


Volume 20 No 10 (2022)
Download PDF
EMPOWER IDENTITY-BASED INTEGRITY AUDITING AND INFORMATION DISTRIBUTION WITH CONFIDENTIAL DATA DEFEAT FOR SAFETY CLOUD STORAGE
Dr.G.R.Anil, Dr.D.Nagaraju, Dr.Kande Srinivas, Mrs.R.Bhavani , Sai Charan Kalikota,Dr.R.SenthamilSelvan
Abstract
Users can use cloud storage services to remotely store their data and enable data sharing with others.
Remote data integrity verification is advised in order to guarantee the accuracy of data saved in the cloud. Some
prominent cloud storage platforms, like the electronic medical record system, may have files with sensitive data on
them. Confidential information shouldn't be made available to others while sharing a cloud file. The entire shared
file can be encrypted to protect sensitive information, but doing so prohibits others from accessing it. It is still
unknown how sensitive data sharing with distant data integrity checks will be carried out. We recommend a
remote data integrity verification method that implements the sharing of sensitive data hidden in this study to
address this issue. This method uses a cleaner to make data block signatures valid for the file being processed while
cleaning data blocks that correspond to sensitive data in the file. In the integrity check phase, these signatures are
used to verify the correctness of the cleaned file. As a result, our method allows you to share and access a file
stored in the cloud while sensitive data is masked, while you can efficiently perform remote data integrity checks.
Keywords
Cloud storage, data integrity auditing, data sharing, concealment of sensitive information
Copyright
Copyright © Neuroquantology
Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Articles published in the Neuroquantology are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJECSE right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.