International Journal of Computer
& Organization Trends

Research Article | Open Access | Download PDF

Volume 9 | Issue 2 | Year 2019 | Article Id. IJCOT-V9I2P303 | DOI : https://doi.org/10.14445/22492593/IJCOT-V9I2P303

A Novel Integrated Auditing Protocol in Cloud Computing


J.A Lavanya, S.Dilshad Begum, Ch.Syamala, P.Sreenidhi, Josephine David

Citation :

J.A Lavanya, S.Dilshad Begum, Ch.Syamala, P.Sreenidhi, Josephine David, "A Novel Integrated Auditing Protocol in Cloud Computing," International Journal of Computer & Organization Trends (IJCOT), vol. 9, no. 2, pp. 9-12, 2019. Crossref, https://doi.org/10.14445/22492593/IJCOT-V9I2P303

Abstract

We propose an empirical model of cloud data auditing and data deduplication over data components, which are uploaded by the data owners. Auditor receives the Meta information and authentication parameters to verify the uploaded components. Proxy implementation reduces the overhead of the cloud server. Base server holds reference to duplicate components, which improves the space of the data owner. Data confidentiality can be maintained by cryptographic model. Authentication can be maintained by random challenges. Our proposed model gives more efficient results than traditional models.

Keywords

NIST, RSA, ID-PKC, PaaS

References

[1] OpenSSL Project. http://www.openssl.org/.
[2] P.Anderson and L. Zhang. Fast and secure laptop backups withencrypted de-duplication. In Proc. of USENIX LISA, 2010.
[3] M.Bellare, S. Keelveedhi, and T. Ristenpart. Dupless: Serveraidedencryption for deduplicated storage. In USENIX Security Symposium, 2013.
[4] M.Bellare, S. Keelveedhi, and T. Ristenpart. Message-lockedencryption and secure deduplication. In EUROCRYPT, pages 296–312, 2013.
[5] M.Bellare, C. Namprempre, and G. Neven. Security proofs foridentity-based identification and signature schemes. J. Cryptology,22(1):1–61, 2009.
[6] M.Bellare and A. Palacio. Gq and schnorr identification schemes:Proofs of security against impersonation under active and concurrentattacks. In CRYPTO, pages 162–177, 2002.
[7] S.Bugiel, S. Nurnberger, A. Sadeghi, and T. Schneider. Twinclouds: An architecture for secure cloud computing. In Workshopon Cryptography and Security in Clouds (WCSC 2011), 2011.
[8] J.R.Douceur, A. Adya, W. J. Bolosky, D. Simon, and M. Theimer.Reclaiming space from duplicate files in a serverless distributedfile system. In ICDCS, pages 617–624, 2002.
[9] D.Ferraiolo and R. Kuhn. Role-based access controls. In 15thNIST-NCSC National Computer Security Conf., 1992.
[10] GNU Libmicrohttpd. http://www.gnu.org/software/libmicrohttpd/.