Multi-Owner Data Sharing in Cloud Storage Using Policy Based Encryption

Size: px
Start display at page:

Download "Multi-Owner Data Sharing in Cloud Storage Using Policy Based Encryption"

Transcription

1 Multi-Owner Data Sharing in Cloud Storage Using Policy Based Encryption Shani Raj 1, Dr. Varghese Paul 2, Nishana Rahim 3 1,3 Assistant Professor, College of Engineering, Kottarakara, Kerala, India 2 Professor in IT, Cochin University of Science & Technology, Cochin, Kerala, India Abstract Cloud storages are generally hosted by third parties where data can be stored and shared. Cloud storage provides virtualized pools of storage and people buy or lease storage capacity from them. The security of data is major problem when people use commercial cloud services to store their data. To avoid unauthorized access, data should be encrypted before outsourcing. Instead of attribute based encryption, role based policies can be generated and based on that policies encryption can be done. In the case of data with multiple owners, the access control, integrity and revocation are major issues. All the owners must have same access policy and revocation should be done with the permission of all owners. Another major issue is key generation and management. Here we explore a policy based encryption technique where access key generation for user is based on access policies assigned to each user along with the attributes. The data stored in the cloud is encrypted using a key generated based on the access permissions assigned to the data and attributes of the owners who share their data with high security and integrity using policy based encryption technique. Keywords ABE, Access control, Access key, Cloud Storage, Integrity, Policy, Revocation. I. INTRODUCTION Cloud computing is a general term for anything that involves delivering hosted services, scalable services like data sharing, accessing etc., over the web on demand basis. It uses the web and central remote servers to maintain data and applications. Cloud computing allows consumers and businesses to use applications without installation and access their personal files at any computer with web access. This technology allows for much more efficient computing by centralizing storage, memory, processing and bandwidth. Cloud computing is broken down into three segments: "application" "storage" and "connectivity". Each segment serves a different purpose and offers different products for businesses and individuals around the world. Multi-owner information exchange is a model for sharing business data of large organizations, which allows owners to create, manage and control their information/data in cloud. Cloud storage permits a large number of users having different roles and access permissions to share and store their data. In policy based data sharing, each user has an access policy for the system and each file has some file access policy which may differ for different users. In a distributed environment multiple copies of data is there to improve availability. Hence the integrity and access control are major concerns. A cloud system may have many cloud service providers (CSPs) to improve the performance of said system. Based on availability and work load, the system selects a CSP for the client accessing it. Hundreds or thousands of clients may access the system simultaneously; hence the availability is a major problem. It can be improved by CSPs with data replication. The data owners may want to set some restrictions to clients who are trying to access the data. In this scenario, the distributed data should keep all details about the different access control policies set to data. But again the authorized clients should be categorized according to permission; it will be a problem in a distributed system with many clients. This system mainly allows public users and custom users. In the case of public users the policy is same for all and only public files can be accessed by them, it is not a challenging problem. The second category, custom users are somehow a major problem. Custom users are selected users who have special permissions for accessing some files/data. The permissions may be same or different for each custom user. The system must keep track of all the access policies of custom users and provide data/file according to those policies. We are proposing a system which deals multiple owners and multiple policies to provide secured data sharing in cloud. II. RELATED WORK The outsourced data/information is protected using some encryption techniques widely. A brief overview of some of the recent researches is presented below. In Mona [1], a user is able to share data with others in the group without revealing identity privacy to the cloud. 126

2 Additionally, Mona supports efficient user revocation and new user joining. More specially, efficient user revocation can be achieved through a public revocation list without updating the private keys of the remaining users, and new users can directly decrypt files stored in the cloud before their participation. Moreover, the storage overhead and the encryption computation cost are constant. In FADE [2], a secure overlay cloud storage system that achieves fine-grained, policy-based access control and file assured deletion is proposed. It associates outsourced files with file access policies, and assuredly deletes files to make them unrecoverable to anyone upon revocations of file access policies. To achieve such security goals, FADE is built upon a set of cryptographic key operations that are self-maintained by a quorum of key managers that are independent of third-party clouds. In particular, FADE acts as an overlay system that works seamlessly atop today s cloud storage services. In Secured sharing of Personal Health Records [3], to achieve fine-grained and scalable data access control, they suggest attribute based encryption techniques. In this approach they focus on the multiple data owner scenario and divide the users in the PHR system into multiple security domains that greatly reduces the key management complexity for owners and users. A high degree of patient privacy is guaranteed simultaneously by exploiting multiauthority ABE (MA-ABE). The proposed architecture uses some important security services including authentication, encryption and decryption. The same is discussed along with compression in [4]. Key Policy Attribute-Based Encryption (KP-ABE), Proxy Re-Encryption (PRE) and Lazy re-encryption [4] handles many of the security issues. A main issue in the proposed system is distributed auditing. A flexible distributed storage integrity auditing mechanism, utilizing the homomorphic token and distributed erasure-coded data is referred in [5]. The design in [6] allows users to audit the cloud storage with very lightweight communication and computation cost. The auditing result not only ensures strong cloud storage correctness guarantee, but also simultaneously achieves fast data error localization. Considering the cloud data are dynamic in nature, the design [5] further supports secure and efficient dynamic operations on outsourced data, including block modification and deletion. III. ARCHITECTURE We are proposing the architecture with multiple owners and users. The owners of a single data/file may belong to an organization or institution. For example, in a company the confidential data may be handled by only directors and may have more than one director. In such situations the security and integrity of data is challenging. Here the data may have multiple owners, the owners register into system as a group but having individual access keys and passwords. Anyone in the group can store and share the data. The policies of shared files are set by any of the owners and need approval of all the owners. In short, any change in file policy should need the group permission. The file shared may be private, custom or public based on the set policy. Private files can only be accessed by the owners. Highly confidential data must be private and the file policies are set using the confidential features and owners private attributes. File revocation means making file permanently inaccessible for all including owners and it is done by deleting the secured decryption key with permission of all the owners along with the file policy. Custom files are shared to a set of selected users by the owners. For example, the directors of an organization may share some information to the employees. Among the employees, the owners can select some particular persons also. The persons are authorized with a special access key to access the data, the access permissions like read, edit, download etc are fixed by owners and users don t have any role in that. Public files can be accessed by all users registered in the system. A public access policy is set to public files and no specific key needed for users other than their access key to access the public file. Here also the access permissions are set by owners. 127

3 Figure 1: Architecture Other than owners, two kinds of users are in the system, custom users and public users. All users must register in the system with a password and an access key is provided to them. Apart from the access key, the user may get an access policy if he/she is in a custom group. For public users a public policy is available for data/file access. The secured keys are sent to users via and the users who clear all authentication tests are only authorized to access the data/file. A. Access Key Generation Access key is generated for each user who registers in the system. System collects some attributes from user including identity attributes like , user-name etc. Using these attributes and some other features a unique key is generated and from that key, using a pattern function, a six digit code is generated and passed to the user. At the time of login, system verifies this code along with the username and password. Since the system is mainly designed for a particular organization, the users of the system can be categorized according to the norms of organization. 1) Owners: Owners are group users who upload data to cloud for safe storage. Each owner in a group have private login including user-name, password and an access key along with a group key. The group key is same for all members in a group. 2) Public Users: Any user can be a public user and the said procedure is same for all users. No particular policy is there to access the public files, only the file policy is needed. 3) Custom Users: In an organization, many kinds of clients and many types of employees are accessing the information always. So the access permissions are varying and owners can select a category or particular user to assign a particular access policy. Special access keys are generated based on file policy and user category or type. That specific access key and policy is checked before giving access to those files. B. File Policy and Encryption Key File policies are generated for each file based on the confidentiality of the file. The owners may store the file as private, public or custom and may set the permissions as read, edit, download and delete. 128

4 The first category is based on confidentiality and type of information. For example, some data are strictly confidential and only owners can view. Some can be edited by any owner and some can be edited with the knowledge of all owners. Likewise the data for clients can be accessed by them and managed by particular employees. The second thing in policy is the access rights or permissions for users. Here user means all who are accessing the system. The permissions may read, edit, download or delete. By mixing these two factors file policies are generated. For example client-a can read and download File-B as a custom user or any user can read File-C as public user. The most challenging part is generation of encryption key based on these policies. For generating the key, the file policy like private, public and custom is used along with file attributes, attributes of owners and access permissions. Hence the encryption method is a combination of Attribute based Encryption [ABE] and Policy based Encryption. A dynamic pattern function is used to make key, the pattern varies for private, public and custom files. The encryption key breaks and forms n codes and saves in n key managers. The combination code is stored in another location. C. Decryption Before accessing a file, the file policies and user policies are matching. If both match, then according to the access key of user the system finds the permissions allowed for that user and retrieves the combination code. Using the combination code, the key codes are retrieved and combined to make the key. Then decryption is doing with that key. D. File Revocation File revocation means making the file permanently inaccessible. This is done by deleting the file policies and encryption keys. If m codes out of n are deleted the key cannot be reformed and decryption is impossible. When a file is trying to access, first the file policies are checked, if there is no file policy then there itself the file is inaccessible. The system two times ensures the inaccessibility of a file. IV. PERFORMANCE EVALUATION Performance of the system should be evaluated with all the advantages of cloud systems. The throughput and security should reach some reasonable level. The factors evaluated here are storage, cryptographic operation time and file revocation and handling time. A. Storage The storage ensures security and confidentiality based on access keys. The key generated is 16 bit and among the 16 bits, a code of length six is given to the user. The pattern function used for generating the code is different for different kinds of users. Hence the complexity of access key generation is high. When a user enters the system, the system collects some information from the user and based on those, the pattern function is selected. This is the same while login also. Group owners have both private access key and group access key. In both cases the features selected for generating the 16 bit key are different. The challenge is to manage the keys and codes separately and to create a mapping function for them. Here it is done with identity attributes. The storage overhead is related to the extra codes generated for each users, groups and group members other than the keys. B. Cryptographic Operation Time The cryptographic operations include key generation, encryption, key retrieval and decryption. Key generation is time consuming since it has to take the file attributes, owner attributes and file policies. Again the key size depends on the size of the file. The key storage is another issue. Here the key is stored in n key managers. Hence storage overhead is also there. Then encryption time depends on the file size, as file size increases the time also increases. Figure 2: File Uploading [file size Vs time] graph The key retrieval also needs a series of operations like the different authentication checking, the retrieval of combination code, retrieval of key codes from key managers and making the correct key from the key codes. This also takes some reasonable time. Finally the decryption operation is doing with the key and it depends on the file size. 129

5 More specially, efficient file revocation can be achieved through file policy revocation and deletion of some key codes. So users cannot decrypt files stored in the cloud. Moreover, the storage overhead and the encryption computation cost are constant. Extensive analyses show that our proposed scheme satisfies the desired security requirements and guarantees efficiency as well. C. Security Figure 3: File Downloading [file size Vs time] graph The designed system achieves finite levels of security using access policies and file policies. 1) Owner Level: In the owner level the system provides equal privileges to all members of a group. A private access key is available to each owner in a group and a common group access key. Hence the system ensures confidentiality by checking the two keys. The owner enters a six bit key and there is a 16 bit key matching to this. For retrieving that 16 bit matching key, an identity attribute from owner is to be collected. To keep files secured, as mentioned above file policies and a key are generated and allows only right users to access the file with right permission. 2) User Level: In the user level the system provides a user access key using the same method used in case of an owner. The authentication is given by checking all those factors specified earlier. 3) File Level: In the file level the system provides file access policies and encryption key to encrypt the file. The file is stored in encrypted format only. The key is of varying size and the variation depends on the size. Hence the hacker must know the file size to fix the key size. Another advantage is the breaking of key into n key codes. These codes are stored in n different locations and the combination of these locations is different for different keys. This makes the system more secure. V. CONCLUSION In this paper, we design a secure data sharing with policies for dynamic groups of owners in a cloud storage system. In this, a user is able to share data with others in the system as well as a group is also capable of storing and sharing their data. Additionally, this system supports efficient file revocation and policy changing. REFERENCES [1] Xuefeng Liu, Yuqing Zhang, Boyang Wang, and Jingbo Yan, "Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud, IEEE Transactions on Parallel and Distributed Systems [2] Yang Tang, Patrick P.C. Lee, John C.S. Lui and Radia Perlman, Secure Overlay Cloud Storage with Access Control and Assured Deletion, IEEE Transactions on Dependable and Secure Computing, Vol. 9, No. 6, November/December [3] Ming Li, Shucheng Yu, Yao Zheng, Kui Ren, and Wenjing Lou, Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption,IEEE Transactions on Parallel and Distributed Systems Vol. 24, Issue No. 1,2013. [4] S Sajithabanu and Dr. E George Prakash Raj, Data Storage Security in Cloud, IJCST Vol. 2, Issue 4, Oct. - Dec [5] Cong Wang, Qian Wang, Kui Ren, Ning Cao and Wenjing Lou, 2012 Toward Secure and Dependable Storage Services in Cloud Computing, IEEE Transaction on Services Computing, VOL 5, Issue 2, April-June. [6] R.Uma Maheswari and M.Chinnadurai,2014 Secured Resource Sharing in Cloud Storage using Policy based Access Control, International Journal of Emerging Technology and Advanced Engineering. [7] Nishana Rahim and K Saravanan,2013 Secured Image sharing and Deletion in the Cloud Storage using Access Policies, International Journal on Computer Science and Engineering.. [8] Dr. Mohammed A. T. AlSudiari & Dr. TGK Vasista, (2012) Cloud Computing and Privacy Regulations: An Exploratory Study on Issues and Implications, Advanced Computing: An International Journal (ACIJ), Vol.3, No.2. [9] Abdul Wahid Khan, Siffat Ullah Khan, Muhammad Ilyas & Muhammad Ilyas Azeem, (2012) A Literature Survey on Data Privacy/ Protection Issues and Challenges in Cloud Computing, IOSR Journal of Computer Engineering (IOSRJCE) ISSN: Volume 1, Issue 3, PP [10] Mell P. & Grance T. "NIST Definition of Cloud Computing V15", (2009) [11] Zhang Xin, Lai Song-qing & Liu Nai-wen, (2012) Research on cloud computing data security model based on multi-dimension, Information Technology in Medicine and Education (ITME), 2012 International Symposium, VOL. 2, Page(s): [12] Kulkarni G; Dept. of Electron. & Telecommun., Marathwada Mitra Mandal's Polytech., Pune, India, Gambhir J, Patil T & Dongare A, (2012) A security aspects in cloud computing, Software Engineering and Service Science (ICSESS), 2012 IEEE 3rd International Conference. [13] D. Boneh & M.K. Franklin, (2001) Identity-Based Encryption from the Weil Pairing, Proc. Int l Cryptology Conf. Advances in Cryptology, pp

6 [14] J. Bethencourt, A. Sahai & B. Waters, (2006) Ciphertext-Policy Attribute-Based Encryption, Proc. IEEE Symp. Security and Privacy. [15] Aderemi A. Atayero & Oluwaseyi Feyisetan, (2011) Security Issues in Cloud Computing: The Potentials of Homomorphic Encryption, Journal of Emerging Trends in Computing and Information Sciences, VOL. 2, NO. 10, ISSN [16] Siani Pearson, Yun Shen & Miranda Mowbray, (2009) A Privacy Manager for Cloud Computing, HP Labs, Long Down Avenue, Stoke Gifford, Bristol BS34 8QZ, UK, pp [17] Siani Pearson & Andrew Charlesworth, (2009) Accountability as a Way Forward for Privacy Protection in the Cloud, HP Laboratories, HPL [18] R. Corin, S. Etalle, J. den Hartog, G. Lenzini & I. Staicu, (2005) A Logic for Auditing Accountability in Decentralized Systems, Proc. IFIP TC1 WG1.7 Workshop Formal Aspects in Security and Trust, pp [19] Rodrigo N. Calheiros, Rajiv Ranjan, César A. F. De Rose & Rajkumar Buyya, CloudSim: A Novel Framework for Modeling and Simulation of Cloud Computing Infrastructures and Services. [20] A. Boldyreva, V. Goyal & V. Kumar, (2008) Identity-Based Encryption with Efficient Revocation, Proc. 15th ACM Conf. Computer and Comm. Security (CCS). [21] V. Goyal, O. Pandey, A. Sahai, & B. Waters, (2006) Attribute- Based Encryption for Fine-Grained Access Control of Encrypted Data, Proc. 13th ACM Conf. Computer and Comm. Security (CCS). [22] A. Shamir, (1979) How to Share a Secret, Comm. ACM, vol. 22, no. 11, pp [23] S. Kamara & K. Lauter, (2010) Cryptographic Cloud Storage, Proc.14th Int l Conf. Financial Cryptography and Data Security. [24] S. Yu, C. Wang, K. Ren & W. Lou, (2010) Attribute Based Data Sharing with Attribute Revocation, Proc. Fifth ACM Symp. Information, Computer and Comm. Security (ASIACCS). [25] M. Pirretti, P. Traynor, P. McDaniel, & B. Waters, (2006) Secure Attribute-Based Systems, Proc. 13th ACM Conf. Computer and Comm. Security (CCS). 131

Secured Image Sharing and Deletion in the Cloud Storage Using Access Policies

Secured Image Sharing and Deletion in the Cloud Storage Using Access Policies Secured Image Sharing and Deletion in the Cloud Storage Using Access Policies Nishana Rahim PG Student, Department of Computer Science & Engineering Regional Centre of Anna University Tirunelveli, India

More information

COMPUSOFT, An international journal of advanced computer technology, 3 (6), June-2014 (Volume-III, Issue-VI)

COMPUSOFT, An international journal of advanced computer technology, 3 (6), June-2014 (Volume-III, Issue-VI) ISSN:2320-0790 Secured Resource Sharing in Cloud Storage using Policy based Access Control S.Imavathy 1, R.Uma Mahes wari 2 1 Assistant Professor,Dept.Of CSE, E.G.S.Pillay Engineering College,Nagapattinam,Tamilnadu,India

More information

EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE

EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE Reshma Mary Abraham and P. Sriramya Computer Science Engineering, Saveetha University, Chennai, India E-Mail: reshmamaryabraham@gmail.com

More information

An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud

An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud T.Vijayalakshmi 1, Balika J Chelliah 2,S.Alagumani 3 and Dr.J.Jagadeesan 4 1 PG

More information

Data management using Virtualization in Cloud Computing

Data management using Virtualization in Cloud Computing Data management using Virtualization in Cloud Computing A.S.R. Krishna Kanth M.Tech (CST), Department of Computer Science & Systems Engineering, Andhra University, India. M.Sitha Ram Research Scholar Department

More information

Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage

Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage Abstract: Cloud computing is one of the emerge technologies. To protect the data and privacy of users the access

More information

Sheltered Multi-Owner Data distribution For vibrant Groups in the Cloud

Sheltered Multi-Owner Data distribution For vibrant Groups in the Cloud Sheltered Multi-Owner Data distribution For vibrant Groups in the Cloud I.sriram murthy 1 N.Jagajeevan 2 II M-Tech student Assistant.Professor Department of computer science & Engineering Department of

More information

Distributed auditing mechanism in order to strengthen user s control over data in Cloud computing Environment

Distributed auditing mechanism in order to strengthen user s control over data in Cloud computing Environment Distributed auditing mechanism in order to strengthen user s control over data in Cloud computing Environment Chandra Sekhar Murakonda M.Tech Student, Department of Computer Science Engineering, NRI Institute

More information

ADVANCE SECURITY TO CLOUD DATA STORAGE

ADVANCE SECURITY TO CLOUD DATA STORAGE Journal homepage: www.mjret.in ADVANCE SECURITY TO CLOUD DATA STORAGE ISSN:2348-6953 Yogesh Bhapkar, Mitali Patil, Kishor Kale,Rakesh Gaikwad ISB&M, SOT, Pune, India Abstract: Cloud Computing is the next

More information

CLOUD STORAGE SYSTEM MANAGING SECURE FILE EXCLUSION

CLOUD STORAGE SYSTEM MANAGING SECURE FILE EXCLUSION INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE CLOUD STORAGE SYSTEM MANAGING SECURE FILE EXCLUSION M.Sreenivasa Reddy 1, B.Sudhakar 2 1 M.Tech Student, Dept of CSE, Mannan

More information

Data Security Using Reliable Re-Encryption in Unreliable Cloud

Data Security Using Reliable Re-Encryption in Unreliable Cloud ISSN (Online): 2277-5420 www.ijcsn.org Data Security Using Reliable Re-Encryption in Unreliable Cloud 328 1 Ajinkya Adhau, 2 Payal Bobade, 3 Priyanka Zilpe, 4 Yashodhara Fulmali 1, 2, 3, 4 Student, Department

More information

DECENTRALIZED ACCESS CONTROL TO SECURE DATA STORAGE ON CLOUDS

DECENTRALIZED ACCESS CONTROL TO SECURE DATA STORAGE ON CLOUDS DECENTRALIZED ACCESS CONTROL TO SECURE DATA STORAGE ON CLOUDS Ankita N.Madde 1, Minal J. Joshi 2, Suchita Gutte 3, Sonal Asawa 4, # Prashant Jawalkar 5 1,2,3,4 UG Student, 5 Project Guide, Computer Dept.,

More information

Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment

Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment Deepa Noorandevarmath 1, Rameshkumar H.K 2, C M Parameshwarappa 3 1 PG Student, Dept of CS&E, STJIT, Ranebennur. Karnataka, India

More information

Distributed Attribute Based Encryption for Patient Health Record Security under Clouds

Distributed Attribute Based Encryption for Patient Health Record Security under Clouds Distributed Attribute Based Encryption for Patient Health Record Security under Clouds SHILPA ELSA ABRAHAM II ME (CSE) Nandha Engineering College Erode Abstract-Patient Health Records (PHR) is maintained

More information

A SECURE CLOUD WITH ADDITIONAL LAYER OF PROTECTION AND USER AUTHENTICATION

A SECURE CLOUD WITH ADDITIONAL LAYER OF PROTECTION AND USER AUTHENTICATION Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 2, Issue. 6, June 2013, pg.307

More information

DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION

DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION Hasna.R 1, S.Sangeetha 2 1 PG Scholar, Dhanalakshmi Srinivasan College of Engineering, Coimbatore. 2 Assistant Professor, Dhanalakshmi Srinivasan

More information

KEY-POLICY ATTRIBUTE BASED ENCRYPTION TO SECURE DATA STORED IN CLOUD

KEY-POLICY ATTRIBUTE BASED ENCRYPTION TO SECURE DATA STORED IN CLOUD KEY-POLICY ATTRIBUTE BASED ENCRYPTION TO SECURE DATA STORED IN CLOUD C.Vinoth 1, G.R.Anantha Raman 2 1 Computer Science and Engineering,ACE Hosur(India) 2 Assistant Professor, Computer Science and Engineering,

More information

A Secure Decentralized Access Control Scheme for Data stored in Clouds

A Secure Decentralized Access Control Scheme for Data stored in Clouds A Secure Decentralized Access Control Scheme for Data stored in Clouds Priyanka Palekar 1, Abhijeet Bharate 2, Nisar Anjum 3 1 SKNSITS, University of Pune 2 SKNSITS, University of Pune 3 SKNSITS, University

More information

Privacy Preservation and Secure Data Sharing in Cloud Storage

Privacy Preservation and Secure Data Sharing in Cloud Storage OPEN ACCESS Int. Res. J. of Science & Engineering, 2015; Vol. 3 (6): 231-236 ISSN: 2322-0015 RESEARCH ARTICLE Privacy Preservation and Secure Data Sharing in Cloud Storage Chavhan Bhaurao* and Deshmukh

More information

Secure Data Sharing in Cloud Computing using Hybrid cloud

Secure Data Sharing in Cloud Computing using Hybrid cloud International Journal of Electronics and Computer Science Engineering 144 Available Online at www.ijecse.org ISSN: 2277-1956 Secure Data Sharing in Cloud Computing using Hybrid cloud Er. Inderdeep Singh

More information

SECURE RE-ENCRYPTION IN UNRELIABLE CLOUD USINGSYNCHRONOUS CLOCK

SECURE RE-ENCRYPTION IN UNRELIABLE CLOUD USINGSYNCHRONOUS CLOCK International Journal of Advance Research In Science And Engineering IJARSE, Vol. No.4, Issue No.01, January 2015 http:// SECURE RE-ENCRYPTION IN UNRELIABLE CLOUD USINGSYNCHRONOUS CLOCK Arudra Gopala Rao

More information

Enhancing Security of Personal Health Records in Cloud Computing by Encryption

Enhancing Security of Personal Health Records in Cloud Computing by Encryption Enhancing Security of Personal Health Records in Cloud Computing by Encryption Nishitha Ramakrishnan 1, Sreerekha B 2 1 PG Student (M.Tech, CSE), Malabar Institute of Technology, Anjarakandy (P.O), Kannur,

More information

ASSURANCE OF PATIENT CONTROL TOWARDS PERSONAL HEALTH DATA

ASSURANCE OF PATIENT CONTROL TOWARDS PERSONAL HEALTH DATA INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE ASSURANCE OF PATIENT CONTROL TOWARDS PERSONAL HEALTH DATA Mahammad Zennyfor Sulthana 1, Shaik Habeeba 2 1 M.Tech Student, Dept of CS

More information

Cloud Information Accountability Framework for Auditing the Data Usage in Cloud Environment

Cloud Information Accountability Framework for Auditing the Data Usage in Cloud Environment International Journal of Computational Engineering Research Vol, 03 Issue, 11 Cloud Information Accountability Framework for Auditing the Data Usage in Cloud Environment D.Dhivya 1, S.CHINNADURAI 2 1,M.E.(Cse),

More information

CLOUD COMPUTING SECURITY IN UNRELIABLE CLOUDS USING RELIABLE RE-ENCRYPTION

CLOUD COMPUTING SECURITY IN UNRELIABLE CLOUDS USING RELIABLE RE-ENCRYPTION CLOUD COMPUTING SECURITY IN UNRELIABLE CLOUDS USING RELIABLE RE-ENCRYPTION Chandrala DN 1, Kulkarni Varsha 2 1 Chandrala DN, M.tech IV sem,department of CS&E, SVCE, Bangalore 2 Kulkarni Varsha, Asst. Prof.

More information

International Journal of Research in Advent Technology Available Online at: http://www.ijrat.org

International Journal of Research in Advent Technology Available Online at: http://www.ijrat.org DYNAMIC ACCESS CONTROL AND FILE ASSURED DELETION FOR SECURED CLOUD STORAGE ABSTARCT: Mrs. Priyanka Nagtilak, Prof. Archana Lomte Department of Computer Engineering Bhivarabai Sawant Institute of Technology

More information

Attribute Based Encryption with Privacy Preserving In Clouds

Attribute Based Encryption with Privacy Preserving In Clouds Attribute Based Encryption with Privacy Preserving In Clouds M. Suriyapriya 1, A. Joicy 2 PG Scholar 1 Assistant Professor CSE Department 2 St.Joseph College of Engineering Sriperumbudur, Chennai-602105

More information

An Efficient Secure Multi Owner Data Sharing for Dynamic Groups in Cloud Computing

An Efficient Secure Multi Owner Data Sharing for Dynamic Groups in Cloud Computing Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 6, June 2014, pg.730

More information

15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM

15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM Dhanashri Bamane Vinayak Pottigar Subhash Pingale Department of Computer Science and Engineering SKN

More information

Privacy Preserving Public Auditing for Data in Cloud Storage

Privacy Preserving Public Auditing for Data in Cloud Storage Privacy Preserving Public Auditing for Data in Cloud Storage M.Priya 1, E. Anitha 2, V.Murugalakshmi 3 M.E, Department of CSE, Karpagam University, Coimbatore, Tamilnadu, India 1, 3 M.E, Department of

More information

PRIVACY ASSURED IMAGE STACK MANAGEMENT SERVICE IN CLOUD

PRIVACY ASSURED IMAGE STACK MANAGEMENT SERVICE IN CLOUD PRIVACY ASSURED IMAGE STACK MANAGEMENT SERVICE IN CLOUD Ms. Shubhangi Edake 1, Prof. Sunil Rathod 2 1 PG Student, Computer Engineering, Dr.D.Y.Patil School of Engineering, Lohgaon,Pune,India 2 Assistant

More information

G.J. E.D.T.,Vol.3(1):43-47 (January-February, 2014) ISSN: 2319 7293 SUODY-Preserving Privacy in Sharing Data with Multi-Vendor for Dynamic Groups

G.J. E.D.T.,Vol.3(1):43-47 (January-February, 2014) ISSN: 2319 7293 SUODY-Preserving Privacy in Sharing Data with Multi-Vendor for Dynamic Groups SUODY-Preserving Privacy in Sharing Data with Multi-Vendor for Dynamic s T.Vijayalakshmi 1, Balika J Chelliah 2 & R. Jegadeesan 3 1 M.Tech Student, Department of Computer Science and Engineering, S.R.M.

More information

Cloud Data Service for Issues in Scalable Data Integration Using Multi Authority Attribute Based Encryption

Cloud Data Service for Issues in Scalable Data Integration Using Multi Authority Attribute Based Encryption Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,

More information

Role Based Encryption with Efficient Access Control in Cloud Storage

Role Based Encryption with Efficient Access Control in Cloud Storage Role Based Encryption with Efficient Access Control in Cloud Storage G. V. Bandewar 1, R. H. Borhade 2 1 Department of Information Technology, Sinhgad Technical Education Society s SKNCOE, Pune, India

More information

Secure & Encrypted Accessing and Sharing of Data in Distributed Virtual Cloud

Secure & Encrypted Accessing and Sharing of Data in Distributed Virtual Cloud Secure & Encrypted Accessing and Sharing of Data in Distributed Virtual Cloud Ashish G. Ahuja 1, Prof. Komal B. Bijwe 2 1. M.E. Scholar, Dept Of CSE 2. Asst. Prof. Dept. Of CSE at P.R.P.C.E& M, Amravati

More information

How To Ensure Correctness Of Data In The Cloud

How To Ensure Correctness Of Data In The Cloud A MECHANICS FOR ASSURING DATA STORAGE SECURITY IN CLOUD COMPUTING 1, 2 Pratibha Gangwar, 3 Mamta Gadoria 1 M. Tech. Scholar, Jayoti Vidyapeeth Women s University, Jaipur, priya25mehta@gmail.com 2 M. Tech.

More information

IMPLEMENTATION OF NETWORK SECURITY MODEL IN CLOUD COMPUTING USING ENCRYPTION TECHNIQUE

IMPLEMENTATION OF NETWORK SECURITY MODEL IN CLOUD COMPUTING USING ENCRYPTION TECHNIQUE IMPLEMENTATION OF NETWORK SECURITY MODEL IN CLOUD COMPUTING USING ENCRYPTION TECHNIQUE 1 Rajesh L Gaikwad, 2 Dhananjay M Dakhane, 3 Ravindra L Pardhi M.E Student, Associate Professor, Assistant Professor,

More information

Decentralized Access Control Secure Cloud Storage using Key Policy Attribute Based Encryption

Decentralized Access Control Secure Cloud Storage using Key Policy Attribute Based Encryption Decentralized Access Control Secure Cloud Storage using Key Policy Attribute Based Encryption 1 Thota Naresh Kumar, 2 K.SRINIVAS, 3 Y.Raju 2 Associate Professor, 3 Associate Professor 1,2,3 Department

More information

Secure Multi Authority Cloud Storage Based on CP- ABE and Data Access Control

Secure Multi Authority Cloud Storage Based on CP- ABE and Data Access Control Secure Multi Authority Cloud Storage Based on CP- ABE and Data Access Control Shivarathri Ravinder M. Tech Student, Dept. of CSE, CMR College of Engineering and Technology, Kandlakoya Village, Medchal

More information

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD Volume 1, Issue 7, PP:, JAN JUL 2015. SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD B ANNAPURNA 1*, G RAVI 2*, 1. II-M.Tech Student, MRCET 2. Assoc. Prof, Dept.

More information

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA U.Pandi Priya 1, R.Padma Priya 2 1 Research Scholar, Department of Computer Science and Information Technology,

More information

Decentralized Access Control Schemes for Data Storage on Cloud

Decentralized Access Control Schemes for Data Storage on Cloud Computer Science and Engineering 2016, 6(1): 1-6 DOI: 10.5923/j.computer.20160601.01 Decentralized Access Control Schemes for Data Storage on Cloud Shraddha V. Mokle *, Nuzhat F. Shaikh Department of Computer

More information

Keywords: Authentication, Third party audit, cloud storage, cloud service provider, Access control.

Keywords: Authentication, Third party audit, cloud storage, cloud service provider, Access control. Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Identity Based

More information

Scalable and secure sharing of data in cloud computing using attribute based encryption

Scalable and secure sharing of data in cloud computing using attribute based encryption Volume :2, Issue :4, 416-420 April 2015 www.allsubjectjournal.com e-issn: 2349-4182 p-issn: 2349-5979 Impact Factor: 3.762 Ghodake Shubhangi Joshi Priyanka Khobragade Pranjali Chandak Manjiri Scalable

More information

Keywords: Cloud Storage, Shared Data, Privacy Preserving, Secret Sharing, Authentication, Third Party Auditor(TPA).

Keywords: Cloud Storage, Shared Data, Privacy Preserving, Secret Sharing, Authentication, Third Party Auditor(TPA). Volume 5, Issue 4, April 215 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Data Security in

More information

Secure Data transfer in Cloud Storage Systems using Dynamic Tokens.

Secure Data transfer in Cloud Storage Systems using Dynamic Tokens. Secure Data transfer in Cloud Storage Systems using Dynamic Tokens. P.Srinivas *,K. Rajesh Kumar # M.Tech Student (CSE), Assoc. Professor *Department of Computer Science (CSE), Swarnandhra College of Engineering

More information

Survey on Efficient Information Retrieval for Ranked Query in Cost-Efficient Clouds

Survey on Efficient Information Retrieval for Ranked Query in Cost-Efficient Clouds Survey on Efficient Information Retrieval for Ranked Query in Cost-Efficient Clouds Ms. Jyotsna T. Kumbhar 1 ME Student, Department of Computer Engineering, TSSM S, P.V.P.I.T., Bavdhan, Pune University,

More information

Data Integrity Issues in Cloud Storage System-A Survey

Data Integrity Issues in Cloud Storage System-A Survey Data Integrity Issues in Cloud Storage System-A Survey K. Karthika Lekshmi 1, Dr. E. Baburaj 2 1 Assistant Professor, Department of Information Technology, Cape Institute of Technology, jk_karthika@yahoo.co.in

More information

ISSN: 2321-7782 (Online) Volume 3, Issue 3, March 2015 International Journal of Advance Research in Computer Science and Management Studies

ISSN: 2321-7782 (Online) Volume 3, Issue 3, March 2015 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) Volume 3, Issue 3, March 2015 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online

More information

How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System

How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System REVIEW ARTICAL A Novel Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage Dumala Harisha 1, V.Gouthami 2 1 Student, Computer Science & Engineering-Department, JNTU Hyderabad India

More information

Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm

Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm Twinkle Graf.F 1, Mrs.Prema.P 2 1 (M.E- CSE, Dhanalakshmi College of Engineering, Chennai, India) 2 (Asst. Professor

More information

Index Terms: Cloud Computing, Cloud Security, Mitigation Attack, Service Composition, Data Integrity. 1. Introduction

Index Terms: Cloud Computing, Cloud Security, Mitigation Attack, Service Composition, Data Integrity. 1. Introduction Real-Time Service Composition and Deployment for Secure Computing in Cloud Environment R. Ushadevi 1, V. Rajamani 2 1 Research Scholar, Department of Computer Applications, St. Peter s University, Chennai

More information

SHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING

SHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING SHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING Er. Kavin M 1, Mr.J.Jayavel 2 1 PG Scholar, 2 Teaching Assistant, Department of Information Technology, Anna University Regional

More information

Data defense in unpredictable Cloud Using Access Control and Access Time

Data defense in unpredictable Cloud Using Access Control and Access Time International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 12 December. 2013 PP.29-34 Data defense in unpredictable Cloud Using Access Control

More information

A Comprehensive Data Forwarding Technique under Cloud with Dynamic Notification

A Comprehensive Data Forwarding Technique under Cloud with Dynamic Notification Research Journal of Applied Sciences, Engineering and Technology 7(14): 2946-2953, 2014 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2014 Submitted: July 7, 2013 Accepted: August

More information

How To Ensure Data Integrity In Cloud Storage

How To Ensure Data Integrity In Cloud Storage Decentralized Admittance Power with Flexible Distributed Storage Integrity Auditing Mechanism I G.Thenmozhi, II Dr.S.Dhanalakshmi I M.Phil Full Time Research Scholar, Dept. of Computer Science II Head

More information

Enabling Public Accountability and Data Sharing for Storage Security in Cloud Computing

Enabling Public Accountability and Data Sharing for Storage Security in Cloud Computing VOLUME 1, NUMBER 1, JUNE 2014 OPEN JOURNAL OF INFORMATION SECURITY AND APPLICATIONS Enabling Public Accountability and Data Sharing for Storage Security in Cloud Computing K. Mohammed Aaqib Ameen, A. Anny

More information

Cryptographic Data Security over Cloud

Cryptographic Data Security over Cloud Cryptographic Data Security over Cloud Er. Lalit Gehlod Asst.Professor, Dept.Of Computer Engineering, Institute Of Engineering & Technology, Devi Ahilya University, Indore, India. Govind Patidar Dept.

More information

A Survey on Data Integrity of Cloud Storage in Cloud Computing

A Survey on Data Integrity of Cloud Storage in Cloud Computing A Survey on Data Integrity of Cloud Storage in Cloud Computing A B S T R A C T Mr.Vitthal Raut, Prof. Suhasini Itkar Department Computer Engineering, PES Modern College of Engineering, Pune, India. raut.vitthal@gmail.com,

More information

Public Auditing for Shared Data in the Cloud by Using AES

Public Auditing for Shared Data in the Cloud by Using AES Public Auditing for Shared Data in the Cloud by Using AES 1 Syagamreddy Subbareddy, 2 P.Tejaswi, 3 D.Krishna 1 M.Tech(CSE) Pursuing, 2 Associate Professor, 3 Associate Professor,HOD, 1,2,3 Dept. of Computer

More information

Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud

Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud Arpitha.K 1,Aawini.T 2,Divya J. 3, Kalyani P 4, Prof. Sudhakar Avareddy 5 1,2,3,4 Department of CSE, BITM Bellary, Karnataka. 5 Department

More information

Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving,

Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving, Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Third Party

More information

ISSN 2278-3091. Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability

ISSN 2278-3091. Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability Outsourcing and Discovering Storage Inconsistencies in Cloud Through TPA Sumathi Karanam 1, GL Varaprasad 2 Student, Department of CSE, QIS College of Engineering and Technology, Ongole, AndhraPradesh,India

More information

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer

More information

Outstanding Cloud Security Service For Modify Data Distribute In Cloud Method

Outstanding Cloud Security Service For Modify Data Distribute In Cloud Method Outstanding Cloud Security Service For Modify Data Distribute In Cloud Method A.Manikanta Sharma M.Tech Student Sri Vatsavai Krishnam Raju College of Engineering and Technology, Bhimavaram, AP. Abstract:

More information

Third Party Auditing For Secure Data Storage in Cloud through Trusted Third Party Auditor Using RC5

Third Party Auditing For Secure Data Storage in Cloud through Trusted Third Party Auditor Using RC5 Third Party Auditing For Secure Data Storage in Cloud through Trusted Third Party Auditor Using RC5 Miss. Nupoor M. Yawale 1, Prof. V. B. Gadicha 2 1 Student, M.E. Second year CSE, P R Patil COET, Amravati.INDIA.

More information

AN ENHANCED ATTRIBUTE BASED ENCRYPTION WITH MULTI PARTIES ACCESS IN CLOUD AREA

AN ENHANCED ATTRIBUTE BASED ENCRYPTION WITH MULTI PARTIES ACCESS IN CLOUD AREA Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,

More information

Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment

Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment Chih Hung Wang Computer Science and Information Engineering National Chiayi University Chiayi City 60004,

More information

COMPUSOFT, An international journal of advanced computer technology, 4 (4), April-2015 (Volume-IV, Issue-IV)

COMPUSOFT, An international journal of advanced computer technology, 4 (4), April-2015 (Volume-IV, Issue-IV) ISSN:2320-0790 Secured Data on Cloud Environment by SAPA Protocol with Auto-renewal K. Prashanthi 1, P. Sangamithirai 2, S.Pothumani 3 1,2 B.Tech Student(CSE), Bharath University, Chennai-73. 3, Assistant

More information

A SELF-DESTRUCTION SYSTEM FOR DYNAMIC GROUP DATA SHARING IN CLOUD

A SELF-DESTRUCTION SYSTEM FOR DYNAMIC GROUP DATA SHARING IN CLOUD A SELF-DESTRUCTION SYSTEM FOR DYNAMIC GROUP DATA SHARING IN CLOUD Ranjith.K 1, P.G.Kathiravan 2 1 PG Scholar, Department of Information Technology, V.S.B Engineering College, Tamilnadu, India 2 Assistant

More information

A Novel Framework for Cloud Environment Using CPDP for Data Integrity and Security

A Novel Framework for Cloud Environment Using CPDP for Data Integrity and Security A Novel Framework for Cloud Environment Using CPDP for Data Integrity and Security V. Narasimha Swamy 1, K. Raja Shekar Reddy 2 1.M. Tech (CSE)., Srinivasa Institute of Technology & Science, Kadapa, Andhra

More information

Secure Sharing of Health Records in Cloud Using ABE

Secure Sharing of Health Records in Cloud Using ABE Secure Sharing of Health Records in Cloud Using ABE Nithya.E, TousifAhamed Nadaf Abstract In recent years, Personal health record (PHR) has emerged as a patient-centric model of health information exchange.

More information

Ranked Keyword Search Using RSE over Outsourced Cloud Data

Ranked Keyword Search Using RSE over Outsourced Cloud Data Ranked Keyword Search Using RSE over Outsourced Cloud Data Payal Akriti 1, Ms. Preetha Mary Ann 2, D.Sarvanan 3 1 Final Year MCA, Sathyabama University, Tamilnadu, India 2&3 Assistant Professor, Sathyabama

More information

IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD ENVIRONMENT

IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD ENVIRONMENT IJRRECS/November 2014/Volume-2/Issue-11/3699-3703 ISSN 2321-5461 INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD

More information

Secure emergency medical architecture on the cloud using wireless sensor networks for emergency detection

Secure emergency medical architecture on the cloud using wireless sensor networks for emergency detection Secure emergency medical architecture on the cloud using wireless sensor networks for emergency detection Ahmed Lounis, Abdelkrim Hadjidj, Abdelmadjid Bouabdallah and Yacine Challal {lounisah,ahadjidj,bouabdal,ychallal}@utc.fr

More information

Implementation of Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage

Implementation of Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage Implementation of Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage 1 A. MsVaishali Patil, 2 B. Prof. Archana Lomte Dept of Computer,BSIOTR, Pune ABSTRACT Cloud computing is speculated

More information

FADE: Secure Overlay Cloud Storage with File Assured Deletion

FADE: Secure Overlay Cloud Storage with File Assured Deletion FADE: Secure Overlay Cloud Storage with File Assured Deletion Yang Tang, Patrick P. C. Lee, John C. S. Lui, and Radia Perlman The Chinese University of Hong Kong Intel Labs {tangyang,pclee,cslui}@cse.cuhk.edu.hk,radiaperlman@gmail.com

More information

Isolated Distribution of Health Records in Cloud Computing using Attribute-Based Encryption

Isolated Distribution of Health Records in Cloud Computing using Attribute-Based Encryption Isolated Distribution of Health Records in Cloud Computing using Attribute-Based Encryption 1 Satish Pedada, 2 Ch.Kodanda Ram, 3 Y.Ramesh Kumar 1 Final year M.tech Student, 2,3 Associated professor 1,

More information

Decentralized Information Accountability Framework for Information Sharing In Cloud Environment

Decentralized Information Accountability Framework for Information Sharing In Cloud Environment Decentralized Information Accountability Framework for Information Sharing In Cloud Environment Deepthi Srinivas, Shylaja BR, Rajeev RK, Muruli R 1 BNM Institute of technology 2,3,4 Rai Technology University

More information

How To Protect Your Data In A Cloud Environment

How To Protect Your Data In A Cloud Environment A Framework to Avoid Vulnerability Incidents in Cloud Computing 1 Kavyashree M U, 2 Manjunath H 1 PG Scholar, Department of Computer Science & Engineering, Mangalore Institute of Technology & Engineering,

More information

Data Storage Security in Cloud Computing

Data Storage Security in Cloud Computing Data Storage Security in Cloud Computing Manoj Kokane 1, Premkumar Jain 2, Poonam Sarangdhar 3 1, 2, 3 Government College of Engineering and Research, Awasari, Pune, India Abstract: Cloud computing is

More information

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department

More information

Selective dependable storage services for providing security in cloud computing

Selective dependable storage services for providing security in cloud computing Selective dependable storage services for providing security in cloud computing Gade Lakshmi Thirupatamma*1, M.Jayaram*2, R.Pitchaiah*3 M.Tech Scholar, Dept of CSE, UCET, Medikondur, Dist: Guntur, AP,

More information

Dynamic Federation in Identity Management for Securing and Sharing Personal Health Records in a Patientcentric

Dynamic Federation in Identity Management for Securing and Sharing Personal Health Records in a Patientcentric Dynamic Federation in Identity Management for Securing and Sharing Personal Health Records in a Patientcentric Model in Cloud Ramkinker Singh 1, Vipra Gupta 1, Mohan K. 2 Final year, Computer Science and

More information

Enabling Public Auditing for Secured Data Storage in Cloud Computing

Enabling Public Auditing for Secured Data Storage in Cloud Computing IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 5 (May. 2013), V3 PP 01-05 Enabling Public Auditing for Secured Data Storage in Cloud Computing 1 Er.Amandeep Kaur,

More information

Secure Cloud Storage with File Assured Deletion

Secure Cloud Storage with File Assured Deletion Secure Cloud Storage with File Assured Deletion Gousiya Begum, M. Shravya CSE Department, MGIT, Hyderabad, INDIA, Abstract When we outsource data backup to third-party cloud storage services so as to reduce

More information

How To Ensure Data Integrity In Cloud Computing

How To Ensure Data Integrity In Cloud Computing A Novel Approach for public exploration Data with Effective user Denial in the cloud Mahankali Anitha PG Scholar Department of CSE J.Vijayasree Assistant professor Department of CSE Dr.M.V.Siva Prasad

More information

Privacy preserving technique to secure cloud

Privacy preserving technique to secure cloud Vitthal S. Gutte Pune University, MIT College of engineering, Kothrud, Pune 411038, India vitthalgutte2014@gmail.com Privacy preserving technique to secure cloud Prof. Priya Deshpande Pune University,

More information

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD S.REVATHI B.HASEENA M.NOORUL IZZATH PG Student PG Student PG Student II- ME CSE II- ME CSE II- ME CSE Al-Ameen Engineering

More information

Secure Role-Based Access Control on Encrypted Data in Cloud Storage using Raspberry PI

Secure Role-Based Access Control on Encrypted Data in Cloud Storage using Raspberry PI Volume: 2, Issue: 7, 20-27 July 2015 www.allsubjectjournal.com e-issn: 2349-4182 p-issn: 2349-5979 Impact Factor: 3.762 Miss Rohini Vidhate Savitribai Phule Pune University. Mr. V. D. Shinde Savitribai

More information

Development of enhanced Third party Auditing Scheme for Secure Cloud Storage

Development of enhanced Third party Auditing Scheme for Secure Cloud Storage Development of enhanced Third party Auditing Scheme for Secure Cloud Storage Bhanu Prakash Chamakuri*1, D. Srikar*2, Dr. M.Suresh Babu*3 M.Tech Scholar, Dept of CSE, Grandhi Varalakshmi Institute Of Technology,

More information

Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage

Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage Pranita Bakka 1, Dr. Jayashree Agarkhed 2 1 P.G.Student, Department of Computer Science & Engineering,

More information

Surveying Cloud Storage Correctness using TPA with BLS

Surveying Cloud Storage Correctness using TPA with BLS Surveying Cloud Storage Correctness using TPA with BLS Priyanka Dehariya 1, Prof. Shweta Shrivastava 2, Dr. Vineet Richaraya 3 1 M.Tech Scholar (CSE), LNCT, Bhopal 2 Asst.Professors, (CSE Department),

More information

Keywords: - Ring Signature, Homomorphic Authenticable Ring Signature (HARS), Privacy Preserving, Public Auditing, Cloud Computing.

Keywords: - Ring Signature, Homomorphic Authenticable Ring Signature (HARS), Privacy Preserving, Public Auditing, Cloud Computing. Survey on Privacy Preserving Public Auditing Techniques for Shared Data in the Cloud Kedar Jayesh Rasal 1, Dr. S.V.Gumaste 2, Sandip A. Kahate 3 Computer Engineering, Pune University, SPCOE, Otur, Pune,

More information

Improving data integrity on cloud storage services

Improving data integrity on cloud storage services International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services

More information

A Survey on Privacy-Preserving Techniques for Secure Cloud Storage

A Survey on Privacy-Preserving Techniques for Secure Cloud Storage Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,

More information

A Secure and Dependable Cloud Storage Service in Cloud Computing

A Secure and Dependable Cloud Storage Service in Cloud Computing A Secure and Dependable Cloud Storage Service in Cloud Computing Yalla Ram Charan MTech Student Department of CSE Sri Venkateswra College of Engineering & Technology Abstract: Cloud storage is a model

More information

Cloud Server Storage Security Using TPA

Cloud Server Storage Security Using TPA Cloud Server Storage Security Using TPA I K.Meenakshi, II Victo Sudha George I Student (M.Tech), DR. MGR Educational and Research Institute, India II Assisstant Professo, DR. MGR Educational and Research

More information

Survey Paper on Integrity Auditing of Storage

Survey Paper on Integrity Auditing of Storage International Journal of Computational Engineering Research Vol, 04 Issue, 3 Survey Paper on Integrity Auditing of Storage Ugale Santosh A 1 1M.E. Computer AVCOE, Sangmner, India ABSTRACT: Cloud servers

More information

Cryptographic Encryption to the Personal Medical Information in Cloud

Cryptographic Encryption to the Personal Medical Information in Cloud Cryptographic Encryption to the Personal Medical Information in Cloud Authors Sunil Suresh Ghadge, Poonam Mohan Jadhav St. Mary Group of Institutions, JNTU University, Hyderabad, India ABSTRACT Cloud computing

More information