Cloud Audit Server based verification for enhancing Information Security in cloud

Authors

  • Ganji R Department of Computer Science & Engineering, Research Scholar, Acharya Nagarjuna University, Guntur. India
  • Yalavarthi SB Prof. in Computer Science, Department of Computer Science, J.K.C. College, Guntur, Andhra Pradesh, India

DOI:

https://doi.org/10.26438/ijcse/v6i8.406413

Keywords:

Cloud computing, thrid party auditor, Third party arbitrator, Data Verification, dispute arbitration

Abstract

Cloud computing enables internet based data storage, accessing, portability and processing. The flexibility cloud endows comes with a few security challenges. Though plans like "Proofs of Retrievability" and "Provable Data Possession" has been created to ascertain security they can't bolster dynamic information. By and large a significant number of the peril models accept that having a fair data owners are concentrating on the exploitative cloud authority organization. In certain scenarios the client might be untrustworthy for getting the advantages by means of pay from the supplier. This research work focuses on an open inspecting plan that endows information support and reasonable discretion in data safety issues. This paper primarily focuses on developing a signature based plan to configure reasonable discretion conventions that ensures data integrity and security. The security verification establishes that the proposed method is secure and the information flow and dispute arbitration are sensible

References

G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable data possession at untrusted stores,” in Proc. 14th ACM Conf. Computer and Comm. Security (CCS07), 2007, pp. 598–609.

H. Shacham and B. Waters, “Compact proofs of retrievability,” in Proc. 14th Intl Conf. Theory and Application of Cryptology and Information Security: Advances in Cryptology (ASIACRYPT 08), 2008, pp. 90–107.

Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, “Enabling publicverifiability and data dynamics for storage security in cloud computing,”in Proc. 14th European Conf. Research in Computer Security(ESORICS 08), 2009, pp. 355–370.

A. Juels and B. S. Kaliski Jr, “Pors: Proofs of retrievability forlarge files,” in Proc. 14th ACM Conf. Computer and Comm. Security(CCS07), 2007, pp. 584–597.

M. A. Shah, R. Swaminathan, and M. Baker, “Privacypreservingaudit and extraction of digital contents.” IACR Cryptology ePrintArchive, Report 2008/186, 2008.

Q. Zheng and S. Xu, “Fair and dynamic proofs of retrievability ” inProc. 1st ACM Conf. Data and Application Security and Privacy(CODASPY 11), 2011, pp. 237–248.

A.Kupcu¸ “Official arbitration with secure cloud storage application”, The Computer Journal, pp. 138–169, 2013.

Vishnu Patidar, Makhan Kumbhkar, “Analysis of Cloud

Computing Security Issues in Software as a Service” International Journal of Scientifi International Journal of Scientific Research , Vol.2 , Issue.3, pp.1-4, 2014.

Downloads

Published

2025-11-15
CITATION
DOI: 10.26438/ijcse/v6i8.406413
Published: 2025-11-15

How to Cite

[1]
R. Ganji and S. B. Yalavarthi, “Cloud Audit Server based verification for enhancing Information Security in cloud”, Int. J. Comp. Sci. Eng., vol. 6, no. 8, pp. 406–413, Nov. 2025.

Issue

Section

Research Article