Authorizing Identity based Integrity Auditing and Data Assigning with Responsive Information Hiding for Cloud

Siva Priya
2019 International Journal for Research in Applied Science and Engineering Technology  
Authorizing based on Identity-based cloud storage auditing schemes can check the security of cloud data. It contains the confidential information that must be protected from unauthorized access. To provide the privacy for an individual or organization, the sensitive information's are need to be hided. Hiding the sensitive information in the cloud makes the data in the cloud more secure. In the proposed system the Private Key Generator (PKG) generate the authentication key to the data owner and
more » ... he data user. By using the authentication key, the data owner and the data user enter into the cloud to upload and to download the data from the cloud. The data are encrypted and the sensitive information's are hided before uploading in the cloud. Third Party Auditor (TPA) performs the auditing process in the cloud. This scheme makes the file stored in the cloud able to be shared and used by others on the condition that the sensitive information is hidden, which makes the auditing system to work in efficient manner.
doi:10.22214/ijraset.2019.5485 fatcat:sxjnkcz775gkretr3owfzmgamm