Identity Based Security Auditingfor Data Sharing with Sensitive Information Hiding using Cloud Storage
N.V.T. Bhuvaneswari1, M. TrinathBasu2, M. Sri Sathvik3, Ravi Kumar Tenali4

1N.V.T. Bhuvaneswari, Department of ECM, Koneru Lakshmaiah Education Foundation, Vaddeswaram (A.P), India.
2M.TrinathBasu, Assistant Professor, Department of ECM, Koneru Lakshmaiah Education Foundation, Vaddeswaram (A.P), India.
3M.SriSathvik, Department of ECM, Koneru Lakshmaiah Education Foundation, Vaddeswaram (A.P), India.
4Ravi Kumar Tenali, Assistant Professor, Department of ECM, Koneru Lakshmaiah Education Foundation, Vaddeswaram  (A.P), India.
Manuscript received on 07 April 2019 | Revised Manuscript received on 20 April 2019 | Manuscript published on 30 April 2019 | PP: 1327-1333 | Volume-8 Issue-6, April 2019 | Retrieval Number: F3862048619/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: A privacy-preserving public auditing mechanism is used in the cloud for data sharing in the cloud storage. To utilize this, we require digital signatures to construct homomorphism authenticators and also verifying the metadata which is needed for auditing thewanted data, so that a public verifier can able to reviewthe distributed data integrity without retrieving the entire data. In this paper, we have implemented sensitive information for sensitive data sharing mechanism in cloud system, where user can remotely store his/her data in cloud and can retrieve data whenever he/she wants.Data owner store the file in the database and he can send the key to the user with the SMTP(Simple Mail Transfer Protocol) and the user can download the file with encrypted format with the help of 16bit key user can access to the file. Here auditor can check the file that it is corrupted or not. If it is corrupted from the user then auditor can regenerate the file. In addition, this mechanism is able to perform multiple auditing tasks at the same time instead of validating them one by one. It cannot decide who the signer on each block. In addition, our mechanism is in a position to perform multiple auditing tasks at the same time rather than verifying them one by one. We advance extend our mechanism to support batch auditing.
Keyword: Cloud Computing, Privacy-Preserving Mechanism, Remote Data integrity, Data Integrity.
Scope of the Article: Cloud and Systems