Mr.R.Sathyaraj, Dr.V.K.Manavala Sundaram M.E., Ph.D.,
Cloud computing enables highly scalable services consumed over the Internet. Cloud services are provided on user request basis. In cloud environment users’ data are usually processed remotely in unknown machines that users do not own or operate. User data control is reduced on data sharing under remote machines. Entities are allowed to join and leave the cloud in a flexible manner. Public and private auditing schemes are used to monitor the user data access activities. Data access management can be done through the cloud service providers (CSP). Cloud services are provided by Amazon, Google, Microsoft, Yahoo and Salesforce. Remote data storages are used to share data and services in the cloud environment. Data provider uploads the shared data into the data centers. Public auditing methods are used to verify the data integrity in remote data storages. Third-party auditor (TPA) is used to check the integrity of outsourced data. Privacy preserving public auditing mechanism is used to verify the data integrity with privacy. TPA supports auditing for multiple users simultaneously. Batch auditing mechanism is used for multi user environment. Homomorphic linear authenticator and random masking techniques are used to protect the data from TPA. The privacy preserving public auditing scheme is enhanced to perform data verification for multi user environment. Batch verification scheme is adapted to multi user data sharing environment. Data dynamism is integrated with public data auditability scheme. The system is improved to support public auditing based data sharing under commercial cloud environment.