ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

DYNAMIC DATA INTEGRITY AND CHECKPOINT RECOVERY USING PUBLIC AUDITING IN CLOUD STORAGE

Journal: International Journal of Civil Engineering and Technology (IJCIET) (Vol.8, No. 9)

Publication Date:

Authors : ;

Page : 692-700

Keywords : Checkpoint recovery; Data integrity; RSA; ECC; Auditing.;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Cloud computing brings great challenges in the field of data security and security assurance. In this paper, we are analysing the different types of cloud security issues. The key and signature are generated using the elliptic curve cryptography algorithm and Ron Rivest, AdiShamir and Leonard Adlema algorithm to provide efficient security. Dynamic Merkle hash tree is constructed for providing dynamic data integrity. Public auditing is performed using Third party auditor (TPA). Checkpoint information is used for recovering the lost data blocks in the cloud storage. The main objective is to provide public auditing and data recovery to recover the lost data from the cloud storage and finally compare the key size, time taken for key generation and signature generation of ECC and RSA encryption algorithm.

Last modified: 2018-04-16 16:18:20