Reference Hub9
Achieving Cloud Security Using a Third Party Auditor and Preserving Privacy for Shared Data Over a Public Cloud

Achieving Cloud Security Using a Third Party Auditor and Preserving Privacy for Shared Data Over a Public Cloud

Vitthal Sadashiv Gutte, Sita Devulapalli
Copyright: © 2020 |Volume: 11 |Issue: 1 |Pages: 19
ISSN: 1947-8208|EISSN: 1947-8216|EISBN13: 9781799807179|DOI: 10.4018/IJKSS.2020010104
Cite Article Cite Article

MLA

Gutte, Vitthal Sadashiv, and Sita Devulapalli. "Achieving Cloud Security Using a Third Party Auditor and Preserving Privacy for Shared Data Over a Public Cloud." IJKSS vol.11, no.1 2020: pp.77-95. http://doi.org/10.4018/IJKSS.2020010104

APA

Gutte, V. S. & Devulapalli, S. (2020). Achieving Cloud Security Using a Third Party Auditor and Preserving Privacy for Shared Data Over a Public Cloud. International Journal of Knowledge and Systems Science (IJKSS), 11(1), 77-95. http://doi.org/10.4018/IJKSS.2020010104

Chicago

Gutte, Vitthal Sadashiv, and Sita Devulapalli. "Achieving Cloud Security Using a Third Party Auditor and Preserving Privacy for Shared Data Over a Public Cloud," International Journal of Knowledge and Systems Science (IJKSS) 11, no.1: 77-95. http://doi.org/10.4018/IJKSS.2020010104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Correctness of data and efficient mechanisms for data security, while transferring the file to and from Cloud, are of paramount importance in today's cloud-centric processing. A mechanism for correctness and efficient transfer of data is proposed in this article. While processing users request data, a set of attributes are defined and checked. States with attributes at different levels are defined to prevent unauthorized access. Security is provided while storing the data using a chunk generation algorithm and verification of chunks using lightweight Third-Party Auditor (TPA). TPA uses digital signatures to verify user's data that are generated by RSA with MD5 algorithms. The metadata file of generated chunks is encrypted using a modified AES algorithm. The proposed method prevents unauthorized users from accessing the data in the cloud environment, in addition to maintaining data integrity. Results of the proposed cloud security model implementation are discussed.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.