Loading

Kernel filtering for Multi-level integrity verification approach for cloud data storage
K.Shirisha Reddy1, M. Balaraju2

1Shirisha Reddy, Research Scholar, JNTUH, Hyderabad (Telangana), India.
2Dr. M. Balaraju, Professor & Principal, SVIT, JNTUH, Hyderabad (Telangana), India.

Manuscript received on 18 June 2019 | Revised Manuscript received on 25 June 2019 | Manuscript published on 30 June 2019 | PP: 1479-1489 | Volume-8 Issue-5, June 2019 | Retrieval Number: E7710068519/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: User data privacy is essential in the cloud storage for protecting the user data in the cloud server. Register the user’s data and accessing their respective data from the cloud server is an active area in the research community. Due to the data validation conditions, hardware, and operational complexity constraints, it is a challenging issue for the user to verify the integrity of data. Hence, in this paper, a new approach named Multi-level integrity verification scheme is proposed to ensure the data integrity of the user. The main focus of this work is to protect the user data privacy, and to forward the user signature and the files from the user to the Cloud Server Provider (CSP) and Third Party Auditor (TPA). The user files are verified based on the dual control mechanism and the file signature is verified by the Cloud Server Provider. The privacy of the signature information and the cloud storage space utilization is effectively enhanced. The performance of the proposed Multi-level integrity verification scheme is evaluated using different parameters, like computational time and memory usage of 889ns, and 4083bytes for 400kb dataset, respectively.
Keywords: Cloud Service Provider (CSP), Data Integrity, Kernel Filtering, Multi-Level Integrity Verification, Third Party Auditor (TPA).

Scope of the Article: Cloud Computing