Efficient Data Integrity and Auditing in Cloud by using Block Chain
Prof Chethan Raj C , Shivani M S, , Sowjanya D R, Sowmya M T, , Tejaswini D R
The main aim of this paper is to discuss the usage of cloud storage services, enabling individuals to store their information in the cloud and keep away from the local data storage and maintenance expense. Numerous data integrity auditing systems have been implemented to guarantee the quality of the data stored in the cloud. An individual would like to enroll his private key to create the authenticators for understanding the auditing of data integrity in certain, but not all of the current system. The user must then have a hardware token (e.g. USB token, smart card) for storing the private key and memorizing a password to trigger the private key. Most of the new data integrity auditing system will be unable to operate if the user misplaced this hardware token or forgot this password. We are proposing a new module called data integrity auditing without private key storage to solve this issue, and developing such a scheme using block chain technology. In this project we are proposing a computerized signature along with face reorganization with block chain operation, so that there will be no unique design to obtain unauthorized and furthermore to prevent hacking operation and all the respective user data or information will be stored in cloud with maximum security.
Cloud storage, Data integrity auditing and Data security Biometric data.
 Wenting Shen, Jing Qin”Data Integrity Auditing without Private Key Storage for Secure Cloud Storage” A review IEEE Trans.2019.
 Yue Zhang “Enabling Efﬁcient User Revocation in Identity-based Cloud Storage Auditing for Shared Big Data” A review IEEE Trans. 2018.
 Jia Yu “Storage Key-Exposure Resilient Auditing for Secure Cloud Storage” A review IEEE Trans. 2017.
 Anmin Fu, Huaqun Wang, Shui Yu, Chanyinghusang “NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data Sharing with Group Users: A review”IEEE Trans. 2017.
 Neeru Garg, Seema Bhava” RITS-MHT: Relative indexed and time stamped Merkle hash tree based data auditing protocol for cloud computing: A review” 2017.
 Wenting Shen, Jiayu, Hui Xia, Rong Hao” Light-Weight and Privacy-Preserving Secure Cloud Auditing Scheme for Group Users via the Third Party Medium: A review” 15 Jan 2017.
 Wenting Shen, Hanlin Zhang, Rong Hao, Fanyu Konhg “Data Possession Checking with Privacy-Preserving Authenticators for Cloud Storage: A review” 2017.
 Jia Yu, Kui Ren, Cong Wang” Enabling Cloud Storage Auditing with Veriﬁable Outsourcing of Key Updates: A review “IEEE Trans. 2016.
 Jiangtao Li, Lei Zhang, Joseph K. Liu, Zheming Dong” Privacy-Preserving Public Auditing Protocol for Low Performance End Devices in Cloud: A review” IEEE Trans. 2016.
 Huaqun Wang, Debiao He, Shaohua Tang” Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud: A review” 2016.
 C. Guan, K. Ren, F. Zhang, F. Kerschbaum, and J. Yu, “Symmetric-key based proofs of retrievability supporting public verification,” in Cham: Springer International Publishing, 2015.
 C. Liu, J. Chen, L. Yang, et al, “Authorized public auditing of dynamicbig data storage on cloud with efficient verifiable fine-grained updates,”IEEE Transactions on Parallel and Distributed Systems 2014.
 G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable data possession at untrusted stores,” in Proceedings of the 14th ACM Conference on Computer and Communications Security 2007.
 C. Ellison and B. Schneier, “Ten risks of pki: What you’re not being told about public key infrastructure,”2000.
[Prof Chethan Raj C , Shivani M S, , Sowjanya D R, Sowmya M T, , Tejaswini D R (2020) Efficient Data Integrity and Auditing in Cloud by using Block Chain IJIRCST Vol-8 Issue-4 Page No-299-305] (ISSN 2347 - 5552). www.ijircst.org
Prof Chethan Raj C
Associate Professor, Department of Computer Science & Engineering, Mysuru Royal Institute of Technology, Mandya, Karnataka, India (email:email@example.com)