High Impact Factor : 4.396 icon | Submit Manuscript Online icon |

Checking the Security of Data by Continuous Auditing and Providing Certificates

Author(s):

DurgaDevi S , VELAMMAL INSTITUTE OF TECHNOLOGY; Hemalatha D. S, VELAMMAL INSTITUTE OF TECHNOLOGY; Neranjana M, VELAMMAL INSTITUTE OF TECHNOLOGY; Mr. Raja R, VELAMMAL INSTITUTE OF TECHNOLOGY

Keywords:

Auditing, Certification, Data Integrity, File Recovery, Security

Abstract

Cloud computing has become an associate integral part of the IT infrastructure for several corporations worldwide. Security is one of the issues which reduces the growth of cloud computing and complications with data privacy and data protection. Cloud security auditing depends upon the surroundings, and also the rise of cloud computing is a crucial new context in world economics. Cloud service certificate from the cloud security alliance must have for those having a hacking background. Public cloud account compromises new attack vectors, causing 27% of organizations to have users whose accounts are potentially compromised. To prevent the file from attack, there is a need for continuous auditing and providing certificates regarding the security of the file. A file is uploaded and distributed to the cloud storage. A file is split into blocks based on Dynamic block generation algorithm. The MD5 algorithm is used to generate a signature for the particular file. Also, data gets encoded using the Base64 algorithm. Continuous auditing is done by allocating the audit time. File recovery is done by the verifier if the data gets corrupted during checking. Finally, a certificate is generated and grade is provided based on the security of the file. We also focus on the challenges and benefits of auditing the file on a cloud platform. Further on we find the advancement in the related previous technology and the gaps.

Other Details

Paper ID: IJSRDV7I10401
Published in: Volume : 7, Issue : 1
Publication Date: 01/04/2019
Page(s): 478-482

Article Preview

Download Article