Privacy preserving public auditing for shared data in distributed environment

Author: 
Kousalya R., Akshaya Devi S., Sangeetha S and Smitha P.S[AP]

In distributed environment where group of systems connected over a network and the individual computers were physically distributed within some geographical area where the users can form a group for uploading or viewing the files. They may face some security breaches at the storage servers and while sharing the files. As with physical security, the motivators for breaches of computer security vary between attackers. Some are thrill-seekers or vandals, others are activists or criminals looking for financial gain. Even while storing those files in server the attacks may happen. So the files must be protected by using some encryption algorithm and digital signature schemes. In this system Advanced Encryption Standard (AES) algorithm for encrypting and ring signature has been used. If an unauthorized user tries to access or modify those stored files in server, they can be traced and blocked using their IP address.
To ensure the correctness of data, we consider the task of allowing a Third Party Auditor (TPA), to verify the integrity of the data stored in the server, the auditing process should bring in no new vulnerabilities towards user data privacy, so the TPA can only view the hash values of those stored files. They cannot demand for the local copy of the file for auditing. This system uses methods like AES algorithm, Ring Signature are for securing data. Thus our protocol is much more efficient than a recent preserving public auditing protocol.

Download PDF: 
DOI: 
http://dx.doi.org/10.24327/ijcar.2018.10720.1830
Select Volume: 
Volume7