Efficient Data Integrity and Auditing in Cloud by using Block Chain

Authors

  • Chethan Raj C Associate Professor, Department of Computer Science & Engineering, Mysuru Royal Institute of Technology, Mandya, Karnataka, India Author
  • Shivani M Department of Computer Science & Engineering, Mysuru Royal Institute of Technology, Mandya, Karnataka, India Author
  • Sowjanya D R Department of Computer Science & Engineering, Mysuru Royal Institute of Technology, Mandya, Karnataka, India Author
  • Sowmya M T Department of Computer Science & Engineering, Mysuru Royal Institute of Technology, Mandya, Karnataka, India Author
  • Tejaswini D R Department of Computer Science & Engineering, Mysuru Royal Institute of Technology, Author

Keywords:

Cloud storage, Data integrity auditing and Data security Biometric data

Abstract

The main aim of this paper is to discuss the  usage of cloud storage services, enabling individuals to store  their information in the cloud and keep away from the local  data storage and maintenance expense. Numerous data  integrity auditing systems have been implemented to  guarantee the quality of the data stored in the cloud. An  individual would like to enroll his private key to create the  authenticators for understanding the auditing of data  integrity in certain, but not all of the current system. The  user must then have a hardware token (e.g. USB token,  smart card) for storing the private key and memorizing a  password to trigger the private key. Most of the new data  integrity auditing system will be unable to operate if the user  misplaced this hardware token or forgot this password. We  are proposing a new module called data integrity auditing  without private key storage to solve this issue, and  developing such a scheme using block chain technology. In  this project we are proposing a computerized signature  along with face reorganization with block chain operation,  so that there will be no unique design to obtain unauthorized  and furthermore to prevent hacking operation and all the  respective user data or information will be stored in cloud  with maximum security. 

Downloads

Download data is not yet available.

References

Wenting Shen, Jing Qin”Data Integrity Auditing without Private Key Storage for Secure Cloud Storage” A review IEEE Trans.2019.

Yue Zhang “Enabling Efficient User Revocation in Identity-based Cloud Storage Auditing for Shared Big Data” A review IEEE Trans. 2018.

Jia Yu “Storage Key-Exposure Resilient Auditing for Secure Cloud Storage” A review IEEE Trans. 2017. [4] Anmin Fu, Huaqun Wang, Shui Yu, Chanyinghusang “NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data Sharing with Group Users: A review”IEEE Trans. 2017.

Neeru Garg, Seema Bhava” RITS-MHT: Relative indexed and time stamped Merkle hash tree based data auditing protocol for cloud computing: A review” 2017.

Wenting Shen, Jiayu, Hui Xia, Rong Hao” Light-Weight and Privacy-Preserving Secure Cloud Auditing Scheme for Group Users via the Third Party Medium: A review” 15 Jan 2017.

Wenting Shen, Hanlin Zhang, Rong Hao, Fanyu Konhg “Data Possession Checking with Privacy-Preserving Authenticators for Cloud Storage: A review” 2017.

Jia Yu, Kui Ren, Cong Wang” Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates: A review “IEEE Trans. 2016.

Jiangtao Li, Lei Zhang, Joseph K. Liu, Zheming Dong” Privacy-Preserving Public Auditing Protocol for Low Performance End Devices in Cloud: A review” IEEE Trans. 2016.

Huaqun Wang, Debiao He, Shaohua Tang” Identity Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud: A review” 2016.

C. Guan, K. Ren, F. Zhang, F. Kerschbaum, and J. Yu, “Symmetric-key based proofs of retrievability supporting public verification,” in Cham: Springer International Publishing, 2015.

C. Liu, J. Chen, L. Yang, et al, “Authorized public auditing of dynamicbig data storage on cloud with efficient verifiable fine-grained updates,”IEEE Transactions on Parallel and Distributed Systems 2014.

G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable data possession at untrusted stores,” in Proceedings of the 14th ACM Conference on Computer and Communications Security 2007.

C. Ellison and B. Schneier, “Ten risks of pki: What you’re not being told about public key infrastructure,”2000.

Downloads

Published

2020-07-04

How to Cite

Efficient Data Integrity and Auditing in Cloud by using Block Chain . (2020). International Journal of Innovative Research in Computer Science & Technology, 8(4), 299–305. Retrieved from https://acspublisher.com/journals/index.php/ijircst/article/view/13238