data integrity auditing without private key storage for secure cloud storage

S.Dinesh Babu,Malathi.S,Pavan Kumar.B,Deva.H

Published in International Journal of Advanced Research in Computer Science Engineering and Information Technology

ISSN: 2321-3337          Impact Factor:1.521         Volume:6         Issue:3         Year: 20 April,2023         Pages:1721-1725

International Journal of Advanced Research in Computer Science Engineering and Information Technology

Abstract

Utilizing distributed storage administrations, clients can store their information in the cloud to maintain a strategic distance from the consumption of nearby information stockpiling also, support. To guarantee the honesty of the information put away in the cloud, numerous information uprightness evaluating plans have been proposed. In most, if not all, of the current plans, a client needs to utilize his private key to create the information authenticators for understanding the information honesty inspecting. Therefore, the client needs to have an equipment token (for example USB token, shrewd card) to store his private key and remember a secret phrase to actuate this private key. On the off chance that this equipment token is lost or this secret phrase is overlooked, the majority of the current information honesty inspecting plans would be not able work. So as to defeat this issue, we propose another worldview called information uprightness examining without private key stockpiling and structure such a plan. In this plan, we use biometric information (for example iris check, unique mark) as the client's fluffy private key to abstain from utilizing the equipment token. In the interim, the plan can in any case adequately complete the information honesty auditing. We use a straight sketch with coding and blunder remedy procedures to affirm the personality of the client. What's more, we structure another mark plot which supports blockless undeniable nature, yet in addition is perfect with the straight sketch. The security evidence and the execution examination demonstrate that our proposed plan accomplishes alluring security and productivity

Kewords

Privacy, Data Integrity, Encryption

Reference

[1] K. Ren, C. Wang, and Q. Wang, “Security challenges for the public cloud,” IEEE Internet Computing, vol. 16, no. 1, pp. 69–73, Jan 2020. [2] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable data possession at untrusted stores,” in Proceedings of the 14th ACM Conference on Computer and Communications Security, ser. CCS ’07, 2021, pp. 598–609. [3] A. Juels and B. S. Kaliski, “Pors: Proofs of retrievability for large files,” in Proceedings of the 14th ACM Conference on Computer and Communications Security, ser. CCS ’07, 2019, pp. 584–597. [4] H. Shacham and B. Waters, “Compact proofs of retrievability,” J. Cryptology, vol. 26, no. 3, pp. 442–483, Jul. 2019.[5] C. Wang, S. S. M. Chow, Q. Wang, K. Ren, and W. Lou, “Privacy-preserving public auditing for secure cloud storage,” IEEE Transactions on Computers, vol. 62, no. 2, pp. 362–375, 2019. [6] S. G. Worku, C. Xu, J. Zhao, and X. He, “Secure and efficient privacy-preserving public auditing scheme for cloud storage,” Comput. Electr. Eng., vol. 40, no. 5, pp. 1703–1713, Jul. 2020. [7] C. Guan, K. Ren, F. Zhang, F. Kerschbaum, and J. Yu, “Symmetric-key based proofs of retrievability supporting public verification,” in Computer Security – ESORICS 2021. Cham: Springer International Publishing, 2015, pp. 203–223. [8] W. Shen, J. Yu, H. Xia, H. Zhang, X. Lu, and R. Hao, “Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium,” Journal of Network and Computer Applications, vol. 82, pp. 56–64, 2019. [9] J. Sun and Y. Fang, “Cross-domain data sharing in distributed electronic health record systems,” IEEE Transactions on Parallel and Distributed Systems, vol. 21, no. 6, pp. 754–764, June 2019. [10] G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, “Scalable and efficient provable data possession,” in Proceedings of the 4th international conference on Security and privacy in communication netowrks, 2020, pp. 1–10.