This paper is published in Volume-4, Issue-2, 2018
Area
Cloud Computing
Author
Kolachina. Amrutha, Dr. Prayala Shyry
Org/Univ
Sathyabama Institute of Science and Technology, Chennai, Tamil Nadu, India
Keywords
Cloud Computing, Hashing, Key Generation, Ring Signature, Encryption, MD5 Algorithm.
Citations
IEEE
Kolachina. Amrutha, Dr. Prayala Shyry . Public Integrity Auditing with Multi user Modifications, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
Kolachina. Amrutha, Dr. Prayala Shyry (2018). Public Integrity Auditing with Multi user Modifications. International Journal of Advance Research, Ideas and Innovations in Technology, 4(2) www.IJARIIT.com.
MLA
Kolachina. Amrutha, Dr. Prayala Shyry . "Public Integrity Auditing with Multi user Modifications." International Journal of Advance Research, Ideas and Innovations in Technology 4.2 (2018). www.IJARIIT.com.
Kolachina. Amrutha, Dr. Prayala Shyry . Public Integrity Auditing with Multi user Modifications, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
Kolachina. Amrutha, Dr. Prayala Shyry (2018). Public Integrity Auditing with Multi user Modifications. International Journal of Advance Research, Ideas and Innovations in Technology, 4(2) www.IJARIIT.com.
MLA
Kolachina. Amrutha, Dr. Prayala Shyry . "Public Integrity Auditing with Multi user Modifications." International Journal of Advance Research, Ideas and Innovations in Technology 4.2 (2018). www.IJARIIT.com.
Abstract
Cloud Computing has visualized as the next-generation architecture of IT Enterprise.A cloud storage system, consisting of a collection of storage servers, provides long time storage services over the internet.Storing data in third party’s cloud system causes serious concern over the data secrecy.In, this paper our main aim is, we allow the third party auditor on behalf of the cloud client, to verify the integrity of dynamic data that is stored in the cloud.The most general forms of data dynamic are modifications, insertion, and deletion.To, give them more efficient in handling the multi-users the ring signature is used by the privacy-preserving mechanism.When the data is stored in the cloud it has an only certain time limit to be present in cloud storage to overcome this time limit process we use hashing technique, this makes the data to be stored in a long period of time, by key generation process.And, also we use MD5algorithm for uploading the data and encrypted in hexadecimal form.