• Deepali Ujalambkar*, Geetanjali Sharma, Punam Sawale, Sairabanu Pansare & Aman Kamble


Third party Auditor (TPA), Cloud storage Server (CSS), Cloud service provider (CSP), Proof of Retrievability (PoR), Provable data Possession (PDP), Markel Hash Tree (MHT).


In cryptography, secrecy, honesty, and auditability have long been stressed, and providing security is the foundation of all cutting-edge cryptographic research. There may be certain challenges in the emerging era of distributed computing when clients store information on integrated cloud servers. This research focuses specifically on the reliability of data stored on cloud servers. One of the services provided by cloud computing is distributed storage, which enables remote management of information and client access across an enterprise (regularly the Internet). The client is concerned about the security of information stored in the cloud since it could be stolen or altered by an outside attacker. Considering this, a different concept known as information examining is put out, which uses a component known as a Third-Party Auditor (TPA) to verify the accuracy of information. The goal of this work is to develop an evaluation strategy that is safe, effective to use, and has capabilities like protection saving, public inspecting, maintaining information uprightness alongside classification. Information owner, TPA, and cloud server are the three components that make up this system. The owner of the information undertakes several activities such as dividing the record into blocks, encrypting them, creating a hash as a reward for each, connecting it, and leaving a mark on it. The TPA performs the essential function of information trustworthiness verification. It carries out tasks including generating a hash as a reward for encoded blocks obtained from a cloud server, connecting them, and creating a signature on it. To save the data-scrambled squares, only the cloud server is used. Utilizing a TPA that is authorized to periodically verify the accuracy of information rather than a customer, the information uprightness is confirmed. Block level verification is developed further using Markel Hash Tree. Bilinear total mark is used to manage reviewing assignments continuously. The evaluation of a multi-client TPA framework is discussed.



How to Cite

Deepali Ujalambkar*, Geetanjali Sharma, Punam Sawale, Sairabanu Pansare & Aman Kamble. (2022). CLOUD DATA: ENCRYPTION AND AUDITING BY A THIRD PARTY . Harbin Gongye Daxue Xuebao/Journal of Harbin Institute of Technology, 54(11), 1–10. Retrieved from