0% found this document useful (0 votes)
49 views6 pages

A Secure Data Dynamics and Public Auditing Scheme For Cloud Storage

This document proposes a secure auditing scheme for cloud storage that uses third party auditors to authenticate privacy, reliability, and integrity of stored data. It suggests using AES-256 for encryption, SHA-512 for integrity checks, and RSA-15360 for public key encryption. The proposed scheme also supports data dynamics operations like insertion, deletion and modification.

Uploaded by

Divyaprathapraju
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
49 views6 pages

A Secure Data Dynamics and Public Auditing Scheme For Cloud Storage

This document proposes a secure auditing scheme for cloud storage that uses third party auditors to authenticate privacy, reliability, and integrity of stored data. It suggests using AES-256 for encryption, SHA-512 for integrity checks, and RSA-15360 for public key encryption. The proposed scheme also supports data dynamics operations like insertion, deletion and modification.

Uploaded by

Divyaprathapraju
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

Domain: Cloud Computing

Technology: Java

A Secure Data Dynamics and Public Auditing Scheme for


Cloud Storage

PROBLEM STATEMENT:

This paper desire to suggest a secure public auditing scheme applying third party auditors to
authenticate the privacy, reliability, and integrity of data stored in the cloud. This proposed
auditing scheme composes the use of the AES-256 algorithm for encryption, SHA-512 for
integrity check and RSA-15360 for public key encryption. And perform data dynamics operation
which deals with mostly insertion, deletion, and, modification

ABSTRACT

Cloud computing is an evolving technology that provides data storage and highly fast computing
services at a very low cost. All data stored in the cloud is handled by their cloud service
providers or the caretaker of the cloud. The data owner is concerned about the authenticity and
reliability of the data stored in the cloud as the data owners. Data can be misappropriated or
altered by any unauthorized user or person. This paper desire to suggest a secure public auditing
scheme applying third party auditors to authenticate the privacy, reliability, and integrity of data
stored in the cloud. This proposed auditing scheme composes the use of the AES-256 algorithm
for encryption, SHA-512 for integrity check and RSA-15360 for publickey encryption. And
perform data dynamics operation which deals with mostly insertion, deletion, and, modification.

INTRODUCTION

The global cloud computing market is anticipated to rise from $272billion in 2018 to $624billion
by 2023 at a compound annual growth rate of 18%, a report from research and markets showed.
Cloud computing is an advanced technology every person is used inner or outer in today’s world
[2]. The advance and rapidly expanding technology of cloud computing are used computation
and storage. The very minimum cost is used storage and computation as a service in it. Service
model provided three essential services in it: infrastructure as a service (IaaS), platform as a
service (PaaS) and software as a service(SaaS)[3]. The NIST definition, “Cloud computing is a

Page 1
Domain: Cloud Computing
Technology: Java

model permissive ubiquitous, convenient, on-demand network approach to a shared pool of


configurable computing property(e.g. networks, servers, storage, applications, and services) that
can be immediately provisioned and released with basic management effort or service provider
interaction [4][6]. Cloud storage is a crucial service of cloud computing. They involve data
privacy, data protection, data availability, data location, and, secure transmission which is a
crucial release in cloud security. The involved in cloud.

challenge security are threats, data loss, degradation, outside malicious attack and multi-tenancy .
The stored information of integrity is conserved for data integrity in the cloud system. The
unauthorized users should not be accessed misappropriate or vary of data. Data integrity and
reliability of data are faithful to preserve by the cloud computing provider. Data confidentiality is
also a crucial way from a user’s point of perspective therefore they store their private or
confidential data in the cloud. Data confidentiality is taken to assure access control policies and
authentication. The faith of cloud computing could be forward by rising cloud authenticate and
data confidentiality. So the keep data on the cloud should be security, integrity, privacy, and
confidentiality of crucial demands from the user perspective. A secure data storage of cloud
computing is presented of a data auditing scheme. Auditing is a refinement of checking the user
data which can be done by the data owner or by a TPA. The integrity of stored data on the cloud
serves to maintain it. The TPA manage is split into two: one is private audibility, which allows
the data owner can analyze the integrity of the data. No one has the authority to inquire about the
server considering the data. Though it attains to increases verification overhead of the user.
Second is public audibility, the confidentiality of the data can check by only TPA. The behalf of

Page 2
Domain: Cloud Computing
Technology: Java

the client can act TPA so TPA is an entity. The verification of integrity has handled to
appropriate work that all essential expertise, capabilities, knowledge and professional skill and
the position of the client is also reduced by it[8]. It should be crucial that TPA should efficiently
or frequently audit the cloud data storage without requesting for the local copy of data[9] The
halt of a research paper is arranged to comply section1 is discuss the introduction and section 2 is
discuss related work. The proposed method is discussed in section 3 and section4 is discussed in
security analysis whereas the conclusion and future work in section 5.

EXISTING METHOD

All data stored in the cloud is handled by their cloud service providers or the caretaker of the
cloud. The data owner is concerned about the authenticity and reliability of the data stored in the
cloud as the data owners. Data can be misappropriated or altered by any unauthorized user or
person.

PROPOSED METHOD

This proposed auditing scheme composes the use of the AES-256 algorithm for encryption,
SHA-512 for integrity check and RSA-15360 for publickey encryption. And perform data
dynamics operation which deals with mostly insertion, deletion, and, modification.

ADVANTAGES

 Improving Data Privacy


 Providing more Security to the Data
 High efficiency
 Confidentiality and privacy

APPLICATIONS

1. Software Industries.
2. Startup Companies.

Page 3
Domain: Cloud Computing
Technology: Java

HARDWARE & SOFTWARE REQUIREMENTS

SYSTEM REQUIREMENTS:
H/W System Configuration:-

 Processor - I3/Intel Processor


 RAM - 4GB (min)
 Hard Disk - 160GB
 Key Board - Standard Windows Keyboard
 Mouse - Two or Three Button Mouse
 Monitor - SVGA
S/W System Configuration:-
 Operating System : Windows 7/8/10
 Application Server : Tomcat 7.0
 Front End : HTML, JSP
 Scripts : JavaScript.

 Server side Script : Java Server Pages.

 Database : My SQL 6.0

 Database Connectivity : JDBC

ARCHITECTURE:

Page 4
Domain: Cloud Computing
Technology: Java

Page 5
Domain: Cloud Computing
Technology: Java

Page 6

You might also like