Parisha Parisha, P. Khanna, Puneet Sharma, S. Rizvi
{"title":"Hash Function based Data Partitioning in Cloud Computing for Secured Cloud Storage","authors":"Parisha Parisha, P. Khanna, Puneet Sharma, S. Rizvi","doi":"10.9790/9622-0707100106","DOIUrl":null,"url":null,"abstract":"There is a necessity to firmly manage, store, and examine enormous quantity of complex data i.e. semi-structure and unstructured to regulate configurations and developments in order to expand the feature and excellence. It is very essential that clouds be secure and protected because of the critical environment of the applications. The foremost security task using cloud is that the holder of the data possibly will not have control of where the data is located. If anyone who desires to exploit the advantages of using cloud computing, one must also use the resource sharing and scheduling delivered by clouds. The data stored on cloud may be possible altered or modified without the knowledge of client. There should be a mechanism that verifies the stored and the data being retrieved is same.Thus we need protection of the data.This paper examines some significant security services including verification, encryption and decryption are provided in cloud computing system. In this paper data partitioning technique is used for privacy conserving and security of data, using third party auditor (TPA) and concept of hash function. A hash function takes a data of variable size and generates a data of fixed length, which is unique for each data. when data is encoded the hash value of encrypted data is also created and it is stored by third party auditor .For retrieval of data, third party auditor decodes the data by random key and creates the hash of the encrypted file attained from cloud then the hash value is matched and compared with one generated by it and the hash value at data holder, this verifies the data exactness. The objective of this work is designing, an effective flexible storage structure to confirm the accessibility of data and data exactness in cloud.","PeriodicalId":13972,"journal":{"name":"International Journal of Engineering Research and Applications","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Engineering Research and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.9790/9622-0707100106","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
There is a necessity to firmly manage, store, and examine enormous quantity of complex data i.e. semi-structure and unstructured to regulate configurations and developments in order to expand the feature and excellence. It is very essential that clouds be secure and protected because of the critical environment of the applications. The foremost security task using cloud is that the holder of the data possibly will not have control of where the data is located. If anyone who desires to exploit the advantages of using cloud computing, one must also use the resource sharing and scheduling delivered by clouds. The data stored on cloud may be possible altered or modified without the knowledge of client. There should be a mechanism that verifies the stored and the data being retrieved is same.Thus we need protection of the data.This paper examines some significant security services including verification, encryption and decryption are provided in cloud computing system. In this paper data partitioning technique is used for privacy conserving and security of data, using third party auditor (TPA) and concept of hash function. A hash function takes a data of variable size and generates a data of fixed length, which is unique for each data. when data is encoded the hash value of encrypted data is also created and it is stored by third party auditor .For retrieval of data, third party auditor decodes the data by random key and creates the hash of the encrypted file attained from cloud then the hash value is matched and compared with one generated by it and the hash value at data holder, this verifies the data exactness. The objective of this work is designing, an effective flexible storage structure to confirm the accessibility of data and data exactness in cloud.