Secure third-party auditing for user data in cloud using HLA with random masking algorithm

Abstract

Cloud services allow individuals and businesses to use software and hardware that are managed by third parties at remote locations. The cloud facilitates on-demand self service, integrated availability of resources and high flexibility. Moving data into the cloud offers great convenience to users since they don’t have to care about the complexities of direct resource management. Although cloud computing offers several advantages, it also brings in several threats and challenges; the integrity of data stored in the cloud being the major one. Thus permitting the public auditability of cloud data by an independent third party auditing (TPA) authority is essential to ensure the authenticity of the cloud data. Also, the use of TPA should not introduce new data management and privacy issues like revealing the data contents to the TPA. In this paper, the Homomorphic Linear Authenticator with random masking algorithm is used for ensuring data privacy during third party auditing process of cloud data.

Authors and Affiliations

Nisha R S, Poovaraghan R J

Keywords

Related Articles

General Approach of Prediction of Diabetes Mellitus using Top-K and MOPNAR Algorithm

Today’s world is the digital world all the people are surrounded with the electronic or digital gadgets. Due to this the life style of people is getting change; the individual work is replaced by the electronic gadgets,...

Energy Efficient Clustered Routing Protocols of LEACH

Sensor node has a limited amount of battery in sensor network. To prolong the overall lifetime of the network, development of energy efficient routing protocol is a major issue in Wireless Sensor Network. Clustering pro...

Evaluating An Electrical Discharge Machining Parameters With Using Titanium Nano Particle Mixed Dielectric Medium

Electric discharge machining is un-conventional machining process. Electrical discharge machine is commonly used for machining for those materials which are cannot processed by conventional machining process. Electrical...

An Experimental Analysis and Comparison of the Mechanical Efficiency of Two Different Design Three Blade Wind Turbine NACA 4415 and NACA 5520 with Varying Camber Area, Camber Position and Blade Thickness

In the present era, the world is struggling for energy so lots of researches are being conducted to meet the demand. The wind energy is a renewable source of energy and it is clean and pollution free too. So it is neces...

Distributed Operating System

A distributed system is a collection of independent computers that appear to the users of the system as a single computer. The distributed operating system has two aspects. The first one deals with hardware: the machine...

Download PDF file
  • EP ID EP20133
  • DOI -
  • Views 240
  • Downloads 4

How To Cite

Nisha R S, Poovaraghan R J (2015). Secure third-party auditing for user data in cloud using HLA with random masking algorithm. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 3(4), -. https://europub.co.uk/articles/-A-20133