Volume 20 No 10 (2022)
 Download PDF
EMPOWER IDENTITY-BASED INTEGRITY AUDITING AND INFORMATION DISTRIBUTION WITH CONFIDENTIAL DATA DEFEAT FOR SAFETY CLOUD STORAGE
Dr.G.R.Anil, Dr.D.Nagaraju, Dr.Kande Srinivas, Mrs.R.Bhavani , Sai Charan Kalikota,Dr.R.SenthamilSelvan
Abstract
Users can use cloud storage services to remotely store their data and enable data sharing with others. Remote data integrity verification is advised in order to guarantee the accuracy of data saved in the cloud. Some prominent cloud storage platforms, like the electronic medical record system, may have files with sensitive data on them. Confidential information shouldn't be made available to others while sharing a cloud file. The entire shared file can be encrypted to protect sensitive information, but doing so prohibits others from accessing it. It is still unknown how sensitive data sharing with distant data integrity checks will be carried out. We recommend a remote data integrity verification method that implements the sharing of sensitive data hidden in this study to address this issue. This method uses a cleaner to make data block signatures valid for the file being processed while cleaning data blocks that correspond to sensitive data in the file. In the integrity check phase, these signatures are used to verify the correctness of the cleaned file. As a result, our method allows you to share and access a file stored in the cloud while sensitive data is masked, while you can efficiently perform remote data integrity checks.
Keywords
Cloud storage, data integrity auditing, data sharing, concealment of sensitive information
Copyright
Copyright © Neuroquantology

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.

Articles published in the Neuroquantology are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJECSE right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.