Cloud Data Security and Integrity using Sack of Cryptographic Algorithms through Trusted Third Party (TTP)

Pritam L Mahamane, Prof. Sonali A Patil


In today’s technological world, virtual resources and services are more demanded over the network and internet. For this cloud computing is the best solution in all terms like scalability, cost, flexibility, and efficiency. But the major factor affecting on cloud services is the poor security. Therefore in this paper, we propose sack of algorithms which are combine methods of symmetric and asymmetric cryptographic algorithms encrypted for security and secure hash algorithm for data integrity.This ensures more data confidentiality with secure encryption of secret key using digital certificate through trusted third party(TTP).Trusted third party acts as substitute of cloud service user (CSU),by holding secret key and communicating with cloud service provider(CSP) , to reduce overhead of maintainability of data.We proposed the method for data integrity, which will enhance checking of data correctness with zero overhead to user

Full Text:



Syed Rizvi, Katie Cover, Christopher Gates, A Trusted Third Party (TTP)

based Encryption Scheme for Ensuring Data Confidentiality in Cloud

Environment, ScienceDirect ELSEVIER, journal Procedia Computer Science

, 2014, 381-386.

. S. Arul Oli, L. Arockiam ,A Novel Approach for Ensuring Data Con-

fidentiality in Public Cloud Storage, International Journal of Computer

Applications (0975 8887).Advanced Computing and Communication

Techniques for High Performance Applications (ICACCTHPA-2014),

, 1-5.

Muralikrishnan Ramane, Bharath Elangovan,A Metadata Verification

Scheme ForData Auditing In Cloud Environment, International Journal

on Cloud Computing: Services and Architecture(IJCCSA),Vol.2, No.4,

August 2012, 1-10.

Priyadarshini Patil, Prashant Narayankar, Narayan D G, Meena S M,A

Comprehensive Evaluation of Cryptographic Algorithms: DES,3DES,

AES, RSA and Blowfish., ScienceDirect ELSEVIER, journal Procedia

Computer Science 78, 2016, 617-624.

Qian Wang, Cong Wang, Kui Ren, Wenjing Lou, and Jin Li,Enabling

Public Auditability and Data Dynamics for Storage Security in Cloud

Computing, IEEE Transactions on parallel and Distributed System,vol.22,

no.5, May2011, 847-859.

Dilli Ravilla, Chandra Shekar Reddy Putta, Enhancing the Security of

MANETs Using Hash Algorithms, ScienceDirect ELSEVIER, journal

Procedia Computer Science 54, 2015, 196-206.

Triveni A. Bhalerao, Prof. N. P. Kulkarni, Survey on Secure Cloud Data

Sharing Using Trusted Third Party, International Journal of Innovative

Research in Computer and Communication Engineering (An ISO 3297:

Certified Organization) Vol. 4, Issue 10, October 2016, 1-4.

Mr. Manish M Potey, Dr C A Dhote, Mr Deepak H Sharma, Homomorphic

Encryption for Security of Cloud Data, ScienceDirect ELSEVIER,

journal Procedia Computer Science 79, 2016, 175 181.

Naresh vurukonda, B.Thirumala Rao, A Study on Data Storage Security

Issues in Cloud Computing, ScienceDirect ELSEVIER, journal Procedia

Computer Science 92, 2016, 128 135.

Akashdeep Bhardwaj, GVB Subrahmanyam, Vinay Avasthi, Hanumat

Sastry, Security Algorithms for Cloud Computing, ScienceDirect ELSEVIER,

journal Procedia Computer Science 85, 2016, 535 542.

K.Devika, M.Jawahar, Review On: Cryptographic Algorithms for Data

Integrity Proofs in Cloud Storage, International Journal of Engineering

Trends and Applications (IJETA) Volume 2 Issue 1, Jan-Feb 2015, 14-19.

Niels Ferguson, Richard Schroeppel, and Doug Whiting, A simple

algebraic representation of Rijndael, Proceeding of Selected Areas in

Cryptography, 2001, Lecture notes in computer science, Springer-Verlag,

, 103-111.


Copyright © IJETT, International Journal on Emerging Trends in Technology