@article{3059, author = {Ghassan Sabeeh Mahmood, Dong Jun Huang, Baidaa Abdulrahman Jaleel}, title = {Secure and Efficient Third-party Auditing Scheme for Cloud Storage}, journal = {Journal of Information Security Research}, year = {2020}, volume = {11}, number = {3}, doi = {https://doi.org/10.6025/jisr/2020/11/3/67-74}, url = {http://www.dline.info/jisr/fulltext/v11n3/jisrv11n3_1.pdf}, abstract = {In the cloud environment, pay-per-use is used to provide services for the end-users. With all the benefits available, a threat is present in the security of sensitive data. Users of the cloud cannot rely on cloud service providers for the security of data. In this work we present a model of cloud system that supports privacy-preserving and public auditing. The design introduced now has three components such as data owner, cloud server, and third-party auditor (TPA). In this proposed model the data owner first encrypts the data using the Advanced Encryption Standard (AES) algorithm and applies a Steganography technique by combining Discrete Wavelet Transform (DWT) and Singular Value Decomposition (SVD) in order to hide the encrypted data and subsequently save them on a cloud server. In the next phase, the SHA-2 value is developed for the hidden file and creates a signature on it. The Third Party Auditor then next authorize the data onto the cloud instead of data owners by generating the value of the SHA-2 and create a signature on it, eventually, compares both signatures to verify the data integrity. We thus intend to produce an efficient and secure system that is capable of privacy preserving public auditing maintaining the data confidentiality and integrity. In the experimentation process, it is found that the security and performance have recorded a good level of security and found to me more efficient.}, }