{"title":"Enhancing data storage security in Cloud using Certificateless public auditing","authors":"R. Swathi, T. Subha","doi":"10.1109/ICCCT2.2017.7972299","DOIUrl":null,"url":null,"abstract":"Cloud computing is a type of online based computing that gives shared computer dealing out resources & data to the computers. It is dreadfully challenging part to maintain the safety of all required data that are wanted in various applications for the user in cloud. The data stored in the cloud may not be wholly responsible. So, the cloud storage contributors are in charge for monitoring the data which is available and accessible on the cloud, and the physical environment protected and running. There are still some interesting challenges on maintaining the truthfulness of full data that is stored up in the computing environment. The stored data in cloud is so important that the users make ensure either the data is corrupted or lost. This work studies the problem of ensuring the security and integrity of data storage in Cloud Computing. This paper, proposes an approach named enhancing data storage security in cloud using Certificate less public auditing scheme which is used to generate key value. Key Generation Center (KGC) will generate only the partial key so that at any case it will not compromise user's private key. Private & public key is generated based on the partially generated private key by the KGC and to check the cloud data reliability of the user's uploads the data in server and then during the auditing of the reliability of data is checked. Once after checking it then sends the report to the users'. To confirm the data reliability during the auditing process & the server generates the proof and randomly selects the blocks. The TPA then authenticates the proof against cloud server & the auditing result issent to the user. A detailed execution analysis exhibited that the proposed approach gives preferred execution over the current works.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"15","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCT2.2017.7972299","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 15
Abstract
Cloud computing is a type of online based computing that gives shared computer dealing out resources & data to the computers. It is dreadfully challenging part to maintain the safety of all required data that are wanted in various applications for the user in cloud. The data stored in the cloud may not be wholly responsible. So, the cloud storage contributors are in charge for monitoring the data which is available and accessible on the cloud, and the physical environment protected and running. There are still some interesting challenges on maintaining the truthfulness of full data that is stored up in the computing environment. The stored data in cloud is so important that the users make ensure either the data is corrupted or lost. This work studies the problem of ensuring the security and integrity of data storage in Cloud Computing. This paper, proposes an approach named enhancing data storage security in cloud using Certificate less public auditing scheme which is used to generate key value. Key Generation Center (KGC) will generate only the partial key so that at any case it will not compromise user's private key. Private & public key is generated based on the partially generated private key by the KGC and to check the cloud data reliability of the user's uploads the data in server and then during the auditing of the reliability of data is checked. Once after checking it then sends the report to the users'. To confirm the data reliability during the auditing process & the server generates the proof and randomly selects the blocks. The TPA then authenticates the proof against cloud server & the auditing result issent to the user. A detailed execution analysis exhibited that the proposed approach gives preferred execution over the current works.