Enhancing Cloud Data Security and Integrity Using Third Party Auditing Service
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Downloads: 112 | Weekly Hits: ⮙3 | Monthly Hits: ⮙11

Research Paper | Information Technology | India | Volume 4 Issue 4, April 2015

Enhancing Cloud Data Security and Integrity Using Third Party Auditing Service

Rakesh J. Wagh, Rajesh C. Dharmik

Cloud Computing is called future generation architecture for computing. Generally cloud computing is a large scale and internet based computing paradigm in which pool of resources, shared software information is accessible to the world via internet. Now a days data storage is important application of cloud where data owners put their data on cloud servers and users access their data from servers, Since Cloud Computing stores the resources and data in the cloud environment, security of stored data has become the main concern. Even though the Cloud computing is efficient and promising, there are several challenges for data security as there is no data proximity for the Cloud user. In proposed work the aim is to guarantee the data correctness, we consider the task of assigning multiple Third Party Auditor (TPA) on behalf of cloud client instead of existing schemes which uses single verifier (TPA). Also to ensure user authentication we extend our work by using the technique of digital signature and the Blowfish cryptographic algorithm together for better security of the cloud data and miscellaneous attacks. It provides good security with better data efficiency.

Keywords: cloud computing, Third Party Auditor, data security and integrity, Digital signature, cryptographic algorithm

Edition: Volume 4 Issue 4, April 2015

Pages: 992 - 994

Share this Article

How to Cite this Article?

Rakesh J. Wagh, Rajesh C. Dharmik, "Enhancing Cloud Data Security and Integrity Using Third Party Auditing Service", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB153072, Volume 4 Issue 4, April 2015, 992 - 994

Enter Your Registered Email Address





Similar Articles with Keyword 'cloud computing'

Downloads: 82 | Weekly Hits: ⮙6

Research Paper, Information Technology, India, Volume 9 Issue 7, July 2020

Pages: 1598 - 1602

An Approach to Storage of Data on Cloud Computing and Challenges Involved

Pranshu Prenam, Rahul Chawda

Share this Article

Downloads: 100 | Monthly Hits: ⮙11

Research Paper, Information Technology, India, Volume 5 Issue 9, September 2016

Pages: 1751 - 1754

Re-encryption based Attribute Revocation in Data Access Control for Multiauthority Cloud Storage

Kalyani G. Ktangale, Milind Penurkar

Share this Article

Downloads: 101 | Weekly Hits: ⮙2 | Monthly Hits: ⮙13

Research Paper, Information Technology, Iraq, Volume 4 Issue 11, November 2015

Pages: 1736 - 1745

Recommendations to Evaluate and Choose Cloud Services and Deployment Models for e-Business Strategic Use: A Case Study of Malaysian SMEs

Haider N. Hussain

Share this Article

Downloads: 102 | Weekly Hits: ⮙1 | Monthly Hits: ⮙9

Survey Paper, Information Technology, India, Volume 3 Issue 12, December 2014

Pages: 1137 - 1140

A Literature Survey on Virtualization Security Threats in Cloud Computing

Brona Shah, Jignesh Vania

Share this Article

Downloads: 103 | Weekly Hits: ⮙1 | Monthly Hits: ⮙14

Research Paper, Information Technology, India, Volume 6 Issue 1, January 2017

Pages: 1773 - 1777

Optimized Load Balancing in Cloud Computing using Hybrid Approach of Round Robin and Min-Min Scheduling

Muskan Garg, Rajneesh Narula

Share this Article

Similar Articles with Keyword 'Digital signature'

Downloads: 112 | Weekly Hits: ⮙3 | Monthly Hits: ⮙11

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 992 - 994

Enhancing Cloud Data Security and Integrity Using Third Party Auditing Service

Rakesh J. Wagh, Rajesh C. Dharmik

Share this Article

Downloads: 114 | Weekly Hits: ⮙8

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 2422 - 2427

Secure Data Transmission with Hierarchical Clustering

Rahul Raj, J. Godwin Ponsam

Share this Article

Downloads: 125 | Weekly Hits: ⮙3 | Monthly Hits: ⮙11

Research Paper, Information Technology, India, Volume 5 Issue 6, June 2016

Pages: 1706 - 1708

An Approach for Securing Data in e-Governance Projects in Developing Countries

Rakhi V. Pathrikar

Share this Article

Similar Articles with Keyword 'cryptographic algorithm'

Downloads: 104 | Monthly Hits: ⮙11

Research Paper, Information Technology, India, Volume 3 Issue 7, July 2014

Pages: 1360 - 1367

Implementation of Location based Encryption in GSM Cellular Network using OPNET

Vijay S. More, Uma R. Godase

Share this Article

Downloads: 112 | Weekly Hits: ⮙3 | Monthly Hits: ⮙11

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 992 - 994

Enhancing Cloud Data Security and Integrity Using Third Party Auditing Service

Rakesh J. Wagh, Rajesh C. Dharmik

Share this Article

Downloads: 147 | Weekly Hits: ⮙1

Research Paper, Information Technology, Iraq, Volume 6 Issue 7, July 2017

Pages: 1006 - 1012

Risk Surveillance Control of Wireless Security Attack with Fuzzy Rules

Dr. Abdulkareeem Merhej Radhi

Share this Article

Downloads: 196 | Weekly Hits: ⮙10 | Monthly Hits: ⮙26

Survey Paper, Information Technology, India, Volume 6 Issue 1, January 2017

Pages: 711 - 724

A Survey on Advanced Encryption Standard

Sandeep Kumar Rao, Dindayal Mahto, Dr. Danish Ali Khan

Share this Article



Top