An Effective Technology for Secured Data Auditing for Cloud Computing using Fuzzy Biometric Method
Title | An Effective Technology for Secured Data Auditing for Cloud Computing using Fuzzy Biometric Method |
Publication Type | Conference Paper |
Year of Publication | 2021 |
Authors | Yarava, Rokesh Kumar, Sowjanya, Ponnuru, Gudipati, Sowmya, Charles Babu, G., Vara Prasad, Srisailapu D |
Conference Name | 2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC) |
Keywords | biometrics (access control), cloud computing, compositionality, control theory, data integrity, Hardware, passwords, Predictive Metrics, provable security, pubcrawl, resilience, Resiliency, security, Servers |
Abstract | The utilization of "cloud storage services (CSS)", empowering people to store their data in cloud and avoid from maintenance cost and local data storage. Various data integrity auditing (DIA) frameworks are carried out to ensure the quality of data stored in cloud. Mostly, if not all, of current plans, a client requires to utilize his private key (PK) to generate information authenticators for knowing the DIA. Subsequently, the client needs to have hardware token to store his PK and retain a secret phrase to actuate this PK. In this hardware token is misplaced or password is forgotten, the greater part of existing DIA plans would be not able to work. To overcome this challenge, this research work suggests another DIA without "private key storage (PKS)"plan. This research work utilizes biometric information as client's fuzzy private key (FPK) to evade utilizing hardware token. In the meantime, the plan might in any case viably complete the DIA. This research work uses a direct sketch with coding and mistake correction procedures to affirm client identity. Also, this research work plan another mark conspire that helps block less. Verifiability, yet in addition is viable with linear sketch Keywords- Data integrity auditing (DIA), Cloud Computing, Block less Verifiability, fuzzy biometric data, secure cloud storage (SCS), key exposure resilience (KER), Third Party Auditor (TPA), cloud audit server (CAS), cloud storage server (CSS), Provable Data Possession (PDP) |
DOI | 10.1109/I-SMAC52330.2021.9640845 |
Citation Key | yarava_effective_2021 |