Loading…
An analysis of secure and efficient audit service for data integrity in cloud storage
Today in fast growing development in technology leads to storage management in all aspects. Cloud computing is one of the emerging platform which provides highly reliable and perfect resilient infrastructure for the users to store their data and retrieve it whenever needed from the cloud based serve...
Saved in:
Main Authors: | , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Today in fast growing development in technology leads to storage management in all aspects. Cloud computing is one of the emerging platform which provides highly reliable and perfect resilient infrastructure for the users to store their data and retrieve it whenever needed from the cloud based servers. Henceforth cloud based storage technology enables the scalable storage management as well as maintenance in a cost effective and location independent platform. The cloud offers cloud storage service (CSS) for storage management as well as for security purpose. There is possibility of data corrupted as well as missing of data since data are handled in servers directly by the clients. The security threats are violated by various methods of providing security in accessing the data, storing the data and confidentiality is required. Audit service is provided to ensure the security of outsourced data by verifying integrity of the data. Mostly all the data are nowadays shifted into centralized cloud. Henceforth an efficient audit service is needed for all the cloud service providers to ensure the integrity and availability of the stored data. More number of cryptographic algorithms is available for integrity and availability of the stored data but it cannot work in outsourced data. Provable data possession (PDP) with Key values is proposed which address the soundness property and zero – knowledge property to prevent the intruders to attack the server. |
---|---|
ISSN: | 0094-243X 1551-7616 |
DOI: | 10.1063/5.0173570 |