ECC-Encrypted Secure Cloud Storage with Verifiable Data Sharing Ensures Privacy, Integrity, and Trusted Access Control

12 Dec

ECC-Encrypted Secure Cloud Storage with Verifiable Data Sharing Ensures Privacy, Integrity, and Trusted Access Control

Dhanalakshmi V, Keerthana K, Saranya T, Sri Dharshini M

Abstract- – Storage and IT services are expanding so quickly that more data centers and server rooms are necessary for quick processing in the allotted time. Web-based computing is the product of an enormous shift in the way digital services as well as information technologies ( IT ) are provided and acquired. At the moment, there has been a rise in the trend of outsourcing data to distant clouds, where users contract with cloud service providers ( CSPs ) who supply large storage capacities at affordable prices. As a result, users can lessen the strain and upkeep associated with local data storage. In the meantime, they lose control over their data once it is stored in the cloud, which unavoidably results in additional security threats to confidentiality and integrity. Therefore, successful and effective techniques are required to guarantee the confidentiality and integrity of rented data on trusted cloud servers. But in order to use cloud computing, businesses must have faith that a service provider’s platforms are safe and offer enough data confidentiality for their clients. In order to solve these problems, we offer a secure and effective protocol in this work. Elliptic Curve Cryptography and Sobol Sequence (random sampling) form the foundation of our approach. With our approach, a third-party auditor (TPA) can routinely confirm the accuracy of the data kept at CSP without having to access the original data. By sending a modest, consistent quantity of statistics, the challenge-response protocol saves network communication. Most significantly, our protocol is private; malevolent parties never get access to the data contents. While keeping the same extent of security, the recommended approach also takes dynamic data processing at the file level to account. Our scheme is more secure and effective when compared to current schemes.

DOI: /10.61463/ijset.vol.11.issue6.670