International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064


Downloads: 113

Research Paper | Information Technology | India | Volume 4 Issue 4, April 2015


Enhancing Cloud Data Security and Integrity Using Third Party Auditing Service

Rakesh J. Wagh, Rajesh C. Dharmik


Abstract: Cloud Computing is called future generation architecture for computing. Generally cloud computing is a large scale and internet based computing paradigm in which pool of resources, shared software information is accessible to the world via internet. Now a days data storage is important application of cloud where data owners put their data on cloud servers and users access their data from servers, Since Cloud Computing stores the resources and data in the cloud environment, security of stored data has become the main concern. Even though the Cloud computing is efficient and promising, there are several challenges for data security as there is no data proximity for the Cloud user. In proposed work the aim is to guarantee the data correctness, we consider the task of assigning multiple Third Party Auditor (TPA) on behalf of cloud client instead of existing schemes which uses single verifier (TPA). Also to ensure user authentication we extend our work by using the technique of digital signature and the Blowfish cryptographic algorithm together for better security of the cloud data and miscellaneous attacks. It provides good security with better data efficiency.


Keywords: cloud computing, Third Party Auditor, data security and integrity, Digital signature, cryptographic algorithm


Edition: Volume 4 Issue 4, April 2015,


Pages: 992 - 994


How to Cite this Article?

Rakesh J. Wagh, Rajesh C. Dharmik, "Enhancing Cloud Data Security and Integrity Using Third Party Auditing Service", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=SUB153072, Volume 4 Issue 4, April 2015, 992 - 994

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'cloud computing'

Downloads: 83

Research Paper, Information Technology, India, Volume 9 Issue 7, July 2020

Pages: 1598 - 1602

An Approach to Storage of Data on Cloud Computing and Challenges Involved

Pranshu Prenam, Rahul Chawda

Share this Article

Downloads: 101

Research Paper, Information Technology, India, Volume 5 Issue 9, September 2016

Pages: 1751 - 1754

Re-encryption based Attribute Revocation in Data Access Control for Multiauthority Cloud Storage

Kalyani G. Ktangale, Milind Penurkar

Share this Article

Similar Articles with Keyword 'Digital signature'

Downloads: 116

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 2422 - 2427

Secure Data Transmission with Hierarchical Clustering

Rahul Raj, J. Godwin Ponsam

Share this Article

Downloads: 126

Research Paper, Information Technology, India, Volume 5 Issue 6, June 2016

Pages: 1706 - 1708

An Approach for Securing Data in e-Governance Projects in Developing Countries

Rakhi V. Pathrikar

Share this Article

Similar Articles with Keyword 'cryptographic algorithm'

Downloads: 104

Research Paper, Information Technology, India, Volume 3 Issue 7, July 2014

Pages: 1360 - 1367

Implementation of Location based Encryption in GSM Cellular Network using OPNET

Vijay S. More, Uma R. Godase

Share this Article

Downloads: 147

Research Paper, Information Technology, Iraq, Volume 6 Issue 7, July 2017

Pages: 1006 - 1012

Risk Surveillance Control of Wireless Security Attack with Fuzzy Rules

Dr. Abdulkareeem Merhej Radhi

Share this Article

Similar Articles with Keyword 'cloud'

Downloads: 2

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 91 - 93

A Scalable Two-Phase Bottom-Up Specialization Prospective for Data Anonymization Using Map Reduce on Cloud

Dilipprasad.E, Ajay.R, K. Durairaj

Share this Article

Downloads: 83

Research Paper, Information Technology, India, Volume 9 Issue 7, July 2020

Pages: 1598 - 1602

An Approach to Storage of Data on Cloud Computing and Challenges Involved

Pranshu Prenam, Rahul Chawda

Share this Article

Similar Articles with Keyword 'computing'

Downloads: 0

Survey Paper, Information Technology, Iraq, Volume 10 Issue 7, July 2021

Pages: 1341 - 1348

Proposed Model to Identify the Influencing Students' Behavioral Intention to Use Mobile Learning: A Perspective from a Different Countries Case Study

Zainab Dalaf Katheeth, Bashar Dheyaa Noor, Ammar Dheyaa Noor

Share this Article

Downloads: 83

Research Paper, Information Technology, India, Volume 9 Issue 7, July 2020

Pages: 1598 - 1602

An Approach to Storage of Data on Cloud Computing and Challenges Involved

Pranshu Prenam, Rahul Chawda

Share this Article

Similar Articles with Keyword 'Third'

Downloads: 2

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 91 - 93

A Scalable Two-Phase Bottom-Up Specialization Prospective for Data Anonymization Using Map Reduce on Cloud

Dilipprasad.E, Ajay.R, K. Durairaj

Share this Article

Downloads: 99

Research Paper, Information Technology, India, Volume 3 Issue 3, March 2014

Pages: 138 - 141

Impact of Family Media Environment on Childrens Leisure Time Activities

B. N. Neelima

Share this Article

Similar Articles with Keyword 'Party'

Downloads: 2

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 91 - 93

A Scalable Two-Phase Bottom-Up Specialization Prospective for Data Anonymization Using Map Reduce on Cloud

Dilipprasad.E, Ajay.R, K. Durairaj

Share this Article

Downloads: 2

Research Paper, Information Technology, Vietnam, Volume 10 Issue 4, April 2021

Pages: 798 - 803

Enhancing the Legal Awareness of Vietnamese Basic Officers

Tran Thuy Linh

Share this Article

Similar Articles with Keyword 'Auditor'

Downloads: 141

Research Paper, Information Technology, India, Volume 5 Issue 12, December 2016

Pages: 1277 - 1279

dBot: AI Based Conversational Agent

Gayathri Ravichandran, N. Maithili Reddy, Shriya G. S.

Share this Article

Downloads: 142

Research Paper, Information Technology, Indonesia, Volume 8 Issue 7, July 2019

Pages: 1228 - 1234

Accountability of Course Graduation Records using Permissioned Blockchain in Hyperledger Fabric

Linda Handayani, Avinanta Tarigan

Share this Article

Similar Articles with Keyword 'data'

Downloads: 324 | Monthly Hits: ⮙2

Survey Paper, Information Technology, Ghana, Volume 8 Issue 6, June 2019

Pages: 64 - 69

The Use of Information and Communication Technology (ICT) in Teaching and Learning of Mathematics in Al-Faruq College of Education, Wenchi-Ghana

Abu Sulemana, Yahuza Abdul-Kadir

Share this Article

Downloads: 2

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 91 - 93

A Scalable Two-Phase Bottom-Up Specialization Prospective for Data Anonymization Using Map Reduce on Cloud

Dilipprasad.E, Ajay.R, K. Durairaj

Share this Article

Similar Articles with Keyword 'security'

Downloads: 0

Survey Paper, Information Technology, Iraq, Volume 10 Issue 7, July 2021

Pages: 1341 - 1348

Proposed Model to Identify the Influencing Students' Behavioral Intention to Use Mobile Learning: A Perspective from a Different Countries Case Study

Zainab Dalaf Katheeth, Bashar Dheyaa Noor, Ammar Dheyaa Noor

Share this Article

Downloads: 2 | Monthly Hits: ⮙1

Research Paper, Information Technology, India, Volume 10 Issue 5, May 2021

Pages: 174 - 178

Android Notes using Finger Print Authentication

Vaibhav Garg, Siddharth Yadav, Rishabh Kamal

Share this Article

Similar Articles with Keyword 'integrity'

Downloads: 105

Research Paper, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 1892 - 1895

Securing Data in Cloud Using Homomorphic Encryption

Honey Patel, Jasmin Jha

Share this Article

Downloads: 106

Survey Paper, Information Technology, India, Volume 3 Issue 11, November 2014

Pages: 2230 - 2233

A Control Mechanism for Enforcing Inference Usability of XML Documents

Smita Chaudhari, Rakesh Rajani

Share this Article

Similar Articles with Keyword 'Digital'

Downloads: 2 | Monthly Hits: ⮙1

Research Paper, Information Technology, India, Volume 10 Issue 5, May 2021

Pages: 174 - 178

Android Notes using Finger Print Authentication

Vaibhav Garg, Siddharth Yadav, Rishabh Kamal

Share this Article

Downloads: 4 | Monthly Hits: ⮙1

Case Studies, Information Technology, India, Volume 10 Issue 5, May 2021

Pages: 563 - 567

Online Teaching Excellence: A Case Study of EMC Institute Kishtwar during COVID-19 Lockdown

Dr. Ashaq Hussain

Share this Article

Similar Articles with Keyword 'signature'

Downloads: 112

Research Paper, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 1127 - 1130

Analysis and Data Retrieval by Filtering Packets in High Speed Routers

Indumathi, K. Kumar

Share this Article

Downloads: 116

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 2422 - 2427

Secure Data Transmission with Hierarchical Clustering

Rahul Raj, J. Godwin Ponsam

Share this Article

Similar Articles with Keyword 'cryptographic'

Downloads: 104

Research Paper, Information Technology, India, Volume 3 Issue 7, July 2014

Pages: 1360 - 1367

Implementation of Location based Encryption in GSM Cellular Network using OPNET

Vijay S. More, Uma R. Godase

Share this Article

Downloads: 105

Research Paper, Information Technology, India, Volume 3 Issue 6, June 2014

Pages: 1654 - 1660

Privacy Preserving Protocol for Two-Party Classifier Over Vertically Partitioned Dataset Using ANN

Smitha Iddalgave, Sumana M

Share this Article

Similar Articles with Keyword 'algorithm'

Downloads: 136

Research Paper, Information Technology, India, Volume 4 Issue 11, November 2015

Pages: 24 - 27

An Approach for Canny Edge Detection Algorithm on Face Recognition

A. D. Chitra, Dr. P. Ponmuthuramalingam

Share this Article

Downloads: 102

Survey Paper, Information Technology, India, Volume 3 Issue 10, October 2014

Pages: 607 - 611

A Survey Based on Fingerprint Recognition - Minutiae

Annapoorani. D, Caroline Viola Stella Mery. M

Share this Article
Top