Secure Cloud Auditing Over Encrypted Data
Internet of Things and Cloud Computing
Volume 6, Issue 1, March 2018, Pages: 25-35
Received: Feb. 8, 2018; Accepted: Mar. 8, 2018; Published: Apr. 13, 2018
Views 59      Downloads 2
Yesu Ragavi Kannadasan, Department of Master of Computer Applications, Vivekanandha College of Arts and Sciences for Women, Tiruchengode, India
Rajagopal Devarajan, Department of Master of Computer Applications, Vivekanandha College of Arts and Sciences for Women, Tiruchengode, India
Article Tools
Follow on us
Cloud computing is a popular technology which permits storing and accessing data over Internet instead of storing it on local machines’ hard drive. Cloud users can enable to store their data on cloud without any anxiety about its accuracy and reliability. However storing data on cloud imposes certain security challenges. Outsourcing data in cloud result may lose physical control over their data. Certain Cloud Service Providers (CSPs) may operate dishonestly with the cloud users’ data, they may sneak the data from cloud and sell it to third parties in order to earn profit. Even though outsourcing data on cloud is inexpensive and reduces long duration storage and maintenance complexity, there is least assurance of data integrity, privacy, security and availability on cloud servers. A number of solutions have been recommended to solve the security issues in cloud. This paper mainly focuses on the integrity verification strategy for outsourced data. The proposed scheme combines the encrypting mechanism.
Cloud Computing, Data Encryption, Security, Cloud Audit, Cloud Service Provider
To cite this article
Yesu Ragavi Kannadasan, Rajagopal Devarajan, Secure Cloud Auditing Over Encrypted Data, Internet of Things and Cloud Computing. Vol. 6, No. 1, 2018, pp. 25-35. doi: 10.11648/j.iotcc.20180601.14
Copyright © 2018 Authors retain the copyright of this article.
This article is an open access article distributed under the Creative Commons Attribution License ( which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Sarah sheikh and Deepali vora, “Secure cloud auditing over encrypted data”, IEEE transactions on information forensics and security, Vol. 11, No. 6, Mar 2017, PP: 1-5.
Kalyani sonaware and Rahul dagade, “A survey on multi-key word ranked search over encrypted cloud data with multiple data owners”, International journal of computer applications, Vol. 162, No. 11, Mar 2017, PP:9-12.
Swapnali and Snagita chaudhari, “Third party public auditing scheme for cloud storage”, 7th International conference on communication, computing and virtualized 2016, PP: 69-76.
Nitin nagar and Ugrasen suman, “Reliable & enhanced third party auditing in cloud server data storage”, International journal of security and its applications, Vol. 11, No. 7, 2017, PP: 59-71.
Mahesh kumar, “Encrypted bigdata using AES deduplication in cloud storage”, International journal of engineering and computer science, Vol. 6, No. 7, July2017, PP: 21889-21894.
Sweta k. parmer and K. C. Dave “Implementation of data encryption & decryption algorithm for information security”, International journal of advanced in science engineering and technology, Vol. 1, No. 2, Oct2013, PP: 7-10.
Pitchaiah, Philemon Daniel & Praveen, “Implementation of advanced encryption standard algorithm”, International journal of engineering research, Vol. 3, No. 3, 2012, PP: 1-6.
Vaishali Patil & Archana Lomte, “Implementation of privacy –preserving public auditing and secure searchable data cloud storage”, Vol. 3, No. 7, 2017, PP: 65-72.
Karthika priya dharshini, Viji & Saravanan, “Seclusion search over encrypted data in cloud storage services”, Vol. 4, No. 3, Mar 2015, PP: 27-34.
Evgeny Milanov, “The RSA Algorithm”, 3, June 2007, PP:1-11.
Science Publishing Group
NEW YORK, NY 10018
Tel: (001)347-688-8931