Authorized data deduplication check in hybrid cloud With Cluster as a Service

Size: px
Start display at page:

Download "Authorized data deduplication check in hybrid cloud With Cluster as a Service"

Transcription

1 Authorized data deduplication check in hybrid cloud With Cluster as a Service X.ALPHONSEINBARAJ PG Scholar, Department of Computer Science and Engineering, Anna University, Coimbatore. Abstract Data deduplication Techniques is one of the compression techniques which is mostly used to eliminate the repeating multiple copies of the data.to support differential authorization deduplication check and to avoid repudiation between the user and cloud service provide, encryption is enhanced before the data is outsourced. To better protect data security,this paper makes the first attempt to formally address the problems of integrity without any key generation. Only the tag generation and authorized user identity are making the data more secure compared to the previous traditional deduplication system. Moreover one of the additional cloud storage service that is included for security concern is Cluster as a Service(CaaS).This paper explains how CaaS is used in the secure system than the previous normal operation. Keywords: Deduplication, CaaS, Encryption, PoW,Tag. 1 INTRODUCTION Cloud computing is a new computing paradigm that offers a huge amount of computes and storage resources to the masses. Individuals and enterprises can have access to these resources by paying a small amount of money just for what is really needed. Cloud computing provides seemingly unlimited virtualized resources to users as services across the internet while hiding platform and implementation details. Depending on what services and resources are offered, cloud belongs to one of the three basic cloud categories: Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS). Iaas clouds make basic computational resources (e.g., Storage, servers), Paas clouds offers easy development and deployment of environment scalable applications. Saas clouds offer complete end user applications to be deployed, managed and delivered as service usually through the browser. The main purpose of Cluster as a Service (CaaS) is to ease the publication, discovery, selection and use of existing computational clusters. With the goal of providing users more flexible services in a transparent manner, all services are allocated in a cloud that actually is a collection of devices and resources connected through the Internet. One of the core services provided by cloud computing is data storage. This poses new challenges in creating secure and reliable data storage and access facilities over remote service providers in the cloud and increasing volume of the data. To make data management scalable in cloud computing, data deduplication [1] is the known technique which is one of the compression technique and eliminating the duplicate copies of repeating data. By applying data deduplication, we can utilize the data storage completely and efficiently by reducing the amount of bytes of data and also we can use the data storage at very low cost. Instead of keeping multiple copies of data, we can use only one identical copy to refer to the rest of the process. To make efficient use of data deduplication, convergent encryption [2] [5] method has been used. This produces identical ciphertext from identical plaintext files. This has applications in cloud computing to remove duplicate files from storage without the provider having access to the encryption keys. This is different from the traditional method which is referred as follows. Each time user access with their own private key, different plain text will be produced and it produces the different cipher text and this makes deduplication ineffective. 10

2 To enable deduplication and to avoid duplication, the tag has been used with corresponding privileges [3] [4]. Here tag detect duplication and that is associated with privileges. According to the privileges, tag generated is independent of convergent encryption [5] [2]. Duplication checking is done by privilege whenever each file is uploaded in the cloud. Authorized owner's identity was verified in the case of duplication file found. This verification was accessed by proof of ownership (PoW) [6] [7]. By giving this information it will match to the identity that is stored already on cloud with which the user had registered. 1.1 CONTRIBUTIONS In this paper, 1) Performing convergent encryption with differential privilege and providing tag to detect duplicate check without key generation is done.as stated, that the definition of convergent encryption, without provider having access the encryption key, when user register and upload the file, he /she will give the identity of ownership and security proof that will make encryption and decryption of file. 2) Here without interfere of provider generate keys, performing data deduplication and to detect the duplicate by tag generation, according the privilege [3] [4]. Here we consider a hybrid cloud architecture consisting of private and public cloud. 3) Introduce the first provably-secure and practical deduplication schemes that guarantee data security. 4) Implement one of the schemes and show experimental result. The rest of this paper proceeds as follows. Section 2 briefly revisit some preliminaries of this paper. Section 3 propose the system model for secure data protection. In section 4, the practical implementation progress of the secure duplication system is described. In section 5, some other related work regarding this system is described. In section 6, some future work and some other ideas to enhance security is described. Finally conclusions are drawn in section 7. 2 PRELIMINARIES In this section we are going to consider the symmetric encryption and review some secure primitives used in our secure deduplication. 2.1 Cluster as a Service (CaaS) IMPLEMENTATION: In other experiments which contained CaaS was implemented using Windows Communication Foundation (WCF) of.net that uses web services [26]. The problem is while Web services have simplified resource access and management, it is not possible to know if the resource(s) behind the web service is (are) ready for request. Clients need to exchange numerous messages with required web services to learn the current activity of the resources and thus face significant overhead losses if most of the Web services prove ineffective. The role of the CaaS is to (i) provide easy and intuitive file transfer tools so that clients can upload jobs and download results and (ii) offer an easy to use interface for clients to monitor their jobs. The CaaS Service does this by allowing clients to upload files as they would do in any Web page while carrying out the required data transfer to the cluster transparently. Because clients to the cluster cannot know how the data storage is managed,the CaaS offers a simple transfer interface to clients while addressing the transfer specified. Job submission is done in CaaS which does file upload completion and that makes a connection to the cluster storage and commences the transfer of all files.job Monitoring is specified to show the execution progress of job even though the cluster is not owned by the client,their job is. Thus,it is the right of the client to see how the job is progressing and (if client decides) terminates the job and remove it from the cluster. 11

3 2.2 Authorized user Identity-PoW: The notation of Proof Of ownership (PoW) [7],[24],[6] enables users to prove their ownership of data copies to the storage server which is denoted by Authorized user Identity instead. Whenever the user finds some duplication of files in hybrid cloud,he wants to give his ownership to Auditor Controller(AC).When user does uploading /downloading file(s),they need to give their proof. According to the concept of Designated Verifier Provable Data Possession (DV-PDP)[14],data owners are designated a verifier, can verify their data with independent of Cloud Service Provider(CSP).In our system, user can communicate to Storage server indirectly through Auditor Controller. Because of security concerns deduplication is done by issuing the Tag Generation. 3 SYSTEM MODEL This section consists of three different network entities: User, Auditor, Controller (AC), Cloud Storage Server (CSS). Figure 1 depicts the architecture employed in our prototype. The system consists of several modules described below. 1) User: It s an entity who has massive data will be shifted into CSS for maintenance and computation which can be either consumer or organization through the Auditor Controller 2) Cloud Storage Server (CSS): It s an entity which has significant storage space and computation resource to maintain clients and organizations' data. 3) Auditor Controller (AC): It s an entity which has the expertise and capabilities that clients do not have and is trusted to assess and expose the risk of cloud storage services on behalf of the clients request. Small companies normally store their data s in cloud server through the data centre. In data centres, companies data s is maintained. For maintenance and computation companies should pay, over the period of the time companies goes bankrupt, companies do not deal with these data. To solve the problems, I propose Authorized data deduplication check in hybrid with Cluster as a Service. User Identity of Ownership Tag Generation Upload Queue Encryption Deduplication Auditor Controller Encrypted Blocks/File(s) Upload Queue Cloud Storage Server Cloud Storage Server Cloud Storage Cloud Storage Cloud Storage Figure1:Architecture of proposed deduplication system. 12

4 Optionally, data on the backup server can be replicated to multiple cloud storages in the background. 1) User: A user is an entity that wants outsource data to cloud storage. Therefore upload the file(s) through private cloud and through which file(s) has been uploaded to Auditor Controller (AC). Data deduplication is performed under this level by user register their proof user details, tag will be generated. Set of privileges are associated with a tag. 2) Auditor Controller (AC): This is an entity which reduces storage space and bandwidth by eliminating repeating copy of the data. In the case of duplicate found, the duplication request made by the user is passed to CSS through Auditor Controller (AC). Accessing the files from set of privileges is done by the user. 3) Cloud Storage Server (CSS): This entity gives data storage in public cloud. To reduce the storage cost, the CSS eliminates the storage of redundant data via deduplication and keeps only unique data.we assume that CSS is always online and computation power. 3.1 Adversary Model: In this paper, suppose all files are sensitive and fully protected from private and public cloud means,it comes under some assumption by considering two kinds of adversaries. That is 1)Internal adversaries who are aiming to extract information on file from private cloud and make deduplication ineffective by sending copies of data under the same name. 2)External adversaries whose aim is to extract information from both private and public clouds. 4 SECURE DEDUPLICATION SYSTEM 1) Upload-to-Download Integrity : Since if integrity is the problem how can the user and provider know whether the data retrieved from cloud is the same data which was uploaded previously by the user? 2) Repudiation between Users and Service Providers : Some data errors will occur without any transmission error while downloading /uploading files means, how a user or/and service provider prove their innocence? Our proposed system is a providing solution for the above indicated security problems by performing uploading and downloading the files in our system. 4.1 Uploading file in our secure deduplication system: 1) User : Sends the data to Cloud Storage Server(CSS) through Auditor Controller(AC) with tag generation and Tag Generation by User (TGU). 2) Auditor Controller(AC) : Verifies the data with TGU and sends to Cloud Storage Server(CSS) if it is valid, the CSS sends back the tag generation to the user through Auditor Controller. This is known as Tag Generation by Auditor Controller (TGAC). 3) TGU is stored at the user side and TGAC is stored at the Cloud Servicer Server(CSS). Once uploading have been finished, both the sides agree on the integrity of the uploading data. 4.2 Downloading file in our secure deduplication system : 1) User : Send request to Cloud Storage Server(CSS) through Auditor Controller (AC)with Authorized Identity.Its known as Proof of Ownership(PoW). 2) Auditor Controller (AC) : Verifies the Authorized Identity and send to Cloud Storage Server (CSS) which will verify and send back the files with the help of Tag Generation Auditor Controller(TGAC) to the user. 3) The user can verify that the TGAC for integrity of files which he had sent is directed to download the file. When disputation occurs, the user or Cloud Storage Server can check TGAC and TGU to prove its innocence. However there are some special cases that exist. a) When a Cloud Storage Server is trust worthy, only TGU is needed; when the user is trustworthy only TGAC is needed ; b ) If each of them trusts then on the other side, neither TGU nor TGAC is needed. 13

5 5. RELATED WORK: The current deduplication system is involved in three categories : whole file,fixed sized and variable size chunks. These three categories uses Single Instance Storage (SIS).The first category refers that it would take whole file as the hash value identifier.if two or more file have same hash value, but those files are stored identically then it is known as Content Addressable Identity (CAS) [25].The second category is fixed sized chunks that refers to blocks of files.example of second category is Venti archival storage system [15].The third Category is sliding window. Here the files are converted into variable length chunks using hash values. Example is Rabin fingerprints [20]. Variable-length chunks are used in LBFS [10], Shark [16], and Deep Store [11]. Beyond these three categories, some other techniques are also available.for example secure storage through secret sharing[12]. PASIS [13] and POTSHARDS [17], Similarly, steganographic systems, such as the Steganographic File System [18] and Mnemosyne [19], provide plausible deniability over storage contents through the use of random data blocks. Both the techniques has many times of plain text. Our system coalesces data at file level, thus achieving a space for saving files.here a unique tag will be generated by user without knowing him/her by which the hash values are accessed and make convergent efficient and also deduplication perform actively. As tag defined, duplication is detected and privileges are associated with it. Finally we represent secure deduplication through hybrid approach with CaaS model. Further Proof of ownership(pow)[24]schemes are security protocols which is designed to allow a server to verify the file whether it belongs to the authorized user or not. A PoW scheme should be efficient in terms of CPU, bandwidth and I/O for server and Ateniese et al.[23] proposed a protocol based on the Provable data Procession(PDP)[8] technology,which allows users to obtain a probabilistic proof from the storage service providers.such a proof will be used as evidence that their data have been stored there. One advantage for this protocol is that proof could be generated by storage service provider will be accessing only a small portion of the whole dataset. 6. CONCLUSION Our Authorized deduplication System is provided to protect the data from the attacker by generating Tag and Proof of Ownership (PoW). My proposed system showed that it will incur minimal overhead compared to previous deduplication check in a hybrid approach. Our secure deduplication system provides the best way to secure file by sending Tag generation and mainly occurred without any key generation for encryption and decryption. 7. FUTURE WORK In our secure system, we are using three different categories such that User, Auditor Controller(AC) and Cloud Storage Server(CSS).In future work, without Auditor controller, we can enhance this work. Xu et al[21] addressed the problem and showed a secure encryption without considering issues of the key management and block level deduplication. It is known that some commercial cloud storage providers,such as Bitcasa, also deploy convergent encryption for deduplication techniques.here group secure file transfer is consider one of the future work and inwhich among group there is no need help from AC.But between group deduplication work should be done with help of AC. REFERENCES : [1]. S. Quinlan and S. Dorward. Venti: a new approach to archival storage. In Proc. USENIX FAST, Jan [2]. J. R. Douceur, A. Adya, W. J. Bolosky, D. Simon, and M. Theimer.Reclaiming space from duplicate files in a serverless distributed file system. In ICDCS, pages , [3]. D. Ferraiolo and R. Kuhn. Role-based access controls. In 15 th NIST-NCSC National Computer Security Conf.,

6 [4]. R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-based access control models.ieee Computer, 29:38 47, Feb [5]. M. Bellare, S. Keelveedhi, and T. Ristenpart. Message-locked encryption and secure deduplication. In EUROCRYPT, pages , [6]. S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg. Proofs of ownership in remote storage systems. In Y. Chen, G. Danezis, and V. Shmatikov, editors, ACM Conference on Computer and Communications Security, pages ACM, [7]. [8]. [9]. [10]. A. Muthitacharoen, B. Chen, and D. Mazières. A low-bandwidth network file system. In Proceedings of the 18th ACM Symposium on Operating Systems Principles (SOSP 01), pages , Oct [11]. L. L. You, K. T. Pollack, and D. D. E. Long. Deep Store: An archival storage system architecture. In Proceedings of the 21st International Conference on Data Engineering (ICDE 05), Tokyo, Japan, Apr IEEE [12]. A. Shamir. How to share a secret. Communications of the ACM, 22(11): , Nov [13]. G. R. Goodson, J. J. Wylie, G. R. Ganger, and M. K. Reiter. Efficient Byzantine-tolerant erasure-coded storage. In Proceedings of the 2004 Int l conference on Dependable Systems and Networking (DSN 2004), June [14]. [15]. S. Quinlan and S. Dorward. Venti: A new approach to archival storage. In Proceedings of the 2002 Conference on File and Storage Technologies (FAST), pages , Monterey, California, USA, USENIX. [16]. S. Annapureddy, M. J. Freedman, and D. Mazières. Shark: Scaling file servers via cooperative caching. In Proceedings of the 2nd Symposium on Networked Systems Design and Implementation (NSDI), pages , 2005 [17]. M. W. Storer, K. M. Greenan, E. L. Miller, and K. Vorugant POTSHARDS: secure long-term storage without encryption. In Proceedings of the 2007 SENIX Annual Technical Conference, pages , June 2007 [18] R. Anderson, R. Needham, and A. Shamir. The steganographic file system. In Proceedings of the International Workshop on Information Hiding (IWIH 1998), pages 73 82, Portland, OR, Apr [19]. S. Hand and T. Roscoe. Mnemosyne: Peer-to-peer steganographic storage. Lecture Notes in Computer Science 2429: , Mar [20]. M. O. Rabin. Fingerprinting by random polynomials.technical Report TR-15-81, Center for Research in Computing Technology, Harvard University, [21]. J. Xu, E.-C. Chang, and J. Zhou. Weak leakage-resilient client-side deduplication of encrypted data in cloud storage. In ASIACCS,pages , [22].Googl , bf98/8a9a505e8aaee07a?show_docid=8a9a505e8aaee07a# [23]. G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song. Provable data possession at untrusted stores. In CCS '07, (2007)October ;Alexandria, VA, USA. [24]. [25]. [26]. 15

Data Deduplication Scheme for Cloud Storage

Data Deduplication Scheme for Cloud Storage 26 Data Deduplication Scheme for Cloud Storage 1 Iuon-Chang Lin and 2 Po-Ching Chien Abstract Nowadays, the utilization of storage capacity becomes an important issue in cloud storage. In this paper, we

More information

Optimized And Secure Data Backup Solution For Cloud Using Data Deduplication

Optimized And Secure Data Backup Solution For Cloud Using Data Deduplication RESEARCH ARTICLE OPEN ACCESS Optimized And Secure Data Backup Solution For Cloud Using Data Deduplication Siva Ramakrishnan S( M.Tech ) 1,Vinoth Kumar P (M.E) 2 1 ( Department Of Computer Science Engineering,

More information

DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION

DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION Hasna.R 1, S.Sangeetha 2 1 PG Scholar, Dhanalakshmi Srinivasan College of Engineering, Coimbatore. 2 Assistant Professor, Dhanalakshmi Srinivasan

More information

A SIGNIFICANT REDUCTION OF CLOUD STORAGE BY ELIMINATION OF REPETITIVE DATA

A SIGNIFICANT REDUCTION OF CLOUD STORAGE BY ELIMINATION OF REPETITIVE DATA INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE A SIGNIFICANT REDUCTION OF CLOUD STORAGE BY ELIMINATION OF REPETITIVE DATA M.Rajashekar Reddy 1, B.Ramya 2 1 M.Tech Student, Dept of

More information

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD Volume 1, Issue 7, PP:, JAN JUL 2015. SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD B ANNAPURNA 1*, G RAVI 2*, 1. II-M.Tech Student, MRCET 2. Assoc. Prof, Dept.

More information

A Survey Paper on Secure Auditing and Maintaining Block Level Integrity with Reliability of Data in Cloud

A Survey Paper on Secure Auditing and Maintaining Block Level Integrity with Reliability of Data in Cloud A Survey Paper on Secure Auditing and Maintaining Block Level Integrity with Reliability of Data in Cloud Aishwarya R. Kumthekar 1, Prof. Jyoti Raghatwan 2 1 M.E. II Computer, aish275@gmail.com, 8806967523

More information

Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System

Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System 1 K.Valli Madhavi A.P vallimb@yahoo.com Mobile: 9866034900 2 R.Tamilkodi A.P tamil_kodiin@yahoo.co.in Mobile:

More information

TITLE: Secure Auditing and Deduplicating Data in Cloud(Survey Paper)

TITLE: Secure Auditing and Deduplicating Data in Cloud(Survey Paper) TITLE: Secure Auditing and Deduplicating Data in Cloud(Survey Paper) Pratik Raut 1, Pratik Kamble 2, Prafull Pansare 3, Dipti Salunkhe 4 1 UG Student, Dept. of Computer Engineering, JSCOE, Hadapsar, Pune,

More information

Verifying Correctness of Trusted data in Clouds

Verifying Correctness of Trusted data in Clouds Volume-3, Issue-6, December-2013, ISSN No.: 2250-0758 International Journal of Engineering and Management Research Available at: www.ijemr.net Page Number: 21-25 Verifying Correctness of Trusted data in

More information

Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication

Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication Sanjay Kumar Baghel Mtech Scholar, CSE, CSIT DURG Sanju5878@gmail.com Bhupesh Kumar Dewangan Assistant Professor,CSE,

More information

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD S.REVATHI B.HASEENA M.NOORUL IZZATH PG Student PG Student PG Student II- ME CSE II- ME CSE II- ME CSE Al-Ameen Engineering

More information

February. ISSN: 2321-8134

February. ISSN: 2321-8134 IJFEAT INTERNATIONAL JOURNAL FOR ENGINEERING APPLICATIONS AND TECHNOLOGY TITLE: DATA PLACE & MANAGE SECURITY IN CLOUD COMPUTING FOR EFFECTIVE AND FLEXIBLE DISTRIBUTED SYSTEM 1 Mr. Pritam S. Bhoyar, 2 Mr.

More information

Identifying Data Integrity in the Cloud Storage

Identifying Data Integrity in the Cloud Storage www.ijcsi.org 403 Identifying Data Integrity in the Cloud Storage Saranya Eswaran 1 and Dr.Sunitha Abburu 2 1 Adhiyamaan College of Engineering, Department of Computer Application, Hosur. 2 Professor and

More information

Selective dependable storage services for providing security in cloud computing

Selective dependable storage services for providing security in cloud computing Selective dependable storage services for providing security in cloud computing Gade Lakshmi Thirupatamma*1, M.Jayaram*2, R.Pitchaiah*3 M.Tech Scholar, Dept of CSE, UCET, Medikondur, Dist: Guntur, AP,

More information

15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM

15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM Dhanashri Bamane Vinayak Pottigar Subhash Pingale Department of Computer Science and Engineering SKN

More information

Improving data integrity on cloud storage services

Improving data integrity on cloud storage services International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services

More information

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department

More information

IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD

IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD 1 Ms.Nita R. Mhaske, 2 Prof. S.M.Rokade 1 student, Master of Engineering, Dept. of Computer Engineering Sir Visvesvaraya

More information

A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA

A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA Mr.Mahesh S.Giri Department of Computer Science & Engineering Technocrats Institute of Technology Bhopal, India

More information

SHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING

SHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING SHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING Er. Kavin M 1, Mr.J.Jayavel 2 1 PG Scholar, 2 Teaching Assistant, Department of Information Technology, Anna University Regional

More information

Secure Cloud StorageForPrivacy-Preserving Public Audit

Secure Cloud StorageForPrivacy-Preserving Public Audit RESEARCH ARTICLE OPEN ACCESS Secure Cloud StorageForPrivacy-Preserving Public Audit ShekhAhamadhusen D., Prof. Rahul Deshmukh Abstract- In Cloud Environment, using cloud storage service, users can remotely

More information

RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES

RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES 1 MD ISMAIL Z, 2 ASHFAQUE AHAMED K. 1 PG Scholar,Department of Computer Science, C.Abdul Hakeem College Of Arts and Science,Melvisharam.

More information

Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing.

Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing. Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Privacy - Preserving

More information

De-duplication-based Archival Storage System

De-duplication-based Archival Storage System De-duplication-based Archival Storage System Than Than Sint Abstract This paper presents the disk-based backup system in which only relational database files are stored by using data deduplication technology.

More information

A Survey on Secure Storage Services in Cloud Computing

A Survey on Secure Storage Services in Cloud Computing Global Journal of Computer Science and Technology Cloud & Distributed Volume 12 Issue 12 Version 1.0 Year 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

SURVEY ON DISTRIBUTED DEDUPLICATION SYSTEM WITH AUDITING AND IMPROVED RELIABILITY IN CLOUD Rekha R 1, ChandanRaj BR 2

SURVEY ON DISTRIBUTED DEDUPLICATION SYSTEM WITH AUDITING AND IMPROVED RELIABILITY IN CLOUD Rekha R 1, ChandanRaj BR 2 SURVEY ON DISTRIBUTED DEDUPLICATION SYSTEM WITH AUDITING AND IMPROVED RELIABILITY IN CLOUD Rekha R 1, ChandanRaj BR 2 1 MTech, 4th Sem, Dept. Of Computer Science and Engineering EWIT, Bengaluru-91 2 Assistant

More information

Target Deduplication Metrics and Risk Analysis Using Post Processing Methods

Target Deduplication Metrics and Risk Analysis Using Post Processing Methods Target Deduplication Metrics and Risk Analysis Using Post Processing Methods Gayathri.R 1, 1 Dr. Malathi.A 2 1 Assistant Professor, 2 Assistant Professor 1 School of IT and Science, 2 PG and Research Department

More information

CONSIDERATION OF DYNAMIC STORAGE ATTRIBUTES IN CLOUD

CONSIDERATION OF DYNAMIC STORAGE ATTRIBUTES IN CLOUD INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE CONSIDERATION OF DYNAMIC STORAGE ATTRIBUTES IN CLOUD Ravi Sativada 1, M.Prabhakar Rao 2 1 M.Tech Student, Dept of CSE, Chilkur Balaji

More information

Remote Data Integrity Checking for Public Clouds

Remote Data Integrity Checking for Public Clouds IBM Student Workshop for Frontiers of Cloud Computing 01 Remote Data Integrity Checking for Public Clouds Bo (Irvine) Chen Department of Computer Science New Jersey Institute of Technology joint work with

More information

Secure Hybrid Cloud Architecture for cloud computing

Secure Hybrid Cloud Architecture for cloud computing Secure Hybrid Cloud Architecture for cloud computing Amaresh K Sagar Student, Dept of Computer science and Eng LAEC Bidar Email Id: mr.amarsagar@gmail.com Sumangala Patil Associate prof and HOD Dept of

More information

Cloud Data Service for Issues in Scalable Data Integration Using Multi Authority Attribute Based Encryption

Cloud Data Service for Issues in Scalable Data Integration Using Multi Authority Attribute Based Encryption Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,

More information

Review On Deduplicating Data and Secure Auditing in Cloud

Review On Deduplicating Data and Secure Auditing in Cloud Review On Deduplicating Data and Secure Auditing in Cloud Mr.Satish Shelar 1, Prof.S.Y.Raut 2 1 Student ME CSE,PREC,Loni,Maharashtra,India 2 Asst.Professor,PREC,Loni, Maharashtra,India ---------------------------------------------------------------------***---------------------------------------------------------------------

More information

SECURED DATA STORAGE IN CLOUD

SECURED DATA STORAGE IN CLOUD International Journal of Information Technology & Management Information System (IJITMIS) Volume 6, Issue 2, July-December-2015, pp. 44-48, Article ID: IJITMIS_06_02_007 Available online at http://http://www.iaeme.com/issue.asp?jtype=ijitmis&vtype=6&itype=2

More information

A Survey on Secure Auditing and Deduplicating Data in Cloud

A Survey on Secure Auditing and Deduplicating Data in Cloud A Survey on Secure Auditing and Deduplicating Data in Cloud Tejaswini Jaybhaye 1 ; D. H. Kulkarni 2 PG Student, Dept. of Computer Engineering, SKNCOE, Pune, India 1 Assistant Professor, Dept. of Computer

More information

Erasure correcting to enhance data security in cloud data storage

Erasure correcting to enhance data security in cloud data storage Erasure correcting to enhance data security in cloud data storage K.Shrividhya Department of computer science- Vels University shrividhya224@gmail.com A.Sajeevram Department of computer science Vels University

More information

Multi-level Metadata Management Scheme for Cloud Storage System

Multi-level Metadata Management Scheme for Cloud Storage System , pp.231-240 http://dx.doi.org/10.14257/ijmue.2014.9.1.22 Multi-level Metadata Management Scheme for Cloud Storage System Jin San Kong 1, Min Ja Kim 2, Wan Yeon Lee 3, Chuck Yoo 2 and Young Woong Ko 1

More information

ADVANCE SECURITY TO CLOUD DATA STORAGE

ADVANCE SECURITY TO CLOUD DATA STORAGE Journal homepage: www.mjret.in ADVANCE SECURITY TO CLOUD DATA STORAGE ISSN:2348-6953 Yogesh Bhapkar, Mitali Patil, Kishor Kale,Rakesh Gaikwad ISB&M, SOT, Pune, India Abstract: Cloud Computing is the next

More information

OVERVIEW OF SECURITY ISSUES IN CLOUD COMPUTING

OVERVIEW OF SECURITY ISSUES IN CLOUD COMPUTING OVERVIEW OF SECURITY ISSUES IN CLOUD COMPUTING K. Arumugam 1, P. Sumathi 2 1 Research Scholar/Department Of Computer Science, Government Arts College, Coimbatore (India) 2 Assistant Professor/Department

More information

ISSN 2278-3091. Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability

ISSN 2278-3091. Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability Outsourcing and Discovering Storage Inconsistencies in Cloud Through TPA Sumathi Karanam 1, GL Varaprasad 2 Student, Department of CSE, QIS College of Engineering and Technology, Ongole, AndhraPradesh,India

More information

A Novel Re-Authentication Scheme on Cloud Based Storage Services T.G.V.V.Srinivas 1, P.Suresh Babu 2 1 Final M.Tech Student, 2 Associate professor

A Novel Re-Authentication Scheme on Cloud Based Storage Services T.G.V.V.Srinivas 1, P.Suresh Babu 2 1 Final M.Tech Student, 2 Associate professor A Novel Re-Authentication Scheme on Cloud Based Storage Services T.G.V.V.Srinivas 1, P.Suresh Babu 2 1 Final M.Tech Student, 2 Associate professor 1,2 Dept of CSE, Kaushik College of engineering, JNTUK

More information

A Proxy-Based Data Security Solution in Mobile Cloud

A Proxy-Based Data Security Solution in Mobile Cloud , pp. 77-84 http://dx.doi.org/10.14257/ijsia.2015.9.5.08 A Proxy-Based Data Security Solution in Mobile Cloud Xiaojun Yu 1,2 and Qiaoyan Wen 1 1 State Key Laboratory of Networking and Switching Technology,

More information

Secrecy Maintaining Public Inspecting For Secure Cloud Storage

Secrecy Maintaining Public Inspecting For Secure Cloud Storage Secrecy Maintaining Public Inspecting For Secure Cloud Storage K.Sangamithra 1, S.Tamilselvan 2 M.E, M.P.Nachimuthu.M.Jaganathan Engineering College, Tamilnadu, India 1 Asst. Professor, M.P.Nachimuthu.M.Jaganathan

More information

CLOUD BASED STORAGE SERVICES FOR SECURITY FOLLOWED BY THE DATA AUTHENTICATION

CLOUD BASED STORAGE SERVICES FOR SECURITY FOLLOWED BY THE DATA AUTHENTICATION INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE CLOUD BASED STORAGE SERVICES FOR SECURITY FOLLOWED BY THE DATA AUTHENTICATION Akheel Mohammed 1, Dr.Vasumathi 2, Mir Ahmed Ali

More information

Role Based Encryption with Efficient Access Control in Cloud Storage

Role Based Encryption with Efficient Access Control in Cloud Storage Role Based Encryption with Efficient Access Control in Cloud Storage G. V. Bandewar 1, R. H. Borhade 2 1 Department of Information Technology, Sinhgad Technical Education Society s SKNCOE, Pune, India

More information

Dynamic Resource Allocation and Data Security for Cloud

Dynamic Resource Allocation and Data Security for Cloud Dynamic Resource Allocation and Data Security for Cloud Rajesh M. Devakate Annasaheb Dange College of Engg. & Technology, Ashta, Maharashtra, India. Amol B. Rajmane Ashokrao Mane Group of Institutions,

More information

AN EXPOSURE TO RELIABLE STORAGE SERVICES IN CLOUD COMPUTING

AN EXPOSURE TO RELIABLE STORAGE SERVICES IN CLOUD COMPUTING INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EXPOSURE TO RELIABLE STORAGE SERVICES IN CLOUD COMPUTING Ayesha Romana 1, Akheel Mohammed 2, Ayesha 3 1 M.Tech Student, Dept

More information

International Journal of Infinite Innovations in Engineering and Technology. ISSN (Online): 2349-2287, ISSN (Print): 2349-2279 2015

International Journal of Infinite Innovations in Engineering and Technology. ISSN (Online): 2349-2287, ISSN (Print): 2349-2279 2015 SECURED AUDITING SYSTEM FOR CLOUD DATA STORAGE WITH ERROR CORRECTION GUARANTEES 1 S.Sathya, 2 S.Sivakumar 1 Research Scholar, Department of Computer Science & Applications, PGP College of Arts & Science,

More information

Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud

Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud M.Jayanthi, Assistant Professor, Hod of MCA.E mail: badini_jayanthi@yahoo.co.in MahatmaGandhi University,Nalgonda, INDIA. B.Ranganatha

More information

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction Enhancing Data Security in Cloud Storage Auditing With Key Abstraction 1 Priyadharshni.A, 2 Geo Jenefer.G 1 Master of engineering in computer science, Ponjesly College of Engineering 2 Assistant Professor,

More information

M. Nathiya 2 B.Tech. (IT), M.E. (CSE), Assistant Professor, Shivani Engineering College, Trichy, Tamilnadu, India.

M. Nathiya 2 B.Tech. (IT), M.E. (CSE), Assistant Professor, Shivani Engineering College, Trichy, Tamilnadu, India. ISSN: 2321-7782 (Online) Volume 2, Issue 5, May 2014 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com Robust Data

More information

Insuring Security for Outsourced Data Stored in Cloud Environment

Insuring Security for Outsourced Data Stored in Cloud Environment Insuring Security for Outsourced Data Stored in Cloud Environment Durga Priya.G Department of Information Technology Sri Sairam Engineering College Chennai-45, India Soma Prathibha Department of Information

More information

Dynamic Data Storage for Trustworthy Cloud

Dynamic Data Storage for Trustworthy Cloud www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 11 November, 2014 Page No. 9350-9354 Dynamic Data Storage for Trustworthy Cloud Prof. M.M.More, Mahesh

More information

Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment

Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment Deepa Noorandevarmath 1, Rameshkumar H.K 2, C M Parameshwarappa 3 1 PG Student, Dept of CS&E, STJIT, Ranebennur. Karnataka, India

More information

Development of enhanced Third party Auditing Scheme for Secure Cloud Storage

Development of enhanced Third party Auditing Scheme for Secure Cloud Storage Development of enhanced Third party Auditing Scheme for Secure Cloud Storage Bhanu Prakash Chamakuri*1, D. Srikar*2, Dr. M.Suresh Babu*3 M.Tech Scholar, Dept of CSE, Grandhi Varalakshmi Institute Of Technology,

More information

Comments on "public integrity auditing for dynamic data sharing with multi-user modification"

Comments on public integrity auditing for dynamic data sharing with multi-user modification University of Wollongong Research Online Faculty of Engineering and Information Sciences - Papers Faculty of Engineering and Information Sciences 2016 Comments on "public integrity auditing for dynamic

More information

Side channels in cloud services, the case of deduplication in cloud storage

Side channels in cloud services, the case of deduplication in cloud storage Side channels in cloud services, the case of deduplication in cloud storage Danny Harnik IBM Haifa Research Lab dannyh@il.ibm.com Benny Pinkas Bar Ilan University benny@pinkas.net Alexandra Shulman-Peleg

More information

Keywords: CSV module, Third Party Auditors, SOAP protocol, ERP system, blowfish cryptography. Introduction

Keywords: CSV module, Third Party Auditors, SOAP protocol, ERP system, blowfish cryptography. Introduction IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY Cloud Storage Security And Providing Integrity Proof Prof. Avinash C Taskar*, Prof. Mangesh T Nikam * Computer Engineering Department,Sandip

More information

A Survey on Privacy-Preserving Techniques for Secure Cloud Storage

A Survey on Privacy-Preserving Techniques for Secure Cloud Storage Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,

More information

Towards a compliance audit of SLAs for data replication in Cloud storage

Towards a compliance audit of SLAs for data replication in Cloud storage Towards a compliance audit of SLAs for data replication in Cloud storage J. Leneutre B. Djebaili, C. Kiennert, J. Leneutre, L. Chen, Data Integrity and Availability Verification Game in Untrusted Cloud

More information

Trusted Public Auditing Process for Secure Cloud Storage

Trusted Public Auditing Process for Secure Cloud Storage Trusted Public Auditing Process for Secure Cloud Storage K.Adhiyaman 1, A. Jesudoss 2, D.Saravanan 3 1 Final Year MCA, Faculty of Computing, Department of MCA Sathyabama University, Chennai,Tamil Nadu,

More information

SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING

SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING Saranya.V 1, Suganthi.J 2, R.G. Suresh Kumar 3 1,2 Master of Technology, Department of Computer Science and Engineering, Rajiv Gandhi College of Engineering

More information

Data Grid Privacy and Secure Storage Service in Cloud Computing

Data Grid Privacy and Secure Storage Service in Cloud Computing Data Grid Privacy and Secure Storage Service in Cloud Computing L.Revathi 1, S.Karthikeyan 2 1 Research Scholar, Department of Computer Applications, Dr. M.G.R. Educational and Research Institute University,

More information

Near Sheltered and Loyal storage Space Navigating in Cloud

Near Sheltered and Loyal storage Space Navigating in Cloud IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 8 (August. 2013), V2 PP 01-05 Near Sheltered and Loyal storage Space Navigating in Cloud N.Venkata Krishna, M.Venkata

More information

Energy Efficiency in Secure and Dynamic Cloud Storage

Energy Efficiency in Secure and Dynamic Cloud Storage Energy Efficiency in Secure and Dynamic Cloud Storage Adilet Kachkeev Ertem Esiner Alptekin Küpçü Öznur Özkasap Koç University Department of Computer Science and Engineering, İstanbul, Turkey {akachkeev,eesiner,akupcu,oozkasap}@ku.edu.tr

More information

A Secure and Dependable Cloud Storage Service in Cloud Computing

A Secure and Dependable Cloud Storage Service in Cloud Computing A Secure and Dependable Cloud Storage Service in Cloud Computing Yalla Ram Charan MTech Student Department of CSE Sri Venkateswra College of Engineering & Technology Abstract: Cloud storage is a model

More information

Data management using Virtualization in Cloud Computing

Data management using Virtualization in Cloud Computing Data management using Virtualization in Cloud Computing A.S.R. Krishna Kanth M.Tech (CST), Department of Computer Science & Systems Engineering, Andhra University, India. M.Sitha Ram Research Scholar Department

More information

preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.

preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design. Privacy-Preserving Public Auditing For Secure Cloud Storage ABSTRACT: Using cloud storage, users can remotely store their data and enjoy the on-demand high-quality applications and services from a shared

More information

Data Integrity for Secure Dynamic Cloud Storage System Using TPA

Data Integrity for Secure Dynamic Cloud Storage System Using TPA International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 7-12 International Research Publication House http://www.irphouse.com Data Integrity for Secure

More information

Quanqing XU Quanqing.Xu@nicta.com.au. YuruBackup: A Highly Scalable and Space-Efficient Incremental Backup System in the Cloud

Quanqing XU Quanqing.Xu@nicta.com.au. YuruBackup: A Highly Scalable and Space-Efficient Incremental Backup System in the Cloud Quanqing XU Quanqing.Xu@nicta.com.au YuruBackup: A Highly Scalable and Space-Efficient Incremental Backup System in the Cloud Outline Motivation YuruBackup s Architecture Backup Client File Scan, Data

More information

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA U.Pandi Priya 1, R.Padma Priya 2 1 Research Scholar, Department of Computer Science and Information Technology,

More information

Enable Public Audit ability for Secure Cloud Storage

Enable Public Audit ability for Secure Cloud Storage Enable Public Audit ability for Secure Cloud Storage Leela Poornima 1, D.Hari Krishna 2 1 Student, Nova College of Engineering and Technology, Ibrahimpatnam,Krishna Dist., Andhra Pradesh, India 2 Assistant

More information

Performance Evaluation Panda for Data Storage and Sharing Services in Cloud Computing

Performance Evaluation Panda for Data Storage and Sharing Services in Cloud Computing Performance Evaluation Panda for Data Storage and Sharing Services in Cloud Computing Gunnala Ajay Kumar M.Tech Student Department of CSE Global Group Of Institutions Batasingaram, Ranga Reddy (Dist),

More information

PERFORMANCE OF BALANCED STORAGE SERVICES IN CLOUD SYSTEM

PERFORMANCE OF BALANCED STORAGE SERVICES IN CLOUD SYSTEM INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE PERFORMANCE OF BALANCED STORAGE SERVICES IN CLOUD SYSTEM Byagari Kumar 1, K.Pradeep Kumar 2 1 M.Tech Student, Dept of CSE, RRS College

More information

Secure Storage Services and Erasure Code Implementation in Cloud Servers

Secure Storage Services and Erasure Code Implementation in Cloud Servers Secure Storage Services and Erasure Code Implementation in Cloud Servers G. Rahul Reddy 1, N. J. Subashini 2 1 Research Scholar, M.Tech, Cloud Computing, Dept of Information Technology, SRM University,

More information

DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION

DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION Prof. M. Ben Swarup Professor, Department of CSE Vignan's Institute of Information Technology Visakhapatnam-49, India Chukkala

More information

Index Terms : cloud computing, Distributed Storage, error detection, data recovery, SHA, dynamic block operations

Index Terms : cloud computing, Distributed Storage, error detection, data recovery, SHA, dynamic block operations Revisiting Secure Cloud Storage by Replacing Token Generation With SHA Ms. Bhagyashree Alhat (1), Prof. Amar Buchade(2) Pune Institute of Computer Technology, University of Pune,PG Student(1), Assistant

More information

Index Terms: Data integrity, dependable distributed storage, Cloud Computing

Index Terms: Data integrity, dependable distributed storage, Cloud Computing Volume 5, Issue 5, May 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Cloud Data Protection

More information

Data Storage Security in Cloud Computing

Data Storage Security in Cloud Computing Data Storage Security in Cloud Computing Manoj Kokane 1, Premkumar Jain 2, Poonam Sarangdhar 3 1, 2, 3 Government College of Engineering and Research, Awasari, Pune, India Abstract: Cloud computing is

More information

Secure Data Deduplication

Secure Data Deduplication Secure Data Deduplication Mark W. Storer Kevin Greenan Darrell D. E. Long Ethan L. Miller Storage Systems Research Center University of California, Santa Cruz {mstorer,kmgreen,darrell,elm}@cs.ucsc.edu

More information

Protected Deduplication of Data using Hybrid Cloud

Protected Deduplication of Data using Hybrid Cloud Protected Deduplication of Data using Hybrid Cloud 1 B.NAVEEN, 2 V.SRINIVAS 1 M.Tech Student, Department of CSE, Aurora s Scientific Technological and Research Academy, Bandlaguda, Hyderabad. naveenbandari75@gmail.com

More information

Cloud Data Storage Security and Public Auditing

Cloud Data Storage Security and Public Auditing A Meticulous Description of Applying Watermarking Technique for Secure Cloud Storage 1 M. Guresh, 2 R. Suresh 1 M.Tech 2 nd Year, Department of CSE, CREC Tirupati, AP, India 2 Professor & HOD, Department

More information

Cloud Data Storage Services Considering Public Audit for Security

Cloud Data Storage Services Considering Public Audit for Security Global Journal of Computer Science and Technology Cloud and Distributed Volume 13 Issue 1 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE

SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE International Journal of Computer Network and Security(IJCNS) Vol 7. No.1 2015 Pp. 1-8 gopalax Journals, Singapore available at : www.ijcns.com ISSN: 0975-8283 ----------------------------------------------------------------------------------------------------------------------------------------------------------

More information

Secure Way of Storing Data in Cloud Using Third Party Auditor

Secure Way of Storing Data in Cloud Using Third Party Auditor IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 4 (Jul. - Aug. 2013), PP 69-74 Secure Way of Storing Data in Cloud Using Third Party Auditor 1 Miss.

More information

A Survey and a Data Integrity Proofs In Cloud Storage

A Survey and a Data Integrity Proofs In Cloud Storage IJCSNS International Journal of Computer Science and Network Security, VOL.15 No.11, November 2015 39 A Survey and a Data Integrity Proofs In Cloud Storage V.Kiruthika B.R.Laxmi Sree School Of IT & Science

More information

An Efficient Multi-Keyword Ranked Secure Search On Crypto Drive With Privacy Retaining

An Efficient Multi-Keyword Ranked Secure Search On Crypto Drive With Privacy Retaining An Efficient Multi-Keyword Ranked Secure Search On Crypto Drive With Privacy Retaining 1 B.Sahaya Emelda and 2 Mrs. P. Maria Jesi M.E.,Ph.D., 1 PG Student and 2 Associate Professor, Department of Computer

More information

A secure two-phase data deduplication scheme

A secure two-phase data deduplication scheme A secure two-phase data deduplication scheme Pierre Meye, Philippe Raipin, Frédéric Tronel, Emmanuelle Anceaume To cite this version: Pierre Meye, Philippe Raipin, Frédéric Tronel, Emmanuelle Anceaume.

More information

A Novel Way of Deduplication Approach for Cloud Backup Services Using Block Index Caching Technique

A Novel Way of Deduplication Approach for Cloud Backup Services Using Block Index Caching Technique A Novel Way of Deduplication Approach for Cloud Backup Services Using Block Index Caching Technique Jyoti Malhotra 1,Priya Ghyare 2 Associate Professor, Dept. of Information Technology, MIT College of

More information

HTTP-Level Deduplication with HTML5

HTTP-Level Deduplication with HTML5 HTTP-Level Deduplication with HTML5 Franziska Roesner and Ivayla Dermendjieva Networks Class Project, Spring 2010 Abstract In this project, we examine HTTP-level duplication. We first report on our initial

More information

Keywords: Cloud Storage, Shared Data, Privacy Preserving, Secret Sharing, Authentication, Third Party Auditor(TPA).

Keywords: Cloud Storage, Shared Data, Privacy Preserving, Secret Sharing, Authentication, Third Party Auditor(TPA). Volume 5, Issue 4, April 215 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Data Security in

More information

An Efficient Data Correctness Approach over Cloud Architectures

An Efficient Data Correctness Approach over Cloud Architectures International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 8, Issue 12 (October 2013), PP. 33-37 An Efficient Data Correctness Approach over

More information

Efficient File Storage Using Content-based Indexing

Efficient File Storage Using Content-based Indexing Efficient File Storage Using Content-based Indexing João Barreto joao.barreto@inesc-id.pt Paulo Ferreira paulo.ferreira@inesc-id.pt Distributed Systems Group - INESC-ID Lisbon Technical University of Lisbon

More information

Efficient Integrity Checking Technique for Securing Client Data in Cloud Computing

Efficient Integrity Checking Technique for Securing Client Data in Cloud Computing International Journal of Electrical & Computer Sciences IJECS-IJENS Vol: 11 No: 05 41 Efficient Integrity Checking Technique for Securing Client Data in Cloud Computing Abstract-- It has been widely observed

More information

Secure Deduplication and Data Security with Efficient and Reliable Convergent Key Management

Secure Deduplication and Data Security with Efficient and Reliable Convergent Key Management Secure Deduplication and Data Security with Efficient and Reliable Convergent Key Management Nikhil O. Agrawal 1, Prof.S.S.Kulkarni 2 Student, Information Technology, PRMIT&R, Badnera 1 Professor, Information

More information

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer

More information

A Survey on Data Integrity of Cloud Storage in Cloud Computing

A Survey on Data Integrity of Cloud Storage in Cloud Computing A Survey on Data Integrity of Cloud Storage in Cloud Computing A B S T R A C T Mr.Vitthal Raut, Prof. Suhasini Itkar Department Computer Engineering, PES Modern College of Engineering, Pune, India. raut.vitthal@gmail.com,

More information

IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD ENVIRONMENT

IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD ENVIRONMENT IJRRECS/November 2014/Volume-2/Issue-11/3699-3703 ISSN 2321-5461 INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD

More information

Implementation of Role Based Access Control on Encrypted Data in Hybrid Cloud

Implementation of Role Based Access Control on Encrypted Data in Hybrid Cloud Implementation of Role Based Access Control on Encrypted Data in Hybrid Cloud Gajanan Ganorkar, Prof. A.B. Deshmukh, Prof M.D.Tambhakhe Information Technology Email:g.ganorkar7691@gmail.com Contact: 8600200142

More information

Advanced HMAC Schemes for Hybrid Cloud Deduplication G. Siva Punyavathi 1, P. Neelima 2

Advanced HMAC Schemes for Hybrid Cloud Deduplication G. Siva Punyavathi 1, P. Neelima 2 Advanced HMAC Schemes for Hybrid Cloud Deduplication G. Siva Punyavathi 1, P. Neelima 2 1 M. Tech Student, Department of Computer Science and Engineering, S.R.K.R Engineering College, Bhimavaram, Andhra

More information

Data Integrity and Dynamic Storage Way in Cloud Computing

Data Integrity and Dynamic Storage Way in Cloud Computing 1 Data Integrity and Dynamic Storage Way in Cloud Computing Dinesh.C, P.G Scholar, Computer Science and Engineering, Mailam Engineering College, Mailam, Tamilnadu. Abstract It is not an easy task to securely

More information