Header menu link for other important links
Achieving Cloud Security Using a Third Party Auditor and Preserving Privacy for Shared Data Over a Public Cloud
, Devulapalli Sita
Published in International Journal of Knowledge and Systems Science (IJKSS)
Volume: 11.0
Issue: 1.0
Pages: 77.0 - 95.0
Correctness of data and efficient mechanisms for data security, while transferring the file to and from Cloud, are of paramount importance in today's cloud-centric processing. A mechanism for correctness and efficient transfer of data is proposed in this article. While processing users request data, a set of attributes are defined and checked. States with attributes at different levels are defined to prevent unauthorized access. Security is provided while storing the data using a chunk generation algorithm and verification of chunks using lightweight Third-Party Auditor (TPA). TPA uses digital signatures to verify user's data that are generated by RSA with MD5 algorithms. The metadata file of generated chunks is encrypted using a modified AES algorithm. The proposed method prevents unauthorized users from accessing the data in the cloud environment, in addition to maintaining data integrity. Results of the proposed cloud security model implementation are discussed.
About the journal
JournalInternational Journal of Knowledge and Systems Science(IJKSS)
PublisherInternational Journal of Knowledge and Systems Science (IJKSS)
Open AccessNo