DATA INTEGRITY USING ENCRYPTION IN CLOUD COMPUTING
*1 Regil V Raju, 2M.Vasanth, 3Udaykumar P
The department of CSE, BharathUniversity ,Chennai, Tmail Nadu, India
|Related article at Pubmed, Scholar Google|
Data integrity is an important phase in cloud computing. Since the previous couple of years the protocols that was evoked during this field has reached greater heights. Existing protocols with the assistance of a third-party auditor in an exceedingly previous work, Sebe´et al propose a data integrity verifying protocol that supports information dynamics. During this paper, we adapt Sebe´et al.‟s protocol to support information authentication. The outlined protocol supports information verification while not facilitate of a third-party auditor . In addition, the projected protocol doesn't leak any personal data to third-party verifiers. Through a correct diagnosing we are going to be measurement however sensible will the system works. After that, through thorough analysis, we will show that the protocol encompasses a sensible performance.