Secure Storage Service Using Homomorphic Tokens and Dependable Erasure Coded Data in Cloud Computing
|
|
- Silvia Charles
- 3 years ago
- Views:
Transcription
1 Secure Storage Service Using Homomorphic Tokens and Dependable Erasure Coded Data in Cloud Computing 1 K.SARANYA, 2 I.SIBIYA, 3 M.SASIKALA, 4 D.SUVITHA Assistant Professor, Department of Computer Science and Engineering, Bharathiyar Institute of Engineering for Women, Deviyakurichi. ABSTRACT Cloud storage space enables users to pileup their data and enjoy the on-demand highfeature cloud applications without the trouble of local hardware and software management.though the benefits are clear, such a service is also giving up users' physical control of their data, which certainly causes new security risks toward the correctness of the data in cloud. In order to deal with this new problem and further to accomplish a secure and dependable cloud storage service, we propose in this paper a flexible distributed storage auditing way, utilizing the homomorphic symbol and distributed erasure-coded data. The proposed design allows users to audit the cloud storage with very lightweight communication and computation cost. The auditing result not only secures cloud storage, at the same time accomplishes fast data error localization, the identification of misbehaving server. Considering the cloud data are energetic in nature, the proposed design further supports secure and efficient changing operations on data, including block change, deletion, and add. Analysis shows the proposed layout plan is highly efficient and tough against Confusing failure, evil and cruel data change attack, and even server working (criminally) together attacks.. 1. INTRODUCTION Several trends are opening up the time in history of computing, which is an Internet - based development and use of technology. The ever cheaper and more powerful processors, together with the Software as a Service (SaaS) figuring out changing data centers into pools of calculating service on a huge scale. The increasing network ability and reliable yet flexible network connections make it users to subscribe high quality services from data and software that reside only on remote data centers. On the one hand, although the cloud are much more powerful and reliable than personal calculating devices, broad range of both internal and external force for data still exist. Examples of outages and data loss events of amazing and interesting cloud storage services appear from time to time. On the other hand, since users may not hold a local copy of data, there exist different for CSP to behave dishonestly toward the cloud users regarding the status of their data. For example, to increase the money by reducing cost, it is possible for CSP to throw out rarely accessed data without being detected in an appropriately-timed fashion.csp may even attempt to hide data loss events to maintain reputation. Therefore, data into the cloud is cheaply attractive for the cos t and complex difficulty of long-term large-scale data storage, its missing of offering strong promise of data and availability may interfere with its wide adoption by both business and individual cloud users. In order to accomplish the promises of cloud data honest and availability, the quality of cloud storage service, provide ondemand data correctness checking for cloud users have to be designed. so users no longer have physical possession of data in the cloud prohibits the direct adoption of traditional cryptographic method for the purpose of data protection. Hence, the checking of cloud storage correctness must be conducted without clear knowledge of the whole data files. Meanwhile, cloud storage is not just third party data storage. The datas in the cloud may not only be accessed but also be often updated by the users including add, deletion, change, ap-pending, etc. So, it is also very important to support the combination of this energetic feature into the cloud storage correctness promise, which ISSN: Page 11
2 makes the system design even more challenging. Recently, the importance of making sure of the remote data completeness has been highlighted by the following research works under different system and security models. These ways of doing things, while can be useful to secure the storage correctness without having users local data, are all focusing on single server situation. They may be useful for quality-of-service testing, but does not guarantee the data availability in case of server failures. Although direct applying these ways of doing things to distributed storage (multiple servers) could be easy, the resulted storage checking overhead would be linear to the number of servers. As a completing approach, rese archers havealso proposed distributed rules of conduct for securing storage correctness across multiple servers or peers. However, while providing efficient cross server storage checking and data availability insurance, these layouts are all focusing on static or permanent data. As a result, their abilities of handling energetic data remains unclear, which unavoidably limits their full access incloud storage. In this paper, we propose an effective and flexib le distributed storage checking with clear dynamic data support to secure the correctness and get ability of users' data in the cloud. We depend on erasurecorrecting code in the file distribution preparation to provide unnecessary things and guarantee the data a dependability against Confusing servers, where a storage server may fail in random ways. This construction extremely reduces the communication and storage overhead as compared to the usual copy-based file distribution ways of doing things. By utilizing the homomorphism symbol with distributed checking of erasure-coded data, our big layout accomplishes the storage correctness insurance as well a data error localization: whenever data has been detected during the storage correctness checking, our layout can almost guarantee localization of data errors,, the identification of the misbehaving server(s). Inorder to strike a good balance between error toughness and data patterns, we further explore the math-related property of our symbol computation and erasure-coded data, and demonstrate how to efficiently support energetic operation on data blocks, while maintaining thesame level of storage correctness promise., we also provide theextension of th e proposed main layout to support third-party auditing, where users can safely providechecking tasks to third-party and be worryfree to use the cloud storage services. Our work is among the first few ones in this field to think about distributed data storage security in cloud computing. One can be summarized as the following three aspects: 1) Compared to many of the things that came before it, which only provide binary results about the storage status across the distributed servers, the proposed plan accomplish of storage correctness insurance and data error localizationand the identification of misbehaving server(s). 2) Unlike most prior works for securing remote data, the new plan further supports secure and efficient changing operations on data blocks, including: update, delete, and add. 3) The experiment results will show the proposed plan is highly efficient for long security analysis. ISSN: Page 12
3 II. System Model PROBLEM STATEMENT Three different network things/businesses can b e identified as follows:.user: a thing/business, who has data to be stored in the cloud and depends on the cloud for data storage and computation, can be either business/project or individual customers..cloud Server (CS): a thing, which is managed by Service provider (CSP) to provide data storage service a nd also has significant storage space and computation useful things. Third-Party Person : an optional TPA, who has ability to do things very well and abilities that users may not have, is trusted to evaluate and expose risk of cloud storage services for the users upon request. As users no longer possess their data locally, it is of extr eme importance to make sure of users that their data are being correctly stored and maintained. That is, users should be prepared with security means so that they can make to enforce cloud storage service-level agreement of their stored data even without the exist enceof local copies. In case that users do not necessarily have the time, valuable supplies to watch their data online, they can perform the data auditing tasks to an optional trusted TPA of their choices. However, to securely introduce such a TPA, any possible leakage of user's data toward TPA through the auditing rules of conduct should be prohibited. In our model, we assume that the point-to-point communication channels between each cloud server and the user and reliable, which can be in practice with little overhead. These relation handshakes are left out in the following presentation Adversary Model From user's the way of seeing things, the enemy model has to capture all kinds of threats toward his cloud. Because cloud data do not reside at user's local site but at CSP's address domain, these threats can come from two different sources: internal and external attacks. For internal attacks, a CSP can be self-interested, untrusted, and possibly mal-icious. Not only does it want to move data that has not been or is rarely accessed to a lower level of storage than agreed for moneybased reasons, but it may also attempt to hide a data loss event due to management errors, Confusing failures, and so on. For external attacks, data threatsmay come from outsiders who are beyond the control domain of CSP, for example, the money-based motivated attackers. They may agree some cloud data storage servers in different time periods of time and able to change or delete users' data while remaining undetected by CSP. Therefore, we consider the enemy in our model has the f ollowing abilities, which captures both external and internal threats toward the cloud data.specifically, the e nemy is interested in continuously ruining the user's data files stored on individual servers. Once a server is made up,an enemy can pollute the original data files by changing or introducing its own fake data to prevent the original data from being retrieved by the user. This goes along with the threats from external attacks. In the worst case, the enemy can agree all the storage servers so that he can change the data files as long as they are internally consistent. In fact, this is equal to internal attack case where all servers are assumed working (criminally) together from the early stages of application or service to hide a data loss event. IV. WAY OF WRITING AND PRELIMINARIES The data file to be stored. We assume that F can be repre sented as a connected combination of m equal-sized data vectors, each consisting of l blocks A--The breaking up and moving away matrix used for Reed-Solomon coding. G--The (translated /put into secret code) file matrix, which includes a set of n ¼ m þ k vectors, each consisting of l blocks. Over-- a version number bound with the index for individual ISSN: Page 13
4 blocks, which records the times the block has been changed. At first we assume ver is 0 for all data blocks. sverij--the seed for PRF, which depends on the file name, blockindex i, the server position j as well as the optional block version number ver. III. ENSURING CLOUD DATA STORAGE In cloud data storage system, users store their data in the cloud and no longer possess thedata locally. So, the corr ectness and availability of the data files being stored on t hedistributed cloud servers must be guaranteed. One of t he key issues is to effectively detectany unauthorized dat a change and misbehaving, possibly due to server and /or random Confusing failures Besides, in the distributed case when such inconsistencies are successfully detected, to find which server the data error lies in is als oof great importance,since it can always be the first step to fast recover the storage errors and/or identifying possible threats of external attacks. To deal with these problems, our main plan for making sure of cloud data storage is presented in this section. The first part of the section is is dedicated to a review of basic tools from coding explanation that is needed in our big plan for file distribution across cloud servers. Then, the homomorphi c symbol is introduced. The symbolic computation function we are thinking about belongs to a family of universal hash function, chosen to preserve the homomorphic properties, which can be perfectly combined with the checking of erasure-coded data, it is shown how to get a challenge-response rules of conduct for the storage correctness as well as identifying misbehaving servers. The procedure forfile retrieval and error recover y based on erasure-correcting code is also organized and listed. Finally, we describe how to extend our plan to third party auditing with only small change of the main design. FILE RETRIEVAL AND ERROR RECOVERY Since our layout of file matrix is well-thoughtout, the user can reconstruct the original file by downloading the data vectors from the first m servers, assuming that they return the c orrect response values. Notice that our checking big plan is basedon random spot-checking, so the storage correctness promise is a probabilistic one. However,by choosing system limits appropriately and conducting enough times of checking, we can guarantee the successful file retrieval with high probability. On the otherhand, whenever the data theft is detected, the comparison of precomputed symbols and received response values can guarantee the identification of misbehaving server(s), which will be discussed shortly. Therefore,the user can always ask servers to send back blocks of the r rows specified in the challenge and to correct blocks by erasure correction, shown in Set of computer instructions, as long as the number of identified misbehaving servers is less. The newly recovered blocks can then be redistributed to the misbehaving servers to maintain the correctness of storage. Algorithm Error Recovery. procedure Assume the block things have been detected among the specified r rows; Assume s _ k servers have been identified misbehaving Download r rows of blocks from servers; Treat s servers as erasures and recover the block s. Resend the recovered blocks to corresponding s ervers. end procedure Toward Third Party Auditing The user does not have the time, to perform the storage correctness checking,the can optionally transfer power to this job to an independent thirdparty person who carefully checks business records, making the cloud storage publicly. However,as pointed out by the recent work to securely i ISSN: Page 14
5 ntroduce an effective TPA, the auditing process should bring in no new weaknesses toward user data privacy. Namely, TPA should not learn user's data content through thedata auditing. Now we show that with onl ysmall change, our rules of conduct can support privacypreserving third party auditing. parities. This part of operation has to be carried out by the user, since only he knows the secret matrix P. Besides, to make sure of the changes of data blocks correctly reflected in the cloud address domain, the user also needs to change the similar The new design is based on the observation of linear pro perty of the equality vector very extreme process. Recall that the reason of veryextreme process is for protection of the secret matrix P against cloud servers. However, this can be accomplished either by hide the equality vector or hiding the data vector So, if we blind data vector before file distrib ution, then the storage checking job can be successfully transferred power to third party auditing in a privacy-preserving manner PROVIDING DATA OPERATION SUPPORT So far, we assumed that F represents static data. This m odel may fit someapplication pictures, such as libraries a nd scientific datas ets. However, in cloud data storage, there are many possible situations where data stored in the cloud is changing, like electronic documents, photos, or log files, etc. Therefore, it is extremely important to think about the changing case, where a user may wish to perform different block-level operations of update, delete, and add to change the data file while maintaining the storage correctness promise. Since data do not reside at users' local site but at Service provider's address domain, supporting changing data operation can be quite challenging. On the one hand, CSP needs to process the data patterns request without knowing the secret keying material.on the other hand, users need to make sure that all the changing data operation request has been faithfully processed by CSP. To deal with this problem, we briefly explain our approach way(s) of doing things here and provide the details later. For any data changing operation, the user must first create the similar resulted file blocks and storage checking symbols to change something take care of someone the changes on data blocks. V. CONCLUSION In this paper, we investigate the problem of data security in clouddata storage, which is almost a distributed storage system. To accomplish the promises of cloud data completeness and availability, enforce the quality of dependable cloud storage service for users, we propose an effective and flexible distributed plan with changing data support, including block update, delete, and add. We depend on erasure-correcting code in the file distribution preparation to provide unnec essary thing equality vectors and guarantee the data dependabili ty. By utilizing the homomorphic symbol with distributed checking of erasure coded data, our plan to accomplish the combination of storage correctness insurance and data error localizati on, whenever data has been detected during the storage correctness checking across the distributed servers, we can almost guarantee the identification of the misbehaving server(s). Considering the time, computation useful valuable supplies, and even the related online heavy load of users, we also provide the extension of the proposed main ISSN: Page 15
6 plan to supportthird-party auditing, where users can safely transfer power to checking tasks to third party people and be worry-free to use the cloud storage services. Through described results, we show that our plan is highly efficient and tough to Confusing failure, evil and cruel data change attack, and even server working (criminally) together attacks. Int l Conf. Security and Privacy in Comm. Netowrks (SecureComm 08), pp. 1-10, [15] Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing, Proc. 14th European Conf. Research in Computer Security (ESORICS 09), pp , REFERENCES [1] C. Wang, Q. Wang, K. Ren, and W. Lou, Ensuring Data Storage Security in Cloud Computing, Proc. 17th Int l Workshop Quality of Service (IWQoS 09), pp. 1-9, July [2] Amazon.com, Amazon Web Services (AWS), amazon.com, [3] Sun Microsystems, Inc., Building Customer Trust in Cloud Computing with Transparent Security, offers/details/sun_transparency.xml, Nov [4] K. Ren, C. Wang, and Q. Wang, Security Challenges for the Public Cloud, IEEE Internet Computing, vol. 16, no. 1, pp , [5] M. Arrington, Gmail Disaster: Reports of Mass Deletions, Dec [6] J. Kincaid, MediaMax/TheLinkup Closes Its Doors, July [7] Amazon.com, Amazon S3 Availability Event: July 20, 2008, July [8] S. Wilson, Appengine Outage, /appengine_outage.php, June [9] B. Krebs, Payment Processor Breach May Be Largest Ever, payment_processor_breach_may_b.html, Jan [10] A. Juels and B.S. Kaliski Jr., PORs: Proofs of Retrievability for Large Files, Proc. 14th ACM Conf. Computer and Comm. Security(CCS 07), pp , Oct [11] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z.Peterson, and D. Song, Provable Data Possession at Untrusted Stores, Proc. 14th ACM Conf. Computer and Comm. Security (CCS 07), pp , Oct [12] M.A. Shah, M. Baker, J.C. Mogul, and R. Swaminathan, Auditing to Keep Online Storage Services Honest, Proc. 11th USENIX Workshop Hot Topics in Operating Systems (HotOS 07), pp. 1-6, [13] M.A. Shah, R. Swaminathan, and M. Baker, Privacy- Preserving Audit and Extraction of Digital Contents, Cryptology eprint Archive, Report 2008/186, [14] G. Ateniese, R.D. Pietro, L.V. Mancini, and G. Tsudik, Scalable and Efficient Provable Data Possession, Proc. Fourth ISSN: Page 16
Selective dependable storage services for providing security in cloud computing
Selective dependable storage services for providing security in cloud computing Gade Lakshmi Thirupatamma*1, M.Jayaram*2, R.Pitchaiah*3 M.Tech Scholar, Dept of CSE, UCET, Medikondur, Dist: Guntur, AP,
More informationErasure correcting to enhance data security in cloud data storage
Erasure correcting to enhance data security in cloud data storage K.Shrividhya Department of computer science- Vels University shrividhya224@gmail.com A.Sajeevram Department of computer science Vels University
More informationIndex Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing.
Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Privacy - Preserving
More informationSecure Way of Storing Data in Cloud Using Third Party Auditor
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 4 (Jul. - Aug. 2013), PP 69-74 Secure Way of Storing Data in Cloud Using Third Party Auditor 1 Miss.
More informationData Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System
Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System 1 K.Valli Madhavi A.P vallimb@yahoo.com Mobile: 9866034900 2 R.Tamilkodi A.P tamil_kodiin@yahoo.co.in Mobile:
More informationEFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department
More informationImproving data integrity on cloud storage services
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services
More informationData Storage Security in Cloud Computing
Data Storage Security in Cloud Computing Manoj Kokane 1, Premkumar Jain 2, Poonam Sarangdhar 3 1, 2, 3 Government College of Engineering and Research, Awasari, Pune, India Abstract: Cloud computing is
More informationAn Efficient Data Correctness Approach over Cloud Architectures
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 8, Issue 12 (October 2013), PP. 33-37 An Efficient Data Correctness Approach over
More informationSECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD
Volume 1, Issue 7, PP:, JAN JUL 2015. SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD B ANNAPURNA 1*, G RAVI 2*, 1. II-M.Tech Student, MRCET 2. Assoc. Prof, Dept.
More informationFebruary. ISSN: 2321-8134
IJFEAT INTERNATIONAL JOURNAL FOR ENGINEERING APPLICATIONS AND TECHNOLOGY TITLE: DATA PLACE & MANAGE SECURITY IN CLOUD COMPUTING FOR EFFECTIVE AND FLEXIBLE DISTRIBUTED SYSTEM 1 Mr. Pritam S. Bhoyar, 2 Mr.
More informationDependable and Secure Storage Services in Cloud Computing
Dependable and Secure Storage Services in Cloud Computing D.Veena Sanjitha #1, M.Himaswanthi #2, T.V.N.Sai Sindhura #3, K.V.V. Satyanarayana * # CSE Department, KL University Guntur, AndhraPradesh * K.V.V.
More informationNear Sheltered and Loyal storage Space Navigating in Cloud
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 8 (August. 2013), V2 PP 01-05 Near Sheltered and Loyal storage Space Navigating in Cloud N.Venkata Krishna, M.Venkata
More informationEnsuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication
Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication Sanjay Kumar Baghel Mtech Scholar, CSE, CSIT DURG Sanju5878@gmail.com Bhupesh Kumar Dewangan Assistant Professor,CSE,
More informationEfficient Remote Data Possession Checking In Critical Information Infrastructures Ensuring Data Storage Security In Cloud Computing
Efficient Remote Data Possession Checking In Critical Information Infrastructures Ensuring Data Storage Security In Cloud Computing Dr. T.Nalini 1, Dr.K.Manivannan 2,Vaishnavi Moorthy 3 1 Professor, Department
More informationSecuring Cloud Data Storage
IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661 Volume 1, Issue 6 (July-Aug. 2012), PP 43-49 Securing Cloud Data Storage S. P. Jaikar 1, M. V. Nimbalkar 2 1,2 (Department of Information
More informationHow To Ensure Correctness Of Data In The Cloud
A MECHANICS FOR ASSURING DATA STORAGE SECURITY IN CLOUD COMPUTING 1, 2 Pratibha Gangwar, 3 Mamta Gadoria 1 M. Tech. Scholar, Jayoti Vidyapeeth Women s University, Jaipur, priya25mehta@gmail.com 2 M. Tech.
More informationAN EXPOSURE TO RELIABLE STORAGE SERVICES IN CLOUD COMPUTING
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EXPOSURE TO RELIABLE STORAGE SERVICES IN CLOUD COMPUTING Ayesha Romana 1, Akheel Mohammed 2, Ayesha 3 1 M.Tech Student, Dept
More informationKeywords: Cloud Computing, Data Dynamics, Data Integrity, Error Localization, Third Party Auditor.
www.semargroup.org, www.ijsetr.com ISSN 2319-8885 Vol.03,Issue.11 June-2014, Pages:2300-2307 Secure Cloud: Storage with Privacy Preserving Public Auditing and Data Dynamics Dept of CSE, Malabar College
More informationEnhance Data Security in Cloud Computing using Layered Interleaving Approach
Enhance Data Security in Cloud Computing using Layered Interleaving Approach Mr. Pradeep Semwal Assistant Professor Dept of Computer Application & IT SGRR-Institute of Technology & Sciences, Dehradun Mr.
More informationTo Provide Security & Integrity for Storage Services in Cloud Computing
To Provide Security & Integrity for Storage Services in Cloud Computing 1 vinothlakshmi.s Assistant Professor, Dept of IT, Bharath Unversity, Chennai, TamilNadu, India ABSTRACT: we propose in this paper
More informationSecure Storage Services and Erasure Code Implementation in Cloud Servers
Secure Storage Services and Erasure Code Implementation in Cloud Servers G. Rahul Reddy 1, N. J. Subashini 2 1 Research Scholar, M.Tech, Cloud Computing, Dept of Information Technology, SRM University,
More informationAustralian Journal of Basic and Applied Sciences. Secure and Efficient Dynamic Data Operations in Cloud Computing
AENSI Journals Australian Journal of Basic and Applied Sciences ISSN:1991-8178 Journal home page: www.ajbasweb.com Secure and Efficient Dynamic Data Operations in Cloud Computing 1 S.K. Mouleeswaran, 2
More informationIndex Terms : cloud computing, Distributed Storage, error detection, data recovery, SHA, dynamic block operations
Revisiting Secure Cloud Storage by Replacing Token Generation With SHA Ms. Bhagyashree Alhat (1), Prof. Amar Buchade(2) Pune Institute of Computer Technology, University of Pune,PG Student(1), Assistant
More informationDevelopment of enhanced Third party Auditing Scheme for Secure Cloud Storage
Development of enhanced Third party Auditing Scheme for Secure Cloud Storage Bhanu Prakash Chamakuri*1, D. Srikar*2, Dr. M.Suresh Babu*3 M.Tech Scholar, Dept of CSE, Grandhi Varalakshmi Institute Of Technology,
More informationCLOUD BASED STORAGE SERVICES FOR SECURITY FOLLOWED BY THE DATA AUTHENTICATION
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE CLOUD BASED STORAGE SERVICES FOR SECURITY FOLLOWED BY THE DATA AUTHENTICATION Akheel Mohammed 1, Dr.Vasumathi 2, Mir Ahmed Ali
More informationTrusted Public Auditing Process for Secure Cloud Storage
Trusted Public Auditing Process for Secure Cloud Storage K.Adhiyaman 1, A. Jesudoss 2, D.Saravanan 3 1 Final Year MCA, Faculty of Computing, Department of MCA Sathyabama University, Chennai,Tamil Nadu,
More informationIndex Terms: Data integrity, dependable distributed storage, Cloud Computing
Volume 5, Issue 5, May 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Cloud Data Protection
More informationPRIVACY PRESERVING PUBLIC AUDITING FOR SECURED DATA STORAGE IN CLOUD USING BLOCK AUTHENTICATION CODE
PRIVACY PRESERVING PUBLIC AUDITING FOR SECURED DATA STORAGE IN CLOUD USING BLOCK AUTHENTICATION CODE R.REVATHI # PG Scholar #, Bharathiyar Institute Of Engineering for Women, Deviyakurichi, Salem(DT) India
More informationVerification of Data Reliability and Secure Service for Dynamic Data in Cloud Storage
Verification of Data Reliability and Secure Service for Dynamic Data in Cloud Storage Nithiavathy.R 1, Suresh.J 2 Department of Computer Science &Engineering, Coimbatore Institute of Engineering and Technology
More informationCONSIDERATION OF DYNAMIC STORAGE ATTRIBUTES IN CLOUD
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE CONSIDERATION OF DYNAMIC STORAGE ATTRIBUTES IN CLOUD Ravi Sativada 1, M.Prabhakar Rao 2 1 M.Tech Student, Dept of CSE, Chilkur Balaji
More informationEnsuring Data Integrity of Cloud Storage Services In Cloud Computing
Ensuring Data Integrity of Cloud Storage Services In Cloud Computing Gunjal Yogita S. 1 P.G. Student, Department of IT, Amrutvahini College of Engineering, Sangamner, Maharashtra, India 1. ABSTRACT: Cloud
More informationImplementing Remote Data Integrity Checking Protocol for Secured Storage Services with Data Dynamics and Public Verifiability In Cloud Computing
Implementing Remote Data Integrity Checking Protocol for Secured Storage Services with Data Dynamics and Public Verifiability In Cloud Computing Ms. Vaishnavi Moorthy 1, Dr. S. Sivasubramaniam 2 1 (M.Tech-Final
More informationSecure Cloud StorageForPrivacy-Preserving Public Audit
RESEARCH ARTICLE OPEN ACCESS Secure Cloud StorageForPrivacy-Preserving Public Audit ShekhAhamadhusen D., Prof. Rahul Deshmukh Abstract- In Cloud Environment, using cloud storage service, users can remotely
More informationTo Assure Factual Information Storage Security in Cloud Computing
To Assure Factual Information Storage Security in Cloud Computing Archana M, Shirisha K, Bhavani V Abstract Abstract-Cloud computing has evolved from virtualization, utility computing and client-server
More informationSecure Distribution of File on Cloud
Secure Distribution of File on Cloud Niyamat I. Ujloomwale, Ranjana Badre Dept. of Computer, MIT Academy of Engineering, Alandi, Savitri Phule Pune University, Pune, India Dept. of Computer, MIT Academy
More informationData storage security in Cloud
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 6, Ver. III (Nov Dec. 2014), PP 50-56 Data storage security in Cloud Mrs. Niyamat Ujloomwale, Mrs.
More informationA Survey on Secure Storage Services in Cloud Computing
Global Journal of Computer Science and Technology Cloud & Distributed Volume 12 Issue 12 Version 1.0 Year 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
More informationSecurity in Cloud Audit Using the Key Based Homomorphic Linear Authenticator
Security in Cloud Audit Using the Key Based Homomorphic Linear Authenticator S.Muralitharan 1, M.Vijayaraj 2 Assistant Professor, Department of Information Technology, Mohamed Sathak Engineering College,
More informationAnalysis of Secure Cloud Data Sharing Within a Group
Analysis of Secure Cloud Data Sharing Within a Group Ms. uri Pande* Department of CSE, GHRAET Nagpur (M.S), India, Prof. Vikrant Chole Dept of Computer Science & Engg Nagpur (M.S.), India Abstract In this
More informationSHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING
SHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING Er. Kavin M 1, Mr.J.Jayavel 2 1 PG Scholar, 2 Teaching Assistant, Department of Information Technology, Anna University Regional
More informationData Security And Integrity Of Cloud Storage In Cloud Computing
Data Security And Integrity Of Cloud Storage In Cloud Computing Yogita Gunjal 1, Prof. J.Rethna Virjil Jeny 2 ME.student, Dept. Of Information technology, Amrutvahini College of Engineering,Sangamner,
More informationADVANCE SECURITY TO CLOUD DATA STORAGE
Journal homepage: www.mjret.in ADVANCE SECURITY TO CLOUD DATA STORAGE ISSN:2348-6953 Yogesh Bhapkar, Mitali Patil, Kishor Kale,Rakesh Gaikwad ISB&M, SOT, Pune, India Abstract: Cloud Computing is the next
More informationDistributing, Ensuring and Recovery of Data Stored in Cloud
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,
More informationCloud Data Storage Services Considering Public Audit for Security
Global Journal of Computer Science and Technology Cloud and Distributed Volume 13 Issue 1 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
More informationEnable Public Audit ability for Secure Cloud Storage
Enable Public Audit ability for Secure Cloud Storage Leela Poornima 1, D.Hari Krishna 2 1 Student, Nova College of Engineering and Technology, Ibrahimpatnam,Krishna Dist., Andhra Pradesh, India 2 Assistant
More informationA Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA
A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA Mr.Mahesh S.Giri Department of Computer Science & Engineering Technocrats Institute of Technology Bhopal, India
More informationEnsuring Data Storage Security in Cloud Computing
Ensuring Data Storage Security in Cloud Computing Cong Wang 1, Qian Wang 1, Kui Ren 1, and Wenjing Lou 2 1 ECE Department, Illinois Institute of Technology 2 ECE Department, Worcester Polytechnic Institute
More informationHow To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System
REVIEW ARTICAL A Novel Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage Dumala Harisha 1, V.Gouthami 2 1 Student, Computer Science & Engineering-Department, JNTU Hyderabad India
More informationSecure and Dependable Cloud Storage Services for CRM
Secure and Dependable Cloud Storage Services for CRM U. Rama Govinda Reddy PG Student, Bonam Venkata Chalamayya Engineering College, Odalarevu, Andhra Pradesh, India Abstract: Cloud storage allows users
More informationHow To Ensure Correctness Of Data In The Cloud
Ensuring Data Storage Security in Cloud Computing ABSTRACT Cloud computing has been envisioned as the next-generation architecture of IT enterprise. In contrast to traditional solutions, where the IT services
More informationSECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING
SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING Saranya.V 1, Suganthi.J 2, R.G. Suresh Kumar 3 1,2 Master of Technology, Department of Computer Science and Engineering, Rajiv Gandhi College of Engineering
More informationInternational Journal of Infinite Innovations in Engineering and Technology. ISSN (Online): 2349-2287, ISSN (Print): 2349-2279 2015
SECURED AUDITING SYSTEM FOR CLOUD DATA STORAGE WITH ERROR CORRECTION GUARANTEES 1 S.Sathya, 2 S.Sivakumar 1 Research Scholar, Department of Computer Science & Applications, PGP College of Arts & Science,
More information15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM
RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM Dhanashri Bamane Vinayak Pottigar Subhash Pingale Department of Computer Science and Engineering SKN
More informationHow To Design A Cloud Data Storage Service For A Cloud Computer System
Ensuring Security Services for Data Storing and Data Sharing in Cloud Computing D. Raman 1, Bojja Vamshikrishna 2 1 Associate Professor Department of Computer Science and Engineering, Vardhaman College
More informationAN APPROACH TOWARDS FUNCTIONING OF PUBLIC AUDITABILITY FOR CLOUD ENRICHMENT
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN APPROACH TOWARDS FUNCTIONING OF PUBLIC AUDITABILITY FOR CLOUD ENRICHMENT Mohd Abdul Shoaib 1, Akheel Mohammed 2, Ayesha 3
More informationSecure Data transfer in Cloud Storage Systems using Dynamic Tokens.
Secure Data transfer in Cloud Storage Systems using Dynamic Tokens. P.Srinivas *,K. Rajesh Kumar # M.Tech Student (CSE), Assoc. Professor *Department of Computer Science (CSE), Swarnandhra College of Engineering
More informationEnsuring Data Integrity in Cloud Computing
Journal of Computer Applications ISSN: 0974 1925, Volume-5, Issue EICA2012-4, February 10, 2012 Ensuring Data Integrity in Cloud Computing Venkatesa Kumar V Asst.Professor, Dept of Computer Science and
More informationSECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD
SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD S.REVATHI B.HASEENA M.NOORUL IZZATH PG Student PG Student PG Student II- ME CSE II- ME CSE II- ME CSE Al-Ameen Engineering
More informationISSN 2278-3091. Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability
Outsourcing and Discovering Storage Inconsistencies in Cloud Through TPA Sumathi Karanam 1, GL Varaprasad 2 Student, Department of CSE, QIS College of Engineering and Technology, Ongole, AndhraPradesh,India
More informationEnabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage
Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage Pranita Bakka 1, Dr. Jayashree Agarkhed 2 1 P.G.Student, Department of Computer Science & Engineering,
More informationCloud Data Service for Issues in Scalable Data Integration Using Multi Authority Attribute Based Encryption
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,
More informationHow To Secure Cloud Data Storage
Enabling Data Storage Security in Cloud Computing for Banking Enterprise S.BIRUNTHA V.VENKATESA KUMAR, S.PALANISWAMI, II ME CSE Lect/CSE, Registrar Anna University Coimbatore, Anna University Coimbatore,
More informationPrivacy-Preserving Public Auditing & Data Intrgrity for Secure Cloud Storage
Privacy-Preserving Public Auditing & Data Intrgrity for Secure Cloud Storage Imran Ahmad Student, M.Tech Dept. Computer Science & Engineering Patel Institute of Technology Bhopal, India imimran86@gmail.com
More informationPRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING T.Vidhya Sree M.Phil Research Scholar,CS, MGR College, Hosur (India) ABSTRACT Cloud Computing is the long dreamed vision
More informationVerifying Correctness of Trusted data in Clouds
Volume-3, Issue-6, December-2013, ISSN No.: 2250-0758 International Journal of Engineering and Management Research Available at: www.ijemr.net Page Number: 21-25 Verifying Correctness of Trusted data in
More informationOVERVIEW OF SECURITY ISSUES IN CLOUD COMPUTING
OVERVIEW OF SECURITY ISSUES IN CLOUD COMPUTING K. Arumugam 1, P. Sumathi 2 1 Research Scholar/Department Of Computer Science, Government Arts College, Coimbatore (India) 2 Assistant Professor/Department
More informationEnabling Public Auditing for Secured Data Storage in Cloud Computing
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 5 (May. 2013), V3 PP 01-05 Enabling Public Auditing for Secured Data Storage in Cloud Computing 1 Er.Amandeep Kaur,
More informationEnsuring Data Storage Security in Cloud Computing
IOSR Journal of Engineering e-issn: 2250-3021, p-issn: 2278-8719, Vol. 2, Issue 12 (Dec. 2012) V2 PP 17-21 Ensuring Data Storage Security in Cloud Computing Rampal Singh, Sawan Kumar, Shani Kumar Agrahari
More informationA Novel Re-Authentication Scheme on Cloud Based Storage Services T.G.V.V.Srinivas 1, P.Suresh Babu 2 1 Final M.Tech Student, 2 Associate professor
A Novel Re-Authentication Scheme on Cloud Based Storage Services T.G.V.V.Srinivas 1, P.Suresh Babu 2 1 Final M.Tech Student, 2 Associate professor 1,2 Dept of CSE, Kaushik College of engineering, JNTUK
More informationIMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD ENVIRONMENT
IJRRECS/November 2014/Volume-2/Issue-11/3699-3703 ISSN 2321-5461 INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD
More informationPrivacy-Preserving Public Auditing For Secure Cloud Storage
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 4, Ver. III (Jul Aug. 2014), PP 33-38 Privacy-Preserving Public Auditing For Secure Cloud Storage Salve
More informationA Secure and Dependable Cloud Storage Service in Cloud Computing
A Secure and Dependable Cloud Storage Service in Cloud Computing Yalla Ram Charan MTech Student Department of CSE Sri Venkateswra College of Engineering & Technology Abstract: Cloud storage is a model
More informationA Survey on Privacy-Preserving Techniques for Secure Cloud Storage
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,
More informationAn Integrated Approach of Data storage and Security in Cloud Computing
An Integrated Approach of Data storage and Security in Cloud Computing K.SHIRISHA REDDY 1, Dr.M.BALARAJU 2 1 Associate Professor, CSE, VIGNAN BHARATHI INSTITUTE OF TECHNOLOGY, Hyderabad, Andhra Pradesh,
More informationRemote Data Integrity Checking for Public Clouds
IBM Student Workshop for Frontiers of Cloud Computing 01 Remote Data Integrity Checking for Public Clouds Bo (Irvine) Chen Department of Computer Science New Jersey Institute of Technology joint work with
More informationIdentifying Data Integrity in the Cloud Storage
www.ijcsi.org 403 Identifying Data Integrity in the Cloud Storage Saranya Eswaran 1 and Dr.Sunitha Abburu 2 1 Adhiyamaan College of Engineering, Department of Computer Application, Hosur. 2 Professor and
More informationData Grid Privacy and Secure Storage Service in Cloud Computing
Data Grid Privacy and Secure Storage Service in Cloud Computing L.Revathi 1, S.Karthikeyan 2 1 Research Scholar, Department of Computer Applications, Dr. M.G.R. Educational and Research Institute University,
More informationCloud Data Storage Security and Public Auditing
A Meticulous Description of Applying Watermarking Technique for Secure Cloud Storage 1 M. Guresh, 2 R. Suresh 1 M.Tech 2 nd Year, Department of CSE, CREC Tirupati, AP, India 2 Professor & HOD, Department
More informationSurveying Cloud Storage Correctness using TPA with BLS
Surveying Cloud Storage Correctness using TPA with BLS Priyanka Dehariya 1, Prof. Shweta Shrivastava 2, Dr. Vineet Richaraya 3 1 M.Tech Scholar (CSE), LNCT, Bhopal 2 Asst.Professors, (CSE Department),
More informationPERFORMANCE OF BALANCED STORAGE SERVICES IN CLOUD SYSTEM
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE PERFORMANCE OF BALANCED STORAGE SERVICES IN CLOUD SYSTEM Byagari Kumar 1, K.Pradeep Kumar 2 1 M.Tech Student, Dept of CSE, RRS College
More informationIMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD
IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD 1 Ms.Nita R. Mhaske, 2 Prof. S.M.Rokade 1 student, Master of Engineering, Dept. of Computer Engineering Sir Visvesvaraya
More informationPRIVACY PRESERVING AND BATCH AUDITING IN SECURE CLOUD DATA STORAGE USING AES
PRIVACY PRESERVING AND BATCH AUDITING IN SECURE CLOUD DATA STORAGE USING AES 1 SANTOSH P. JADHAV, 2 B. R. NANDWALKAR 1,2 Department of Computer Engineering, Late G.N.Sapkal collage of engineering, University
More informationSecure Privacy Preserving Public Auditing for Cloud storage
Secure Privacy Preserving Public Auditing for Cloud storage Sathiskumar R 1, Dr.Jeberson Retnaraj 2 Department of Information Technology, Sathyabama University, Chennai, India 1 Department of Information
More informationSecrecy Maintaining Public Inspecting For Secure Cloud Storage
Secrecy Maintaining Public Inspecting For Secure Cloud Storage K.Sangamithra 1, S.Tamilselvan 2 M.E, M.P.Nachimuthu.M.Jaganathan Engineering College, Tamilnadu, India 1 Asst. Professor, M.P.Nachimuthu.M.Jaganathan
More informationENABLING PUBLIC AUDITABILITY AND DATA DYNAMICS FOR STORAGE SECURITY IN CLOUD COMPUTING
ENABLING PUBLIC AUDITABILITY AND DATA DYNAMICS FOR STORAGE SECURITY IN CLOUD COMPUTING 1 P.ILAMATHY M.TECH-INFORMATION TECHNOLOGY AMS ENGINEERING COLLEGE NAMAKKAL, INDIA ilamathyponnuvel@gmail.com 2 V.ANITHA,M.E.
More informationEnabling Data Security in Cloud Computing Using Third Party Auditing and Encryption Services
Enabling Data Security in Cloud Computing Using Third Party Auditing and Encryption Services Amal Jose, M.Sambath, S.Ravi PG Scholar, Department of Computer Science & Engineering, Hindustan University,
More informationSecurity in Cloud Network
Security in Cloud Network Vimula Shwetha, (M.Tech) CSE Dept, KCEA, Nizamabad, ABSTRACT: Cloud computing, large number of computers that are connected through a real-time communication network. The users
More informationI. Introduction. A. Related Work
PUBLIC VERIFIABILITY AND DATA DYNAMICS IN CLOUD SERVER P.Saranya, Roever Engineering College; S.Vishnupriya, Roever Engineering College; E.Elangovan, PRIST University Abstract- Cloud computing stores the
More informationEnhancing Data Security in Cloud Storage Auditing With Key Abstraction
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction 1 Priyadharshni.A, 2 Geo Jenefer.G 1 Master of engineering in computer science, Ponjesly College of Engineering 2 Assistant Professor,
More informationA Review on Towards Audit of Secure Storage Correctness Verification and Dependable Storage Error Recovery in Cloud Computing
International Conference on Multidisciplinary Research & Practice P a g e 548 A Review on Towards Audit of Secure Storage Correctness Verification and Dependable Storage Error Recovery in Cloud Computing
More informationpreliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.
Privacy-Preserving Public Auditing For Secure Cloud Storage ABSTRACT: Using cloud storage, users can remotely store their data and enjoy the on-demand high-quality applications and services from a shared
More informationPerformance Evaluation Panda for Data Storage and Sharing Services in Cloud Computing
Performance Evaluation Panda for Data Storage and Sharing Services in Cloud Computing Gunnala Ajay Kumar M.Tech Student Department of CSE Global Group Of Institutions Batasingaram, Ranga Reddy (Dist),
More informationPRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE
PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE Abstract: Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared
More informationPublic Auditability and Privacy preserving in Cloud Storage
Public Auditability and Privacy preserving in Cloud Storage Kishan Lathkar, Ambulgekar H. P SGGS IE&T Nanded, Maharashtra India lathkarkishan@sggs.ac.in, ambulgekar@sggs.ac.in Abstract: Cloud computing
More informationDESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION
DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION Prof. M. Ben Swarup Professor, Department of CSE Vignan's Institute of Information Technology Visakhapatnam-49, India Chukkala
More informationENABLING AUDITABILITY FOR SECURE CLOUD STORAGE USING TPA
ENABLING AUDITABILITY FOR SECURE CLOUD STORAGE USING TPA 1 Chennuri. Kranthi kumar, 2 Vishakha Lokhande 1 M.Tech Student, Department of CSE, KG reddy College Of Engineering and Technology, Chilkur village,
More informationSurvey of Data Storage Security in Cloud Computing
Survey of Data Storage Security in Cloud Computing Mr. Kiran Nagargoje, Patel College of Science & Technology Ralamandal Indore, India Abstract: Mr.Niranjan Mahanwar Patel College of Science & Technology
More informationPrivacy Preserving Public Auditing for Data in Cloud Storage
Privacy Preserving Public Auditing for Data in Cloud Storage M.Priya 1, E. Anitha 2, V.Murugalakshmi 3 M.E, Department of CSE, Karpagam University, Coimbatore, Tamilnadu, India 1, 3 M.E, Department of
More informationAuthorized Auditing of Big Data Stored on Cloud with Auditability Aware Data Scheduling
Authorized Auditing of Big Data Stored on Cloud with Auditability Aware Data Scheduling Surapriya Swain 1, Prof. Saurabh Gupta 2 1 Department of Computer Engineering, GSMCOE, Balewadi, Savitribai Phule
More information