Hash Based Approach for Providing Privacy and Integrity in Cloud Data Storage using Digital Signatures

نویسندگان

  • N Gowtham Kumar
  • K Praveen Kumar Rao
چکیده

Cloud computing offers a prominent service for data storage and it refers to a broad set of technologies, policies and controls deployed to provide security for data and applications. As more businesses move to the cloud, security is a leading concern in the cloud environment, it’s essential that companies work with partners that understand best practices of cloud security and provide transparency when it comes to their solutions. Service provider in cloud environment capable to controls the computing resources, the monitoring authority ensures the data integrity over out sourced data. In this paper we proposed hash based mechanism to provide privacy and integrity of outsourced data in cloud environment using private key security method. . Keywords— Cloud Storage, TPP, Signature, Data Integrity.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Remote Data Auditing Scheme in Secured Cloud Storage Environment

Cloud data centers are used to maintain the shared data values for the data owners .Data owners and public verifiers are involved to efficiently audit cloud data integrity without retrieving the entire data from the cloud server. File and block signatures are used in the integrity verification process. Public data auditing schemes are tuned to verify the encrypted cloud storage environment. “On...

متن کامل

Public Data Integrity Verification for Secure Cloud Storage

Cloud storage can provide a flexible on-demand data storage service to users anywhere and anytime. However, users’ data is owned by cloud service providers physically, and the physical boundary between two users’ data is fuzzy. In this environment not controlled by users, a method to ensure users’ data integrity must be provided. In order to avoid retrieving enormous storage data and users them...

متن کامل

Preserving Public Auditing and Privacy Policy for Shared Data in the Cloud

Cloud computing technology providing services rather than a product that permits users to use applications without installation of applications and access their files, application on any personal computer, laptop, tab and mobile devices within the internet or intranet connection. Whereby the software, shared resources and information are provided as a utility network. The Cloud may share data i...

متن کامل

Privacy-Preserving Accountable Cloud Storage

In cloud storage services, a wide range of sensitive information may be leaked to the host server via the exposure of access pattern albeit data is encrypted. Many security-provable schemes have been proposed to preserve the access pattern privacy; however, they may be vulnerable to attacks towards data integrity or availability from malicious users. This is due to the fact that, preserving acc...

متن کامل

Tamper-resistant storage techniques for multimedia systems

Tamper-resistant storage techniques provide varying degrees of authenticity and integrity for data. This paper surveys five implemented tamper-resistant storage systems that use encryption, cryptographic hashes, digital signatures and error-correction primitives to provide varying levels of data protection. Five key evaluation points for such systems are: (1) authenticity guarantees, (2) integr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014