Achieving Authentication of Remotely Stored Data
Vidyullata Devmane1, B.K.Lande2, Jyoti Joglekar3, Hemant Kothari4

1Vidyullata Devmane*, PhD Scholar of Computer Engineering Department, PAHERU Udaipur, Rajasthan, India.
2Dr. B.K.Lande, Professor in Electronics Department, Datta Meghe College of Engineering, Airoli, Navi Mumbai, India.
3Dr. Jyoti Joglekar, Department, Professor in Computer Engineering Departement, K.J.Somaiya College of Engineering, Mumbai, India
4Dr. Hemant Kothari, Professor at PAHERU, Udaipur, Rajasthan, India.
Manuscript received on December 17, 2019. | Revised Manuscript received on December 23, 2019. | Manuscript published on January 10, 2020. | PP: 882-884 | Volume-9 Issue-3, January 2020. | Retrieval Number: B7435129219/2020©BEIESP | DOI: 10.35940/ijitee.B7435.019320
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (

Abstract: Data storage over cloud is a demanding service but it is vulnerable for various attacks. It is required to provide strong security to this data. An authenticity of the data on remote storage is necessary but data owners have to trust on cloud storage for their outsourced data. There is a need of some mechanism to check correctness of the data without compromising its confidentiality. We have studied homomorphic algorithms so that can be applied on the cipher text. Aim of the framework designed here is to enable any authentic user or auditor to verify hash value generated by owner with the hash value of encrypted data which is stored at remote storage for assuring authentication of the data. This can be done with strong mathematical cryptographic algorithms those can be used in the public environment and can provide better performance complexity. 
Keywords: Cloud Storage Data Authenticity, Homomorphic Algorithms, Hash tree.
Scope of the Article: Authentication, authorization, Accounting