PERFORMANCE OF CLOUD DATA INTEGRITY PROOFS IN CLOUD STORAGE SYSTEM USING CRYPTOGRAPHIC KEY

B Rajesh
International Research Journal of Engineering and Technology (IRJET)   unpublished
The de-facto solution to the increasing storage costs of IT Enterprises is the Cloud computing has been envisioned. In order to frequently update their hardware with the high costs of data storage devices as well as the rapid rate of which data is being generated it proves costly for enterprises or individual users. Data outsourcing to the cloud leads to reduction in storage costs also helps in reducing the maintenance. In this scheme a proof of data integrity in the cloud which the customer
more » ... employ to check the correctness of his data in the cloud is provided. Both the cloud and the customer can greed upon this proof and can be incorporated in the Service level agreement (SLA). Data is moved to a remotely located cloud server in cloud computing. Whenever needed the Cloud faithfully stores the data and return back to the owner. The data stored in the cloud is secured and not altered by the cloud or Third Parity Auditor (TPA) is not guaranteed. Apart from reducing the storage costs cloud data outsourcing to the cloud also helps in reducing the maintenance. The user does not have any control on the Cloud storage which moves the user's data to large data centers, which are remotely located. At the client side the storage is minimal which will be useful for thin clients is ensured in this research. Cloud stores the data faithfully and returns back to the owner whenever needed. The data stored in the cloud is no guarantee that it is secured and not altered by the cloud or Third Party Auditor (TPA). The user must be able to use the assist of a TPA in order to overcome the threat of integrity of data. The TPA has experience in checking integrity of the data, that clouds users does not have, and that is difficult for the owner to check. The content in the cloud should be correct, consistent, accessible and high quality. The aim of this paper is twofold 1) ensuring the integrity of the data and Provides the proof that data is in secured manner. 2) Providing Cryptographic key to secure the data in the cloud. The implementation and the test results are promising in the proposed approach.
fatcat:oqjeogu3crafng6c4oqdothxem