Research Paper | Information Technology | India | Volume 8 Issue 3, March 2019
A Privacy Preserving Mechanism for Integrity Auditing and Data Sharing
R. Ramya Devi, R. Rangeela, S. Shalini, R. Sankara Narayanan
With cloud storage services, users can store huge amount of data and share their data with others. This leads to security and integrity problems. Data on the web can be manipulated and corrupted and therefore will lose its integrity. To avoid this, data verification was introduced, which is achieved by using a technique called integrity auditing, through which verification of multiple data of a user is performed at a time. This paper avails a shared environment in which the data owner uploads the data and the users in that environment access it. In order to provide security to the uploaded data, Advanced Encryption Standard (AES) is used by the data owner to store encrypted data in cloud server. AES uses a 16 bit key which is sent to users through Simple Mail Transfer Protocol (SMTP), using which the users can retrieve the required data. A public auditor challenges the cloud server to prove the integrity of data stored by the data owner and verifies the integrity of data by using the proof generated by the server. Message Digest (MD5) generates a hash value which is used by public auditor to verify the integrity of data. Thus, this paper aims for providing privacy preserving mechanism using cryptographic techniques for integrity auditing and data sharing, and the performance analysis shows the efficiency of the mechanism when auditing data integrity.
Keywords: Cloud Storage, Integrity Auditing, Data Sharing, Privacy Preserving, Cryptographic Techniques
Edition: Volume 8 Issue 3, March 2019
Pages: 318 - 322
How to Cite this Article?
R. Ramya Devi, R. Rangeela, S. Shalini, R. Sankara Narayanan, "A Privacy Preserving Mechanism for Integrity Auditing and Data Sharing", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20195881, Volume 8 Issue 3, March 2019, 318 - 322
201 PDF Views | 143 PDF Downloads
Similar Articles with Keyword 'Cloud Storage'
Research Paper, Information Technology, India, Volume 5 Issue 9, September 2016
Pages: 1751 - 1754Re-encryption based Attribute Revocation in Data Access Control for Multiauthority Cloud Storage
Kalyani G. Ktangale, Milind Penurkar
Informative Article, Information Technology, Malaysia, Volume 3 Issue 12, December 2014
Pages: 570 - 576How Much Privacy We Still Have?
Ayn Nur Azhana Binti Azhar Amanullah, Nur Faizah Binti Ab Aziz, Maya Novia Sari, Jamaludin Bin Ibrahim
M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 5, May 2015
Pages: 2565 - 2567Cloud Storage with Added Data Security and Integrity
Reshmi Das M V, R Charanya
Research Paper, Information Technology, India, Volume 4 Issue 7, July 2015
Pages: 2400 - 2403Secure Deduplication in Cloud Backup Services
Nidhi Panpaliya, Prachi Sorte
Survey Paper, Information Technology, India, Volume 3 Issue 6, June 2014
Pages: 1470 - 1473The Heartbleed Bug: An Open Secure Sockets Layer Vulnerability
Thabiso Peter Mpofu, Noe Elisa, Nicholaus Gati
Similar Articles with Keyword 'Data Sharing'
M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 6, June 2015
Pages: 1285 - 1288Key Aggregate Cryptosystem for Data Sharing in Cloud Computing
Rohit Tate, Jyoti Pingalkar
M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 12, December 2015
Pages: 1995 - 1998Outsourcing Data on Cloud Using Aggregate Key
Ramakrishna Jadhav
Research Paper, Information Technology, Kenya, Volume 3 Issue 9, September 2014
Pages: 1965 - 1971Developing a Geoportal for County SDI: Case Study of Nairobi County
Miriam Mabeya, Hunja Waithaka
Survey Paper, Information Technology, India, Volume 3 Issue 5, May 2014
Pages: 266 - 268Advancement in Security and Efficiency for Attribute Based Data Sharing System
Vaibhav Satane, Arindam Dasgupta
Research Paper, Information Technology, India, Volume 8 Issue 3, March 2019
Pages: 318 - 322A Privacy Preserving Mechanism for Integrity Auditing and Data Sharing
R. Ramya Devi, R. Rangeela, S. Shalini, R. Sankara Narayanan
Similar Articles with Keyword 'Privacy Preserving'
M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 3 Issue 5, May 2014
Pages: 1844 - 1847Privacy Preserving in Participatory Sensing
Deepika Nair, Bhuvaneswari Raju
Comparative Studies, Information Technology, India, Volume 5 Issue 4, April 2016
Pages: 2013 - 2019Comprehensive Research on Privacy Preserving Emphasizing on Distributed Clustering
Prajna M.S., Sumana M.
Research Paper, Information Technology, India, Volume 3 Issue 6, June 2014
Pages: 1654 - 1660Privacy Preserving Protocol for Two-Party Classifier Over Vertically Partitioned Dataset Using ANN
Smitha Iddalgave, Sumana M
Review Papers, Information Technology, India, Volume 4 Issue 3, March 2015
Pages: 1895 - 1898Privacy Preserving Data Mining
Divya Rana
Research Paper, Information Technology, India, Volume 8 Issue 3, March 2019
Pages: 318 - 322A Privacy Preserving Mechanism for Integrity Auditing and Data Sharing
R. Ramya Devi, R. Rangeela, S. Shalini, R. Sankara Narayanan