Paper Title
A Secure Public Auditing of Cloud Data with Fragmentation and Replication
Abstract
Outsourcing data to a third-party administrative control, as is done in cloud computing, it gives rise to security
concerns. The data compromise may occur due to attacks by other users and nodes within the cloud. Therefore, high security
measures are required to protect data within the cloud. Cloud storage can make data users store and access their files any
time, from anywhere and with any device. To ensure the security of the outsourced data, data user needs to periodically
check data integrity. There are existing auditing schemes that are based on PKI. There is auditor to check integrity but for
that he needs to must validate the certificates of data user before auditing data integrity. Thus, It result in a large amount of
computation cost. Especially, it brings heavy burden to the auditor in the multi user setting. Overcome this problem, in this
paper, we propose an efficient ID based auditing protocol for cloud data integrity based on ID Based Cryptography. It
supports batch auditing in the multi-user setting. Finally, extensive security and simulation results show that our ID-based
auditing protocols are secure and efficient especially it reduces the computation cost of the auditor in the multi-user setting.
It improves security by creating of replica of each file block and store it on different nodes. If the attacker attacks on the
cloud, then he/she will not get any information of file as every block of files are spread on the nodes except adjacent nodes.
Thus purpose of this work is to develop an auditing scheme which possesses the capabilities such as privacy preserving,
public auditing, maintaining the data integrity along with confidentiality. And also it must support batch auditing and data
dynamics operations. Thus the new auditing scheme is been developed by considering all these requirements.
Keywords - Cloud Security, ID-based Auditing; Security Proof, The CDH Problem, Data Integrity Checking