Loading

A Secured Public Auditing Protocol with Dynamic Structure for Cloud Data
K. Vidhya Lakshmi1, S. Thanga Ramya2

1Ms. K. Vidhya Lakshmi, Department of IT, Vel Tech Mutitech, Dr. Rangarajan and Dr. Sakunthala Engineering College, Chennai (Tamil Nadu), India.

2Dr. S. Thanga Ramya, Department of IT, RMD Engineering College, Chennai (Tamil Nadu), India.

Manuscript received on 22 November 2019 | Revised Manuscript received on 03 December 2019 | Manuscript Published on 14 December 2019 | PP: 81-85 | Volume-9 Issue-1S November 2019 | Retrieval Number: A10191191S19/2019©BEIESP | DOI: 10.35940/ijitee.A1019.1191S19

Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: At present Cloud computing is a very successful paradigm for data computing and storage. It Increases the concerns about data security and privacy in the cloud. Paper covers cloud security and privacy research, while focusing on the works that protect data confidentiality and privacy for sensitive data being stored and queried in the cloud. As Survey enlist all the research carried out related to data security and users privacy preserving techniques in detail. Data sharing can be achieved with sensitive information hiding with remote data integrity auditing, propose a new concept called identity based shared data integrity auditing with sensitive information hiding for secure cloud storage. Initially every data would be outsourced to the cloud only after authorized or activated by the proxy. The key would be generated to the file randomly by the key generation Centre. The transaction details such as key mismatch, file upload and download, hacking details would be shown to the proxy and cloud server. If the match occurs, automatically file would be recovered by the user even if hacker access or tamper the file. The main motive is to ensure that when the cloud properly stores the user’s sanitized data, the proof it generates can pass the verification of the third party auditor. And the paper provides various research work done in the field.

Keywords: Auditing, Privacy, Cloud Security.
Scope of the Article: Cloud Computing