Markle Hellman Knapsack Crypto-System Auditing Scheme for Privacy Preserving in Cloud Storage
N. Gowtham Kumar1, P. Niranjan2, D. Aruna Kumari3

1N Gowtham Kumar, Department Computer Science and Engineering, KL (Demmed to be University), Vijayawada, India.
2P. Niranjan, Department Computer Science and Engineering, Kakatiya Institute of Technology and Science, Waranagal, India.
3D. Aruna Kumari, Department of Electronics and Computer Engineering, KL (Deemed to be University), Vijayawada, India.

Manuscript received on September 16, 2019. | Revised Manuscript received on 24 September, 2019. | Manuscript published on October 10, 2019. | PP: 5231-5238 | Volume-8 Issue-12, October 2019. | Retrieval Number: L27941081219/2019©BEIESP | DOI: 10.35940/ijitee.L2794.1081219
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Cloud computing is an on demand paradigm which provides a different kind of services to the cloud users. Cloud storage is the most popular service, as the data owners are free from the data management and storage overhead. However, the data owners’ concern about the security of the data. In order to address this issue, this paper presents an efficient security with an auditing scheme that guarantees the security of the data and preserve data integrity. In this paper, the cloud storage auditing model used efficient privacy preserving algorithm, namely Markle Hellman Knapsack Crypto-System (MHKCS) algorithm. This algorithm effectively improves the data integrity, confidentiality and security. Moreover, reduces the key generation time, encryption time and decryption time. The performance of MHKCS algorithm is calculated using evaluation metrics like encryption time, decryption time, key generation time and communication cost. The MHKCS algorithm achieved approximately 10% better performance in terms of encryption time than the existing methods RSA, MRSA, and MRSAC.
Keywords: Auditing System, Cloud Storage Model, Data Integrity, Markle Hellman Knapsack Crypto-System, Rivest-Shamir-Adleman.
Scope of the Article: Cloud Computing