Third Party Audit Integrated Cloud MicroServices Approach for Security and Integrity for Assorted Real Time Applications

Main Article Content

Kalluri Rama Krishna, Dr. C.V.Guru Rao

Abstract

Data in the form of files, documents, emails, pictures, videos, etc. is moved from point A to point B. It is also retained for potential retrieval and delivery via a network (typically the Internet). The user is worried about the security of their data since the data may be attacked and corrupted by someone on the outside. Data integrity is important in the business world, therefore a new idea called data auditing has been created which will have a third party auditor that is capable of ensuring the integrity of the data (TPA). This research effort aims to design a robust auditing system that is able to efficiently implement protection for privacy, make public audits possible, maintain data integrity, and protect the confidentiality of the records. To accommodate the various needs, the auditing system was developed. The three elements are the data owner, the TPA, and the cloud server. The data owner uses an assortment of tools including dividing their file into smaller chunks, encrypting the pieces, creating hash values, reassembling the pieces, and creating a digital signature. The TPA is the one that carries out the primary task of data integrity check. It can do tasks like taking hash values from the blocks in encrypted messages sent from the cloud server, joining them, and signing the string of information. On addition, it does a comparison between the signatures to find out whether the data is changed in the cloud. Data integrity is confirmed on demand by the consumers. The encrypted data blocks are the sole thing the cloud server is utilised for. The network is constantly encountering attacks, and many methods have been created to ensure safe and consistent transmission of data packets. A better and dependable architecture is needed to transfer information across a network effectively. A breach or interception is a kind of attack that intentionally tries to do damage to a system and attempts to make it inoperable or to obtain unauthorised information. To get a full picture of what's happening on their networks, professionals may wish to have Intercept Detection Systems collect information about both successful and failed efforts. The development of intercept detection systems must be done with extreme caution, since there is a very real risk of natural and deliberate interference. This research examines the role of third party forensic database upkeep and analysis. To further investigate all the surveillance efforts with the third party audit scheme in cloud environment, it is essential to save all of the data collected in order to immediately discover how it was found. The study explores new techniques to analyse data stored in third party audit integrated forensic databases in order to help identify the many methods used to monitor citizens and to increase the efficiency of current systems.


 

Article Details

Section
Articles