دورية أكاديمية

Third Party Audit Integrated Cloud MicroServices Approach for Security and Integrity for Assorted Real Time Applications.

التفاصيل البيبلوغرافية
العنوان: Third Party Audit Integrated Cloud MicroServices Approach for Security and Integrity for Assorted Real Time Applications.
المؤلفون: Krishna, Kalluri Rama, Rao, C. V. Guru
المصدر: Turkish Online Journal of Qualitative Inquiry; 2021, Vol. 12 Issue 7, p11426-11434, 9p
مصطلحات موضوعية: DATA integrity, DATA packeting, DIGITAL signatures, DATABASES, AUDITING, DATA transmission systems
مستخلص: Data in the form of files, documents, emails, pictures, videos, etc. is moved from point A to point B. It is also retained for potential retrieval and delivery via a network (typically the Internet). The user is worried about the security of their data since the data may be attacked and corrupted by someone on the outside. Data integrity is important in the business world, therefore a new idea called data auditing has been created which will have a third party auditor that is capable of ensuring the integrity of the data (TPA). This research effort aims to design a robust auditing system that is able to efficiently implement protection for privacy, make public audits possible, maintain data integrity, and protect the confidentiality of the records. To accommodate the various needs, the auditing system was developed. The three elements are the data owner, the TPA, and the cloud server. The data owner uses an assortment of tools including dividing their file into smaller chunks, encrypting the pieces, creating hash values, reassembling the pieces, and creating a digital signature. The TPA is the one that carries out the primary task of data integrity check. It can do tasks like taking hash values from the blocks in encrypted messages sent from the cloud server, joining them, and signing the string of information. On addition, it does a comparison between the signatures to find out whether the data is changed in the cloud. Data integrity is confirmed on demand by the consumers. The encrypted data blocks are the sole thing the cloud server is utilised for. The network is constantly encountering attacks, and many methods have been created to ensure safe and consistent transmission of data packets. A better and dependable architecture is needed to transfer information across a network effectively. A breach or interception is a kind of attack that intentionally tries to do damage to a system and attempts to make it inoperable or to obtain unauthorised information. To get a full picture of what's happening on their networks, professionals may wish to have Intercept Detection Systems collect information about both successful and failed efforts. The development of intercept detection systems must be done with extreme caution, since there is a very real risk of natural and deliberate interference. This research examines the role of third party forensic database upkeep and analysis. To further investigate all the surveillance efforts with the third party audit scheme in cloud environment, it is essential to save all of the data collected in order to immediately discover how it was found. The study explores new techniques to analyse data stored in third party audit integrated forensic databases in order to help identify the many methods used to monitor citizens and to increase the efficiency of current systems. [ABSTRACT FROM AUTHOR]
Copyright of Turkish Online Journal of Qualitative Inquiry is the property of Turkish Online Journal of Qualitative Inquiry and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
قاعدة البيانات: Complementary Index