Call for Paper - May 2019 Edition
IJCA solicits original research papers for the May 2019 Edition. Last date of manuscript submission is April 20, 2019. Read More

Preserving Privacy using Third Party Auditor in Cloud for Data Storage

IJCA Proceedings on National Conference on Advances in Computing
© 2015 by IJCA Journal
NCAC 2015 - Number 1
Year of Publication: 2015
Yogesh Shinde
Ramesh M. Kagalkar

Yogesh Shinde and Ramesh M Kagalkar. Article: Preserving Privacy using Third Party Auditor in Cloud for Data Storage. IJCA Proceedings on National Conference on Advances in Computing NCAC 2015(1):1-6, December 2015. Full text available. BibTeX

	author = {Yogesh Shinde and Ramesh M. Kagalkar},
	title = {Article: Preserving Privacy using Third Party Auditor in Cloud for Data Storage},
	journal = {IJCA Proceedings on National Conference on Advances in Computing},
	year = {2015},
	volume = {NCAC 2015},
	number = {1},
	pages = {1-6},
	month = {December},
	note = {Full text available}


Cloud computing is a internet based thing or next generation in information technology. Users store their large amount of data on a cloud server at the remote place without worrying about storage correctness and integrity of data. Security is viewed as one of the top positioned open issues in cloud computing. In most of the before proposed schemes, RSA algorithm was used for storage security. AES being faster in encryption and decryption as compared to RSA. The proposed system makes use of AES algorithm to maintain data integrity at the untrusted server. The client can alternative to a Third Party Auditor (TPA) to check the integrity of outsourced data and be worry free because user does not physical present at all time. The proposed storage security scheme also assures recovery of data files, in case of data loss or corruption. To recover of that block or file to maintain data availability in the cloud server. It supports data dynamics where the user can perform different operations on files such as insert, delete and update as well as batch auditing, where multiple cloud client requests for storage correctness will be handled simultaneously which decrease communication and also computing cost. To expand the user level safety, proposed procedure supplied a click on point based graphical password scheme and One Time Password (OTP) on the time of uploading the file.


  • Cong Wang ,Sherman S. M. Chow ,Qian Wang ,KuiRen and Wenjing Lou ,"Privacy- Preserving Public Auditing for Secure Cloud Storage",IEEE Transactions on Computers,Vol. 62, No. 2, Feb. 2013.
  • C. Wang, Q. Wang, K. Ren, and W. Lou, "Privacy Preserving Public Auditing for Storage Security in Cloud Computing", Proc. IEEE INFOCOM 10, Mar. 2010.
  • H. Takabi, J. B. D. Joshi, and G. Ahn, "Security and Privacy Challenges in Cloud Computing Environments",Article in IEEE Security and Privacy, Vol. 8, No. 6, Nov-Dec. 2010.
  • Y. Deswarte, J. -J. Quisquater, and A. Saidane ,"Remote integrity checking ", In Proc. Of Conference on Integrity and Internal Control in Information Systems (IICIS),Vol. 3 , Nov. 2003.
  • Betzy K. Thomas, M. NewlinRajkumar,"A Dynamic Public Auditing Security Scheme To Preserve Privacy In Cloud Storage",International Journal of Software and Hardware Research in Engineering,Vol. 2,Issue 1,Jan. 2014.
  • Giuseppe Ateniese, Roberto Di Pietro, Luigi V. Mancini, and Gene Tsudik. , "Scalable and Efficient Provable Data Possession",Proc. SecureComm 08, Sept. 2008. pp. 24-31.
  • YogeshShinde ,OmprakashTembhurne ,"A Review of Protect The Integrity of Outsourced Data using Third Party Auditing for Secure Cloud Storage ", International Journal of Science and Research (IJSR),ISSN(Online):2319-7064,Vol-3, Issue 10 , Oct. 2014.
  • YogeshShinde ,AlkaVishwa,"Privacy Preserving using Data Partitioning Technique for Secure Cloud Storage",International Journal of Computer Applications (0975 8887), Vol. 116 ,No. 16, Apr. 2015.
  • YogeshShinde , AlkaVishwa,"Public Auditing Security Scheme To Preserving Privacy For Secure Cloud Storage", Fourth Post Graduate Conference for Computer Engineering students (cPGCON) , Mar. 2015.
  • FarnazTowhidi, Maslin Masrom ,"A Survey on Recognition-Based Graphical User Authentication Algorithms ",International Journal of Computer Science and Information Security,Vol. 6, No. 2, Nov. 2009.
  • T. Schwarz and E. L. Miller, "Store, forget, and check: Using algebraic signatures to check remotely administered storage,In Proceedings of ICDCS . IEEE Computer Society, 2006.
  • G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, "Provable Data Possession at Untrusted Stores",Proc. 14th ACM Conf. Computer and Communication Security(CCS 07), PP. 598-609, 2007.
  • A. Juels and J. Burton, S. Kaliski, "PORs: Proofs of Retrievability for Large Files",Proc. ACM Conf. Computer and Comm. Security(CCS 07), pp. 584-597, Oct. 2007.
  • Cong Wang,QianWang,KuiRen, Ning Cao , and Wenjing Lou "Toward Secure and Dependable Storage Services in Cloud Computing",IEEE Transaction On Service Computing,Vol. 5,No. 2,Apr-Jun. 2012.
  • Huaqun Wang, "Proxy Provable Data Possession in Public Clouds ",IEEE Transactions On Services Computing, Vol. 6,ISSN: 1939-1374 , No. 4, Oct-Dec 2013.
  • Poonam M. Pardeshi, Prof. Bharat Tidke,"Improving Data Integrity for Data Storage Security in Cloud Computing",International Journal of Computer Science and Information Technologies, Vol. 5, May 2014.