Cloud Storage Data Security and Integrity Protection Using Localized and Customized Key Manipulator (LCKM) Algorithm
Main Article Content
Abstract
In leveraging cloud storage services for efficient data storage while addressing data integrity concerns. Traditional data integrity auditing schemes necessitate private key usage, relying on hardware tokens and password memorization, which can be problematic if lost or forgotten. In prevailing methods data integrity checking without private key storage and key generation through third-party key distributors used, biometric data like iris scans and fingerprints, linear sketching and signatures are used to verify user data. These methods do not serve the purpose as biometrics has default drawbacks and third-party key generators can also not be trusted. To overcome these challenges, a pioneering approach called the proposed Localized key generator and storage is implemented in our proposed system. This LCKM algorithm generates customized keys for each file in a localized key generator and cloud details. Localized Key Manipulator will be provided to each user which is a password protector and the key customization will done according to the confidentiality, priority, and importance of the file. Customization of keys will be done with various combinations of digits, alphabets, symbols, and different sizes along with details of cloud storage chosen by the user. This localized key manipulator is mobile and carried as a protected file anywhere but only authenticated users can access it. Security and localized data integrity confirm the method’s effectiveness, ensuring robust security and operational efficiency.