Call for Paper - March 2023 Edition
IJCA solicits original research papers for the March 2023 Edition. Last date of manuscript submission is February 20, 2023. Read More

Secure Audit Service by using TPA

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2016
Pradnya P. Kulkarni

Pradnya P Kulkarni. Article: Secure Audit Service by using TPA. International Journal of Computer Applications 139(4):7-10, April 2016. Published by Foundation of Computer Science (FCS), NY, USA. BibTeX

	author = {Pradnya P. Kulkarni},
	title = {Article: Secure Audit Service by using TPA},
	journal = {International Journal of Computer Applications},
	year = {2016},
	volume = {139},
	number = {4},
	pages = {7-10},
	month = {April},
	note = {Published by Foundation of Computer Science (FCS), NY, USA}


Using Cloud Storage, users can remotely store their data and enjoy high quality applications and services from a shared pool of resources. However, users, when they don’t have the physical possession of the data, chances of raising data integrity issue are possible. Thus, verification of data integrity is the at most important for a user, who has outsourced data to the cloud. To make the integrity check, a public auditing must be made possible. For it, resort to a Third Party Auditor (TPA). Also, the auditing process should not bring in further more burdens to the user, a secure cloud storage for which integrate the technique of Homomorphic linear authenticator with random masking. Thereby, assure integrity of the user’s outsourced data in the cloud.


  1. C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-Preserving Public Auditing for Storage Security in Cloud Computing,” Proc. IEEE INFOCOM ’10, Mar. 2010.
  2. P. Mell and T. Grance, “Draft NIST Working Definition of Cloud Computing,”, June 2009.
  3. M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, A. Konwinski, G. Lee, D.A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “Above the Clouds: A Berkeley View of Cloud Computing,” Technical Report UCB-EECS-2009-28, Univ. of California, Berkeley, Feb. 2009.
  4. Cloud Security Alliance, “Top threats to Cloud Computing [29].
  5. M. Arrington, “Gmail Disaster: Reports of Mass Email Deletions,”, 2006.
  6. J. Kincaid, “MediaMax/TheLinkup Closes Its Doors,” http://, July 2008.
  7. C. Wang, Q. Wang, K. Ren, and W. Lou, “Towards Secure and Dependable Storage Services in Cloud Computing,” IEEE Trans. Service Computing, vol. 5, no. 2, 220-232, Apr.-June 2012.
  8. F. Sebe, J. Domingo-Ferrer, A. Martı ´nez-Balleste, Y. Deswarte, and J.-J. Quisquater, “Efficient Remote Data Possession Checking in Critical Information Infrastructures,” IEEE Trans. Knowledge and Data Eng., vol. 20, no. 8, pp. 1034-1038, Aug. 2008.
  9. A. Juels and J. Burton, S. Kaliski, PORs: Proofs of Retrievability for Large Files,” Proc. ACM Conf. Computer and Comm. Security (CCS’07), pp. 584-597, Oct. 2007.008.
  10. M.A. Shah, R. Swaminathan, and M. Baker, ”Privacy-Preserving Audit and Extraction of Digital Contents,” Cryptology ePrint Archive, Report 2008/186, 2
  11. H. Shacham and B. Waters,”Compact Proofs of Retrievability,” Proc. Int’l Conf. Theory and Application of Cryptology and Information Security: Advances), in Cryptology (Asiacrypt vol. 5350, pp. 90-107, Dec. 2008.
  12. M.A. Shah, M. Baker, J.C. Mogul, and R. Swaminathan,”Auditing to Keep Online Storage Services Honest,” Proc. 11th USENIX Workshop Hot Topics in Operating Systems (HotOS ’07), pp. 1-6, and 2007.
  13. Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, ”Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing,” IEEE Trans. Parallel and Distributed Systems, vol. 22,no. 5, pp. 847-859, May 2011.


Data integrity, Third Party Auditing, Public Auditing, Data storage, Cloud computing, Batch verification, Zero knowledge.