📞 +91-7667918914 | ✉️ ijarcce@gmail.com
IJARCCE Logo
International Journal of Advanced Research in Computer and Communication Engineering A monthly Peer-reviewed & Refereed journal
ISSN Online 2278-1021ISSN Print 2319-5940Since 2012
IJARCCE adheres to the suggestive parameters outlined by the University Grants Commission (UGC) for peer-reviewed journals, upholding high standards of research quality, ethical publishing, and academic excellence.
← Back to VOLUME 6, ISSUE 8, AUGUST 2017

Security Enhancement through Third Party Auditing for Data Storage in Cloud Computing using RC5 Algorithm

T. Kalaiselvi, Dr. S. Ravichandran Ph.D.,

DOI: 10.17148/IJARCCE.2017.6805

Abstract: Cloud computing is an internet based computing which enables sharing of services. Cloud computing allows users to use applications without installation any application and access their personal files and application at any computer with internet or intranet access. Many users place their data in the cloud, so correctness of data and security is a prime concern. Cloud Computing is technology for next generation Information and Software enabled work that is capable of changing the software working environment. It is interconnecting the large-scale computing resources to effectively integrate, and to computing resources as a service to users. To ensure the correctness of data, we consider the task of allowing a third party auditor (TPA), on behalf of the cloud client, to verify the integrity of the data stored in the cloud., the auditing process should bring in no new vulnerabilities towards user data privacy, and introduce no additional online burden to user. In this paper, we propose a secure cloud storage system supporting privacy-preserving public auditing. We further extend our result to enable the TPA to perform audits for multiple users simultaneously and efficiently with RC5 Encryption Algorithm. This shows the proposed scheme is highly efficient and data modification attack, and even server colluding attacks. Here Work is focuses on RC5 Encryption Algorithm for stored data in cloud. Resulted encrypted method is secure and easy to use.



Keywords: Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacy-preserving, public auditability.

How to Cite:

[1] T. Kalaiselvi, Dr. S. Ravichandran Ph.D.,, “Security Enhancement through Third Party Auditing for Data Storage in Cloud Computing using RC5 Algorithm,” International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE), DOI: 10.17148/IJARCCE.2017.6805