
Ensuring Privacy and Integrity of User’s Data on Public Cloud
Author(s) -
Vitthal S. Gutte,
K. B. Priya Iyer
Publication year - 2019
Publication title -
international journal of innovative technology and exploring engineering
Language(s) - English
Resource type - Journals
ISSN - 2278-3075
DOI - 10.35940/ijitee.i7519.078919
Subject(s) - cloud computing , computer science , correctness , data integrity , computer security , information privacy , key (lock) , audit , hash function , cloud storage , database , operating system , management , economics , programming language
in the cloud store the data and use it from anywhere in the world but the users are worried of the data stored on the cloud in aspect of data integrity and validation of data. Therefore we are using Third Party Auditor (TPA) to ensure data integrity for ensuring data correctness on cloud. There are many auditing schemes existing but they have limitation so that we come up with a new approach of auditing. In this paper we have implemented a new scheme which efficient in performance over the cloud. It consists with two key one with users private and other with user’s public key. The user key has created a hash value from all the data with encoding framework. TPA performs the validation of data throughout any user’s action over the cloud. TPA generate the own signature and validate with users signature and keep the log of data all the time. It matches the both signature for data correctness .Validation of data shows the movements on users demand. The server keeps the all data watch over the performing action by users and TPA. The main objective is to show the correctness of data on cloud, maintain the integrity of data and provide a secure channel for privacy over the cloud usage. We have frame architecture to minimize the cost of cloud with TPA where minimum use of data on the TPA side. The system supports to batch auditing process and dynamic updating in usage