A Secure Data Dynamics and Public Auditing Scheme For Cloud Storage
A Secure Data Dynamics and Public Auditing Scheme For Cloud Storage
Technology: Java
PROBLEM STATEMENT:
This paper desire to suggest a secure public auditing scheme applying third party auditors to
authenticate the privacy, reliability, and integrity of data stored in the cloud. This proposed
auditing scheme composes the use of the AES-256 algorithm for encryption, SHA-512 for
integrity check and RSA-15360 for public key encryption. And perform data dynamics operation
which deals with mostly insertion, deletion, and, modification
ABSTRACT
Cloud computing is an evolving technology that provides data storage and highly fast computing
services at a very low cost. All data stored in the cloud is handled by their cloud service
providers or the caretaker of the cloud. The data owner is concerned about the authenticity and
reliability of the data stored in the cloud as the data owners. Data can be misappropriated or
altered by any unauthorized user or person. This paper desire to suggest a secure public auditing
scheme applying third party auditors to authenticate the privacy, reliability, and integrity of data
stored in the cloud. This proposed auditing scheme composes the use of the AES-256 algorithm
for encryption, SHA-512 for integrity check and RSA-15360 for publickey encryption. And
perform data dynamics operation which deals with mostly insertion, deletion, and, modification.
INTRODUCTION
The global cloud computing market is anticipated to rise from $272billion in 2018 to $624billion
by 2023 at a compound annual growth rate of 18%, a report from research and markets showed.
Cloud computing is an advanced technology every person is used inner or outer in today’s world
[2]. The advance and rapidly expanding technology of cloud computing are used computation
and storage. The very minimum cost is used storage and computation as a service in it. Service
model provided three essential services in it: infrastructure as a service (IaaS), platform as a
service (PaaS) and software as a service(SaaS)[3]. The NIST definition, “Cloud computing is a
Page 1
Domain: Cloud Computing
Technology: Java
challenge security are threats, data loss, degradation, outside malicious attack and multi-tenancy .
The stored information of integrity is conserved for data integrity in the cloud system. The
unauthorized users should not be accessed misappropriate or vary of data. Data integrity and
reliability of data are faithful to preserve by the cloud computing provider. Data confidentiality is
also a crucial way from a user’s point of perspective therefore they store their private or
confidential data in the cloud. Data confidentiality is taken to assure access control policies and
authentication. The faith of cloud computing could be forward by rising cloud authenticate and
data confidentiality. So the keep data on the cloud should be security, integrity, privacy, and
confidentiality of crucial demands from the user perspective. A secure data storage of cloud
computing is presented of a data auditing scheme. Auditing is a refinement of checking the user
data which can be done by the data owner or by a TPA. The integrity of stored data on the cloud
serves to maintain it. The TPA manage is split into two: one is private audibility, which allows
the data owner can analyze the integrity of the data. No one has the authority to inquire about the
server considering the data. Though it attains to increases verification overhead of the user.
Second is public audibility, the confidentiality of the data can check by only TPA. The behalf of
Page 2
Domain: Cloud Computing
Technology: Java
the client can act TPA so TPA is an entity. The verification of integrity has handled to
appropriate work that all essential expertise, capabilities, knowledge and professional skill and
the position of the client is also reduced by it[8]. It should be crucial that TPA should efficiently
or frequently audit the cloud data storage without requesting for the local copy of data[9] The
halt of a research paper is arranged to comply section1 is discuss the introduction and section 2 is
discuss related work. The proposed method is discussed in section 3 and section4 is discussed in
security analysis whereas the conclusion and future work in section 5.
EXISTING METHOD
All data stored in the cloud is handled by their cloud service providers or the caretaker of the
cloud. The data owner is concerned about the authenticity and reliability of the data stored in the
cloud as the data owners. Data can be misappropriated or altered by any unauthorized user or
person.
PROPOSED METHOD
This proposed auditing scheme composes the use of the AES-256 algorithm for encryption,
SHA-512 for integrity check and RSA-15360 for publickey encryption. And perform data
dynamics operation which deals with mostly insertion, deletion, and, modification.
ADVANTAGES
APPLICATIONS
1. Software Industries.
2. Startup Companies.
Page 3
Domain: Cloud Computing
Technology: Java
SYSTEM REQUIREMENTS:
H/W System Configuration:-
ARCHITECTURE:
Page 4
Domain: Cloud Computing
Technology: Java
Page 5
Domain: Cloud Computing
Technology: Java
Page 6