Data Accuracy and Integrity for Cloud Storage using Block Chain
R.Karthik Ganesh
Department of Computer Science and Engineering
SCAD College of Engineering and Technology
TamilNadu, India
A.Afreedha
Department of Computer Science and Engineering
SCAD College of Engineering and Technology
TamilNadu, India
Abstract— Cloud computing is the delivery of information technology services over the web. Cloud security involves the procedures and technology that secure cloud computing environments against external and insider security threats. Cloud safety and security management best practices to forestall unauthorized access are required to keep data and applications within the cloud secure from current and emerging security threats. The original data in the proof are masked by random integer addition, which protects the verifier from obtaining any knowledge about the data during the integrity checking process. While transferring some crucial data, intruders can attack the data or file. To overcome this in the proposed system, files with important messages are split into parts and uploaded. Using the key generation technique, we compare the key values from the original keys to determine the changes within the file. The content will be stored and encrypted within the cloud server. Here we are using a blockchain double hashing algorithm for splitting the original file into three different files and storing that files in three different locations in the cloud. If anyone attempt to hack at the cloud end is not possible to interrupt, because of the various blocks. Therefore, the safety of our scheme is robust. The Encryption and Decryption Techniques are done by using Cryptographic hashing techniques. Anyone can download the files from the server with the file owner's permission. A key is generated at the time of download, and it will be sent to the file owner. We can download that file by using the verification key. Sometimes the hackers can hack the file and take a look to download it. However, once they attempt to download the file, without the verification key one can’t open the file.
Keywords—random integer addition, blockchain, encryption, decryption