Loading

Remote Data Integrity Check
A. Nagesh1, Javeria Qurratul Ain2

1Dr A Nagesh*, Professor, Department of CSE, MGIT, Hyderabad India.
2Javeria Qurratul, M- Tech in Computer Networks and Information Security at MGIT, Hyderabad, India.

Manuscript received on May 29, 2020. | Revised Manuscript received on June 22, 2020. | Manuscript published on June 30, 2020. | PP: 566-571 | Volume-9 Issue-5, June 2020. | Retrieval Number: E9780069520/2020©BEIESP | DOI: 10.35940/ijeat.E9780.069520
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: In Cloud Storage Server, data integrity plays an important role, given cloud clients might not be aware whether the data is safe or has been tampered with. This system introduces identity-based signature algorithms to protect data that belongs to the data owner and gets the status of cloud data by means of verification through signatures. Since it is practically not possible for the data owner to be available online all the time for checking cloud data integrity, Third party auditor is tasked with verifying the data integrity every time instead of data owner. The Third party auditors should not read the cipher text data while verifying and must authenticate itself to cloud server by performing Proof of Knowledge operation; then cloud server can reveal the sensitive data as block wise and the third party auditor can verify the signature without knowledge of cipher text data. Finally, an audit report is sent to the data owner. This work demonstrates data security and integrity in the cloud.
Keywords: Data integrity, data security, CSP, KGC, Cloud Storage.