ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Cloud Storage Security And Providing Integrity Proof

Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.3, No. 9)

Publication Date:

Authors : ; ;

Page : 121-125

Keywords : CSV module; Third Party Auditors; SOAP protocol; ERP system; blowfish cryptography.;

Source : Downloadexternal Find it from : Google Scholarexternal


Cloud computing has been envisioned as the next-generation architecture and solution to the rising storage costs of IT Enterprises. Cloud faithfully stores the data and return back to the owner whenever needed. But there is no guarantee that data stored in the cloud is secured and not altered. In this article, we focus on cloud data storage security, which has always been an important aspect of quality of service. To ensure the correctness of users' data in the cloud, we propose an effective and flexible distributed schemes. the cloud stores the clients data in comma separation form(CSV) form. As part of the verification process we assume that the TPA is reliable and independent according to the service level agreements (SLA), which does not mean that there is no space for the TPA to cheat. The approach used for the encryption in the verification process was the blowfish algorithm..Extensive security and performance analysis shows that the proposed scheme is highly efficient and resilient against Byzantine failure, malicious data modification attack, and even server colluding attacks. The aim of this research is two fold 1) ensuring the integrity of the data and 2)provides the proof that data is in secured manner.

Last modified: 2014-10-14 22:29:10