International Research Journal of Engineering and Technology (IRJET)
e-ISSN: 2395-0056
Volume: 09 Issue: 11 | Nov 2022
p-ISSN: 2395-0072
www.irjet.net
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION Dr. Mohammed Bakhar1, Arshiya Umara Hussain2 1 Professor,
Dept. of Electronics and Communication Engineering, Guru Nanak Dev Engineering College, Karnataka, India 2Student, Dept. of Electronics and Communication Engineering, Guru Nanak Dev Engineering College, Karnataka, India ----------------------------------------------------------------------***------------------------------------------------------------2. OBJECTIVE Abstract - An increasingly common use of cloud computing is cloud storage, which allows businesses and individuals to outsource their data whenever they need it. However, users may not have full confidence in cloud service providers (CSPs). This is because it is difficult to determine whether regulatory beliefs for data safety are being met. Consequently, it is important to progress effective authentication procedures that increase statistics holders' trust in cloud storage. This white paper introduces a new public audit program for secure cloud storage based on Dynamic Hash Tables (DHT). A new twodimensional data structure called DHT stores data quality information in the Third Parity Auditor (TPA). Dynamic log analysis, the proposed technique moves legitimate information from his CSP to the TPA, significantly reducing computational cost and communication overhead, in contrast to previous work. On the other hand, our approach can also achieve higher renewal efficiency than prior art schemes by exploiting the structural advantages of DHT. We extend the scheme to support data protection by combining a public-key-based homomorphic authenticator with a TPA-generated random mask and using the BLS sum-signing technique for batch verification. We formally state the security of the proposed system.
The suggested paper complies with the cloud server's data center's implementation requirements for security. In order to fulfill the notion of data security, the concepts of splitting and merging are included. When a hybrid method is used in a cloud server, the distant server becomes more secure, assisting cloud providers in carrying out their duties more securely. The basic difficulty of separating sensitive data and access control is met for data security and privacy protection issues. Original data is transformed into ciphertext using the cryptography process. Symmetric-key and public-key cryptography are the two types of this encryption method. Consequently, only someone with permission may access the cloud server's data. Data in ciphertext is available to everyone. However, to do so once more, the decryption method must be applied to convert it to the original text.
3. SYSTEM ANALYSIS EXISTING SYSTEM It is known to introduce authenticated fact forms to collect dynamic audits. Common proxies are skiplistbased PDPs and MHT-based public audit systems. However, at some point in the update and validation process, high TPA computational costs and significant overhead can occur. Therefore, Zhu et al. provided a simple fact form called the Index Hash Desk (IHT) to report the alignment of blocks of information and help generate a hash fee for each block in the verification process. The structure of the IHT is a kind of onedimensional array containing the index set, block type, model set, and random price.
Key Words: Cloud Storage, Data Security, Hybrid Cryptography, Encryption, Decryption, etc
1. INTRODUCTION An essential component of cloud computing, Cloud Garage aims to use highly virtualized infrastructure to provide consumers with potent, on-demand, fact-based goods. More and more businesses and people are outsourcing their statistical garages to expert cloud service providers due to the low cost and great performance of cloud garages, which reflect the recent rapid growth of cloud garages and their connected technologies (CSPs) tend to Cloud storage. However brand-new and cutting-edge, still has a lot of security issues to solve. How to verify whether cloud garage devices and their issuers match the statistical security requirements of thieves is one of the major worries.
© 2022, IRJET
|
Impact Factor value: 7.529
A predominantly IHT-based structure can likewise condense storage reduces transmission and computation costs a house of record for auditing IHT usage within the TPA rather than the CSP. Unfortunately, due to the IHT's serial format, update operations (especially inserts and deletes) on the IHT are inefficient. This is because if N is the full multiplicity of all blocks, there will be an average N/2 element adjustment. Furthermore, during the course of an insertion or removal approach, the block number (Bi) of some blocks may inevitably change, thus regenerating the corresponding block tag. This is clearly
|
ISO 9001:2008 Certified Journal
| Page 625