Archives

Enhanced Secure Cloud Storage Auditing System with Proxy and BLS Signature Algorithm


Dr.S. Thiru Nirai Senthil and Dr.A. Muthukumaravel
Abstract

In this paper, we enhance the existing Fair Arbitration based cloud auditing system and present a public auditing design for the regenerating-code-based cloud storage model, where the data owners are indulged to allocate TPA for their data validity scrutinizing. During application process the coefficients are randomized, to protect the data privacy against the TPA. A proxy is made known into the existing model of the cloud system to avoid malicious fraud and to bring down the owner online load. A proxy is employed to maintain the renewal of the coded blocks and authenticators. BLS (Boneh–Lynn–Shacham) algorithm is used to regenerate the code. With the encoding procedure this authenticator can be easily generated by the data owner. A proxy is brought into the system to solve the regeneration drawback of unacknowledged authenticators in the absence of data owners, which is privileged to regenerate the authenticators, into the genuine public auditing system model. If any alternation made in the actual data, it will be notified to the actual data owner as well by the proxy. Thus, our project will completely exempt data owners from online burden. Our auditing protocol is extended to support the data dynamic operations, which is provably secure and effectual random oracle model method.

Volume 11 | Issue 1

Pages: 522-527