Implementation of TPA and Data Integrity in Cloud Computing using RSA Algorithm

Journal Title: INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY - Year 2014, Vol 12, Issue 2

Abstract

Cloud infrastructure has been envisioned as the next-generation construction of IT Initiative. It passages the application software and databases to the integrated large data hubs, where the administration of the data and services may not be fully trustworthy. This exceptional prototype brings about many new security challenges, which have not been well unwritten. This work studies the problem of ensuring the integrity of data storage in Cloud Computing. In certain, we consider the task of allowing a trusted third party (TPA), on behalf of the cloud client, to verify the data integrity of the data stored in the cloud server. By using TPA we eliminate the involvement of the cloud client through the auditing of whether his data integrity 0f stored data in the cloud server is to be sure integral. The support for data changing aspects via the most general forms of data operation, such as text modification, insertion and deletion, is also a significant step toward practicality, since services in Cloud Computing are not limited to archive or backup data only. While previous works on ensuring remote data integrity often lacks the support of either public auditability or dynamic data operations, but our work can be succeeds in both steps both. In this we first identify the difficulties and possible security problems of direct extensions with fully dynamic data updates from previous works and then show how to construct a smart verification scheme for the unified integration of these two outstanding features in our design. In particular, to achieve effective data dynamics, we improve the current proof of storage models by manipulating block tag authentication. To support efficient handling of multiple auditing tasks, we further explore the technique of signature to extend our main result into a multi-user setting, where TPA can perform multiple auditing tasks simultaneously. Extensive security and performance analysis show that the proposed schemes are highly efficient and provably secure.

Authors and Affiliations

Mr. Vinay Tila Patil , Prof. Gajendra Singh Chandel

Keywords

Related Articles

 Managing Customer Relationships through Mobile CRM In Organized retail outlets

 Mobile Customer Relationship Management (mCRM) system is one of the recent advancements in CRM systems. Recent years, customers using mobile phone have presented a very fast growing on value added services, SMS and...

Mitigating Denial-of-Service Attacks Using Secure Service Overlay Model

Denial of service (DoS) and Distributed Denial of Service (DDoS) attacks continue to threaten the reliability of networking systems. Previous approaches for protecting networks from DoS attacks are reactive in that they...

 A Novel Paradigm: Detection & Prevention of Wormhole Attack in Mobile Ad Hoc Networks

 This paper emphasized to propose and develop a scheme for the prevention of wormhole attack from intermediate and surrounding threads.In wireless ad hoc networks, it is difficult to detect wormhole attacks becaus...

Implementation and Optimization of 4×4 Luminance Intra Prediction Modes on FPGA

This paper proposes an efficient, fast and parallel processing of 4×4 luminance intra prediction implemented on FPGA. H.264[1] advanced video coding is a present generation video compression algorithm which can achieve h...

 Survey of Watermarking Algorithms For Medical Images

 Watermarking is a branch of information hiding which is used to hide proprietary information in digital media like photographs, digital music, or digital video. And also which has seen a lot of research interest...

Download PDF file
  • EP ID EP121535
  • DOI -
  • Views 80
  • Downloads 0

How To Cite

Mr. Vinay Tila Patil, Prof. Gajendra Singh Chandel (2014). Implementation of TPA and Data Integrity in Cloud Computing using RSA Algorithm. INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY, 12(2), 85-93. https://europub.co.uk/articles/-A-121535