Loading

Secure Cloud Data Audit using Protocol and Digital Signature Techniques
Prakash G L1, Manish Prateek2, Inder Singh3
1Prakash G L, School of Computer Science, University of Petroleum and Energy Studies.
2Manish Prateek, School of Computer Science, University of Petroleum and Energy Studies.
3Inder Singh, School of Computer Science, University of Petroleum and Energy Studies.

Manuscript received on November 15, 2019. | Revised Manuscript received on November 23, 2019. | Manuscript published on November 30, 2019. | PP: 430-437 | Volume-8 Issue-4, November 2019. | Retrieval Number: D6970118419/2019©BEIESP | DOI: 10.35940/ijrte.D6970.118419

Open Access | Ethics and Policies | Cite  | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Cloud computing is one of the important business models in the modern Information Technology. It provides various services (hardware, software) to the users with minimal interaction and low-cost. Storage service is one of the most useful services in cloud computing, which move data owners data from local computing system to the cloud. In this paradigm, once the data moves from the local computing system to the cloud, the data owner lost the physical control of the outsourced data on the cloud. So that, storage service creates data security challenges. Therefore, the integrity of the outsourced data has to be verified frequently using public or private verification method. In this paper we focus on two data security concern such as data confidentiality and remote data integrity on cloud storage system. In order to ensure the data integrity and reduce the data owners computational resources, in this work we have proposed a remote data integrity auditing methods such as Remote Data Audit using Protocol(RDAP) and Remote Data Audit using Digital Signature (RDADS) methods. To analyze the performance of the system, first, we define the single data owner on multiple servers and then multiple data owners on a single server for public data verification. Besides, these methods not only verify the integrity of data, but also detect the invalid data block during the verification process.
Keywords: Security, Authenticator, Public-auditing, Integrity, Storage as a Service
Scope of the Article: Security Service Systems.