A Survey on Data Storage Security in Cloud Computing

Size: px
Start display at page:

Download "A Survey on Data Storage Security in Cloud Computing"

Transcription

1 ISSN: X Karpagam Journal of Engineering Research (KJER) Vol: 5, 1, Special Issue on A Survey on Data Storage Security in Cloud Computing A.Amali Angel Punitha M.E 1, G.Indumathi M.E,Ph.D 2 1 Assistant Professor,Dept of CSE,[email protected],ULTRA College of Engg & Tech for Women,Madurai, India 2 Professor,Dept of ECE,[email protected],Mepco Schlenk Engg College,Sivakasi, India Abstract The Cloud computing is a latest technology which provides various services through internet. The Cloud server allows user to store their data on the cloud without worrying about correctness & integrity of data. Cloud data storage has many advantages over local data storage, User can upload their data on cloud and can access those data anytime anywhere without any additional burden. But the major issue for cloud is its security. Cloud Computing enables various users to send the data over internet which is then stored at data centers, but there is less chance of data loss. Hence Cloud Security is becoming a major concern for organizations. This Paper discusses the security issues i.e risks, attacks that arise in cloud computing. The aim of the paper is to analyze the various cryptographic techniques and to discuss the various security techniques over cloud which is most helpful and useful in the information security. Keywords: Cloud Security,CPDP,HVR,HIH,ECIES,ECC. 1. Introduction Cloud computing is the most enticing technology due to its flexibility and cost efficiency. There is a extensive scope of cloud computing as many of the organizations have adopted it. Use of cloud computing in organizations can increase the capacity and capabilities of the software by many folds. Security is a necessary component for strong privacy safeguards in all online computing scenarios, but security alone is not enough. Consumers and businesses are ready to use online computing only if they have the reliance that their data will stay private and secure. So to create a trusted environment for customers, we need to develop software, services, and processes with privacy in mind. NIST definition of cloud computing: Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. Cloud storage is a model of networked online storage in which the data is stored in virtualized pools of storage that are generally being hosted by the third parties. Cloud storage allows data stored remotely to be temporarily cached on mobile phones, desktop computers, or other Internet-linked devices. Security and cost are the top issues in this field and vary greatly, depending on the vendor one choose. Cloud service providers such as Microsoft, Oracle Amazon, Google etc. are able to provide huge clouds which are nothing but computing resources that are provided on demand through Internet. The main focus depends upon the data security and privacy. The rest of the paper is organized as follows. Section II Presents the Cloud Architecture, The notion of privacy in cloud storage is presented in section III and the security risks are presented in Section IV. The Section V gives a brief Literature survey about the security risks in cloud storage presents the possible Encryptions techniques in section VI. The section VII gives a brief comparative study of the existing privacy-preserving methodologies. Finally, the paper concludes in Section VIII. 101

2 2.Cloud Architecture In general, geographical distribution works to promote low cost, scalability, flexibility, homogeneity, advanced security technology and service-orientation, Computing architecture is classified based on the type of cloud service. There are three main categories of model. 2.1.Software-as-a-Service (SaaS) SaaS is a set of IT applications run in the cloud and is used to deliver applications through a browser to thousands of customers, using a multiuser architecture. SaaS focuses on the end user/client as opposed to managed services. Basically, a managed service is an application that is accessible to an organization s IT infrastructure, rather than to end users. Examples include Gmail from Google, and Microsoft Office Live. 2.2.Platform-as-a-Service (PaaS) PaaS is closely related to SaaS, but delivers a platform on which to work, rather than an application to work with. It provides the capability to build or deploy applications on top of an infrastructure layer. PaaS delivers development environments to analysts, programmers and software engineers as a service. A provider of cloud computing offers multiple application components that align with specific development models and programming tools. Examples: Google s Apps Engine, Microsoft- Windows Live. Open shift, etc 2.3. Infrastructure-as-a-Service (IaaS) IaaS is a model in which an organization outsources the equipment used to support operations, including hardware, servers and networking components. IaaS is similar to the managed services offered in the Internet era Examples include Elastic Compute Cloud, Amazon, Microsoft Windows Azure Fig 1.1 Cloud Architecture 2.4.Cloud Deployment Models There are four deployment models according to the modes of Cloud Service Delivery:[1] a. Public cloud, where the cloud infrastructure is available to a group of organizations; b.private cloud, where the cloud infrastructure is available to a single organization; c.community cloud, where the cloud infrastructure shares a set of characteristics in the cloud, and is shared between many organizations. d.hybrid cloud, can be defined as the form of two or more clouds like private and public or public and hybrid. 3. Privacy In Cloud Storage Newly, many services in the cloud, e.g., healthcare, online marketing, banking & payment, and social media depend on the use of personal information. Those privacy-sensitive data are residing in the other side of the globe. This movement highlights concerns on privacy in the cloud like how privacy of users is perceived and protected 102

3 3.1.What is Privacy? Privacy means that the person to be free from all interference. Privacy control allows the person to maintain a degree of intimacy. Privacy is the protection for the truthful use of personal information of cloud user. Privacy breaches may create a lot of troubles to cloud users. The American Institute of Certified Public Accountants (AICPA) and Canadian Institute of Charted Accountants (CICA) define that, Privacy is the right and obligation of individuals and organizations with respect to the collection, use, retention, and disclosure of personal information Privacy Issues in Cloud Storage When considering privacy risks in the cloud context, it is very important as privacy threats differ according to the type of cloud scenario. The papers [2][21] presents some of those issues in privacy which is as follows: lack of user control, lack of training and expertise, unauthorized secondary usage, complexity of regulatory compliance, addressing transponder data flow restrictions, litigation, legal uncertainty, compelled disclosure to the government, data security and disclosure of breaches, data accessibility, location of data, transfer and retention. 4. Security Risks 4.1.Data integrity The major security issue associated to cloud security risk is its data integrity. In the case of transition operations from or to the providers, the data stored may get effected. There are certain characteristics of risk of attacks from both outside and inside the cloud. It was difficult to manage the data corruption, when many clients and devices are synchronized by a single user. Many researchers says that by using Byzantine fault-tolerant replication protocol within the cloud, the data corruption problem can be solved.the cloud is most trusted among users because they trust cloud as a single reliable domain without the knowledge of the protection protocols. 4.2 Data Intrusion Data intrusion is the other security risk associated with a cloud provider; there is an example of data intrusion, If someone can hack the account password of cloud users, then the person can access all information s and the resources from the user s account. Thus, with a stolen password, a hacker can delete all information s from the virtual machine. If the user tries to modify the account or even disable the account services, then there is a possibility for the hacker to hack the too. As cloud allows to reset a lost password by , so a hacker can also visit to hack the new password. 4.3 Service Availability The other issue related to security risk is service availability. Service Provider has clearly mentioned in their licensing agreement that there might be a situation of service unavailability time to time. It was earlier stated that if any user s file will break the cloud storage policy, then the user s web service will be terminated at any time. Moreover, if there would be any loss to Cloud web service and the service fails, the service provider is not going to pay any charge. If the company wants to secure the services from such failure, needs measures such as backups or use of multiple providers. If there is any delay of payment from the user for cloud storage, then the user not be capable of getting access of their data. 5. Related Work In Ref [3] Wang et al proposed to combine BLS-based HLA with MHT to support both public audit ability and full data dynamics, none of them meet all the requirements for privacy preserving public auditing in cloud computing. In Ref [5] considered the public audit ability in their provable data possession (PDP) model for ensuring possession of data files on untrusted storages. In Ref [6] proposed a TPA to keep online storage honest by first encrypting the data then sending a number of pre computed symmetric-keyed hashes over the encrypted data to the auditor. The auditor verifies the integrity of the data file and the server s possession of a previously committed decryption key. In Ref [7] Juels et al presented a proof of retrievability (POR) model, where spot-checking and error-correcting codes are used to ensure both possession and retrievability of data files on remote archive service systems. In Ref [8] Schwarz and Miller et al. proposed the first study of checking the integrity of the remotely stored data across multiple distributed servers. Their approach is based on erasure-correcting code. In Ref [9] Bowers et al utilized a two-layer erasure-correcting code structure on the remotely archived data and extend their POR model to distributed scenario with high-data availability assurance. In Ref [10] proposed a new technique in 103

4 which the burden of cloud user from the tedious and possibly privacy auditing task, but also alleviates the users terror of their outsourced data security. Taking into account TPA may concurrently handle multiple audit sessions from dissimilar users for their outsourced data files, he further extend this privacy-preserving public auditing protocol into a multi-user scenario, where the TPA can perform multiple auditing tasks in a batch manner for better effectiveness. In Ref [11] Zhu,Yan et al suggested the efficient provable data possession for hybrid clouds. They focused on the construction of PDP scheme for hybrid clouds, supporting privacy protection and dynamic scalability. They first provide an effective construction of Cooperative Provable Data Possession (CPDP) using Homomorphic Verifiable Responses (HVR) and Hash Index Hierarchy (HIH). This construction uses homomorphic property, such that the responses of the client s challenge computed from multiple CSPs can be combined into a single response as the final result of hybrid clouds. By using this mechanism, the clients can be con-vinced of data possession without knowing what machines or in which geographical locations their files reside. More prominently a new hash index hierarchy is proposed for the clients to seam-lessly store and manage the resources in hybrid clouds. Their ex-perimental results also validate the effectiveness of their construction. In Ref [12] suggested the Trusted Cloud Computing with Secure Resources and Data Coloring,. This technique safeguard multi-way authentications, enable single sign-on in the cloud, and tighten access control for sensitive data in both public and private cloud. In Ref [13] proposed the An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing, It deals with An efficient and secure dynamic auditing protocol is desired to convince data owners that the data are correctly stored in the cloud. It said that the auditing protocols are secure and efficient. In Ref [14] proposed the encryption of a few bits per data block. It Checking the integrity of the uploaded data in a light approach, It reduced the computation, network bandwidth and storage overhead. In Ref [15] proposed hash functions and error correcting code techniques, It checking the integrity and correcting errors. It supports the security application of power cloud computing. In Ref [16] suggested multilayered architecture and agents, It offered the backup of the data. In Ref [17] proposed Anonymization techniques employed, It ensure the confidentiality by protecting user data from service providers using HPAE Architecture. It provides and effective practical solution since it can handle large volume of data. In Ref[18] presented the 3D ring each weighted according to CIA.It preventing the data leakage and ensuring the data privacy and confidentiality and availability. In Ref [19] presented multilayered architecture for enhancing the security of data storage by using an effective scheme called Defense in Depth. This layered architecture was more secure against various attacks. In Ref [20] suggested separation model for ensuring the confidentiality of stored data in the cloud by using RAIN Approach. It achieved without depending on heavy cryptographic operations. 6. Encryption Techniques 6.1. ECIES The Elliptic Curve Integrated Encryption Scheme is a public key encryption scheme based on ECC. It is designed to be se-mantic ally secure in the presence of an adversary capable of launching chosen-plaintext and chosen-cipher text attacks.the advantage of the ECIES is that on one hand it is meanwhile quite well investigated and thus considered secure while on the other hand just a very short bit length is needed as compared to other asymmetric systems ECC Elliptical curve cryptography is a public key encryption technique based on elliptic curve theory that can be used to make faster, less significant and more competent cryptographic keys. ECC produces keys during the properties of the elliptic curve equation as an alternative of the conventional method of creation as the produce of very huge prime numbers. The technology can be used in coincidence with most public key encryption methods, such as RSA, and Diffie-Hellman. 104

5 6.3. AES It is stand for Advanced Encryption Standard. It is a specification of the electronic data encryption. The Advanced Encryption Standard comprises three block ciphers, AES-128, AES-192 and AES-256. AES as a fixed block size of 128 bits and a key size of 128, 192, or 256 bits. The block-size has a maximum of 56 bits, but the keysize has no theoretical maximum. The cipher uses number of encryption rounds which converts plain text to cipher text DES It stands for Data encryption standard. It is a widely-used method of data encryption with the help of private or secrete key. DES uses 56-bit key to each 64-bit block of data. It can run in various modes and involves 16 rounds or operations. Although this is considered strong" encryption, many companies used triple DES that uses three keys in succession. 7. Conclusion Fig 1.2 Block diagram for Encrypted Cloud Data & its Models This paper, discussed about various Data Security techniques for data storage in cloud computing. But some security techniques are too costly to implement in real time. Apart from this, to increase the security level in the cloud environment there are still too many areas which require further enhancements to improve the efficient of algorithms for encryption will develop. Acknowledgements I thank LORD ALMIGHTY for His immense grace and my parents and my Supervisor for incessant encouragement and sustained support for this research work. References Journal & Conferences [1] Noha Alsulami, Eman Alharbi, Muhammad Mostafa Monowar,A Survey on Approaches of Data Confidentiality and Integrity Models in Cloud Computing Systems, Journal of Emerging Trends in Computing and Information Sciences,Vol. 6, No. 3 ISSN , March [2] Mohammed, A., AlSudiari, T., & Vasista, T. G. K Cloud Computing And Privacy Regulations: An Exploratory Study On Issues And Implications. Advanced Computing: An International Journal (ACIJ), 3 (2),

6 [3] Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, Enabling Public Audit ability and Data Dynamics for Storage Security in Cloud Computing, IEEE Trans. Parallel and Distributed Systems, vol. 22, no. 5, pp [4] Srinivas, D. "Privacy-Preserving Public Auditing In Cloud Storage Security." International Journal of computer science and Information Technologies, vol. 2, no. 6, pp , 011, ISSN: [5] Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song,Provable Data Possession at Untrusted Stores, Proc. 14th ACM Conf. Computer and Comm. Security (CCS 07), pp ,2011. [6] M.A. Shah, R. Swaminathan, and M. Baker,Privacy-Preserving Audit and Extraction of Digital Contents, Cryptology eprint Archive, Report 2008/186 [7] A. Juels and J. Burton, S. Kaliski, PORs: Proofs of Retrievability for Large Files, Proc. ACM Conf. Computer and Comm. Security (CCS 07), pp [8] T. Schwarz and E.L. Miller,Store, Forget, and Check: Using Algebraic Signatures to Check Remotely Administered Storage, Proc. IEEE Int l Conf. Distributed Computing Systems (ICDCS 06). [9] K.D. Bowers, A. Juels, and A. Oprea,HAIL: A High-Availability and Integrity Layer for Cloud Storage, Proc. ACM Conf. Computer&Comm. Security (CCS 09), pp [10] Srinivas, D. "Privacy-Preserving Public Auditing In Cloud Storage Security." International Journal of computer science and Information Technologies, vol. 2, no. 6, pp , 011, ISSN: [11] Zhu, Yan, Huaixi Wang, Zexing Hu, Gail-Joon Ahn, Hongxin Hu, and Stephen S. Yau."Efficient provable data possession for hybrid clouds."in Proceedings of the17th ACM Conference on Comp & comm security, pp ,2010 [12] K. Hwang and D. Li, Trusted Cloud Computing with Secure Resources and Data Coloring, IEEE Internet Computing, vol. 14,no. 5, pp , Sept./Oct [13] K. Yang and X. Jia, An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing, IEEE Trans. Parallel and Distributed Systems, vol. 24, no. 9,pp [14] R. Sravan Kumar and A. Saxena, Data integrity proofs in cloud storage, in 2011 Third International Conference on Communication Sys& Networks (COMSNETS), 2011, pp.1-4. [15] Y. Yang and Y. Yan, "Fine-Grained Data Integrity Check for Power Cloud Computing",5 th International Conference on Biomedical Engineering and Informatics,2012. [16] A.M. Talib, R. Atan, R. Abdullah and M. Azrifah, CloudZone: Towards an integrity layer of cloud data storage based on multi agent system architecture, IEEE Conference on Open Systems(ICOS), September [17] V.Ayala-Rivera, D. Nowak and P. McDonagh Protecting Organizational Data Confidentiality in the Cloud using a High-Performance Anonymization Engine,pp 1-8,2013. [18] P.Prasad, B. Ojha, R. R. Shahi, R. Lal, A. Vaish,and U. Goel, 3 Dimensional security in cloud computing, ICCRD 2011 (3), pp [19] N.el-Khameesy and H. Abdel Rahm, "A Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems, Journal of Emerging Trends in Computing and Information Sciences, June 2012, pp [20] M. G. Jaatun, A. A. Nyre, S. Alapnes, and G.Zhao, A Farewell to Trust : An Approach to Confidentiality Control in the Cloud, in Proceedings of the 2nd International Conference on Wireless communications, Vehicular Technology Book [21] Pearson, S Privacy, Security and Trust in Cloud Computing. Privacy and Security for Cloud Computing,

Improving data integrity on cloud storage services

Improving data integrity on cloud storage services International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services

More information

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD Volume 1, Issue 7, PP:, JAN JUL 2015. SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD B ANNAPURNA 1*, G RAVI 2*, 1. II-M.Tech Student, MRCET 2. Assoc. Prof, Dept.

More information

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department

More information

PRIVACY PRESERVING PUBLIC AUDITING FOR SECURED DATA STORAGE IN CLOUD USING BLOCK AUTHENTICATION CODE

PRIVACY PRESERVING PUBLIC AUDITING FOR SECURED DATA STORAGE IN CLOUD USING BLOCK AUTHENTICATION CODE PRIVACY PRESERVING PUBLIC AUDITING FOR SECURED DATA STORAGE IN CLOUD USING BLOCK AUTHENTICATION CODE R.REVATHI # PG Scholar #, Bharathiyar Institute Of Engineering for Women, Deviyakurichi, Salem(DT) India

More information

15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM

15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM Dhanashri Bamane Vinayak Pottigar Subhash Pingale Department of Computer Science and Engineering SKN

More information

A Survey on Privacy-Preserving Techniques for Secure Cloud Storage

A Survey on Privacy-Preserving Techniques for Secure Cloud Storage Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,

More information

Development of enhanced Third party Auditing Scheme for Secure Cloud Storage

Development of enhanced Third party Auditing Scheme for Secure Cloud Storage Development of enhanced Third party Auditing Scheme for Secure Cloud Storage Bhanu Prakash Chamakuri*1, D. Srikar*2, Dr. M.Suresh Babu*3 M.Tech Scholar, Dept of CSE, Grandhi Varalakshmi Institute Of Technology,

More information

Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System

Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System 1 K.Valli Madhavi A.P [email protected] Mobile: 9866034900 2 R.Tamilkodi A.P [email protected] Mobile:

More information

Cloud Data Service for Issues in Scalable Data Integration Using Multi Authority Attribute Based Encryption

Cloud Data Service for Issues in Scalable Data Integration Using Multi Authority Attribute Based Encryption Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,

More information

RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES

RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES 1 MD ISMAIL Z, 2 ASHFAQUE AHAMED K. 1 PG Scholar,Department of Computer Science, C.Abdul Hakeem College Of Arts and Science,Melvisharam.

More information

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer

More information

ADVANCE SECURITY TO CLOUD DATA STORAGE

ADVANCE SECURITY TO CLOUD DATA STORAGE Journal homepage: www.mjret.in ADVANCE SECURITY TO CLOUD DATA STORAGE ISSN:2348-6953 Yogesh Bhapkar, Mitali Patil, Kishor Kale,Rakesh Gaikwad ISB&M, SOT, Pune, India Abstract: Cloud Computing is the next

More information

A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA

A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA Mr.Mahesh S.Giri Department of Computer Science & Engineering Technocrats Institute of Technology Bhopal, India

More information

Trusted Public Auditing Process for Secure Cloud Storage

Trusted Public Auditing Process for Secure Cloud Storage Trusted Public Auditing Process for Secure Cloud Storage K.Adhiyaman 1, A. Jesudoss 2, D.Saravanan 3 1 Final Year MCA, Faculty of Computing, Department of MCA Sathyabama University, Chennai,Tamil Nadu,

More information

Verifying Correctness of Trusted data in Clouds

Verifying Correctness of Trusted data in Clouds Volume-3, Issue-6, December-2013, ISSN No.: 2250-0758 International Journal of Engineering and Management Research Available at: www.ijemr.net Page Number: 21-25 Verifying Correctness of Trusted data in

More information

A Survey on Secure Storage Services in Cloud Computing

A Survey on Secure Storage Services in Cloud Computing Global Journal of Computer Science and Technology Cloud & Distributed Volume 12 Issue 12 Version 1.0 Year 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System

How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System REVIEW ARTICAL A Novel Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage Dumala Harisha 1, V.Gouthami 2 1 Student, Computer Science & Engineering-Department, JNTU Hyderabad India

More information

ISSN 2278-3091. Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability

ISSN 2278-3091. Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability Outsourcing and Discovering Storage Inconsistencies in Cloud Through TPA Sumathi Karanam 1, GL Varaprasad 2 Student, Department of CSE, QIS College of Engineering and Technology, Ongole, AndhraPradesh,India

More information

Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage

Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage Pranita Bakka 1, Dr. Jayashree Agarkhed 2 1 P.G.Student, Department of Computer Science & Engineering,

More information

IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD

IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD 1 Ms.Nita R. Mhaske, 2 Prof. S.M.Rokade 1 student, Master of Engineering, Dept. of Computer Engineering Sir Visvesvaraya

More information

February. ISSN: 2321-8134

February. ISSN: 2321-8134 IJFEAT INTERNATIONAL JOURNAL FOR ENGINEERING APPLICATIONS AND TECHNOLOGY TITLE: DATA PLACE & MANAGE SECURITY IN CLOUD COMPUTING FOR EFFECTIVE AND FLEXIBLE DISTRIBUTED SYSTEM 1 Mr. Pritam S. Bhoyar, 2 Mr.

More information

Data Grid Privacy and Secure Storage Service in Cloud Computing

Data Grid Privacy and Secure Storage Service in Cloud Computing Data Grid Privacy and Secure Storage Service in Cloud Computing L.Revathi 1, S.Karthikeyan 2 1 Research Scholar, Department of Computer Applications, Dr. M.G.R. Educational and Research Institute University,

More information

Secrecy Maintaining Public Inspecting For Secure Cloud Storage

Secrecy Maintaining Public Inspecting For Secure Cloud Storage Secrecy Maintaining Public Inspecting For Secure Cloud Storage K.Sangamithra 1, S.Tamilselvan 2 M.E, M.P.Nachimuthu.M.Jaganathan Engineering College, Tamilnadu, India 1 Asst. Professor, M.P.Nachimuthu.M.Jaganathan

More information

Secure Privacy Preserving Public Auditing for Cloud storage

Secure Privacy Preserving Public Auditing for Cloud storage Secure Privacy Preserving Public Auditing for Cloud storage Sathiskumar R 1, Dr.Jeberson Retnaraj 2 Department of Information Technology, Sathyabama University, Chennai, India 1 Department of Information

More information

Identifying Data Integrity in the Cloud Storage

Identifying Data Integrity in the Cloud Storage www.ijcsi.org 403 Identifying Data Integrity in the Cloud Storage Saranya Eswaran 1 and Dr.Sunitha Abburu 2 1 Adhiyamaan College of Engineering, Department of Computer Application, Hosur. 2 Professor and

More information

Surveying Cloud Storage Correctness using TPA with BLS

Surveying Cloud Storage Correctness using TPA with BLS Surveying Cloud Storage Correctness using TPA with BLS Priyanka Dehariya 1, Prof. Shweta Shrivastava 2, Dr. Vineet Richaraya 3 1 M.Tech Scholar (CSE), LNCT, Bhopal 2 Asst.Professors, (CSE Department),

More information

Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication

Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication Sanjay Kumar Baghel Mtech Scholar, CSE, CSIT DURG [email protected] Bhupesh Kumar Dewangan Assistant Professor,CSE,

More information

M. Nathiya 2 B.Tech. (IT), M.E. (CSE), Assistant Professor, Shivani Engineering College, Trichy, Tamilnadu, India.

M. Nathiya 2 B.Tech. (IT), M.E. (CSE), Assistant Professor, Shivani Engineering College, Trichy, Tamilnadu, India. ISSN: 2321-7782 (Online) Volume 2, Issue 5, May 2014 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com Robust Data

More information

Cloud Data Storage Services Considering Public Audit for Security

Cloud Data Storage Services Considering Public Audit for Security Global Journal of Computer Science and Technology Cloud and Distributed Volume 13 Issue 1 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

SHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING

SHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING SHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING Er. Kavin M 1, Mr.J.Jayavel 2 1 PG Scholar, 2 Teaching Assistant, Department of Information Technology, Anna University Regional

More information

Analysis of Secure Cloud Data Sharing Within a Group

Analysis of Secure Cloud Data Sharing Within a Group Analysis of Secure Cloud Data Sharing Within a Group Ms. uri Pande* Department of CSE, GHRAET Nagpur (M.S), India, Prof. Vikrant Chole Dept of Computer Science & Engg Nagpur (M.S.), India Abstract In this

More information

Third Party Auditing For Secure Data Storage in Cloud through Trusted Third Party Auditor Using RC5

Third Party Auditing For Secure Data Storage in Cloud through Trusted Third Party Auditor Using RC5 Third Party Auditing For Secure Data Storage in Cloud through Trusted Third Party Auditor Using RC5 Miss. Nupoor M. Yawale 1, Prof. V. B. Gadicha 2 1 Student, M.E. Second year CSE, P R Patil COET, Amravati.INDIA.

More information

Dynamic Data Storage for Trustworthy Cloud

Dynamic Data Storage for Trustworthy Cloud www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 11 November, 2014 Page No. 9350-9354 Dynamic Data Storage for Trustworthy Cloud Prof. M.M.More, Mahesh

More information

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction Enhancing Data Security in Cloud Storage Auditing With Key Abstraction 1 Priyadharshni.A, 2 Geo Jenefer.G 1 Master of engineering in computer science, Ponjesly College of Engineering 2 Assistant Professor,

More information

Keywords: Cloud Computing, Data Dynamics, Data Integrity, Error Localization, Third Party Auditor.

Keywords: Cloud Computing, Data Dynamics, Data Integrity, Error Localization, Third Party Auditor. www.semargroup.org, www.ijsetr.com ISSN 2319-8885 Vol.03,Issue.11 June-2014, Pages:2300-2307 Secure Cloud: Storage with Privacy Preserving Public Auditing and Data Dynamics Dept of CSE, Malabar College

More information

Near Sheltered and Loyal storage Space Navigating in Cloud

Near Sheltered and Loyal storage Space Navigating in Cloud IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 8 (August. 2013), V2 PP 01-05 Near Sheltered and Loyal storage Space Navigating in Cloud N.Venkata Krishna, M.Venkata

More information

Erasure correcting to enhance data security in cloud data storage

Erasure correcting to enhance data security in cloud data storage Erasure correcting to enhance data security in cloud data storage K.Shrividhya Department of computer science- Vels University [email protected] A.Sajeevram Department of computer science Vels University

More information

DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION

DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION Prof. M. Ben Swarup Professor, Department of CSE Vignan's Institute of Information Technology Visakhapatnam-49, India Chukkala

More information

How To Ensure Correctness Of Data In The Cloud

How To Ensure Correctness Of Data In The Cloud A MECHANICS FOR ASSURING DATA STORAGE SECURITY IN CLOUD COMPUTING 1, 2 Pratibha Gangwar, 3 Mamta Gadoria 1 M. Tech. Scholar, Jayoti Vidyapeeth Women s University, Jaipur, [email protected] 2 M. Tech.

More information

CONSIDERATION OF DYNAMIC STORAGE ATTRIBUTES IN CLOUD

CONSIDERATION OF DYNAMIC STORAGE ATTRIBUTES IN CLOUD INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE CONSIDERATION OF DYNAMIC STORAGE ATTRIBUTES IN CLOUD Ravi Sativada 1, M.Prabhakar Rao 2 1 M.Tech Student, Dept of CSE, Chilkur Balaji

More information

Secure Way of Storing Data in Cloud Using Third Party Auditor

Secure Way of Storing Data in Cloud Using Third Party Auditor IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 4 (Jul. - Aug. 2013), PP 69-74 Secure Way of Storing Data in Cloud Using Third Party Auditor 1 Miss.

More information

PRIVACY PRESERVING AND BATCH AUDITING IN SECURE CLOUD DATA STORAGE USING AES

PRIVACY PRESERVING AND BATCH AUDITING IN SECURE CLOUD DATA STORAGE USING AES PRIVACY PRESERVING AND BATCH AUDITING IN SECURE CLOUD DATA STORAGE USING AES 1 SANTOSH P. JADHAV, 2 B. R. NANDWALKAR 1,2 Department of Computer Engineering, Late G.N.Sapkal collage of engineering, University

More information

OVERVIEW OF SECURITY ISSUES IN CLOUD COMPUTING

OVERVIEW OF SECURITY ISSUES IN CLOUD COMPUTING OVERVIEW OF SECURITY ISSUES IN CLOUD COMPUTING K. Arumugam 1, P. Sumathi 2 1 Research Scholar/Department Of Computer Science, Government Arts College, Coimbatore (India) 2 Assistant Professor/Department

More information

Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.

Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption. Secure Privacy-Preserving Cloud Services. Abhaya Ghatkar, Reena Jadhav, Renju Georgekutty, Avriel William, Amita Jajoo DYPCOE, Akurdi, Pune [email protected], [email protected], [email protected],

More information

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD S.REVATHI B.HASEENA M.NOORUL IZZATH PG Student PG Student PG Student II- ME CSE II- ME CSE II- ME CSE Al-Ameen Engineering

More information

Index Terms : cloud computing, Distributed Storage, error detection, data recovery, SHA, dynamic block operations

Index Terms : cloud computing, Distributed Storage, error detection, data recovery, SHA, dynamic block operations Revisiting Secure Cloud Storage by Replacing Token Generation With SHA Ms. Bhagyashree Alhat (1), Prof. Amar Buchade(2) Pune Institute of Computer Technology, University of Pune,PG Student(1), Assistant

More information

Cryptographic Data Security over Cloud

Cryptographic Data Security over Cloud Cryptographic Data Security over Cloud Er. Lalit Gehlod Asst.Professor, Dept.Of Computer Engineering, Institute Of Engineering & Technology, Devi Ahilya University, Indore, India. Govind Patidar Dept.

More information

Enable Public Audit ability for Secure Cloud Storage

Enable Public Audit ability for Secure Cloud Storage Enable Public Audit ability for Secure Cloud Storage Leela Poornima 1, D.Hari Krishna 2 1 Student, Nova College of Engineering and Technology, Ibrahimpatnam,Krishna Dist., Andhra Pradesh, India 2 Assistant

More information

Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage

Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage P. Selvigrija, Assistant Professor, Department of Computer Science & Engineering, Christ College

More information

Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing.

Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing. Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Privacy - Preserving

More information

Privacy-Preserving Public Auditing & Data Intrgrity for Secure Cloud Storage

Privacy-Preserving Public Auditing & Data Intrgrity for Secure Cloud Storage Privacy-Preserving Public Auditing & Data Intrgrity for Secure Cloud Storage Imran Ahmad Student, M.Tech Dept. Computer Science & Engineering Patel Institute of Technology Bhopal, India [email protected]

More information

Swathi matha P.G,Student,Jyothi.S,Asst professor,neetha Natesh,Associate professor,dr.ait,bangalore. A) Examples Of model:

Swathi matha P.G,Student,Jyothi.S,Asst professor,neetha Natesh,Associate professor,dr.ait,bangalore. A) Examples Of model: PRESERVING PRIVACY FOR SHARED DATA ON CLOUD STORAGE SYSTEM WITH SECURITY Swathi matha P.G,Student,Jyothi.S,Asst professor,neetha Natesh,Associate professor,dr.ait,bangalore Abstract- Cloud computing is

More information

SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING

SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING Saranya.V 1, Suganthi.J 2, R.G. Suresh Kumar 3 1,2 Master of Technology, Department of Computer Science and Engineering, Rajiv Gandhi College of Engineering

More information

Survey Paper on Integrity Auditing of Storage

Survey Paper on Integrity Auditing of Storage International Journal of Computational Engineering Research Vol, 04 Issue, 3 Survey Paper on Integrity Auditing of Storage Ugale Santosh A 1 1M.E. Computer AVCOE, Sangmner, India ABSTRACT: Cloud servers

More information

PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING

PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING T.Vidhya Sree M.Phil Research Scholar,CS, MGR College, Hosur (India) ABSTRACT Cloud Computing is the long dreamed vision

More information

Cloud Server Storage Security Using TPA

Cloud Server Storage Security Using TPA Cloud Server Storage Security Using TPA I K.Meenakshi, II Victo Sudha George I Student (M.Tech), DR. MGR Educational and Research Institute, India II Assisstant Professo, DR. MGR Educational and Research

More information

Secure Storage Services and Erasure Code Implementation in Cloud Servers

Secure Storage Services and Erasure Code Implementation in Cloud Servers Secure Storage Services and Erasure Code Implementation in Cloud Servers G. Rahul Reddy 1, N. J. Subashini 2 1 Research Scholar, M.Tech, Cloud Computing, Dept of Information Technology, SRM University,

More information

A Review of Cloud Environment and Recognition of Highly Secure Public Data Verification Architecture using Secure Public Verifier Auditor

A Review of Cloud Environment and Recognition of Highly Secure Public Data Verification Architecture using Secure Public Verifier Auditor I J C International Journal of lectrical, lectronics ISSN No. (Online): 2277-2626 and Computer ngineering 3(2): 144-148(2014) A Review of Cloud nvironment and Recognition of Highly Secure Public Data Verification

More information

How To Ensure Data Integrity In Cloud Computing

How To Ensure Data Integrity In Cloud Computing A Novel Approach for public exploration Data with Effective user Denial in the cloud Mahankali Anitha PG Scholar Department of CSE J.Vijayasree Assistant professor Department of CSE Dr.M.V.Siva Prasad

More information

A Novel Re-Authentication Scheme on Cloud Based Storage Services T.G.V.V.Srinivas 1, P.Suresh Babu 2 1 Final M.Tech Student, 2 Associate professor

A Novel Re-Authentication Scheme on Cloud Based Storage Services T.G.V.V.Srinivas 1, P.Suresh Babu 2 1 Final M.Tech Student, 2 Associate professor A Novel Re-Authentication Scheme on Cloud Based Storage Services T.G.V.V.Srinivas 1, P.Suresh Babu 2 1 Final M.Tech Student, 2 Associate professor 1,2 Dept of CSE, Kaushik College of engineering, JNTUK

More information

Public Auditability and Privacy preserving in Cloud Storage

Public Auditability and Privacy preserving in Cloud Storage Public Auditability and Privacy preserving in Cloud Storage Kishan Lathkar, Ambulgekar H. P SGGS IE&T Nanded, Maharashtra India [email protected], [email protected] Abstract: Cloud computing

More information

Authorized Auditing of Big Data Stored on Cloud with Auditability Aware Data Scheduling

Authorized Auditing of Big Data Stored on Cloud with Auditability Aware Data Scheduling Authorized Auditing of Big Data Stored on Cloud with Auditability Aware Data Scheduling Surapriya Swain 1, Prof. Saurabh Gupta 2 1 Department of Computer Engineering, GSMCOE, Balewadi, Savitribai Phule

More information

A Survey on Data Integrity of Cloud Storage in Cloud Computing

A Survey on Data Integrity of Cloud Storage in Cloud Computing A Survey on Data Integrity of Cloud Storage in Cloud Computing A B S T R A C T Mr.Vitthal Raut, Prof. Suhasini Itkar Department Computer Engineering, PES Modern College of Engineering, Pune, India. [email protected],

More information

SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE

SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE International Journal of Computer Network and Security(IJCNS) Vol 7. No.1 2015 Pp. 1-8 gopalax Journals, Singapore available at : www.ijcns.com ISSN: 0975-8283 ----------------------------------------------------------------------------------------------------------------------------------------------------------

More information

Data Integrity for Secure Dynamic Cloud Storage System Using TPA

Data Integrity for Secure Dynamic Cloud Storage System Using TPA International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 7-12 International Research Publication House http://www.irphouse.com Data Integrity for Secure

More information

Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud

Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud M.Jayanthi, Assistant Professor, Hod of MCA.E mail: [email protected] MahatmaGandhi University,Nalgonda, INDIA. B.Ranganatha

More information

Remote Data Integrity Checking in Cloud Computing

Remote Data Integrity Checking in Cloud Computing ISSN 2321 8169 Remote Data Integrity Checking in Cloud Computing Khaba M.V (Assistant Professor/CSE) RVS School of Engineering,dindigul [email protected] M.Santhanalakshmi(Assistant Professor/CSE) RVS

More information

AN EXPOSURE TO RELIABLE STORAGE SERVICES IN CLOUD COMPUTING

AN EXPOSURE TO RELIABLE STORAGE SERVICES IN CLOUD COMPUTING INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EXPOSURE TO RELIABLE STORAGE SERVICES IN CLOUD COMPUTING Ayesha Romana 1, Akheel Mohammed 2, Ayesha 3 1 M.Tech Student, Dept

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 3, March 3 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Using Third Party

More information

Secure Data transfer in Cloud Storage Systems using Dynamic Tokens.

Secure Data transfer in Cloud Storage Systems using Dynamic Tokens. Secure Data transfer in Cloud Storage Systems using Dynamic Tokens. P.Srinivas *,K. Rajesh Kumar # M.Tech Student (CSE), Assoc. Professor *Department of Computer Science (CSE), Swarnandhra College of Engineering

More information

Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving,

Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving, Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Third Party

More information

International Journal of Infinite Innovations in Engineering and Technology. ISSN (Online): 2349-2287, ISSN (Print): 2349-2279 2015

International Journal of Infinite Innovations in Engineering and Technology. ISSN (Online): 2349-2287, ISSN (Print): 2349-2279 2015 SECURED AUDITING SYSTEM FOR CLOUD DATA STORAGE WITH ERROR CORRECTION GUARANTEES 1 S.Sathya, 2 S.Sivakumar 1 Research Scholar, Department of Computer Science & Applications, PGP College of Arts & Science,

More information

International Journal of Advance Research in Computer Science and Management Studies

International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 12, December 2014 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online

More information

Data Integrity and Dynamic Storage Way in Cloud Computing

Data Integrity and Dynamic Storage Way in Cloud Computing 1 Data Integrity and Dynamic Storage Way in Cloud Computing Dinesh.C, P.G Scholar, Computer Science and Engineering, Mailam Engineering College, Mailam, Tamilnadu. Abstract It is not an easy task to securely

More information

Enabling Public Auditing for Secured Data Storage in Cloud Computing

Enabling Public Auditing for Secured Data Storage in Cloud Computing IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 5 (May. 2013), V3 PP 01-05 Enabling Public Auditing for Secured Data Storage in Cloud Computing 1 Er.Amandeep Kaur,

More information

Secure Distribution of File on Cloud

Secure Distribution of File on Cloud Secure Distribution of File on Cloud Niyamat I. Ujloomwale, Ranjana Badre Dept. of Computer, MIT Academy of Engineering, Alandi, Savitri Phule Pune University, Pune, India Dept. of Computer, MIT Academy

More information

A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments

A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining

More information

A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing

A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing International Journal of Emerging Engineering Research and Technology Volume 3, Issue 5, May 2015, PP 1-7 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) A Survey on Security Issues and Security Schemes

More information

BILINEAR PAIRING BASED PUBLIC AUDITING FOR SECURE CLOUD STORAGE USING TPA

BILINEAR PAIRING BASED PUBLIC AUDITING FOR SECURE CLOUD STORAGE USING TPA BILINEAR PAIRING BASED PUBLIC AUDITING FOR SECURE CLOUD STORAGE USING TPA Ms. Shweta khidrapure 1, Prof. Archana lomte 2 1 ME Computer Engg 2 Computer Dept. BSIOTR, Wagholi ABSTRACT Cloud data security

More information

EFFICIENT DISCOVERY OF INTEGRITY AUTOMATION IN HYBRID CLOUD COMPUTING

EFFICIENT DISCOVERY OF INTEGRITY AUTOMATION IN HYBRID CLOUD COMPUTING INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE EFFICIENT DISCOVERY OF INTEGRITY AUTOMATION IN HYBRID CLOUD COMPUTING K.Saipriya 1, A.Ravi Kumar 2 1 M.Tech Student, Dept of

More information

Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication

Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication Volume 4, Issue 6, June 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Three Layered

More information

preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.

preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design. Privacy-Preserving Public Auditing For Secure Cloud Storage ABSTRACT: Using cloud storage, users can remotely store their data and enjoy the on-demand high-quality applications and services from a shared

More information