Privacy Preserving Auditing and Data Recovery for Secure Cloud Storage

Abstract

Cloud Storage permits users to remotely store their data and also provides users with on-demand self service from a shared pool of configurable and computable resources and that can be rapidly provisioned and realized with minimal management efforts or service provider interaction. Despite of its advantage, outsourcing storage prompts a number of interesting challenges. One of the important factors that need to be taken into consideration is to assure the user about the correctness of his outsourced data. Also, cloud user should be able to use the cloud storage without worrying for the need to verify its correctness. Thus, enabling public verifiability for cloud storage system is of critical importance so that cloud user can resort to an external audit party i.e. third party auditor (TPA) to check the correctness of outsourced data. For TPA to be secure and effective, the auditing process should not introduce no new vulnerabilities that violate users’ data privacy and no additional online burden to cloud user. In this paper, a secure storage system that supports user privacy preserving and auditing is implemented using RC4 algorithm to increase efficiency. To speed up auditing by TPA, batch auditing scheme is introduced. Proposed scheme helps to achieve secure and efficient dynamic operations on blocks of data as well as recovery of corrupted data or lost data can be achieved by replicating data on backup servers

Authors and Affiliations

Dimple A. Bedmutha, P. M. Yawalkar

Keywords

Related Articles

IoT Based Smart Alert Network Security System Using Machine Learning

The increasing security threats in public places such as airports, train stations, and shopping malls require the development of smart security systems that can detect potential threats and provide timely alerts to secur...

Decentralized Incognito Limpid E-Voting System

Voting is a constitutional part of governmental systems which gives the people of the nation the liberty to express their opinions. The contemporary system constitutes Electronic Voting Machines (EVM) that is a pile-up o...

Integral Identity method to fluid flow through cracked porous media with different wetting abilities

It is a notable actual peculiarities when a permeable media is totally immersed with a non-wetting liquid. For instance, water is brought into contact. The last option will more often than not precipitously stream into t...

Surrogacy in The Media: Depictions of Reproductive Sovereignty and Susceptibility

Researchers elaborated on the idea of ‘reproductive citizenship,' suggesting that individuals who make a reproductive contribution to modern western countries accumulate cultural capital in a homogenous manner. There has...

Raspberry Pi 3 Model B+ Based Endure Redicting Using Web of Things (WoT)

The Web of Things (WoT) is a breakthrough technology that connects and controls the devices with the help of Web and make them smart and efficient. We build an WoT based Temperature and Humidity Sensing System using Rasp...

Download PDF file
  • EP ID EP748802
  • DOI -
  • Views 35
  • Downloads 0

How To Cite

Dimple A. Bedmutha, P. M. Yawalkar (2015). Privacy Preserving Auditing and Data Recovery for Secure Cloud Storage. International Journal of Innovative Research in Computer Science and Technology, 3(3), -. https://europub.co.uk/articles/-A-748802