z-logo
open-access-imgOpen Access
Remote Data Integrity Check
Author(s) -
Ajay Nagesh,
Javeria Qurratul Ain
Publication year - 2020
Publication title -
international journal of engineering and advanced technology
Language(s) - English
Resource type - Journals
ISSN - 2249-8958
DOI - 10.35940/ijeat.e9780.069520
Subject(s) - data integrity , computer science , cloud computing , computer security , audit , cloud storage , database , encryption , operating system , accounting , business
In Cloud Storage Server, data integrity plays an important role, given cloud clients might not be aware whether the data is safe or has been tampered with. This system introduces identity-based signature algorithms to protect data that belongs to the data owner and gets the status of cloud data by means of verification through signatures. Since it is practically not possible for the data owner to be available online all the time for checking cloud data integrity, Third party auditor is tasked with verifying the data integrity every time instead of data owner. The Third party auditors should not read the cipher text data while verifying and must authenticate itself to cloud server by performing Proof of Knowledge operation; then cloud server can reveal the sensitive data as block wise and the third party auditor can verify the signature without knowledge of cipher text data. Finally, an audit report is sent to the data owner. This work demonstrates data security and integrity in the cloud..

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here