{"title":"在云计算中实现数据隐私和数据完整性的一种新的数据审计方法","authors":"S. Hiremath, Sanjeev R Kunte","doi":"10.1109/ICEECCOT.2017.8284517","DOIUrl":null,"url":null,"abstract":"Cloud computing is a general term for the delivery of hosted services over the internet. Using the cloud services saves both users time and money. However, there are some security issues to be solved for personal users and enterprises to store data in the cloud. The fact is that users will not have any physical control over the outsourced data. The cloud user is concerned about the integrity of his data stored in the cloud as it can be attacked by attacker. The purpose of this paper is to suggest an efficient public auditing technique using Third Party Auditor (TPA) to verify the integrity of data stored in the cloud. The proposed auditing scheme makes use of AES algorithm for encryption and Secure Hash Algorithm (SHA-2) algorithm to generate verification metadata or message digest for data integrity check. The analysis shows that the proposed scheme is provably secure and TPA takes a constant time to audit files of different sizes.","PeriodicalId":439156,"journal":{"name":"2017 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"22","resultStr":"{\"title\":\"A novel data auditing approach to achieve data privacy and data integrity in cloud computing\",\"authors\":\"S. Hiremath, Sanjeev R Kunte\",\"doi\":\"10.1109/ICEECCOT.2017.8284517\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cloud computing is a general term for the delivery of hosted services over the internet. Using the cloud services saves both users time and money. However, there are some security issues to be solved for personal users and enterprises to store data in the cloud. The fact is that users will not have any physical control over the outsourced data. The cloud user is concerned about the integrity of his data stored in the cloud as it can be attacked by attacker. The purpose of this paper is to suggest an efficient public auditing technique using Third Party Auditor (TPA) to verify the integrity of data stored in the cloud. The proposed auditing scheme makes use of AES algorithm for encryption and Secure Hash Algorithm (SHA-2) algorithm to generate verification metadata or message digest for data integrity check. The analysis shows that the proposed scheme is provably secure and TPA takes a constant time to audit files of different sizes.\",\"PeriodicalId\":439156,\"journal\":{\"name\":\"2017 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)\",\"volume\":\"18 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"22\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICEECCOT.2017.8284517\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICEECCOT.2017.8284517","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A novel data auditing approach to achieve data privacy and data integrity in cloud computing
Cloud computing is a general term for the delivery of hosted services over the internet. Using the cloud services saves both users time and money. However, there are some security issues to be solved for personal users and enterprises to store data in the cloud. The fact is that users will not have any physical control over the outsourced data. The cloud user is concerned about the integrity of his data stored in the cloud as it can be attacked by attacker. The purpose of this paper is to suggest an efficient public auditing technique using Third Party Auditor (TPA) to verify the integrity of data stored in the cloud. The proposed auditing scheme makes use of AES algorithm for encryption and Secure Hash Algorithm (SHA-2) algorithm to generate verification metadata or message digest for data integrity check. The analysis shows that the proposed scheme is provably secure and TPA takes a constant time to audit files of different sizes.