DATA INTEGRITY CHECKING FOR SECURING CLOUD STORAGE USING MODIFIED BLOWFISH ALGORITHM

Main Article Content

Gopalakrishnan Sekar
A. Sathya

Abstract

Cloud computing, an emerging technology is being widely used for outsourcing the data into the cloud instead of storing it in the local physical storage. It can be accessed by either individual user or group of users. Cloud service providers must concern about the privacy, security and data integrity of the outsourced data. Service availability failure and the data loss is possible is due to the malicious intruders in the cloud environment. As the clients no longer have physical possession of data, the integrity and security of data become the major concern in the cloud computing. One of the important security concerns is to verify the integrity of data stored on cloud. To maintain the integrity of data, the user needs the help of a Third Party Auditor (TPA). The TPA checks the integrity of data bases on demand and releases audit reports that helps the user to evaluate the risk of the services they are using. TPA has the capability to check the integrity of data which is not easy for the end users. This paper elaborates new public and private auditability schemes which are used by TPA to audit the remotely stored data in the cloud and hence provide comparative analysis of existing integrity check techniques with the new technique for cloud data storage.

Downloads

Download data is not yet available.

Article Details

Section
Articles
Author Biography

Gopalakrishnan Sekar, Government Arts College, Vyasarpadi, Chennai

Assistant Professor, PG & Research Department of Computer Science, Dr. Ambedkar Government Arts College, Vyasarpadi, Chennai

References

Sookhak, M., Gani, A., Khan, M. K., & Buyya, R. (2017). Dynamic remote data auditing for securing big data storage in cloud computing. Information Sciences, 380, 101-116.

Desai, C. V., & Jethava, G. B. (2014). Survey on Data Integrity Checking Techniques in Cloud Data Storage. International Journal, 4(12).

Swapnali, and Sangita Chaudhari. "Third Party Public Auditing scheme for Cloud Storage." Procedia Computer Science 79 (2016): 69-76.

Liu, C., Ranjan, R., Yang, C., Zhang, X., Wang, L., & Chen, J. (2015). MuR-DPA: Top-down levelled multi-replica merkle hash tree based secure public auditing for dynamic big data storage on cloud. IEEE Transactions on Computers, 64(9), 2609-2622.

Goyal, Renuka, and Navjot Sidhu. "Third Party Auditor: An Integrity Checking Technique for Client Data Security in Cloud Computing." International Journal of Computer Science & Information Technologies 5 (2014).

Attas, Dalia, and Omar Batrafi. "Efficient integrity checking technique for securing client data in cloud computing." IJECS 8282.6105 (2011): 11.

Morghade, Rahul K., and Sonal Honale. "International Journal Of Engineering Sciences & Research Technology Data Storage Security in Cloud Computing Using Third Party Auditor (TPA)".

Han, Shuai, and Jianchuan Xing. "Ensuring data storage security through a novel third party auditor scheme in cloud computing." Cloud Computing and Intelligence Systems (CCIS), 2011 IEEE International Conference on. IEEE, 2011.

Hsien, W. F., Yang, C. C., & Hwang, M. S. (2016). A Survey of Public Auditing for Secure Data Storage in Cloud Computing. IJ Network Security, 18(1), 133-142.

Jenifer, Ms A. Emily, and Ms S. Karthigaiveni. "New Public Integrity Auditing Scheme for Cloud Data Storage Using Mac And Symmetric Key Cryptographic Algorithms." International Journal of Applied Engineering Research 11.3 (2016): 1894-1899.

Wang, Cong, et al. "Privacy-preserving public auditing for secure cloud storage." IEEE transactions on computers 62.2 (2013): 362-375.

Ateniese, Giuseppe, et al. "Scalable and efficient provable data possession." Proceedings of the 4th international conference on Security and privacy in communication netowrks. ACM, 2008.

Juels, Ari, and Burton S. Kaliski Jr. "PORs: Proofs of retrievability for large files." Proceedings of the 14th ACM conference on Computer and communications security. Acm, 2007.

Wang, Qian, et al. "Enabling public auditability and data dynamics for storage security in cloud computing." IEEE transactions on parallel and distributed systems 22.5 (2011): 847-859.

Zhang, Jianhong, and Qiaocui Dong. "Efficient ID-based public auditing for the outsourced data in cloud storage." Information Sciences 343 (2016): 1-14.

Liu, Chang, et al. "X" Future Generation Computer Systems 49 (2015): 58-67.

Sookhak, Mehdi, et al. "A review on remote data auditing in single cloud server: Taxonomy and open issues." Journal of Network and Computer Applications 43 (2014): 121-141.

Aurora, Tanjyot, and Parul Arora. "Blowfish Algorithm." International Journal of Computer Science and Communication Engineering IJCSCE Special issue on “Recent Advances in Engineering & Technology†NCRAET 3.4 (2013): 238-243.

Balakrishnan, S., et al. "Introducing effective third party auditing (tpa) for data storage security in cloud." International Journal of computer science and Technology 2.2 (2011): 397-400.