An Efficient Auditing System for Secure Cloud Storage
Priyanka Mukund Kamble1, Aditya Sarda2, S.D. Joshi3, M.S. Bewoor4
1Priyanka Mukund Kamble*, M.Tech Student, Department of Computer Engineering, Bharati Vidyapeeth College Of Engineering, Pune, India.
2Aditya Sarda, Research Scholar, Department of Computer Engineering, Bharati Vidyapeeth College Of Engineering , Pune, India.
3Dr. S.D. Joshi, Professor, Department of computer Engineering, Bharati Vidyapeeth College Of Engineering, Pune, India.
4Dr. M.S. Bewoor, Associate Professor, Department of computer Engineering, Bharati Vidyapeeth College Of Engineering, Pune, India.
Manuscript received on March 15, 2020. | Revised Manuscript received on March 27, 2020. | Manuscript published on April 10, 2020. | PP: 42-45 | Volume-9 Issue-6, April 2020. | Retrieval Number: F3474049620/2020©BEIESP | DOI: 10.35940/ijitee.F3474.049620
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: The cloud offers stockpiling administrations where clients can store a tremendous proportion of data. Clients are given adaptable measures of extra room alongside the specific number of processors and essential memory where they can play out the fundamental errands. This sharing of realities is commonly executed by framing organizations of clients who share a normal intrigue. Data shared through any individual might be gotten to the method for by utilizing various clients inside the foundation, where the realities owner is a piece of the data that is spared inside the cloud should be incorporated from burglary, abuse, etc. For the explanation that man or lady can likewise shop basic and delicate data inside the cloud it’s miles the commitment of the cloud specialist organization to ensure that the data is agreeable and furthermore to hold the protection of the clients who share the realities inside the association clients in a set can likewise make adjustments to the realities which is shared inside the association. Additionally while somebody gets to the measurements most refreshed realities should be made accessible all together that substantial surmisings and activity. For this reason right now, protection and information security of shared information in cloud utilizing encryption to save the client security. Likewise Third Party Auditor (TPA) reviews the information put away in the cloud. He ought to have the option to check the dependability of the CSP without uncovering the personality of the clients in the gathering.
Keywords: Cloud Computing, Continuous Auditing, Security, and Encryption.
Scope of the Article: Encryption Methods and Tools.