Loading

Secure Audit Service by Using TPA for Data Integrity in Cloud System
Shingare Vidya Marshal

Mrs. Shingare Vidya Marshal, Department of CSE, Jagruti Institute of Engineering & Technology, Hyderabad (Telangana), India.
Manuscript received on 10 September 2013 | Revised Manuscript received on 19 September 2013 | Manuscript Published on 30 September 2013 | PP: 49-52 | Volume-3 Issue-4, September 2013 | Retrieval Number: D1180093413/13©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Cloud computing is the vast computing utility, where users can remotely store their data into the cloud so to have the benefit of the on-demand availability of huge and different applications and services from a shared pool of configurable computing resources. Cloud-based outsourced storage space reduces the patron load of storage management. It also reduces the maintenance load of customer by providing a comparably low-cost, scalable, location-independent platform. This new model of data hosting service commence a new security challenges, which requires an independent auditing service which audit the data integrity of cloud. There are different existing auditing services available in cloud which audit data integrity remotely in static motion but these are not applicable whenever data is dynamically updated in cloud. Since it require efficient and secure dynamic auditing method for data owner. However in cloud, the clients no have direct physical possession of data. It shows client faces different formidable risk like missing or corruption of data. To keep away from the security and integrity risk of data, audit services are essential to ensure the integrity and availability of outsourced data and to achieve digital forensics and credibility on cloud computing. Provable data possession (PDP), which is a cryptographic technique for verifying the integrity of data without retrieving it at an untrusted server, can be used to realize audit services. In this paper, profiting from the interactive proof system, we address the construction of an interactive PDP protocol to prevent the fraudulence of prove (soundness property) and the leakage of verified data (zero-knowledge property) [1] [17] [20].
Keywords: Data Integrity, Storage Auditing, Dynamic Auditing, Privacy-Preserving Auditing, Cloud Computing, Zero Knowledge.

Scope of the Article: Cloud Computing