Survey on Secrecy-Protective Communal Accounting for Restoring-Key-Based Cloud Storage

Size: px
Start display at page:

Download "Survey on Secrecy-Protective Communal Accounting for Restoring-Key-Based Cloud Storage"

Transcription

1 Survey on Secrecy-Protective Communal Accounting for Restoring-Key-Based Cloud Storage Ankita A. Lande 1, Dr.P.K.Deshmukh 2 1[Department Of Computer Engineering, JSPM s RSCOE, Pune ] 2[Department Of Computer Engineering, JSPM s RSCOE, Pune ] Abstract: Securing outsourced knowledge in cloud storage from corruption, adding fault tolerance to cloud storage along with knowledge integrity checking reparation becomes crucial. Antecedently make codes have quality because of their lower information measure providing fault tolerance. Recently remote checking ways for make coded knowledge solely offer non-public auditing requiring knowledge owner continuously keep online and handle auditing and repairing, that is impractical. Here author propose a public auditing for the make code based mostly cloud storage. It s to resolve the regeneration downside of unsuccessful authenticators within the absence of knowledge homeowners, author introduce a proxy that's privileged to regenerate the authenticators into the standard public auditing system model. Additionally style novel public verifiable authenticators that is generated by a handful of keys and may be regenerated exploitation partial keys. Thus our technique will fully unharnessed knowledge homeowners from on-line burden. Additionally, we disarrange the code coefficients with a pseudorandom perform to preserve knowledge privacy. Keywords: Cloud storage, regenerating codes, public audit, privacy preserving, authenticator regeneration, proxy, privileged, provable secure. I. Introduction Verifying the credibility of information has emerged as a essential issue in storing knowledge on untreated servers. It arises in peer- to-peer storage systems, network file systems, long-run archives, web-service object stores, and information systems. Such systems forestall storage servers from misrepresenting or modifying knowledge by providing authenticity checks once accessing knowledge. However, depository storage needs guarantees regarding the authenticity of knowledge on storage, specifically that storage servers possess information. It s low to observe that information are modified or deleted once accessing the information, as a result of it's going to be too late to recover lost or broken information. Depository storage servers retain tremendous amounts of knowledge, very little of that is accessed. They conjointly hold information for long periods of your time during that there could also be exposure to information loss from ad- ministration errors because the physical implementation of storage evolves, e.g., backup and restore, information migration to new systems, and dynamical memberships in peer-to-peer systems. Previous solutions don't meet these needs for proving knowledge possession. Some schemes give a weaker guarantee by implementing storage complexity: The server should store associate degree quantity of knowledge a minimum of as giant as the client s knowledge, however not essentially constant precise knowledge. Moreover, all previous techniques need the server to access the whole file, that isn't possible once addressing large amounts of knowledge. In this paper, a tendency to specialize in the integrity verification drawback in regenerating-code-based cloud storage, particularly with the purposeful repair strategy. Similar studies are performed by Bo Chen et al. and H. Chen el al. [7] separately and severally. Extended the single-server CPOR scheme (private version in [11]) to the regenerating code- scenario; designed and enforced a knowledge integrity protection (DIP) theme for FMSR-based cloud storage [8] and the theme is customized to the thin-cloud setting1. However, both of them square measure designed for personal audit, solely the information owner is allowed to verify the integrity and repair the faulty servers. Considering the massive size of the outsourced information and the users forced resource capability, the tasks of auditing and reparation within the cloud will be formidable and pricy for the users [12]. The overhead of mistreatment cloud storage ought to be decreased the maximum amount as attainable specified a user doesn't need to perform too several operations to their outsourced information [13] (in extra to retrieving it). Specifically, users might not want to travel through the complexness in valedictory and reparation. The auditing schemes in, imply the matter that users need to invariably keep on-line, which can impede its adoption unpracticed, particularly for long-run repository storage. 11 Page

2 II. Related Work We introduce [2] a model for demonstrable knowledge possession (PDP) that allows a consumer that has keep knowledge at associate untreated server to verify that the server possesses the initial knowledge without retrieving it. The model generates probabilistic proofs of possession by sampling random sets of blocks from the server that drastically reduces I/O prices. The client maintains a continuing quantity of information to verify the proof. The challenge/response protocol transmits a little, constant amount of information that minimizes network communication. Thus, the PDP model for remote knowledge checking supports large knowledge sets in widely-distributed storage systems. We gift 2 provably-secure PDP schemes that square measure more economical than previous solutions, even compared with schemes that attain weaker guarantees. Above all, the overhead at the server is low (or even constant), as op- posed to linear within the size of the info. Experiments exploitation our implementation verify the usefulness of PDP and re- veal that the performance of PDP is delimited by disk I/O and not by science computation. In this paper [3], we tend to outline and explore proofs of irretrievability (PORs). A POR theme enables associate archive or back-up service (proverb) to supply a laconic proof that a user (verifier) can retrieve a target file F, that is, that the archive retains and faithfully transmits file knowledge sufficient for the user to recover F in its completeness. A POR is also viewed as a sort of crypto logic proof of data (POK), however one specially designed to handle an outsized file (or bit string) F. we tend to explore POR protocols here during which the communication prices, range of memory accesses for the proverb, and storage needs of the user (verifier) square measure little parameters primarily freelance of the length of F. additionally to proposing new, sensible POR constructions, we tend to explore implementation issues and optimizations that bear on antecedently explored, connected schemes. In a POR, not like a POK, neither the proverb nor the friend would like even have data of F. PORs produce to a brand new and strange security definition whose formulation is another contribution of our work. We read PORs as a vital tool for semi-trusted on-line archives. Existing crypto logic techniques facilitate users make sure the privacy and integrity of files they retrieve. It s conjointly natural, however, for users to require to verify that archives don't delete or modify files before retrieval. The goal of a POR is to accomplish these checks while not users having to transfer the files themselves. A POR may also give quality-of-service guarantees, i.e., show that a file is retrievable at intervals an explicit time certain. Remote information Checking (RDC) [7] may be a technique by that purchasers will establish that information outsourced at entrusted servers remains intact over time. RDC is helpful as a bar tool, permitting purchasers to periodically check if information has been broken, and as a repair tool whenever injury has been detected. at first planned within the context of one server, RDC was later extended to verify information integrity in distributed storage systems that deem replication and on erasure writing to store information redundantly at multiple servers. Recently, a way was planned to feature redundancy supported network writing that offers attention-grabbing tradeoffs as a result of its remarkably low communication overhead to repair corrupt servers. Unlike previous work on RDC that centered on minimizing the costs of the bar section, we have a tendency to take a holistic look and initiate the investigation of RDC schemes for distributed systems that deem network writing to attenuate the combined prices of each the bar and repair phases. we have a tendency to propose RDC-NC, a completely unique secure and efficient RDC theme for network coding-based distributed storage systems. RDC-NC mitigates new attacks that stem from the underlying principle of network writing. The theme is in a position to preserve in associate adversarial setting the lowest communication overhead of the repair part achieved by network writing during a benign setting. We implement our theme and by experimentation show that it's computationally cheap for each purchasers and servers. In cloud computing [9], knowledge homeowners host their knowledge on cloud servers and users (data consumers) will access the information from cloud servers. Attributable to the information outsourcing, however, this new paradigm of knowledge hosting service additionally introduces new security challenges, which needs associate freelance auditing service to envision the information integrity within the cloud. Some existing remote integrity checking strategies will solely serve for static archive knowledge and therefore can't be applied to the auditing service since the information within the cloud will be dynamically updated. Thus, associate economical and secure dynamic auditing protocol is desired to win over knowledge homeowners that the information ar properly holds on within the cloud. During this paper, we have a tendency to initial style associate auditing framework for cloud storage systems and propose associate economical and privacypreserving auditing protocol. Then, we have a tendency to extend our auditing protocol to support the information dynamic operations, that is economical and demonstrably secure within the random oracle model. we have a tendency to any extend our auditing protocol to support batch auditing for each multiple homeowners and multiple clouds, while not victimization any trusty organizer. The analysis and simulation results show that 12 Page

3 our planned auditing protocols ar secure and economical, particularly it cut back the computation value of the auditor. In a proof-of-irretrievability [12] system, an information storage center should persuade a verger that he's actually storing all of a client's knowledge. The central challenge is to create systems that are each ancient and incontrovertibly secure that is, it ought to be doable to extract the client's knowledge from any proverb that passes a variation check. During this paper, we have a tendency to offer the rest proof-of-irretrievability schemes with full proofs of security against impulsive adversaries within the strongest model, that of Juels and Kaliski. Our rest theme, engineered from BLS signatures and secure within the random oracle model, features a proof-of-irretrievability protocol within which the client's question and server's response are each extremely short. This theme permits public variability: anyone will act as a varied, not simply the le owner. Our second theme that builds on pseudorandom functions (PRFs) and is secure in the standard model, permits solely nonpublic variation. It options a proof-of-irretrievability protocol with a good shorter server's response than our rest theme; however the client's question is long. Both schemes admit homomorphism properties to mixture an indication into one little critic price. Using Cloud [14] Storage, users will remotely store their knowledge and luxuriate in the on-demand prime quality applications and services from a shared pool of configurable computing resources, while not the burden of native knowledge storage and maintenance. However, the actual fact that users not have physical possession of the outsourced knowledge makes the information integrity protection in Cloud Computing a formidable task, particularly for users with affected computing resources. Moreover, users ought to be ready to just use the cloud storage as if it's native, without fear concerning the necessity to verify its integrity. Thus, sanctioning public audit ability for cloud storage is of essential importance so users will resort to a 3rd party auditor (TPA) to examine the integrity of outsourced data and be worry-free. To firmly introduce an efficient TPA, the auditing method ought to usher in no new vulnerabilities towards user knowledge privacy, and introduce no further on-line burden to user. During this paper, we have a tendency to propose a secure cloud storage system supporting privacy-preserving public auditing. We have a tendency to any extend our result to alter the TPA to perform audits for multiple users simultaneously and with efficiency. In depth security and performance analysis show the planned schemes area unit incontrovertibly secure and extremely economical. A cloud storage system [16], consisting of a set of storage servers, provides long storage services over the web. Storing information during a third party s cloud system causes serious concern over information confidentiality. In this paper, we have a tendency to gift a secure non-public cloud for cloud services. We have a tendency to trot out user anonymous access to cloud services and shared storage servers. Our resolution offers anonymous authentication. This suggests that users personal attributes (personal details, social details, valid registration) may be tried while not revealing users identity. Thus, users will use services with none threat of identification their behavior. We have a tendency to analyze current privacy protective solutions for cloud services and description our resolution supported advanced cryptography cryptanalytic parts. Information loss is another concerning issue in cloud computing. Our solutions to the current are providing information backup and restore facility for the users in private cloud. This paper tries to deal with challenges towards non-public cloud. Our technique totally integrates information uploading, encrypting, information backup and restore. Table 1: Survey Table Paper Name Author Name Proposed Work Advantages Disadvantages A Novel Approach to Data Integrity Proofs in Cloud Storage Neha T, P.S Murthy HAIL: A High- Availability and Integrity Layer for Cloud Storage Kevin D. Bowers, Kevin D. Bowers, Alina Oprea Proposes a novel approach to data integrity in the cloud which the client can utilize to check the correctness of his data in the cloud. Service level agreement (SLA) is made between the client and cloud service provider to mount the services. Introduce HAIL (High-Availability and Integrity Layer), a distributed It reduce the computational and storage overhead of the client as well as to minimize the computational overhead of the cloud storage server. It improves on the security and efficiency of existing tools, like The encrypting process is very much limited to only a fraction of the whole data thereby saving on the computational time of the client. 13 Page

4 Remote Data Checking for Network Codingbased Distributed Storage Systems Provable Data Possession at Untrusted Stores Cooperative Schedule Data Possession for Integrity Verification in Multi-Cloud Storage Bo Chen, Reza Curtmola, Giuseppe Ateniese, Randal Burns Giuseppe Ateniese, Randal Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary Peterson, Dawn Song O. Rahamathunisa Begam, T. Manjula, T. Bharath Manohar, B. Susrutha cryptographic system that permits a set of servers to prove to a client that a stored file is intact And retrievable. Proposed RDC-NC, a novel secure and efficient RDC scheme for network codingbased distributed storage Systems. Introduce a model for provable data possession (PDP) that allows a client that has stored data at an entrusted server to verify that the server possesses the original data Without retrieving it. Present a cooperative PDP (CPDP) scheme based on homomorphism verifiable response and hash index hierarchy. Proofs of Irretrievability (PORs) deployed on individual servers. It is Computationally inexpensive for both clients and servers. The practicality of PDP and reveal that the performance of PDP is bounded by disk I/O And not by cryptographic computation. This solution introduces lower computation and communication overheads in comparison with noncooperative approaches Encoding cost is increase for fix the file size Does not solve the issue of Each file can be processed in- Dependently at a different processor. A single file can be Parallelized trivially if processors share key material. Does not focus on the support of variablelength block verification III. Architectural View Figure 1 Architectural View for Proposed System IV. Conclusion In this paper author propose a public auditing for the create code primarily based cloud storage system, wherever because the information owner as delegate TPA for information validity checking. To secure original information privacy against the TPA, here disarrange the constant within the starting than applying the blind 14 Page

5 technique thanks to auditing method. The info owner cannot invariably keep on-line in apply, to stay the storage obtainable and once a malicious corruption, here introduce a semi trustworthy proxy to handle the coded blocks and authenticators. To raised performance for create code situation here style critic supported the BLS signature. These authenticators are often with efficiency generated by the info owner at the same time with the coding procedure. In depth analysis shows that our theme is obvious secure, and therefore the performance evaluation shows that our theme is very economical and might be feasibly integrated into a regenerating-code-based cloud storage system. References [1]. A. Fox, R. Griffith, A. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, and I. Stoica, Above the clouds: A Berkeley view of cloud computing, Dept. Electrical Eng. and Comput. Sciences, University of California, Berkeley, Rep. UCB/EECS, vol. 28, p. 13, [2]. G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, Provable data possession at untrusted stores, in Proceedings of the 14th ACM Conference on Computer and Communications Security, ser. CCS 07. New York, NY, USA: ACM, 2007, pp [3]. A. Juels and B. S. Kaliski Jr, Pors: Proofs of retrievability for large files, in Proceedings of the 14th ACM conference on Computer and communications security. ACM, 2007, pp [4]. R. Curtmola, O. Khan, R. Burns, and G. Ateniese, Mr-pdp: Multiplereplica provable data possession, in Distributed Computing Systems, ICDCS 08. The 28th International Conference on. IEEE, 2008, pp [5]. K. D. Bowers, A. Juels, and A. Oprea, Hail: a high-availability and integrity layer for cloud storage, in Proceedings of the 16th ACM conference on Computer and communications security. ACM, 2009, pp [6]. J. He, Y. Zhang, G. Huang, Y. Shi, and J. Cao, Distributed data possession checking for securing multiple replicas in geographicallydispersed clouds, Journal of Computer and System Sciences, vol. 78, no. 5, pp , [7]. B. Chen, R. Curtmola, G. Ateniese, and R. Burns, Remote data checking for network coding-based distributed storage systems, in Proceedings of the 2010 ACM workshop on Cloud computing security workshop. ACM, 2010, pp [8]. H. Chen and P. Lee, Enabling data integrity protection in regeneratingcoding- based cloud storage: Theory and implementation, Parallel and Distributed Systems, IEEE Transactions on, vol. 25, no. 2, pp , Feb [9]. K. Yang and X. Jia, An efficient and secure dynamic auditing protocol for data storage in cloud computing, Parallel and Distributed Systems, IEEE Transactions on, vol. 24, no. 9, pp , [10]. Y. Zhu, H. Hu, G.-J. Ahn, and M. Yu, Cooperative provable data possession for integrity verification in multicloud storage, Parallel and Distributed Systems, IEEE Transactions on, vol. 23, no. 12, pp , [11]. A. G. Dimakis, K. Ramchandran, Y. Wu, and C. Suh, A survey on network codes for distributed storage, Proceedings of the IEEE, vol. 99, no. 3, pp , [12]. H. Shacham and B. Waters, Compact proofs of retrievability, in Advances in Cryptology-ASIACRYPT Springer, 2008, pp [13]. Y. Hu, H. C. Chen, P. P. Lee, and Y. Tang, Nccloud: Applying network coding for the storage repair in a cloud-of-clouds, in USENIX FAST, [14]. C. Wang, Q. Wang, K. Ren, and W. Lou, Privacy-preserving public auditing for data storage security in cloud computing, in INFOCOM, 2010 Proceedings IEEE. IEEE, 2010, pp [15]. C.Wang, S. S. Chow, Q.Wang, K. Ren, andw. Lou, Privacy-preserving public auditing for secure cloud storage, Computers, IEEE Transactions on, vol. 62, no. 2, pp , [16]. C. Wang, Q. Wang, K. Ren, and W. Lou, Towards secure and dependable storage services in cloud computing, Service Computing, IEEE Transactions on, vol. 5, no. 2, pp , May [17]. D. Boneh, B. Lynn, and H. Shacham, Short signatures from the weil pairing, Journal of Cryptology, vol. 17, no. 4, pp , [18]. A. G. Dimakis, P. B. Godfrey, Y. Wu, M. J. Wainwright, and K. Ramchandran, Network coding for distributed storage systems, Information Theory, IEEE Transactions on, vol. 56, no. 9, pp , [19]. T. Ho, M. M edard, R. Koetter, D. R. Karger, M. Effros, J. Shi, and B. Leong, A random linear network coding approach to multicast, Information Theory, IEEE Transactions on, vol. 52, no. 10, pp , [20]. D. Boneh, D. Freeman, J. Katz, and B. Waters, Signing a linear subspace: Signature schemes for network coding, in Public Key Cryptography PKC Springer, 2009, pp [21]. D. Boneh and M. Franklin, Identity-based encryption from the weil pairing, in Advances in CryptologyłCRYPTO Springer, 2001, pp [22]. A. Miyaji, M. Nakabayashi, and S. Takano, New explicit conditions of elliptic curve traces for fr-reduction, IEICE transactions on fundamentals of electronics, communications and computer sciences, vol. 84, no. 5, pp , [23]. R. Gennaro, J. Katz, H. Krawczyk, and T. Rabin, Secure network coding over the integers, in Public Key Cryptography PKC Springer, 2010, pp [24]. S. Goldwasser, S. Micali, and R. Rivest, A digital signature scheme secure against adaptive chosen message attacks, SIAM Journal of Computing, vol. 17, no. 2, pp , Page

Review On Regenerating Code Based Secure Cloud Storage Using Public Auditing Mr.Satish Shelar 1, Prof.S.Y.Raut 2

Review On Regenerating Code Based Secure Cloud Storage Using Public Auditing Mr.Satish Shelar 1, Prof.S.Y.Raut 2 Review On Regenerating Code Based Secure Cloud Storage Using Public Auditing Mr.Satish Shelar 1, Prof.S.Y.Raut 2 1 Student ME CSE,PREC,Loni,Maharashtra,India 2 Asst.Professor,PREC,Loni, Maharashtra,India

More information

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD Volume 1, Issue 7, PP:, JAN JUL 2015. SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD B ANNAPURNA 1*, G RAVI 2*, 1. II-M.Tech Student, MRCET 2. Assoc. Prof, Dept.

More information

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD S.REVATHI B.HASEENA M.NOORUL IZZATH PG Student PG Student PG Student II- ME CSE II- ME CSE II- ME CSE Al-Ameen Engineering

More information

15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM

15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM Dhanashri Bamane Vinayak Pottigar Subhash Pingale Department of Computer Science and Engineering SKN

More information

OVERVIEW OF SECURITY ISSUES IN CLOUD COMPUTING

OVERVIEW OF SECURITY ISSUES IN CLOUD COMPUTING OVERVIEW OF SECURITY ISSUES IN CLOUD COMPUTING K. Arumugam 1, P. Sumathi 2 1 Research Scholar/Department Of Computer Science, Government Arts College, Coimbatore (India) 2 Assistant Professor/Department

More information

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department

More information

Security of Data from Public - Using Cloud Storage

Security of Data from Public - Using Cloud Storage Security of Data from Public - Using Cloud Storage T.Gopika #1, J.Haripriya #2, R.Ilakiyashri #3, S.Praveenkumar #4 UG Student, Dept. of CSE, Anand Institute of Higher Technology, Chennai, Tamil Nadu,

More information

Preserving Data Integrity and Public Auditing for Data Storage in Cloud Computing

Preserving Data Integrity and Public Auditing for Data Storage in Cloud Computing www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Issue - 8 August, 2014 Page No. 7829-7833 Preserving Data Integrity and Public Auditing for Data Storage

More information

Performance Evaluation Panda for Data Storage and Sharing Services in Cloud Computing

Performance Evaluation Panda for Data Storage and Sharing Services in Cloud Computing Performance Evaluation Panda for Data Storage and Sharing Services in Cloud Computing Gunnala Ajay Kumar M.Tech Student Department of CSE Global Group Of Institutions Batasingaram, Ranga Reddy (Dist),

More information

IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD

IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD 1 Ms.Nita R. Mhaske, 2 Prof. S.M.Rokade 1 student, Master of Engineering, Dept. of Computer Engineering Sir Visvesvaraya

More information

Remote Data Integrity Checking for Public Clouds

Remote Data Integrity Checking for Public Clouds IBM Student Workshop for Frontiers of Cloud Computing 01 Remote Data Integrity Checking for Public Clouds Bo (Irvine) Chen Department of Computer Science New Jersey Institute of Technology joint work with

More information

PRIVACY PRESERVING PUBLIC AUDITING FOR SECURED DATA STORAGE IN CLOUD USING BLOCK AUTHENTICATION CODE

PRIVACY PRESERVING PUBLIC AUDITING FOR SECURED DATA STORAGE IN CLOUD USING BLOCK AUTHENTICATION CODE PRIVACY PRESERVING PUBLIC AUDITING FOR SECURED DATA STORAGE IN CLOUD USING BLOCK AUTHENTICATION CODE R.REVATHI # PG Scholar #, Bharathiyar Institute Of Engineering for Women, Deviyakurichi, Salem(DT) India

More information

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction Enhancing Data Security in Cloud Storage Auditing With Key Abstraction 1 Priyadharshni.A, 2 Geo Jenefer.G 1 Master of engineering in computer science, Ponjesly College of Engineering 2 Assistant Professor,

More information

Secrecy Maintaining Public Inspecting For Secure Cloud Storage

Secrecy Maintaining Public Inspecting For Secure Cloud Storage Secrecy Maintaining Public Inspecting For Secure Cloud Storage K.Sangamithra 1, S.Tamilselvan 2 M.E, M.P.Nachimuthu.M.Jaganathan Engineering College, Tamilnadu, India 1 Asst. Professor, M.P.Nachimuthu.M.Jaganathan

More information

Development of enhanced Third party Auditing Scheme for Secure Cloud Storage

Development of enhanced Third party Auditing Scheme for Secure Cloud Storage Development of enhanced Third party Auditing Scheme for Secure Cloud Storage Bhanu Prakash Chamakuri*1, D. Srikar*2, Dr. M.Suresh Babu*3 M.Tech Scholar, Dept of CSE, Grandhi Varalakshmi Institute Of Technology,

More information

A Novel Re-Authentication Scheme on Cloud Based Storage Services T.G.V.V.Srinivas 1, P.Suresh Babu 2 1 Final M.Tech Student, 2 Associate professor

A Novel Re-Authentication Scheme on Cloud Based Storage Services T.G.V.V.Srinivas 1, P.Suresh Babu 2 1 Final M.Tech Student, 2 Associate professor A Novel Re-Authentication Scheme on Cloud Based Storage Services T.G.V.V.Srinivas 1, P.Suresh Babu 2 1 Final M.Tech Student, 2 Associate professor 1,2 Dept of CSE, Kaushik College of engineering, JNTUK

More information

Improving data integrity on cloud storage services

Improving data integrity on cloud storage services International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services

More information

PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING

PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING T.Vidhya Sree M.Phil Research Scholar,CS, MGR College, Hosur (India) ABSTRACT Cloud Computing is the long dreamed vision

More information

Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System

Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System 1 K.Valli Madhavi A.P vallimb@yahoo.com Mobile: 9866034900 2 R.Tamilkodi A.P tamil_kodiin@yahoo.co.in Mobile:

More information

Keywords: - Ring Signature, Homomorphic Authenticable Ring Signature (HARS), Privacy Preserving, Public Auditing, Cloud Computing.

Keywords: - Ring Signature, Homomorphic Authenticable Ring Signature (HARS), Privacy Preserving, Public Auditing, Cloud Computing. Survey on Privacy Preserving Public Auditing Techniques for Shared Data in the Cloud Kedar Jayesh Rasal 1, Dr. S.V.Gumaste 2, Sandip A. Kahate 3 Computer Engineering, Pune University, SPCOE, Otur, Pune,

More information

International Journal of Infinite Innovations in Engineering and Technology. ISSN (Online): 2349-2287, ISSN (Print): 2349-2279 2015

International Journal of Infinite Innovations in Engineering and Technology. ISSN (Online): 2349-2287, ISSN (Print): 2349-2279 2015 SECURED AUDITING SYSTEM FOR CLOUD DATA STORAGE WITH ERROR CORRECTION GUARANTEES 1 S.Sathya, 2 S.Sivakumar 1 Research Scholar, Department of Computer Science & Applications, PGP College of Arts & Science,

More information

A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA

A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA Mr.Mahesh S.Giri Department of Computer Science & Engineering Technocrats Institute of Technology Bhopal, India

More information

Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.

Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption. Secure Privacy-Preserving Cloud Services. Abhaya Ghatkar, Reena Jadhav, Renju Georgekutty, Avriel William, Amita Jajoo DYPCOE, Akurdi, Pune ghatkar.abhaya@gmail.com, jadhavreena70@yahoo.com, renjug03@gmail.com,

More information

Securing Cloud Data Storage

Securing Cloud Data Storage IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661 Volume 1, Issue 6 (July-Aug. 2012), PP 43-49 Securing Cloud Data Storage S. P. Jaikar 1, M. V. Nimbalkar 2 1,2 (Department of Information

More information

SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE

SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE International Journal of Computer Network and Security(IJCNS) Vol 7. No.1 2015 Pp. 1-8 gopalax Journals, Singapore available at : www.ijcns.com ISSN: 0975-8283 ----------------------------------------------------------------------------------------------------------------------------------------------------------

More information

Data Integrity for Secure Dynamic Cloud Storage System Using TPA

Data Integrity for Secure Dynamic Cloud Storage System Using TPA International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 7-12 International Research Publication House http://www.irphouse.com Data Integrity for Secure

More information

A Survey Paper on Secure Auditing and Maintaining Block Level Integrity with Reliability of Data in Cloud

A Survey Paper on Secure Auditing and Maintaining Block Level Integrity with Reliability of Data in Cloud A Survey Paper on Secure Auditing and Maintaining Block Level Integrity with Reliability of Data in Cloud Aishwarya R. Kumthekar 1, Prof. Jyoti Raghatwan 2 1 M.E. II Computer, aish275@gmail.com, 8806967523

More information

Cloud Data Storage Services Considering Public Audit for Security

Cloud Data Storage Services Considering Public Audit for Security Global Journal of Computer Science and Technology Cloud and Distributed Volume 13 Issue 1 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

Data Storage Security in Cloud Computing

Data Storage Security in Cloud Computing Data Storage Security in Cloud Computing Manoj Kokane 1, Premkumar Jain 2, Poonam Sarangdhar 3 1, 2, 3 Government College of Engineering and Research, Awasari, Pune, India Abstract: Cloud computing is

More information

Survey Paper on Integrity Auditing of Storage

Survey Paper on Integrity Auditing of Storage International Journal of Computational Engineering Research Vol, 04 Issue, 3 Survey Paper on Integrity Auditing of Storage Ugale Santosh A 1 1M.E. Computer AVCOE, Sangmner, India ABSTRACT: Cloud servers

More information

Near Sheltered and Loyal storage Space Navigating in Cloud

Near Sheltered and Loyal storage Space Navigating in Cloud IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 8 (August. 2013), V2 PP 01-05 Near Sheltered and Loyal storage Space Navigating in Cloud N.Venkata Krishna, M.Venkata

More information

Erasure correcting to enhance data security in cloud data storage

Erasure correcting to enhance data security in cloud data storage Erasure correcting to enhance data security in cloud data storage K.Shrividhya Department of computer science- Vels University shrividhya224@gmail.com A.Sajeevram Department of computer science Vels University

More information

Cloud Data Service for Issues in Scalable Data Integration Using Multi Authority Attribute Based Encryption

Cloud Data Service for Issues in Scalable Data Integration Using Multi Authority Attribute Based Encryption Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,

More information

TITLE: Secure Auditing and Deduplicating Data in Cloud(Survey Paper)

TITLE: Secure Auditing and Deduplicating Data in Cloud(Survey Paper) TITLE: Secure Auditing and Deduplicating Data in Cloud(Survey Paper) Pratik Raut 1, Pratik Kamble 2, Prafull Pansare 3, Dipti Salunkhe 4 1 UG Student, Dept. of Computer Engineering, JSCOE, Hadapsar, Pune,

More information

RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES

RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES 1 MD ISMAIL Z, 2 ASHFAQUE AHAMED K. 1 PG Scholar,Department of Computer Science, C.Abdul Hakeem College Of Arts and Science,Melvisharam.

More information

Enable Public Audit ability for Secure Cloud Storage

Enable Public Audit ability for Secure Cloud Storage Enable Public Audit ability for Secure Cloud Storage Leela Poornima 1, D.Hari Krishna 2 1 Student, Nova College of Engineering and Technology, Ibrahimpatnam,Krishna Dist., Andhra Pradesh, India 2 Assistant

More information

Verifying Correctness of Trusted data in Clouds

Verifying Correctness of Trusted data in Clouds Volume-3, Issue-6, December-2013, ISSN No.: 2250-0758 International Journal of Engineering and Management Research Available at: www.ijemr.net Page Number: 21-25 Verifying Correctness of Trusted data in

More information

E-mail- ashwinikumari.e@gmail.com,naguchinni@gmail.com umashankari.917@gmail.com

E-mail- ashwinikumari.e@gmail.com,naguchinni@gmail.com umashankari.917@gmail.com International Journal Of Scientific Research And Education Volume 2 Issue 10 Pages-2019-2026 October-2014 ISSN (e): 2321-7545 Website: http://ijsae.in Multi-Cloud Storage Data Possession Based Data Integrity

More information

Privacy-Preserving Public Auditing & Data Intrgrity for Secure Cloud Storage

Privacy-Preserving Public Auditing & Data Intrgrity for Secure Cloud Storage Privacy-Preserving Public Auditing & Data Intrgrity for Secure Cloud Storage Imran Ahmad Student, M.Tech Dept. Computer Science & Engineering Patel Institute of Technology Bhopal, India imimran86@gmail.com

More information

EFFICIENT DISCOVERY OF INTEGRITY AUTOMATION IN HYBRID CLOUD COMPUTING

EFFICIENT DISCOVERY OF INTEGRITY AUTOMATION IN HYBRID CLOUD COMPUTING INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE EFFICIENT DISCOVERY OF INTEGRITY AUTOMATION IN HYBRID CLOUD COMPUTING K.Saipriya 1, A.Ravi Kumar 2 1 M.Tech Student, Dept of

More information

Secure Cloud StorageForPrivacy-Preserving Public Audit

Secure Cloud StorageForPrivacy-Preserving Public Audit RESEARCH ARTICLE OPEN ACCESS Secure Cloud StorageForPrivacy-Preserving Public Audit ShekhAhamadhusen D., Prof. Rahul Deshmukh Abstract- In Cloud Environment, using cloud storage service, users can remotely

More information

ISSN 2278-3091. Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability

ISSN 2278-3091. Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability Outsourcing and Discovering Storage Inconsistencies in Cloud Through TPA Sumathi Karanam 1, GL Varaprasad 2 Student, Department of CSE, QIS College of Engineering and Technology, Ongole, AndhraPradesh,India

More information

A Survey on Privacy-Preserving Techniques for Secure Cloud Storage

A Survey on Privacy-Preserving Techniques for Secure Cloud Storage Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,

More information

Index Terms : cloud computing, Distributed Storage, error detection, data recovery, SHA, dynamic block operations

Index Terms : cloud computing, Distributed Storage, error detection, data recovery, SHA, dynamic block operations Revisiting Secure Cloud Storage by Replacing Token Generation With SHA Ms. Bhagyashree Alhat (1), Prof. Amar Buchade(2) Pune Institute of Computer Technology, University of Pune,PG Student(1), Assistant

More information

CONSIDERATION OF DYNAMIC STORAGE ATTRIBUTES IN CLOUD

CONSIDERATION OF DYNAMIC STORAGE ATTRIBUTES IN CLOUD INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE CONSIDERATION OF DYNAMIC STORAGE ATTRIBUTES IN CLOUD Ravi Sativada 1, M.Prabhakar Rao 2 1 M.Tech Student, Dept of CSE, Chilkur Balaji

More information

How To Ensure Data Integrity In Cloud Computing

How To Ensure Data Integrity In Cloud Computing A Novel Approach for public exploration Data with Effective user Denial in the cloud Mahankali Anitha PG Scholar Department of CSE J.Vijayasree Assistant professor Department of CSE Dr.M.V.Siva Prasad

More information

Security in Cloud Audit Using the Key Based Homomorphic Linear Authenticator

Security in Cloud Audit Using the Key Based Homomorphic Linear Authenticator Security in Cloud Audit Using the Key Based Homomorphic Linear Authenticator S.Muralitharan 1, M.Vijayaraj 2 Assistant Professor, Department of Information Technology, Mohamed Sathak Engineering College,

More information

Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication

Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication Sanjay Kumar Baghel Mtech Scholar, CSE, CSIT DURG Sanju5878@gmail.com Bhupesh Kumar Dewangan Assistant Professor,CSE,

More information

Selective dependable storage services for providing security in cloud computing

Selective dependable storage services for providing security in cloud computing Selective dependable storage services for providing security in cloud computing Gade Lakshmi Thirupatamma*1, M.Jayaram*2, R.Pitchaiah*3 M.Tech Scholar, Dept of CSE, UCET, Medikondur, Dist: Guntur, AP,

More information

SHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING

SHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING SHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING Er. Kavin M 1, Mr.J.Jayavel 2 1 PG Scholar, 2 Teaching Assistant, Department of Information Technology, Anna University Regional

More information

DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION

DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION Prof. M. Ben Swarup Professor, Department of CSE Vignan's Institute of Information Technology Visakhapatnam-49, India Chukkala

More information

A Secure and Dependable Cloud Storage Service in Cloud Computing

A Secure and Dependable Cloud Storage Service in Cloud Computing A Secure and Dependable Cloud Storage Service in Cloud Computing Yalla Ram Charan MTech Student Department of CSE Sri Venkateswra College of Engineering & Technology Abstract: Cloud storage is a model

More information

AN APPROACH TOWARDS FUNCTIONING OF PUBLIC AUDITABILITY FOR CLOUD ENRICHMENT

AN APPROACH TOWARDS FUNCTIONING OF PUBLIC AUDITABILITY FOR CLOUD ENRICHMENT INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN APPROACH TOWARDS FUNCTIONING OF PUBLIC AUDITABILITY FOR CLOUD ENRICHMENT Mohd Abdul Shoaib 1, Akheel Mohammed 2, Ayesha 3

More information

Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing.

Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing. Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Privacy - Preserving

More information

ADVANCE SECURITY TO CLOUD DATA STORAGE

ADVANCE SECURITY TO CLOUD DATA STORAGE Journal homepage: www.mjret.in ADVANCE SECURITY TO CLOUD DATA STORAGE ISSN:2348-6953 Yogesh Bhapkar, Mitali Patil, Kishor Kale,Rakesh Gaikwad ISB&M, SOT, Pune, India Abstract: Cloud Computing is the next

More information

Secure Way of Storing Data in Cloud Using Third Party Auditor

Secure Way of Storing Data in Cloud Using Third Party Auditor IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 4 (Jul. - Aug. 2013), PP 69-74 Secure Way of Storing Data in Cloud Using Third Party Auditor 1 Miss.

More information

ORUTA: SECRECY PRESERVING POPULACE INSPECTING FOR OUTSOURCED DATA IN CLOUD

ORUTA: SECRECY PRESERVING POPULACE INSPECTING FOR OUTSOURCED DATA IN CLOUD ORUTA: SECRECY PRESERVING POPULACE INSPECTING FOR OUTSOURCED DATA IN CLOUD M.Babu 1, B V Suresh Reddy 2 1 Pursuing M.Tech (CSE), 2 Working as Assistant Professor (CSE), Nalanda Institute of Technology

More information

preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.

preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design. Privacy-Preserving Public Auditing For Secure Cloud Storage ABSTRACT: Using cloud storage, users can remotely store their data and enjoy the on-demand high-quality applications and services from a shared

More information

Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving,

Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving, Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Third Party

More information

Data storage security in Cloud

Data storage security in Cloud IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 6, Ver. III (Nov Dec. 2014), PP 50-56 Data storage security in Cloud Mrs. Niyamat Ujloomwale, Mrs.

More information

PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE

PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE Abstract: Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared

More information

Dependable and Secure Storage Services in Cloud Computing

Dependable and Secure Storage Services in Cloud Computing Dependable and Secure Storage Services in Cloud Computing D.Veena Sanjitha #1, M.Himaswanthi #2, T.V.N.Sai Sindhura #3, K.V.V. Satyanarayana * # CSE Department, KL University Guntur, AndhraPradesh * K.V.V.

More information

COMPUSOFT, An international journal of advanced computer technology, 4 (4), April-2015 (Volume-IV, Issue-IV)

COMPUSOFT, An international journal of advanced computer technology, 4 (4), April-2015 (Volume-IV, Issue-IV) ISSN:2320-0790 Secured Data on Cloud Environment by SAPA Protocol with Auto-renewal K. Prashanthi 1, P. Sangamithirai 2, S.Pothumani 3 1,2 B.Tech Student(CSE), Bharath University, Chennai-73. 3, Assistant

More information

February. ISSN: 2321-8134

February. ISSN: 2321-8134 IJFEAT INTERNATIONAL JOURNAL FOR ENGINEERING APPLICATIONS AND TECHNOLOGY TITLE: DATA PLACE & MANAGE SECURITY IN CLOUD COMPUTING FOR EFFECTIVE AND FLEXIBLE DISTRIBUTED SYSTEM 1 Mr. Pritam S. Bhoyar, 2 Mr.

More information

PERFORMANCE OF BALANCED STORAGE SERVICES IN CLOUD SYSTEM

PERFORMANCE OF BALANCED STORAGE SERVICES IN CLOUD SYSTEM INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE PERFORMANCE OF BALANCED STORAGE SERVICES IN CLOUD SYSTEM Byagari Kumar 1, K.Pradeep Kumar 2 1 M.Tech Student, Dept of CSE, RRS College

More information

A Survey on Secure Storage Services in Cloud Computing

A Survey on Secure Storage Services in Cloud Computing Global Journal of Computer Science and Technology Cloud & Distributed Volume 12 Issue 12 Version 1.0 Year 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

Public Auditing for Shared Data in the Cloud by Using AES

Public Auditing for Shared Data in the Cloud by Using AES Public Auditing for Shared Data in the Cloud by Using AES 1 Syagamreddy Subbareddy, 2 P.Tejaswi, 3 D.Krishna 1 M.Tech(CSE) Pursuing, 2 Associate Professor, 3 Associate Professor,HOD, 1,2,3 Dept. of Computer

More information

A Survey on Secure Auditing and Deduplicating Data in Cloud

A Survey on Secure Auditing and Deduplicating Data in Cloud A Survey on Secure Auditing and Deduplicating Data in Cloud Tejaswini Jaybhaye 1 ; D. H. Kulkarni 2 PG Student, Dept. of Computer Engineering, SKNCOE, Pune, India 1 Assistant Professor, Dept. of Computer

More information

Surveying Cloud Storage Correctness using TPA with BLS

Surveying Cloud Storage Correctness using TPA with BLS Surveying Cloud Storage Correctness using TPA with BLS Priyanka Dehariya 1, Prof. Shweta Shrivastava 2, Dr. Vineet Richaraya 3 1 M.Tech Scholar (CSE), LNCT, Bhopal 2 Asst.Professors, (CSE Department),

More information

Data Grid Privacy and Secure Storage Service in Cloud Computing

Data Grid Privacy and Secure Storage Service in Cloud Computing Data Grid Privacy and Secure Storage Service in Cloud Computing L.Revathi 1, S.Karthikeyan 2 1 Research Scholar, Department of Computer Applications, Dr. M.G.R. Educational and Research Institute University,

More information

AN EFFECTIVE STUDY ON IMPROVED DATA AUTHENTICATION IN CLOUD SYSTEM

AN EFFECTIVE STUDY ON IMPROVED DATA AUTHENTICATION IN CLOUD SYSTEM INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE AN EFFECTIVE STUDY ON IMPROVED DATA AUTHENTICATION IN CLOUD SYSTEM Bairu Ravi 1, B.Ramya 2 1 M.Tech Student, Dept of CSE, Arjun College

More information

How To Ensure Data Integrity In Clouds

How To Ensure Data Integrity In Clouds Proficient Audit Services Outsourced for Data Availability in Clouds N Praveen Kumar Reddy #1, Dr Subhash Chandra *2 N Praveen Kumar Reddy, pursuing M.Tech from Holy Mary Institute of Technology and Science,,

More information

Enhance Data Security in Cloud Computing using Layered Interleaving Approach

Enhance Data Security in Cloud Computing using Layered Interleaving Approach Enhance Data Security in Cloud Computing using Layered Interleaving Approach Mr. Pradeep Semwal Assistant Professor Dept of Computer Application & IT SGRR-Institute of Technology & Sciences, Dehradun Mr.

More information

Privacy preserving technique to secure cloud

Privacy preserving technique to secure cloud Vitthal S. Gutte Pune University, MIT College of engineering, Kothrud, Pune 411038, India vitthalgutte2014@gmail.com Privacy preserving technique to secure cloud Prof. Priya Deshpande Pune University,

More information

AN EFFICIENT STRATEGY OF THE DATA INTEGRATION BASED CLOUD

AN EFFICIENT STRATEGY OF THE DATA INTEGRATION BASED CLOUD INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF THE DATA INTEGRATION BASED CLOUD Koncha Anantha Laxmi Prasad 1, M.Yaseen Pasha 2, V.Hari Prasad 3 1

More information

Hey! Cross Check on Computation in Cloud

Hey! Cross Check on Computation in Cloud Hey! Cross Check on Computation in Cloud Ajeet Singh Rajput Computer Science and Engineering Department S.D.B.C.T, Mhow Road,Indore,(M.P), India ajeetsinghrajput@gmail.com M.E.(CSE), S.D.B.C.T, Indore

More information

Third Party Auditing For Secure Data Storage in Cloud through Trusted Third Party Auditor Using RC5

Third Party Auditing For Secure Data Storage in Cloud through Trusted Third Party Auditor Using RC5 Third Party Auditing For Secure Data Storage in Cloud through Trusted Third Party Auditor Using RC5 Miss. Nupoor M. Yawale 1, Prof. V. B. Gadicha 2 1 Student, M.E. Second year CSE, P R Patil COET, Amravati.INDIA.

More information

How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System

How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System REVIEW ARTICAL A Novel Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage Dumala Harisha 1, V.Gouthami 2 1 Student, Computer Science & Engineering-Department, JNTU Hyderabad India

More information

Security in Cloud Network

Security in Cloud Network Security in Cloud Network Vimula Shwetha, (M.Tech) CSE Dept, KCEA, Nizamabad, ABSTRACT: Cloud computing, large number of computers that are connected through a real-time communication network. The users

More information

Identifying Data Integrity in the Cloud Storage

Identifying Data Integrity in the Cloud Storage www.ijcsi.org 403 Identifying Data Integrity in the Cloud Storage Saranya Eswaran 1 and Dr.Sunitha Abburu 2 1 Adhiyamaan College of Engineering, Department of Computer Application, Hosur. 2 Professor and

More information

Survey on Evidence of Retrievability Schemes of Cloud Storage Services for Resource-Strained Devices

Survey on Evidence of Retrievability Schemes of Cloud Storage Services for Resource-Strained Devices Survey on Evidence of Retrievability Schemes of Cloud Storage Services for Resource-Strained Devices Ujjwala Bandawane 1, Sandeep Gore 2 1 G. H. Raisoni College of Engineering, Pune, Maharashtra, India

More information

Secure Distribution of File on Cloud

Secure Distribution of File on Cloud Secure Distribution of File on Cloud Niyamat I. Ujloomwale, Ranjana Badre Dept. of Computer, MIT Academy of Engineering, Alandi, Savitri Phule Pune University, Pune, India Dept. of Computer, MIT Academy

More information

An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud

An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud T.Vijayalakshmi 1, Balika J Chelliah 2,S.Alagumani 3 and Dr.J.Jagadeesan 4 1 PG

More information

Trusted Public Auditing Process for Secure Cloud Storage

Trusted Public Auditing Process for Secure Cloud Storage Trusted Public Auditing Process for Secure Cloud Storage K.Adhiyaman 1, A. Jesudoss 2, D.Saravanan 3 1 Final Year MCA, Faculty of Computing, Department of MCA Sathyabama University, Chennai,Tamil Nadu,

More information

How To Ensure Data Storage Security In Cloud Computing

How To Ensure Data Storage Security In Cloud Computing Incorporation of Third Party Auditor for Safe and Secure Data Storage in Cloud Computing Abstract: Sanjeeva Polepaka Associate Professor, Department of CSE, Malla Reddy Engineering College. Cloud Computing

More information

Analysis of Secure Cloud Data Sharing Within a Group

Analysis of Secure Cloud Data Sharing Within a Group Analysis of Secure Cloud Data Sharing Within a Group Ms. uri Pande* Department of CSE, GHRAET Nagpur (M.S), India, Prof. Vikrant Chole Dept of Computer Science & Engg Nagpur (M.S.), India Abstract In this

More information

Towards a compliance audit of SLAs for data replication in Cloud storage

Towards a compliance audit of SLAs for data replication in Cloud storage Towards a compliance audit of SLAs for data replication in Cloud storage J. Leneutre B. Djebaili, C. Kiennert, J. Leneutre, L. Chen, Data Integrity and Availability Verification Game in Untrusted Cloud

More information

Enabling Data Security in Cloud Computing Using Third Party Auditing and Encryption Services

Enabling Data Security in Cloud Computing Using Third Party Auditing and Encryption Services Enabling Data Security in Cloud Computing Using Third Party Auditing and Encryption Services Amal Jose, M.Sambath, S.Ravi PG Scholar, Department of Computer Science & Engineering, Hindustan University,

More information

To Provide Security & Integrity for Storage Services in Cloud Computing

To Provide Security & Integrity for Storage Services in Cloud Computing To Provide Security & Integrity for Storage Services in Cloud Computing 1 vinothlakshmi.s Assistant Professor, Dept of IT, Bharath Unversity, Chennai, TamilNadu, India ABSTRACT: we propose in this paper

More information

An Efficient Secure Multi Owner Data Sharing for Dynamic Groups in Cloud Computing

An Efficient Secure Multi Owner Data Sharing for Dynamic Groups in Cloud Computing Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 6, June 2014, pg.730

More information

Cloud Data Storage Security and Public Auditing

Cloud Data Storage Security and Public Auditing A Meticulous Description of Applying Watermarking Technique for Secure Cloud Storage 1 M. Guresh, 2 R. Suresh 1 M.Tech 2 nd Year, Department of CSE, CREC Tirupati, AP, India 2 Professor & HOD, Department

More information

SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING

SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING Saranya.V 1, Suganthi.J 2, R.G. Suresh Kumar 3 1,2 Master of Technology, Department of Computer Science and Engineering, Rajiv Gandhi College of Engineering

More information

International Journal of Computer Sciences and Engineering. Review Paper Volume-4, Issue-3 E-ISSN: 2347-2693

International Journal of Computer Sciences and Engineering. Review Paper Volume-4, Issue-3 E-ISSN: 2347-2693 International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-3 E-ISSN: 2347-2693 Privacy Preservation and Auditing in Public Cloud: A Review Nitesh Kumar Namdeo 1*

More information

AN EXPOSURE TO RELIABLE STORAGE SERVICES IN CLOUD COMPUTING

AN EXPOSURE TO RELIABLE STORAGE SERVICES IN CLOUD COMPUTING INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EXPOSURE TO RELIABLE STORAGE SERVICES IN CLOUD COMPUTING Ayesha Romana 1, Akheel Mohammed 2, Ayesha 3 1 M.Tech Student, Dept

More information

SECURED DATA STORAGE IN CLOUD

SECURED DATA STORAGE IN CLOUD International Journal of Information Technology & Management Information System (IJITMIS) Volume 6, Issue 2, July-December-2015, pp. 44-48, Article ID: IJITMIS_06_02_007 Available online at http://http://www.iaeme.com/issue.asp?jtype=ijitmis&vtype=6&itype=2

More information

Efficient and Secure Dynamic Auditing Protocol for Integrity Verification In Cloud Storage

Efficient and Secure Dynamic Auditing Protocol for Integrity Verification In Cloud Storage Efficient and Secure Dynamic Auditing Protocol for Integrity Verification In Cloud Storage Priyanga.R 1, Maheswari.B 2, Karthik.S 3 PG Scholar, Department of CSE, SNS College of technology, Coimbatore-35,

More information

Cloud Server Storage Security Using TPA

Cloud Server Storage Security Using TPA Cloud Server Storage Security Using TPA I K.Meenakshi, II Victo Sudha George I Student (M.Tech), DR. MGR Educational and Research Institute, India II Assisstant Professo, DR. MGR Educational and Research

More information

Privacy-Preserving Public Auditing For Secure Cloud Storage

Privacy-Preserving Public Auditing For Secure Cloud Storage IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 4, Ver. III (Jul Aug. 2014), PP 33-38 Privacy-Preserving Public Auditing For Secure Cloud Storage Salve

More information

PRIVACY PRESERVING AND BATCH AUDITING IN SECURE CLOUD DATA STORAGE USING AES

PRIVACY PRESERVING AND BATCH AUDITING IN SECURE CLOUD DATA STORAGE USING AES PRIVACY PRESERVING AND BATCH AUDITING IN SECURE CLOUD DATA STORAGE USING AES 1 SANTOSH P. JADHAV, 2 B. R. NANDWALKAR 1,2 Department of Computer Engineering, Late G.N.Sapkal collage of engineering, University

More information

M. Nathiya 2 B.Tech. (IT), M.E. (CSE), Assistant Professor, Shivani Engineering College, Trichy, Tamilnadu, India.

M. Nathiya 2 B.Tech. (IT), M.E. (CSE), Assistant Professor, Shivani Engineering College, Trichy, Tamilnadu, India. ISSN: 2321-7782 (Online) Volume 2, Issue 5, May 2014 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com Robust Data

More information