Cloud Storage Protection Using Responsive Hiding of Crucial Data and Facilitating Identity-Based Integrity Auditing

Victor Chang , Ashwini Ginnarapu, Lewis Golightly, Qianwen Xu

Research output: Contribution to journalArticlepeer-review


The effectiveness of auditing the integrity of data shared is becoming difficult due to the requirement of maintaining data privacy and the corresponding anonymity user identity. Remote information trustworthiness reviewing is planned in ensuring the correctness of the information put away over the cloud storage. Over a few common distributed frameworks, such as the Electronic Personal Health Records (EPHRs)framework, the document in the cloud may contain sensitive data. When a document in the cloud distribution happens, that contains sensitive data that ought not to be presented to other data users. Scrambling the entire distributed record helps to understand delicate data covering up yet will make this standard document incapable of being utilized by others. The most effective method to acknowledge information imparting to sensitive data covering up in remote information uprightness examining still not yet investigated to date. To address this issue, we propose remote information trustworthiness reviewing a plan that acknowledges information offering to delicate data stowing away in this literature. Towards this plan, a data-sanitizer is utilized to sterilize client information squares comparing the touchy data from the record and changes that information squares' marks towards legitimate segments of this sanitized document. Thus, integrity auditing could be achieved using pin-signatures for authenticating sanitized files, which facilitates data owners' files to be shared even that contain sensitive data by encrypting crucial data with a clause to safeguard other data users of the cloud in-turn effectively facilitating integrity audit-check efficiently. The major factor to consider in this proposed scheme is maintaining the individuality of the user among all remote distributed users in the cloud and maintaining the signatures systematic approach. The proposed mechanism lets us build a privacy preserved approach effectively and efficiently. Keywords: Cloud storage; System design for storage; performance evaluation for storage; Electronic Personal Health Records (EPHRs).
Original languageEnglish
JournalInternational Journal of Business Information Systems
Issue number1
Publication statusPublished - 1 Jan 2020


Dive into the research topics of 'Cloud Storage Protection Using Responsive Hiding of Crucial Data and Facilitating Identity-Based Integrity Auditing'. Together they form a unique fingerprint.

Cite this