1 Affiliation : VIT Bhopal University, Bhopal, India
Email : email@example.com
2 Affiliation : Research Group in Artificial Intelligence and Information Technology, University of Guayaquil, Ecuador
Email : firstname.lastname@example.org
3 Affiliation : Department of Computer science and engineering,G.H. Raisoni Institute of Engineering and Business Management, Jalgaon, Maharashtra, India
Email : email@example.com
Computing in the cloud is one of the platforms that may be used to provide distributed computing resources. Supplying and managing cloud resources most effectively is referred to as resource management. A recent development in technology known as fog computing is an example of an expanded and dispersed infrastructure. This architecture maintains application processes between end devices and the network edge to provide more dependable and efficient services. These services include remote data storage, allowing customers to access their data from a distant location. Providing remote storage service is an advantageous function offered by cloud suppliers. On the other hand, the data stored in the cloud is geographically dispersed and kept in various data centers, significantly increasing the risk to users' privacy and security. One of the problems that might arise with privacy is when many data centers store the same information. Many cloud service providers check their customers' data using a Third-Party Auditor (TPA) to address concerns about client privacy and data integrity. Currently, most trusted TPAs only have one validator, making it impossible to expand the data integrity across several data centers. The various verifiers used by TPAs have been reduced in number in response to Man in the Cloud (MiTC) attacks. As a result, they cannot check and authenticate the integrity of data stored in several data centers. A unique Peer to Peer (P2P) authentication protocol with Certificate Authority (CA) and Data Storage Protocol is presented as a solution to the problem that has been outlined above to check for and go around any issues that may arise (DSP). The efficiency of the proposed protocol is demonstrated by the incorporation of TPAs and Certificate Authorities. The proposed protocol has been tested with a single user and a single storage server, as well as multiple storage servers in ownCloud with one backup server, two storage servers, three clients, and two TPAs. The NoSQL server in an organization's cloud is set up to save data to storage servers in the appropriate format. The Amanda backup server is used to back up the mirror copy of the stored data on the storage servers. Automated Validation of Internet Security Protocols with Data Fusion and Applications, or AVISPA for short, is a technology that may be used to verify data stored in the cloud. The findings make it abundantly evident that the suggested protocol is strong enough to guarantee the authenticity of data kept in several data centers.
Third Party Auditor (TPA); multiple data centers.; attacks; Certificate Authority and TPA; Peer to Peer; data fusion.
 Abhishek et al. (2012),” Cloud Data Security while using Third Party”, International
Journal of Scientific & Engineering Research, Vol. 3.
 Wang, S., Celebi, M. E., Zhang, Y. D., Yu, X., Lu, S., Yao, X., ... & Tyukin, I. (2021).
Advances in data preprocessing for biomedical data fusion: an overview of the
methods, challenges, and prospects. Information Fusion, 76, 376-421.
 Kashinath, S. A., Mostafa, S. A., Mustapha, A., Mahdin, H., Lim, D., Mahmoud, M. A.,
... & Yang, T. J. (2021). Review of data fusion methods for real-time and multi-sensor
traffic flow analysis. IEEE Access, 9, 51258-51276.
 Ali et al. (2016),” Security and Privacy of Sensitive Data in Cloud Computing: A
Survey of Recent Developments”, David C. Wyld et al. (Eds): NETCOM, NCS,
WiMoNe, CSEIT, pp. 131–150.
 Al-Saffar (2015),” Identity Based Approach for Cloud Data Integrity in Multi-Cloud
Environment”, International Journal of Advanced Research in Computer and
Communication Engineering Vol. 4, Issue 8, pp.505-509.
 Li, Q., Huang, Y., Zhang, J., & Min, S. (2021). A fast determination of insecticide
deltamethrin by spectral data fusion of UV–vis and NIR based on extreme learning
machine. Spectrochimica Acta Part A: Molecular and Biomolecular Spectroscopy, 247,
 Arasu, S. et al.((2013), “Privacy-Preserving Public Auditing In Cloud Using HMAC
Algorithm.”, International Journal of Recent Technology and Engineering,
 Ardagna et al (2015),” From security to assurance in the 143 cloud: A survey” ACM
Computational Survey, Vol 48-1, pp 1- 50.
 Arjuna et al. (2016),” Cloud Data Security with Modified RSA Algorithm”,
International Journal of Engineering Research & Technology, Vol.5 (5), pp.205-208.
 Arora et al. (2012),” Cloud Computing Security Issues in Infrastructure as a Service”,
International Journal of Advanced Research in Computer Science and Software
Engineering, Vol. 2, Issue 1, ISSN: 2277 128X.
 Bachhav et al.(2015),” Secure Multi-Cloud data sharing using Key Aggregate
Cryptosystem for scalable data sharing”, International Journal of Computer Science and
Information Technologies, Vol. 6 (5), pp.4479-4482.
 Bahrami M, Singhal M (2015),”The role of cloud computing architecture in big data”,
Information Granularity, Big Data, and Computational Intelligence, Cham, Switzerland:
Springer International Publishing, pp.275-295.
 Bhagat, Sahu (2013),” Cloud Data Security while using Third Party Auditor”,
International Journal of Computer Applications, Vol. 70– No.16, pp.9-14.
 Behl A (2012),” An analysis of cloud computing security issues”, World Congress on
Information and Communication Technologies (WICT).
 Deng, Y., Xiao, J., & Zhou, S. Z. (2021). ToF and stereo data fusion using dynamic
search range stereo matching. IEEE Transactions on Multimedia, 24, 2739-2751.
 C. Cachin, I. Keidar, and A. Shraer, “Trusting the cloud,” SIGACT News, vol. 40, no.
2, pp. 81–86, 2009.
 Charmee V. Desai (2014),” Survey on Data Integrity Checking Techniques in Cloud
Data Storage”, International 144 Journal of Advanced Research in Computer Science
and Software Engineering, Vol. 4,pp.292-295.
 Chatterjee et al., (2012),” Symmetric key Cryptography using two-way updated -
Generalized Vernam Cipher method: TTSJA algorithm”, International Journal of
computer applications, Vol.42, pp.39- 42.
 Chen (2012),”Data security and privacy protection issues in cloud computing”,
International Conference on computer science and Electronics Engineering.
 Chin-Ming Hsu (2003),” A group digital signature technique for authentication “,
Proceedings of IEEE 37th Annual 2003 International Conference.
 Chiroma et al (2017),” Bio-inspired computation: Recent development on the
modifications of the cuckoo search algorithm”, Applied Soft Computing, Vol. 61,
 Civicioglu ,Besdok (2011),” A conceptual comparison of the Cuckoo-search, particle
swarm optimization, differential evolution and artificial bee colony algorithms”, Journal
of Artificial Intelligence Review,Vol 39,pp 315–346.
 Cong Wang et al. (2013),” Privacy Preserving Public Auditing for Secure Cloud
Storage”, Computers, IEEE Transactions, Vol. 62(2), pp.362–375.
 Dinh HT, Lee C, Niyato D, Wang P (2013),” A survey of mobile cloud computing:
architecture, applications, and approaches”, Wireless Communication Mobile
Computing, Vol.13 (18) pp.1587-1611.
 Geeta, Varma, (2016)” Cuckoo Search Optimization and its Applications: A Review”,
International Journal of Advanced Research in Computer and Communication
EngineeringVol.5 (11), pp.556-562. 145.
 Gohil, G. B., Pathak, R.K. and Patel, A. A., (2013) "Security in Computing",
International Journal of Computer Science and Mobile Computing, Vol- 2, Issue-3,
pg.52 – 56.
 Goyal and sidhu (2014),” Third Party Auditor: An Integrity Checking Technique for
Client Data Security in Cloud Computing”, International Journal of Computer Science
and Information Technologies, Vol. 5(3), pp.4526-4530.
 Grundy J., Almorsy, M. and Ibrahim, A. S., (2011) "Collaboration-Based Cloud
Computing Security Management Framework", 4th International Conference on Cloud
Computing, IEEE, pp. 364- 371.
 Hao (2011),” A Privacy-Preserving Remote Data Integrity Checking Protocol with Data
Dynamics and Public Verifiability”, IEEE Transactions On Knowledge and Data
Engineering, Vol. 23 (9), pp. 1432 – 1437.
 Haw et al.(2019),” Implementation of RSA Algorithm to Secure Data in Cloud
Computing”, International Journal of Innovative Science, Engineering & Technology,
Vol. 6 (4),pp.61-68.