ
SRM Easwari Engineering College, Chennai, Tamil Nadu, India
Pub. Date
26 March, 2019
Paper ID
V5I2-1347
Publisher
Keywords
Data integrity, Cloud storage, Cloud security, Hadoop file system

Citationsacebook

IEEE
Hari Kumar P., Chandra Sekar S., Dinesh Kumar V., Gopikrishna G.. Secure distributed cloud service using trusted third party, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.

APA
Hari Kumar P., Chandra Sekar S., Dinesh Kumar V., Gopikrishna G. (2019). Secure distributed cloud service using trusted third party. International Journal of Advance Research, Ideas and Innovations in Technology, 5(2) www.IJARIIT.com.

MLA
Hari Kumar P., Chandra Sekar S., Dinesh Kumar V., Gopikrishna G.. "Secure distributed cloud service using trusted third party." International Journal of Advance Research, Ideas and Innovations in Technology 5.2 (2019). www.IJARIIT.com.

Abstract

Cloud storage is a system with a distributed data center that takes advantage of virtualization technology and provides an interface for data storage. It makes servers or data centers able to work together for conveniently sharing and accessing resources. Enterprise cloud user demand that there is a secure supply chain and that every step in that supply chain can be verified in real-time and when things go wrong it is more possible to figure out what went wrong and that there is someone who can be held accountable. Before storing data to an untrusted cloud server, some measures should be adopted to guarantee the security of data. However, the communication overhead will increase when users transmit files encrypted by traditional encryption schemes. Remote data integrity checking enables a data storage server to prove to a verifier that it is actually storing a data owner’s data honestly. We use Hadoop file system to provide high throughput access to user data. If the semi-honest cloud server does not delete the data honestly and returns an incorrect deletion result, the misbehavior of the cloud server can be detected by the data owner with an overwhelming probability. The user cannot deny after requiring the cloud server to delete the data. This implies that the proposed scheme can support traceability.
Paper PDF