Implementation of TPA and Data Integrity in Cloud Computing using RSA Algorithm

Journal Title: INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY - Year 2014, Vol 12, Issue 2

Abstract

Cloud infrastructure has been envisioned as the next-generation construction of IT Initiative. It passages the application software and databases to the integrated large data hubs, where the administration of the data and services may not be fully trustworthy. This exceptional prototype brings about many new security challenges, which have not been well unwritten. This work studies the problem of ensuring the integrity of data storage in Cloud Computing. In certain, we consider the task of allowing a trusted third party (TPA), on behalf of the cloud client, to verify the data integrity of the data stored in the cloud server. By using TPA we eliminate the involvement of the cloud client through the auditing of whether his data integrity 0f stored data in the cloud server is to be sure integral. The support for data changing aspects via the most general forms of data operation, such as text modification, insertion and deletion, is also a significant step toward practicality, since services in Cloud Computing are not limited to archive or backup data only. While previous works on ensuring remote data integrity often lacks the support of either public auditability or dynamic data operations, but our work can be succeeds in both steps both. In this we first identify the difficulties and possible security problems of direct extensions with fully dynamic data updates from previous works and then show how to construct a smart verification scheme for the unified integration of these two outstanding features in our design. In particular, to achieve effective data dynamics, we improve the current proof of storage models by manipulating block tag authentication. To support efficient handling of multiple auditing tasks, we further explore the technique of signature to extend our main result into a multi-user setting, where TPA can perform multiple auditing tasks simultaneously. Extensive security and performance analysis show that the proposed schemes are highly efficient and provably secure.

Authors and Affiliations

Mr. Vinay Tila Patil , Prof. Gajendra Singh Chandel

Keywords

Related Articles

Finite Element Analysis of Universal Joint and Propeller Shaft Assembly

The power transmission system is the system which causes movement of vehicles by transferring the torque produced by the engines to the wheels after some modifications. The transfer and modification system of vehicles is...

Structural Analysis of Front axle beam of a Light Commercial Vehicle (LCV)

There has been exhaustive efforts to develop the front axle design by studying the noise and vibration analysis at static and dynamic loading conditions. The model selected is that of a light commercial vehicle (LCV) whi...

 Strategic Enhancement of Quality through 6σ: A Case Study

 The business objectives are to provide a high quality product to the customer at lower cost and earliest delivery. Six Sigma is a main tool that helps to achieve these objectives. The aim of Six Sigma methodology i...

 Data Acquisition and Supervisory Control System for Environmental Parameters in Greenhouse

 In this project the process variables like Temperature, Humidity are sensed and their continuous reading is transferred to a remote PC via wireless. The project was initially computed and monitored on LabVIEW softw...

 Performance Improvement of OFDM System Using Iterative Signal Clipping With Various Window Techniques for PAPR Reduction

 OFDM signals demonstrates high fluctuations termed as Peak to Average Power Ratio (PAPR).The problem of OFDM is the frequent occurrence of high Peaks in the time domain signal which in turn reduces the efficiency o...

Download PDF file
  • EP ID EP121535
  • DOI -
  • Views 94
  • Downloads 0

How To Cite

Mr. Vinay Tila Patil, Prof. Gajendra Singh Chandel (2014). Implementation of TPA and Data Integrity in Cloud Computing using RSA Algorithm. INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY, 12(2), 85-93. https://europub.co.uk/articles/-A-121535