Visible to the public Design and Development of Collaborative Approach for Integrity Auditing and Data Recovery based on Fingerprint Identification for Secure Cloud Storage

TitleDesign and Development of Collaborative Approach for Integrity Auditing and Data Recovery based on Fingerprint Identification for Secure Cloud Storage
Publication TypeConference Paper
Year of Publication2021
AuthorsWani, Aachal, Sonekar, Shrikant, Lokhande, Trupti
Conference Name2021 2nd Global Conference for Advancement in Technology (GCAT)
Keywords3DES (Triple-data Encryption Standard), authentication, cloud computing, cloud storage service, compositionality, data integrity, Encryption, encryption audits, fingerprint identification, Fingerprint recognition, Integrity Auditing, MD5 (Message Digest), Predictive Metrics, pubcrawl, Resiliency, Safety, security, Three-dimensional displays
AbstractIn a Leading field of Information Technology moreover make information Security a unified piece of it. To manage security, Authentication assumes a significant part. Biometric is the physical unique identification as well as Authentication for third party. We are proposed the Security model for preventing many attacks so we are used Inner most layer as a 3DES (Triple Encryption standard) Cryptography algorithm that is providing 3-key protection as 64-bit And the outer most layer used the MD5 (Message Digest) Algorithm. i. e. Providing 128 - bit protection. As well as we are using Fingerprint Identification as a physical Security that used in third party remote integrity auditing, and remote data integrity auditing is proposed to ensure the uprightness of the information put away in the cloud. Data Storage of cloud services has expanded paces of acknowledgment because of their adaptability and the worry of the security and privacy levels. The large number of integrity and security issues that arise depends on the difference between the customer and the service provider in the sense of an external auditor. The remote data integrity auditing is at this point prepared to be viably executed. In the meantime, the proposed scheme is depends on identity-based cryptography, which works on the convoluted testament the executives. The safety investigation and the exhibition assessment show that the planned property is safe and productive.
DOI10.1109/GCAT52182.2021.9587754
Citation Keywani_design_2021