A Novel Integrated Auditing Protocol in Cloud Computing
||International Journal of Computer & Organization Trends (IJCOT)||
|© 2019 by IJCOT Journal|
|Volume - 9 Issue - 2
|Year of Publication : 2019|
|Authors : J.A Lavanya, S.Dilshad Begum, Ch.Syamala, P.Sreenidhi, Josephine David|
MLA Style:J.A Lavanya, S.Dilshad Begum, Ch.Syamala, P.Sreenidhi, Josephine David "A Novel Integrated Auditing Protocol in Cloud Computing" International Journal of Computer and Organization Trends 9.2 (2019): 9-12.
APA Style:J.A Lavanya, S.Dilshad Begum, Ch.Syamala, P.Sreenidhi, Josephine David (2019). A Novel Integrated Auditing Protocol in Cloud Computing. International Journal of Computer and Organization Trends, 9(2), 9-12.
We propose an empirical model of cloud data auditing and data deduplication over data components, which are uploaded by the data owners. Auditor receives the Meta information and authentication parameters to verify the uploaded components. Proxy implementation reduces the overhead of the cloud server. Base server holds reference to duplicate components, which improves the space of the data owner. Data confidentiality can be maintained by cryptographic model. Authentication can be maintained by random challenges. Our proposed model gives more efficient results than traditional models.
 OpenSSL Project. http://www.openssl.org/.
 P.Anderson and L. Zhang. Fast and secure laptop backups withencrypted de-duplication. In Proc. of USENIX LISA, 2010.
 M.Bellare, S. Keelveedhi, and T. Ristenpart. Dupless: Serveraidedencryption for deduplicated storage. In USENIX Security Symposium, 2013.
 M.Bellare, S. Keelveedhi, and T. Ristenpart. Message-lockedencryption and secure deduplication. In EUROCRYPT, pages 296–312, 2013.
 M.Bellare, C. Namprempre, and G. Neven. Security proofs foridentity-based identification and signature schemes. J. Cryptology,22(1):1–61, 2009.
 M.Bellare and A. Palacio. Gq and schnorr identification schemes:Proofs of security against impersonation under active and concurrentattacks. In CRYPTO, pages 162–177, 2002.
 S.Bugiel, S. Nurnberger, A. Sadeghi, and T. Schneider. Twinclouds: An architecture for secure cloud computing. In Workshopon Cryptography and Security in Clouds (WCSC 2011), 2011.
 J.R.Douceur, A. Adya, W. J. Bolosky, D. Simon, and M. Theimer.Reclaiming space from duplicate files in a serverless distributedfile system. In ICDCS, pages 617–624, 2002.
 D.Ferraiolo and R. Kuhn. Role-based access controls. In 15thNIST-NCSC National Computer Security Conf., 1992.
 GNU Libmicrohttpd. http://www.gnu.org/software/libmicrohttpd/.
NIST, RSA, ID-PKC, PaaS