Ensuring Data Security and Verifiability in Cloud Storage

Authors

  • Prajwal R
  • Sravanthi Kalal

Keywords:

Auditing request, Cloud storage, Data security, Hashcode, Key generation

Abstract

Cloud storage has become more accepted for storing and managing vast amounts of data due to its scalability, accessibility, and cost-effectiveness. However, ensuring the security and reliability of cloud-based data remains a major concern. This paper proposes a secure and verifiable cloud container system that guarantees reliability with advanced cryptographic techniques and auditing mechanisms.

The targeted system utilizes cloud storage systems, which provide an efficient and reliable approach to verifying the integrity of cloud-based data. Cloud storage system encryption allows for flexible access control and authentication, enabling authorized users to securely access and modifies data while preserving its integrity.

The auditing mechanism incorporates cryptographic hash functions and digital signatures to generate verifiable proof of data integrity. By periodically auditing the 1 stored data, the system detects any unauthorized modifications or tampering attempts, ensuring the reliability of the cloud storage system.

Furthermore, the system employs secure communication protocols and encryption techniques to protect data transmission between clients and the cloud container provider. This safeguards data from eavesdropping, interception, or unauthorized access.

 

Published

2023-07-28

Issue

Section

Articles