Header menu link for other important links

Achieving Cloud Security Using a Third Party Auditor and Preserving Privacy for Shared Data Over a Public Cloud

, Devulapalli Sita
Published in IGI Global
Correctness of data and efficient mechanisms for data security, while transferring the file to and from Cloud, are of paramount importance in today’s cloud-centric processing. A mechanism for correctness and efficient transfer of data is proposed in this article. While processing users request data, a set of attributes are defined and checked. States with attributes at different levels are defined to prevent unauthorized access. Security is provided while storing the data using a chunk generation algorithm and verification of chunks using lightweight Third-Party Auditor (TPA). TPA uses digital signatures to verify user’s data that are generated by RSA with MD5 algorithms. The metadata file of generated chunks is encrypted using a modified AES algorithm. The proposed method prevents unauthorized users from accessing the data in the cloud environment, in addition to maintaining data integrity. Results of the proposed cloud security model implementation are discussed. © 2021, IGI Global.
About the journal
JournalResearch Anthology on Privatizing and Securing Data
PublisherIGI Global
Open AccessNo