Merkle Hellman Knapsack Cryptosystem based Cloud Auditing Protocol

Dr. A.Charles, Assistant Professor Government College of Engineering, Bargur, India
Manuscript received on 02 July 2019 | Revised Manuscript received on 09 July 2019 | Manuscript published on 30 August 2019 | PP: 2168-2174 | Volume-8 Issue-10, August 2019 | Retrieval Number: J93810881019/2019©BEIESP | DOI: 10.35940/ijitee.J9381.0881019
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (

Abstract: The cloud environment provided the cloud storage services to allow the users for storing, managing and accessing their data through the internet. The user worried about the integrity of data because of their data can be modified by external hackers due to the limited control. The new auditing technology is required for allowing the user to use local storage without worrying about the integrity of the data. An independent entity called Third Party Auditor (TPA) is presented for auditing task rather than putting the burden of task to the user themselves. In our proposed work, the Cloud Auditor (CA) plays the role of monitoring the modifications done to the block by any external hacker if it happens; original data is recovered from its cache log. Every data that transacts between the storage, user and the CA are encrypted with Merkle Hellman Knapsack Cryptosystem based Cloud Auditing Protocol (MHKC-CAP) algorithm. Thus the proposed methodology outperforms the existing algorithms like Message Digest 5 (MD5) algorithm and Advanced Encryption Standard (AES) by means of auditing time around 13 milliseconds and accuracy in terms of False Positive Rate (FPR) and False Negative Rate (FNR) are around 0.67% and 0.5%.
Keywords: Cloud Storage Services, Third Party Auditor, Message Digest 5, Advanced Encryption Standard and Merkle Hellman Knapsack Cryptosystem based Cloud Auditing Protocol..
Scope of the Article: Encryption Methods and Tools