Enabling Identity-Based Integrity Auditing and Data Sharing with Sensitive Information Hiding for Secure Cloud Storage

  • Rushali Gupta, D.Vathana, Hritik Chahar

Abstract

Users can remotely get their data in the cloud with cloud storage services, and conduct data sharing with others.. The sensitive data shouldn't be revealed to anyone once the file is shared in cloud. Encoding the entire shared file will notice the sensitive data concealment; however can create this shared data which may not be employed by others. The way to apprehend information sharing in remote information integrity auditing with sensitive data shielding has not been mentioned thus far. To deal with this issue, we have a tendency of proposing a foreign information auditing accuracy theme that realizes information sharing with concealment delicate data during this document. A sanitizer is employed during this theme to purge the blocks such as the file's delicate information, and converts the impressions of those information blocks into authentic ones to modify the file. Such signatures are employed in the integrity audit method to ascertain the validity of the modify paper. As a result, our theme permits the file hold on within the cloud to be accessed and employed by others on the condition that the delicate data is secured, whereas the auditing of the isolated information accuracy will still be effectively distributed. Meantime the planned theme is predicated on identity-based enciphering that clarifies the difficult management of certificates. the security review and also the performance analysis indicate that the planned theme is safe and economical.

Keywords: Cloud computing , Storage ,Data, Hospital Management, Encryption, Remote Data, Sanitizer, identity based.

Published
2020-05-06
How to Cite
Rushali Gupta, D.Vathana, Hritik Chahar. (2020). Enabling Identity-Based Integrity Auditing and Data Sharing with Sensitive Information Hiding for Secure Cloud Storage. International Journal of Advanced Science and Technology, 29(06), 2697 - 2704. Retrieved from http://sersc.org/journals/index.php/IJAST/article/view/13732