Publish In
International Journal of Advances in Computer Science and Cloud Computing (IJACSCC)-IJACSCC
Journal Home
Volume Issue
Volume-6,Issue-1  ( May, 2018 )
Paper Title
A Secure Public Auditing of Cloud Data with Fragmentation and Replication
Author Name
Neha R. Patil, S. R. Patil
Department of Computer Engineering, A. C. Patil College of Engineering, Kharghar, Navi Mumbai, India Professor, Department of Computer Engineering, A. C. Patil College of Engineering, Kharghar, Navi Mumbai, India
Outsourcing data to a third-party administrative control, as is done in cloud computing, it gives rise to security concerns. The data compromise may occur due to attacks by other users and nodes within the cloud. Therefore, high security measures are required to protect data within the cloud. Cloud storage can make data users store and access their files any time, from anywhere and with any device. To ensure the security of the outsourced data, data user needs to periodically check data integrity. There are existing auditing schemes that are based on PKI. There is auditor to check integrity but for that he needs to must validate the certificates of data user before auditing data integrity. Thus, It result in a large amount of computation cost. Especially, it brings heavy burden to the auditor in the multi user setting. Overcome this problem, in this paper, we propose an efficient ID based auditing protocol for cloud data integrity based on ID Based Cryptography. It supports batch auditing in the multi-user setting. Finally, extensive security and simulation results show that our ID-based auditing protocols are secure and efficient especially it reduces the computation cost of the auditor in the multi-user setting. It improves security by creating of replica of each file block and store it on different nodes. If the attacker attacks on the cloud, then he/she will not get any information of file as every block of files are spread on the nodes except adjacent nodes. Thus purpose of this work is to develop an auditing scheme which possesses the capabilities such as privacy preserving, public auditing, maintaining the data integrity along with confidentiality. And also it must support batch auditing and data dynamics operations. Thus the new auditing scheme is been developed by considering all these requirements. Keywords - Cloud Security, ID-based Auditing; Security Proof, The CDH Problem, Data Integrity Checking
  View Paper