A Novel Integrated Auditing Protocol in Cloud Computing

  IJCOT-book-cover
 
International Journal of Computer & Organization Trends  (IJCOT)          
 
© 2019 by IJCOT Journal
Volume - 9 Issue - 2
Year of Publication : 2019
Authors :  J.A Lavanya, S.Dilshad Begum, Ch.Syamala, P.Sreenidhi, Josephine David

Citation

MLA Style:J.A Lavanya, S.Dilshad Begum, Ch.Syamala, P.Sreenidhi, Josephine David "A Novel Integrated Auditing Protocol in Cloud Computing" International Journal of Computer and Organization Trends 9.2 (2019): 9-12.

APA Style:J.A Lavanya, S.Dilshad Begum, Ch.Syamala, P.Sreenidhi, Josephine David (2019). A Novel Integrated Auditing Protocol in Cloud Computing. International Journal of Computer and Organization Trends, 9(2), 9-12.

Abstract

We propose an empirical model of cloud data auditing and data deduplication over data components, which are uploaded by the data owners. Auditor receives the Meta information and authentication parameters to verify the uploaded components. Proxy implementation reduces the overhead of the cloud server. Base server holds reference to duplicate components, which improves the space of the data owner. Data confidentiality can be maintained by cryptographic model. Authentication can be maintained by random challenges. Our proposed model gives more efficient results than traditional models.

References

[1] OpenSSL Project. http://www.openssl.org/.
[2] P.Anderson and L. Zhang. Fast and secure laptop backups withencrypted de-duplication. In Proc. of USENIX LISA, 2010.
[3] M.Bellare, S. Keelveedhi, and T. Ristenpart. Dupless: Serveraidedencryption for deduplicated storage. In USENIX Security Symposium, 2013.
[4] M.Bellare, S. Keelveedhi, and T. Ristenpart. Message-lockedencryption and secure deduplication. In EUROCRYPT, pages 296–312, 2013.
[5] M.Bellare, C. Namprempre, and G. Neven. Security proofs foridentity-based identification and signature schemes. J. Cryptology,22(1):1–61, 2009.
[6] M.Bellare and A. Palacio. Gq and schnorr identification schemes:Proofs of security against impersonation under active and concurrentattacks. In CRYPTO, pages 162–177, 2002.
[7] S.Bugiel, S. Nurnberger, A. Sadeghi, and T. Schneider. Twinclouds: An architecture for secure cloud computing. In Workshopon Cryptography and Security in Clouds (WCSC 2011), 2011.
[8] J.R.Douceur, A. Adya, W. J. Bolosky, D. Simon, and M. Theimer.Reclaiming space from duplicate files in a serverless distributedfile system. In ICDCS, pages 617–624, 2002.
[9] D.Ferraiolo and R. Kuhn. Role-based access controls. In 15thNIST-NCSC National Computer Security Conf., 1992.
[10] GNU Libmicrohttpd. http://www.gnu.org/software/libmicrohttpd/.

Keywords
NIST, RSA, ID-PKC, PaaS