Loading…
Public Auditing To Provide Privacy Preservation Of Cloud Data Using Ring Signatures
According to the present situation, an effective public auditing protocol that improves the restriction of the previous auditing system needs to be designed. Here a system is proposed to develop and evaluate the precision of the cloud data by a third-party auditor (TPA), repeatedly or on a request w...
Saved in:
Main Authors: | , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | According to the present situation, an effective public auditing protocol that improves the restriction of the previous auditing system needs to be designed. Here a system is proposed to develop and evaluate the precision of the cloud data by a third-party auditor (TPA), repeatedly or on a request without recovering the whole data or without start the extra online load for cloud users and servers. It satisfies that throughout the auditing process no data content will escape from PA. The proper storage of data, confidentiality, and integrity of saved data is continued. This system is made up of three structures: user, cloud provider, and TPA. The user splits the file into blocks and encrypts the AES algorithms, creates the MD-5 hash value for each, connects the hash, and produces an AES signature on the file. The cloud server is utilized to supply the encrypted file block. When the user or data owner requests for public TPA auditing, it directly demands encrypted files. It uses the same MD-5 algorithm which is referred by the user. Next, it connects the hash value and produces an AES signature for that file. In the validation process, the signature produced by TPA and responsible for the data user is related to the TPA. If they are related to one another, it indicates that the data is perfect, and the data is not stolen by attackers or outsiders. If this does not relate, then it refers that the integrity of the data was affected or stolen. The data integrity verifies output is sponsored to the user. |
---|---|
ISSN: | 2768-0673 |
DOI: | 10.1109/I-SMAC52330.2021.9640805 |