Enhancing Identity-Based Integrity Auditing and Data Exchange while Protecting Private Data for Safe Cloud Storage

  • Unique Paper ID: 183837
  • PageNo: 3303-3311
  • Abstract:
  • In fact, visitors can use cloud storage services to store their data remotely and share it with others. To ensure the integrity of the data saved in the cloud, remote data integrity auditing is suggested. The cloud file may contain sensitive data in some popular cloud storage systems, such the electronic health records system. When the cloud file is shared, the private data shouldn't be made public. Sensitive information can be hidden by encrypting the entire shared file, but doing so will prevent others from using it. To date, there has been no investigation on how to do data sharing while concealing sensitive information in remote data integrity audits. In this research, we offer a remote data integrity auditing approach that addresses this issue by enabling data sharing while concealing critical information. In this technique, the data blocks that contain the sensitive information of the file are sanitized using a sanitizer, which also changes the signatures of these data blocks to ones that are valid for the sanitized file. In the integrity auditing process, these signatures are used to confirm the sanitized file's integrity. Therefore, our plan allows the cloud-stored file to be shared and utilized by others as long as the sensitive information is concealed, allowing for the fast execution of remote data integrity audits.

Copyright & License

Copyright © 2026 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

BibTeX

@article{183837,
        author = {Prof. Tai S. Pawar and Prof. Trupti P. Chavan and Prof. Nikita T. Sabale},
        title = {Enhancing Identity-Based Integrity Auditing and Data Exchange while Protecting Private Data for Safe Cloud Storage},
        journal = {International Journal of Innovative Research in Technology},
        year = {2025},
        volume = {12},
        number = {3},
        pages = {3303-3311},
        issn = {2349-6002},
        url = {https://ijirt.org/article?manuscript=183837},
        abstract = {In fact, visitors can use cloud storage services to store their data remotely and share it with others. To ensure the integrity of the data saved in the cloud, remote data integrity auditing is suggested. The cloud file may contain sensitive data in some popular cloud storage systems, such the electronic health records system. When the cloud file is shared, the private data shouldn't be made public. Sensitive information can be hidden by encrypting the entire shared file, but doing so will prevent others from using it. To date, there has been no investigation on how to do data sharing while concealing sensitive information in remote data integrity audits. In this research, we offer a remote data integrity auditing approach that addresses this issue by enabling data sharing while concealing critical information. In this technique, the data blocks that contain the sensitive information of the file are sanitized using a sanitizer, which also changes the signatures of these data blocks to ones that are valid for the sanitized file. In the integrity auditing process, these signatures are used to confirm the sanitized file's integrity. Therefore, our plan allows the cloud-stored file to be shared and utilized by others as long as the sensitive information is concealed, allowing for the fast execution of remote data integrity audits.},
        keywords = {data integrity auditing, Cloud storage, data sharing, sensitive information hiding.},
        month = {August},
        }

Cite This Article

Pawar, P. T. S., & Chavan, P. T. P., & Sabale, P. N. T. (2025). Enhancing Identity-Based Integrity Auditing and Data Exchange while Protecting Private Data for Safe Cloud Storage. International Journal of Innovative Research in Technology (IJIRT), 12(3), 3303–3311.

Related Articles