International Conference on Communication Computing and Virtualization |
Foundation of Computer Science USA |
ICCCV2016 - Number 1 |
August 2016 |
Authors: Swapnali S. More, Sangita Chaudhari |
fca2cedb-0178-44e3-b5ac-5fa08b8df7d5 |
Swapnali S. More, Sangita Chaudhari . Privacy Preserving Third Party Public Auditing Scheme for Secure Cloud Storage. International Conference on Communication Computing and Virtualization. ICCCV2016, 1 (August 2016), 23-28.
Cloud storage is one of the service provided by Cloud computing in which data is maintained, managed, backed up remotely and made available to users over a network (typically the Internet). The user is concerned about the integrity of data stored in the cloud as the user's data can be attacked or modified by outside attacker. Therefore, a new concept called data auditing is introduced which check the integrity of data with the help of an entity called Third Party Auditor (TPA). The purpose of this work is to develop an auditing scheme which is secure, efficient to use and possess the capabilities such as privacy preserving, public auditing, maintaining the data integrity along with confidentiality. Thus the new auditing scheme has been developed by considering all these requirements. It consist of three entities: data owner, TPA and cloud server. The data owner performs various operations such as splitting the file to blocks, encrypting them, generating a hash value for each, concatenating it and generating a signature on it. The TPA performs the main role of data integrity check. It performs activities like generating hash value for encrypted blocks received from cloud server, concatenating them and generates signature on it. It later compares both the signatures to verify whether the data stored on cloud is tampered or not. It verifies the integrity of data on demand of the users. Thus no additional burden is provided on the cloud server. It is used only to save the encrypted blocks of data. All the task for the scheme is performed by the TPA and data owner. This proposed auditing scheme make use of AES algorithm for encryption, SHA-2 for integrity check and RSA signature for digital signature calculation.