COST EFFECTIVE PRIVACY PRESERVED INTERMEDIATE DATASETS FOR CLOUD DATA SERVICES

Size: px
Start display at page:

Download "COST EFFECTIVE PRIVACY PRESERVED INTERMEDIATE DATASETS FOR CLOUD DATA SERVICES"

Transcription

1 COST EFFECTIVE PRIVACY PRESERVED INTERMEDIATE DATASETS FOR CLOUD DATA SERVICES Chaya.Y.K 1, Bharathi V Kalmath 2 1 PG Student, Department of CSE, S.V.C.E,Bengaluru 2 Asst.Professor, Department of CSE, S.V.C.E,Bengaluru ABSTRACT In cloud computing at the time of processing a runtime application a large volume of intermediate datasets are generated, instead of regenerating these datasets, we store these datasets in cloud for future purpose. When an adversary analyzes these datasets he can get the sensitive information. In existing system to provide privacy for these intermediate datasets they are encrypting all these datasets.but it is time consuming and not cost- effective, proposed system uses heuristic method to reduce cost. In this method by encrypting a part of datasets, reducing cost and also satisfying the privacy requirement of data owners. Keywords: Cloud computing, intermediate datasets, Privacy, Anonymization, and Encryption INTRODUCTION Technically, cloud computing is regarded as an ingenious combination of various technologies, establishing a business model by offering IT services and using economies of scale.participants in the business chain of cloud computing can benefit from this model. Cloud customers can save huge investment of IT infrastructure, nd concentrate on their own business. Therefore, many companies or organizations migrating or building their business into cloud. However, numerous customers hesitate to take advantage of cloud due to security and rivacy concerns. The privacy concerns caused by retaining intermediate datasets in cloud are important but paid little attention. Storage and computation services are equivalent from an economical perspective because they are charged for what they use. Thus cloud customers store valuable intermediate datasets while processing original datasets in order to curtile the overall expenses by avoiding frequent recomputation to obtain these datasets. Such scenarios are quite common because data users often reanalyzes results, conduct new analysis n intermediate datastes,or share some intermediate with others. However, the storage of intermediate data enlarges attacks so that privacy requirements of data holders are at risk of being violated. Usually, intermediate datasets in cloud are accessed and processed by multiple parties, but controlled rarely data owners. This enables an adversary to collect intermediate datasets together and analyze sensitive information from them, ringing considerable economic loss or social reputation impairment to data owners. But,little attention has been paid to such privacy issue. Data provenance is used to manage intermediate datasets. Provenance is commonly as history of derivation of some objects and data, which contains the information upon how data were generated. 2. EXISTING SYSTEM Preserving the privacy of intermediate datasets becomes a challenging problem because adversaries may recover privacy-sensitive information by analyzing multiple datasets. To preserve privacy of intermediate datasets, they encrypt all datasets in cloud. They also use Anonymization method to preserve privacy of datasets. On one hand, encrypting all datasets, a straightforward approach, is widely adopted in current research. Demerits Encrypting all data sets are neither efficient nor cost-effective. Encrypting all datasets results in time consuming and costly for encrypting frequently. Needs to store the encrypt/decrypt datasets in separate requires large storage area.

2 3 PROPOSED SYSTEM The proposed system proves that it is not necessary to encrypt all datasets. Designed a practical heuristic algorithm to identify the intermediate data sets need to be encrypted. Demonstrate the possibility of ensuring privacy leakage requirement without encrypting all. Significantly reduce privacy preserving cost over existing approach. A tree structure has been modeled from the generation relationships of intermediate data sets to analyze privacy propagation among data sets. Privacy preserving cost reduce heuristic algorithm used for privacy leakage constraints. Sensitive Intermediate data set tree/graph (SIT/SIG) methods are used. Thus the proposed system gives the solution for the problems faced in the existing system. Merits Overcome the existing approach of encrypt all the data sets Storage and encrypt time reduced. Also provide accurate value at cost of privacy preserving. Anonymization with encryption of multiple data sets applied. 4 PROBLEM ANALYSIS A. Loading Dataset Initially we are getting the username,password and type from the user to authenticate the user category. If the user has the account in earlier allows the user to make actions else the user must register a new account. Here we categorize the type of user into two as they are: 1. Data Holder 2. Adversary All the following actions will be performing under the data holder side to reduce the capacity of file encryption decryption to provide privacy of the data. As we proposed the final output of the data to a minimized encrypt /decrypt value. In case the user type under adversary has the capability of view the datasets they needed to view. The existing provides the full encrypted datasets. Instead the proposed dataset will provide the necessary dataset to encrypt and anonymized.after processing the account authentication from user we allow them to add a dataset in cloud. For that we make a option of creating the new table from the dataset in text file to table if it is necessary for the user. Next by converting the file to table the dataset needed to upload in cloud will be identified. Original datasets Layer Segmentation by compressed tree Identifying the Privacy Preserving Lost Heuristic algorithm for reduced Privacy Preserving cost Anonymize and encrypting the data set Generating intermediate data sets. B. Layer Segmentation Here we have an intermediate data sets generating after uploading original dataset into cloud. Thereby to reduce the dataset privacy leakage cost we are undergoing the SIT algorithm. Privacy leakage of the dataset value is identified. These value generated should be under the threshold value. According to the concept of compressed tree under SIT is categorization of tree defines the layer, threshold value. Different layers have different threshold values. Based on generation relationship we are constructing tree. Further by generating the threshold value for the various layers, at the end of this process we identified the various levels in the dataset. C. Minimum Privacy Preserving Cost Usually, more than one feasible global encryption solution exists under the PLC constraints, because there are many alternative solutions in each layer. Each intermediate dataset has various size and frequency of usage, leading to different overall cost with different solutions. The type value generated in the compressed tree helps to categorize the dataset. Thus privacy preserving cost is calculated only for the layer level less than the threshold value. As the field greater than the threshold values are omitted. Here the values after some restrictions are allowed to identify the privacy preserving cost value. Such categorization of the minimum value from the dataset under privacy leakage threshold value is dais to minimum privacy preserving cost. These values will be identified with the help of size; price allocated for the transaction in GB or Mb, frequency of the dataset is taken. As these values iteratively find for all records under the field. Hence the dataset size remains same no further elimination is performed in this module. Finally we identify the minimum privacy preserving cost.

3 Privacy Leakage : PLs(d*) H(S,Q) H*(S,Q) Where H(S,Q) = log( QI. SD ) and H (S, Q) = Σ p(s, q). log (p(s, q)) qєqi,sєsd Cost Calculation: C (πi) =Σ Sk.PR.fk, where dk ϵ EDi, 1 i H, πi= {EDi, UDi} D.Heuristic Algorithm The state-search tree generated is different from SIT itself, but with same height. The goal in our algorithm is to find a near optimal solution in a limited search space. Based on this, we design a heuristic algorithm. The basic idea is that the heuristic algorithm iteratively selects a state node with highest heuristic value and then extends its child nodes until it reaches the goal state. The privacy-preserving solution and corresponding cost are derived from the goal state. SORT and SELECT are the simple functions as their name signify.thus each value identified in the minimum privacy preserving cost further undergoes the phase of heuristic algorithm to identify the optimized dataset need the privacy. The algorithm can be used to find which intermediate dataset need to encrypt and to obtain optimal solution. Heuristic value can be calculated for selecting a dataset with small cost and large privacy leakage value to encrypt. Heuristic function for a state node SNi is f(sni)=g(sni)+h(sni) where g(sni) is the heuristic information from starting state to current state and h(sni)is the estimated information from current state to the goal state. The g(sni) =Ccur / (ε-εi+1), where ccur is the privacy preserving cost up to current state and ε is the threshold value and εi+1 is the threshold value for the next layer. The h(sni)is calculated as (SNi)= (εi+1.cdes.bfavg)/plavg, where Cdes represents the total cost of the tree and BFAVG is the branch factor of SIT, it can be computed by BFAVG=NE/NI, where NE denotes the number of edges in the tree and NI represents the number of intermediate datasets in the tree. PLAVG is the average of privacy leakage of all the intermediate datasets. Based on the above description the heuristic value can be calculated for a search node is as follows. f(sni)= Ccur/(ε-εi+1)+(εi+1.Cdes.BFAVG)/PLAVG The heuristic value can be used in the heuristic algorithm for selecting the dataset with highest heuristic value and then retrieving its child nodes finding which intermediate dataset we need to encrypt and adding the child nodes one by one to the priority queue up to the goal state. Finally the global privacy preserving solution and corresponding costs are derived. E. Anonymization and Encryption Here we under the process of converting the dataset that which is needed to be store at cloud storage space. As we able to analyze and find the strings to be encrypted, such process over analyze the integer s values is waste of time, because we can t categorize the integer values. To make such problem to be solved we use a tech nique name Anonymization. The Anonymization process is which hiding the data. As by declaring certain ranges for the integer values and anonymize the data will surely reduce the cost of further encryption as well as the data will unnoticed the true information. As both encryption and Anonymization for a dataset will surely reduce the privacy preserving cost as we proposed in earlier. And finally we transfer the dataset which is encrypted and anonymized will be stored in a cloud space. Further we comparing the result set with the existing and proposed and also produce the graph for the heuristic privacy preserving cost value. When adversary user login to view the dataset uploaded by the data holder will produce the anonymized and encrypted dataset instead of showing fully encrypted datasets. As resulting the adversary user cannot view the original information as well he can notice the information which is necessary to

4 visible by the adversary user.after analyzing the dataset we generating the intermediate dataset with the data need to be encrypted and anonymized. 5. CONCLUSION Identified which data sets need to be encrypted. A practical heuristic algorithm has been designed accordingly. Cost of preserving privacy is reduced with our approach. Modeled the prob lem of saving privacy preserving cost as a constrained optimization problem which is addressed by decomposing the privacy leakage onstraints. Evaluation results on real-world data sets and larger extensive datasets have demonstrated the cost of preserving privacy in cloud can be reduced significantly with our approach over existing ones where all data sets are encrypted. 6. FUTURE WORKS With the contribution of my work, we are planning to further investigate privacy aware efficient scheduling of Intermediate datasets in cloud by taking the privacy preserving as metric together with other metrics such as storage and computation. Optimized balanced scheduling strategies are expected to be enveloped toward overall highly efficient privacy aware data set scheduling. 7. RESULT In existing system we are encrypting 80% datasets but in proposed we are encrypting 20% datasets. REFERENCES [1].M. Armbrust, A. Fox, R. Griffith, A.D.Joseph, R. Katz, A.Konwinski, G. Lee, D.Patterson, A. Rabkin, I. Stoica, and M.Zaharia, A View of Cloud Computing, Comm. ACM,vol. 53,no. 4, pp , [2].R. Buyya, C.S. Yeo, S. Venugopal, J.Broberg, and I. Brandic, Cloud Computingand Emerging It Platforms: Vision, Hype, andreality for Delivering Computing as the FifthUtility, Future Generation Computer Systems, vol. 25, no. 6, pp , [3].L. Wang, J. Zhan, W. Shi, and Y. Liang, In Cloud, Can Scientific Communities Benefit from the Economies of Scale?, IEEE Trans. Parallel and Distributed Systems, vol.23, no. 2, pp , Feb.2012.

5 [4].H. Takabi, J.B.D. Joshi, and G. Ahn, Security and Privacy Challenges in Cloud Computing Environments, IEEE Security& Privacy, vol. 8, no. 6, pp , Nov./Dec [5]. D. Zissis and D. Lekkas, Addressing Cloud Computing Security Issues, Future Generation Computer Systems, vol. 28, no. 3,pp , [6]. D. Yuan, Y. Yang, X. Liu, and J. Chen, On-Demand Minimum Cost Benchmarking for Intermediate Data Set Storage in Scientific Cloud Workflow Systems, J. Parallel Distributed Computing, vol. 71, no. 2, pp , [7]. S.Y. Ko, I. Hoque, B. Cho, and I. Gupta, Making CloudIntermediate Data Fault- Tolerant, Proc. First ACM Symp.CloudComputing (SoCC 10),pp ,2010. [8]. H. Lin and W. Tzeng, A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding, IEEE Trans. Parallel and Distributed Systems, vol. 23, no. 6, pp , June2012 [9]N. Cao, C. Wang, M. Li, K. Ren and W.Lou, Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data, Proc. 31st Annual IEEE Int'l Conf. Computer Communications (INFOCOM'11), pp , [10] M. Li, S. Yu, N. Cao and W. Lou, Authorized Private Keyword Search over Encrypted Data in Cloud Computing, Proc. 31st Int'l Conf. Distributed Computing Systems (ICDCS'11), pp , [11] C. Gentry, Fully Homomorphic Encryption Using Ideal Lattices, Proc. 41 st Annual ACM Symp. Theory of Computing (STOC'09), pp , [12] B.C.M. Fung, K. Wang and P.S. Yu, Anonymizing Classification Data for Privacy Preservation, IEEE Trans. Knowl. Data Eng., vol. 19, no. 5, pp , [13] B.C.M. Fung, K. Wang, R. Chen and P.S. Yu, Privacy-Preserving Data Publishing: A Survey of Recent Developments, ACM Comput. Surv., vol. 42, no. 4, pp. 1-53, [14] X. Zhang, C. Liu, J. Chen and W. Dou, An Upper-Bound Control Approach for Cost- Effective Privacy Protection of Intermediate Dataset Storage in Cloud, Proc. 9th IEEE Int'l Conf. Dependable, Autonomic and Secure Computing (DASC'11), pp , [15] I. Roy, S.T.V. Setty, A. Kilzer, V. Shmatikov and E. Witchel, Airavat: Security and Privacy for Mapreduce, Proc. 7 th USENIX Conf. Networked Systems Design and Implementation (NSDI'10), pp , [16] K.P.N. Puttaswamy, C. Kruegel and B.Y. Zhao, Silverline: Toward Data Confidentiality in Storage-Intensive Cloud Applications, Proc. 2nd ACM Symp. Cloud Computing (SoCC'11), [17] K. Zhang, X. Zhou, Y. Chen, X. Wang and Y. Ruan, Sedic: Privacy-Aware Data Intensive Computing on Hybrid Clouds, Proc. 18th ACM Conf. Computer and Communications Security (CCS'11), pp , [18] V. Ciriani, S.D.C.D. Vimercati, S.Foresti, S. Jajodia, S. Paraboschi and P. Samarati, Combining Fragmentation and Encryption to Protect Privacy in Data Storage, ACM Trans. Information and System Security, vol. 13, no. 3, pp. 1-33, [19] S.B. Davidson, S. Khanna, T. Milo, D.Panigrahi and S. Roy, Provenance Views for Module Privacy, Proc. 30th ACM SIGMODSIGACT- SIGART Symp. Principles of Database Systems (PODS'11), pp , [20] S.B. Davidson, S. Khanna, S. Roy, J.Stoyanovich, V. Tannen and Y. Chen, On Provenance and Privacy, Proc. 14th Int'l Conf. Database Theory, pp. 3-10, [21] S.B. Davidson, S. Khanna, V. Tannen, S. Roy, Y. Chen, T. Milo and J. Stoyanovich, Enabling Privacy in Provenance-Aware Workflow Systems, Proc. 5th Biennial Conf. Innovative Data Systems Research (CIDR'11), pp , [22] P. Samarati, Protecting Respondents' Identities in Microdata Release, IEEE Trans. Knowl. Data Eng., vol. 13, no. 6, pp , [23] A. Machanavajjhala, D. Kifer, J. Gehrke and M. Venkitasubramaniam, L-Diversity: Privacy Beyond K- Anonymity, ACM Trans. Knowl. Discov. Data., vol. 1, no. 1, Article 3, [24] G. Wang, Z. Zutao, D. Wenliang and T. Zhouxuan, Inference Analysis in Privacy- Preserving Data Re- Publishing, Proc. 8 th IEEE Int'l Conf. Data Mining (ICDM '08), pp , [25] W. Du, Z. Teng and Z. Zhu, Privacy- Maxent: Integrating Background Knowledge in Privacy uantification, Proc. ACM SIGMOD Int'l Conf. Management of Data (SIGMOD'08), pp , 2008.

Reduce cost and efficient access for cloud storage Using Intermediate Cloud Datasets

Reduce cost and efficient access for cloud storage Using Intermediate Cloud Datasets International Journal of Scientific and Research Publications, Volume 4, Issue 9, September 2014 1 Reduce cost and efficient access for cloud storage Using Intermediate Cloud Datasets Dr.R.Mala *, M.Lakshmi

More information

An Advanced Bottom up Generalization Approach for Big Data on Cloud

An Advanced Bottom up Generalization Approach for Big Data on Cloud An Advanced Bottom up Generalization Approach for Big Data on Cloud Abstract K.R.Pandilakshmi 1, G.Rashitha Banu 2 1 Research Scholar, Department of Computer Science, Vel s University, Chennai. 2 Professor,

More information

Minimal Cost Data Sets Storage in the Cloud

Minimal Cost Data Sets Storage in the Cloud Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 5, May 2014, pg.1091

More information

A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using Map Reduce On Cloud

A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using Map Reduce On Cloud A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using Map Reduce On Cloud Shweta Sunil Bhand, Prof.J.L.Chaudhari PG Scholar, Department of Computer Engineering, JSPM S BhivarabaiSawant

More information

Keywords: - Ring Signature, Homomorphic Authenticable Ring Signature (HARS), Privacy Preserving, Public Auditing, Cloud Computing.

Keywords: - Ring Signature, Homomorphic Authenticable Ring Signature (HARS), Privacy Preserving, Public Auditing, Cloud Computing. Survey on Privacy Preserving Public Auditing Techniques for Shared Data in the Cloud Kedar Jayesh Rasal 1, Dr. S.V.Gumaste 2, Sandip A. Kahate 3 Computer Engineering, Pune University, SPCOE, Otur, Pune,

More information

A HEURISTIC APPROACH FOR PRESERVING INTERMEDIATE DATA SET STORAGE ON CLOUD USING STORAGE & REGENERATION COST BASED ON USER PREFERENCE

A HEURISTIC APPROACH FOR PRESERVING INTERMEDIATE DATA SET STORAGE ON CLOUD USING STORAGE & REGENERATION COST BASED ON USER PREFERENCE A HEURISTIC APPROACH FOR PRESERVING INTERMEDIATE DATA SET STORAGE ON CLOUD USING STORAGE & REGENERATION COST BASED ON USER PREFERENCE 1 Suriyalakshmi Kanagarajan and 2 Saranya Vellaichamy 1 PG Scholar,

More information

Securing Health Care Information by Using Two-Tier Cipher Cloud Technology

Securing Health Care Information by Using Two-Tier Cipher Cloud Technology Securing Health Care Information by Using Two-Tier Cipher Cloud Technology M.Divya 1 J.Gayathri 2 A.Gladwin 3 1 B.TECH Information Technology, Jeppiaar Engineering College, Chennai 2 B.TECH Information

More information

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA U.Pandi Priya 1, R.Padma Priya 2 1 Research Scholar, Department of Computer Science and Information Technology,

More information

An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud

An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud T.Vijayalakshmi 1, Balika J Chelliah 2,S.Alagumani 3 and Dr.J.Jagadeesan 4 1 PG

More information

SECURITY FOR ENCRYPTED CLOUD DATA BY USING TOP-KEY TREE TECHNOLOGIES

SECURITY FOR ENCRYPTED CLOUD DATA BY USING TOP-KEY TREE TECHNOLOGIES SECURITY FOR ENCRYPTED CLOUD DATA BY USING TOP-KEY TREE TECHNOLOGIES 1 MANJOORULLASHA SHAIK, 2 SYED.ABDULHAQ, 3 P.BABU 1 PG SCHOLAR, CSE (CN), QCET, NELLORE 2,3 ASSOCIATE PROFESSOR, CSE, QCET, NELLORE

More information

Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.

Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption. Secure Privacy-Preserving Cloud Services. Abhaya Ghatkar, Reena Jadhav, Renju Georgekutty, Avriel William, Amita Jajoo DYPCOE, Akurdi, Pune ghatkar.abhaya@gmail.com, jadhavreena70@yahoo.com, renjug03@gmail.com,

More information

Implementation of Role Based Access Control on Encrypted Data in Hybrid Cloud

Implementation of Role Based Access Control on Encrypted Data in Hybrid Cloud Implementation of Role Based Access Control on Encrypted Data in Hybrid Cloud Gajanan Ganorkar, Prof. A.B. Deshmukh, Prof M.D.Tambhakhe Information Technology Email:g.ganorkar7691@gmail.com Contact: 8600200142

More information

Privacy Preserved Association Rule Mining For Attack Detection and Prevention

Privacy Preserved Association Rule Mining For Attack Detection and Prevention Privacy Preserved Association Rule Mining For Attack Detection and Prevention V.Ragunath 1, C.R.Dhivya 2 P.G Scholar, Department of Computer Science and Engineering, Nandha College of Technology, Erode,

More information

SURVEY ON: CLOUD DATA RETRIEVAL FOR MULTIKEYWORD BASED ON DATA MINING TECHNOLOGY

SURVEY ON: CLOUD DATA RETRIEVAL FOR MULTIKEYWORD BASED ON DATA MINING TECHNOLOGY SURVEY ON: CLOUD DATA RETRIEVAL FOR MULTIKEYWORD BASED ON DATA MINING TECHNOLOGY 1 Kavya G, 2 K.S. Rajesh 1 P.G Scholar, Dept. of Computer Science & Engineering RajaRajeswari College of Engineering, Bangalore,

More information

Performance Evaluation Panda for Data Storage and Sharing Services in Cloud Computing

Performance Evaluation Panda for Data Storage and Sharing Services in Cloud Computing Performance Evaluation Panda for Data Storage and Sharing Services in Cloud Computing Gunnala Ajay Kumar M.Tech Student Department of CSE Global Group Of Institutions Batasingaram, Ranga Reddy (Dist),

More information

Development of enhanced Third party Auditing Scheme for Secure Cloud Storage

Development of enhanced Third party Auditing Scheme for Secure Cloud Storage Development of enhanced Third party Auditing Scheme for Secure Cloud Storage Bhanu Prakash Chamakuri*1, D. Srikar*2, Dr. M.Suresh Babu*3 M.Tech Scholar, Dept of CSE, Grandhi Varalakshmi Institute Of Technology,

More information

How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System

How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System REVIEW ARTICAL A Novel Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage Dumala Harisha 1, V.Gouthami 2 1 Student, Computer Science & Engineering-Department, JNTU Hyderabad India

More information

Public Auditing for Shared Data in the Cloud by Using AES

Public Auditing for Shared Data in the Cloud by Using AES Public Auditing for Shared Data in the Cloud by Using AES 1 Syagamreddy Subbareddy, 2 P.Tejaswi, 3 D.Krishna 1 M.Tech(CSE) Pursuing, 2 Associate Professor, 3 Associate Professor,HOD, 1,2,3 Dept. of Computer

More information

IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD

IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD 1 Ms.Nita R. Mhaske, 2 Prof. S.M.Rokade 1 student, Master of Engineering, Dept. of Computer Engineering Sir Visvesvaraya

More information

An Efficient Multi-Keyword Ranked Secure Search On Crypto Drive With Privacy Retaining

An Efficient Multi-Keyword Ranked Secure Search On Crypto Drive With Privacy Retaining An Efficient Multi-Keyword Ranked Secure Search On Crypto Drive With Privacy Retaining 1 B.Sahaya Emelda and 2 Mrs. P. Maria Jesi M.E.,Ph.D., 1 PG Student and 2 Associate Professor, Department of Computer

More information

Big-Data Processing With Privacy Preserving Map-Reduce Cloud

Big-Data Processing With Privacy Preserving Map-Reduce Cloud Big-Data Processing With Privacy Preserving Map-Reduce Cloud R.Sreedhar 1, D.Umamaheshwari 2 PG Scholar, Computer and Communication Engineering, EBET Group of Institutions, EBET Knowledge Park, Tirupur-

More information

Sustaining Privacy Protection in Personalized Web Search with Temporal Behavior

Sustaining Privacy Protection in Personalized Web Search with Temporal Behavior Sustaining Privacy Protection in Personalized Web Search with Temporal Behavior N.Jagatheshwaran 1 R.Menaka 2 1 Final B.Tech (IT), jagatheshwaran.n@gmail.com, Velalar College of Engineering and Technology,

More information

Privacy Preservation and Secure Data Sharing in Cloud Storage

Privacy Preservation and Secure Data Sharing in Cloud Storage OPEN ACCESS Int. Res. J. of Science & Engineering, 2015; Vol. 3 (6): 231-236 ISSN: 2322-0015 RESEARCH ARTICLE Privacy Preservation and Secure Data Sharing in Cloud Storage Chavhan Bhaurao* and Deshmukh

More information

Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment

Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment Deepa Noorandevarmath 1, Rameshkumar H.K 2, C M Parameshwarappa 3 1 PG Student, Dept of CS&E, STJIT, Ranebennur. Karnataka, India

More information

15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM

15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM Dhanashri Bamane Vinayak Pottigar Subhash Pingale Department of Computer Science and Engineering SKN

More information

Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud

Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud Arpitha.K 1,Aawini.T 2,Divya J. 3, Kalyani P 4, Prof. Sudhakar Avareddy 5 1,2,3,4 Department of CSE, BITM Bellary, Karnataka. 5 Department

More information

SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE

SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE International Journal of Computer Network and Security(IJCNS) Vol 7. No.1 2015 Pp. 1-8 gopalax Journals, Singapore available at : www.ijcns.com ISSN: 0975-8283 ----------------------------------------------------------------------------------------------------------------------------------------------------------

More information

An Efficient Secure Multi Owner Data Sharing for Dynamic Groups in Cloud Computing

An Efficient Secure Multi Owner Data Sharing for Dynamic Groups in Cloud Computing Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 6, June 2014, pg.730

More information

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction Enhancing Data Security in Cloud Storage Auditing With Key Abstraction 1 Priyadharshni.A, 2 Geo Jenefer.G 1 Master of engineering in computer science, Ponjesly College of Engineering 2 Assistant Professor,

More information

International Journal of Computer Sciences and Engineering. Review Paper Volume-4, Issue-3 E-ISSN: 2347-2693

International Journal of Computer Sciences and Engineering. Review Paper Volume-4, Issue-3 E-ISSN: 2347-2693 International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-3 E-ISSN: 2347-2693 Privacy Preservation and Auditing in Public Cloud: A Review Nitesh Kumar Namdeo 1*

More information

DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION

DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION Hasna.R 1, S.Sangeetha 2 1 PG Scholar, Dhanalakshmi Srinivasan College of Engineering, Coimbatore. 2 Assistant Professor, Dhanalakshmi Srinivasan

More information

Survey on Efficient Information Retrieval for Ranked Query in Cost-Efficient Clouds

Survey on Efficient Information Retrieval for Ranked Query in Cost-Efficient Clouds Survey on Efficient Information Retrieval for Ranked Query in Cost-Efficient Clouds Ms. Jyotsna T. Kumbhar 1 ME Student, Department of Computer Engineering, TSSM S, P.V.P.I.T., Bavdhan, Pune University,

More information

A UPS Framework for Providing Privacy Protection in Personalized Web Search

A UPS Framework for Providing Privacy Protection in Personalized Web Search A UPS Framework for Providing Privacy Protection in Personalized Web Search V. Sai kumar 1, P.N.V.S. Pavan Kumar 2 PG Scholar, Dept. of CSE, G Pulla Reddy Engineering College, Kurnool, Andhra Pradesh,

More information

Secure semantic based search over cloud

Secure semantic based search over cloud Volume: 2, Issue: 5, 162-167 May 2015 www.allsubjectjournal.com e-issn: 2349-4182 p-issn: 2349-5979 Impact Factor: 3.762 Sarulatha.M PG Scholar, Dept of CSE Sri Krishna College of Technology Coimbatore,

More information

A Secure Decentralized Access Control Scheme for Data stored in Clouds

A Secure Decentralized Access Control Scheme for Data stored in Clouds A Secure Decentralized Access Control Scheme for Data stored in Clouds Priyanka Palekar 1, Abhijeet Bharate 2, Nisar Anjum 3 1 SKNSITS, University of Pune 2 SKNSITS, University of Pune 3 SKNSITS, University

More information

Secure Privacy Preserving Public Auditing for Cloud storage

Secure Privacy Preserving Public Auditing for Cloud storage Secure Privacy Preserving Public Auditing for Cloud storage Sathiskumar R 1, Dr.Jeberson Retnaraj 2 Department of Information Technology, Sathyabama University, Chennai, India 1 Department of Information

More information

Data attribute security and privacy in distributed database system

Data attribute security and privacy in distributed database system IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. V (Mar-Apr. 2014), PP 27-33 Data attribute security and privacy in distributed database system

More information

EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE

EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE Reshma Mary Abraham and P. Sriramya Computer Science Engineering, Saveetha University, Chennai, India E-Mail: reshmamaryabraham@gmail.com

More information

Data Integrity for Secure Dynamic Cloud Storage System Using TPA

Data Integrity for Secure Dynamic Cloud Storage System Using TPA International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 7-12 International Research Publication House http://www.irphouse.com Data Integrity for Secure

More information

Decentralized Access Control Secure Cloud Storage using Key Policy Attribute Based Encryption

Decentralized Access Control Secure Cloud Storage using Key Policy Attribute Based Encryption Decentralized Access Control Secure Cloud Storage using Key Policy Attribute Based Encryption 1 Thota Naresh Kumar, 2 K.SRINIVAS, 3 Y.Raju 2 Associate Professor, 3 Associate Professor 1,2,3 Department

More information

Secure Data Sharing in Cloud Computing using Hybrid cloud

Secure Data Sharing in Cloud Computing using Hybrid cloud International Journal of Electronics and Computer Science Engineering 144 Available Online at www.ijecse.org ISSN: 2277-1956 Secure Data Sharing in Cloud Computing using Hybrid cloud Er. Inderdeep Singh

More information

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD S.REVATHI B.HASEENA M.NOORUL IZZATH PG Student PG Student PG Student II- ME CSE II- ME CSE II- ME CSE Al-Ameen Engineering

More information

A SECURE DECISION SUPPORT ESTIMATION USING GAUSSIAN BAYES CLASSIFICATION IN HEALTH CARE SERVICES

A SECURE DECISION SUPPORT ESTIMATION USING GAUSSIAN BAYES CLASSIFICATION IN HEALTH CARE SERVICES A SECURE DECISION SUPPORT ESTIMATION USING GAUSSIAN BAYES CLASSIFICATION IN HEALTH CARE SERVICES K.M.Ruba Malini #1 and R.Lakshmi *2 # P.G.Scholar, Computer Science and Engineering, K. L. N College Of

More information

Sheltered Multi-Owner Data distribution For vibrant Groups in the Cloud

Sheltered Multi-Owner Data distribution For vibrant Groups in the Cloud Sheltered Multi-Owner Data distribution For vibrant Groups in the Cloud I.sriram murthy 1 N.Jagajeevan 2 II M-Tech student Assistant.Professor Department of computer science & Engineering Department of

More information

DYNAMIC SECURE SYSTEM FOR DETECTING AND ELIMINATING FRAUDULENCE IN CLOUD STORAGE

DYNAMIC SECURE SYSTEM FOR DETECTING AND ELIMINATING FRAUDULENCE IN CLOUD STORAGE DYNAMIC SECURE SYSTEM FOR DETECTING AND ELIMINATING FRAUDULENCE IN CLOUD STORAGE Kalaivani A 1, Ranjith Kumar M 2, Sabarish M 3, Sai Kishore R 4 Assistant Professor, Dept. of CSE, R.M.K College of Engineering

More information

CLOUD COMPUTING SECURITY IN UNRELIABLE CLOUDS USING RELIABLE RE-ENCRYPTION

CLOUD COMPUTING SECURITY IN UNRELIABLE CLOUDS USING RELIABLE RE-ENCRYPTION CLOUD COMPUTING SECURITY IN UNRELIABLE CLOUDS USING RELIABLE RE-ENCRYPTION Chandrala DN 1, Kulkarni Varsha 2 1 Chandrala DN, M.tech IV sem,department of CS&E, SVCE, Bangalore 2 Kulkarni Varsha, Asst. Prof.

More information

G.J. E.D.T.,Vol.3(1):43-47 (January-February, 2014) ISSN: 2319 7293 SUODY-Preserving Privacy in Sharing Data with Multi-Vendor for Dynamic Groups

G.J. E.D.T.,Vol.3(1):43-47 (January-February, 2014) ISSN: 2319 7293 SUODY-Preserving Privacy in Sharing Data with Multi-Vendor for Dynamic Groups SUODY-Preserving Privacy in Sharing Data with Multi-Vendor for Dynamic s T.Vijayalakshmi 1, Balika J Chelliah 2 & R. Jegadeesan 3 1 M.Tech Student, Department of Computer Science and Engineering, S.R.M.

More information

Privacy Preserving Outsourcing for Frequent Itemset Mining

Privacy Preserving Outsourcing for Frequent Itemset Mining Privacy Preserving Outsourcing for Frequent Itemset Mining M. Arunadevi 1, R. Anuradha 2 PG Scholar, Department of Software Engineering, Sri Ramakrishna Engineering College, Coimbatore, India 1 Assistant

More information

MrLazy: Lazy Runtime Label Propagation for MapReduce

MrLazy: Lazy Runtime Label Propagation for MapReduce MrLazy: Lazy Runtime Label Propagation for MapReduce Sherif Akoush, Lucian Carata, Ripduman Sohan and Andy Hopper Computer Laboratory, University of Cambridge firstname.lastname@cl.cam.ac.uk Abstract Organisations

More information

Loss Less and Privacy Preserved Data Retrieval in Cloud Environment using TRSE

Loss Less and Privacy Preserved Data Retrieval in Cloud Environment using TRSE I.J. Wireless and Microwave Technologies, 2015, 6, 19-25 Published Online November 2015 in MECS(http://www.mecs-press.net) DOI: 10.5815/ijwmt.2015.06.03 Available online at http://www.mecs-press.net/ijwmt

More information

Cryptographic Data Security over Cloud

Cryptographic Data Security over Cloud Cryptographic Data Security over Cloud Er. Lalit Gehlod Asst.Professor, Dept.Of Computer Engineering, Institute Of Engineering & Technology, Devi Ahilya University, Indore, India. Govind Patidar Dept.

More information

A Survey on Privacy-Preserving Techniques for Secure Cloud Storage

A Survey on Privacy-Preserving Techniques for Secure Cloud Storage Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,

More information

Heterogeneous Workload Consolidation for Efficient Management of Data Centers in Cloud Computing

Heterogeneous Workload Consolidation for Efficient Management of Data Centers in Cloud Computing Heterogeneous Workload Consolidation for Efficient Management of Data Centers in Cloud Computing Deep Mann ME (Software Engineering) Computer Science and Engineering Department Thapar University Patiala-147004

More information

Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving,

Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving, Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Third Party

More information

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department

More information

How To Ensure Data Integrity In Cloud Computing

How To Ensure Data Integrity In Cloud Computing A Novel Approach for public exploration Data with Effective user Denial in the cloud Mahankali Anitha PG Scholar Department of CSE J.Vijayasree Assistant professor Department of CSE Dr.M.V.Siva Prasad

More information

A COMPARATIVE STUDY OF SECURE SEARCH PROTOCOLS IN PAY- AS-YOU-GO CLOUDS

A COMPARATIVE STUDY OF SECURE SEARCH PROTOCOLS IN PAY- AS-YOU-GO CLOUDS A COMPARATIVE STUDY OF SECURE SEARCH PROTOCOLS IN PAY- AS-YOU-GO CLOUDS V. Anand 1, Ahmed Abdul Moiz Qyser 2 1 Muffakham Jah College of Engineering and Technology, Hyderabad, India 2 Muffakham Jah College

More information

How To Create A Multi-Keyword Ranked Search Over Encrypted Cloud Data (Mrse)

How To Create A Multi-Keyword Ranked Search Over Encrypted Cloud Data (Mrse) JJT-029-2015 SEARCHABLE SYMMETRIC ENCRYPTION METHOD FOR ENCRYPTED DATA IN CLOUD P.Vidyasagar, R.Karthikeyan, Dr.C.Nalini M.Tech Student, Dept of CSE,Bharath University, Email.Id: vsagarp@rediffmail.com

More information

Ranked Keyword Search Using RSE over Outsourced Cloud Data

Ranked Keyword Search Using RSE over Outsourced Cloud Data Ranked Keyword Search Using RSE over Outsourced Cloud Data Payal Akriti 1, Ms. Preetha Mary Ann 2, D.Sarvanan 3 1 Final Year MCA, Sathyabama University, Tamilnadu, India 2&3 Assistant Professor, Sathyabama

More information

AN APPROACH TOWARDS FUNCTIONING OF PUBLIC AUDITABILITY FOR CLOUD ENRICHMENT

AN APPROACH TOWARDS FUNCTIONING OF PUBLIC AUDITABILITY FOR CLOUD ENRICHMENT INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN APPROACH TOWARDS FUNCTIONING OF PUBLIC AUDITABILITY FOR CLOUD ENRICHMENT Mohd Abdul Shoaib 1, Akheel Mohammed 2, Ayesha 3

More information

Security over Cloud Data through Encryption Standards

Security over Cloud Data through Encryption Standards Security over Cloud Data through Encryption Standards Santhi Baskaran 1, Surya A 2, Stephen Pius C 3, Sudesh Goud G 4 1 Professor, 2,3,4 Student, Department of Information Technology, Pondicherry Engineering

More information

MINIMIZING STORAGE COST IN CLOUD COMPUTING ENVIRONMENT

MINIMIZING STORAGE COST IN CLOUD COMPUTING ENVIRONMENT MINIMIZING STORAGE COST IN CLOUD COMPUTING ENVIRONMENT 1 SARIKA K B, 2 S SUBASREE 1 Department of Computer Science, Nehru College of Engineering and Research Centre, Thrissur, Kerala 2 Professor and Head,

More information

IMPROVING BUSINESS PROCESS MODELING USING RECOMMENDATION METHOD

IMPROVING BUSINESS PROCESS MODELING USING RECOMMENDATION METHOD Journal homepage: www.mjret.in ISSN:2348-6953 IMPROVING BUSINESS PROCESS MODELING USING RECOMMENDATION METHOD Deepak Ramchandara Lad 1, Soumitra S. Das 2 Computer Dept. 12 Dr. D. Y. Patil School of Engineering,(Affiliated

More information

A Catechistic Method for Traffic Pattern Discovery in MANET

A Catechistic Method for Traffic Pattern Discovery in MANET A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer

More information

Keyword Ranked MetaData Indexed Object Clawler in Cloud Servers

Keyword Ranked MetaData Indexed Object Clawler in Cloud Servers Keyword Ranked MetaData Indexed Object Clawler in Cloud Servers R.Bakyalakshmi 1, Dr.R.Rameh 2 PG Student of computer science and engineering. Chennai institute of technology College, India 1. Associate.Professor,

More information

Cloud Data Service for Issues in Scalable Data Integration Using Multi Authority Attribute Based Encryption

Cloud Data Service for Issues in Scalable Data Integration Using Multi Authority Attribute Based Encryption Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,

More information

Fig. 1 WfMC Workflow reference Model

Fig. 1 WfMC Workflow reference Model International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 10 (2014), pp. 997-1002 International Research Publications House http://www. irphouse.com Survey Paper on

More information

Enable Public Audit ability for Secure Cloud Storage

Enable Public Audit ability for Secure Cloud Storage Enable Public Audit ability for Secure Cloud Storage Leela Poornima 1, D.Hari Krishna 2 1 Student, Nova College of Engineering and Technology, Ibrahimpatnam,Krishna Dist., Andhra Pradesh, India 2 Assistant

More information

Secure Way of Storing Data in Cloud Using Third Party Auditor

Secure Way of Storing Data in Cloud Using Third Party Auditor IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 4 (Jul. - Aug. 2013), PP 69-74 Secure Way of Storing Data in Cloud Using Third Party Auditor 1 Miss.

More information

Distributed Attribute Based Encryption for Patient Health Record Security under Clouds

Distributed Attribute Based Encryption for Patient Health Record Security under Clouds Distributed Attribute Based Encryption for Patient Health Record Security under Clouds SHILPA ELSA ABRAHAM II ME (CSE) Nandha Engineering College Erode Abstract-Patient Health Records (PHR) is maintained

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 10, October-2013 ISSN 2229-5518 1582

International Journal of Scientific & Engineering Research, Volume 4, Issue 10, October-2013 ISSN 2229-5518 1582 1582 AN EFFICIENT CRYPTOGRAPHIC APPROACH FOR PRESERVING PRIVACY IN DATA MINING T.Sujitha 1, V.Saravanakumar 2, C.Saravanabhavan 3 1. M.E. Student, Sujiraj.me@gmail.com 2. Assistant Professor, visaranams@yahoo.co.in

More information

A Hybrid BTF Approach for Temporal Query Processing In the Patented Medical Database

A Hybrid BTF Approach for Temporal Query Processing In the Patented Medical Database A Hybrid BTF Approach for Temporal Query Processing In the Patented Medical Database T. Yogameera 1, Dr.D.Shanthi Saravanan 2 PG Student, Department of CSE, P.S.N.A College of Engineering and Technology,

More information

Authorized Auditing of Big Data Stored on Cloud with Auditability Aware Data Scheduling

Authorized Auditing of Big Data Stored on Cloud with Auditability Aware Data Scheduling Authorized Auditing of Big Data Stored on Cloud with Auditability Aware Data Scheduling Surapriya Swain 1, Prof. Saurabh Gupta 2 1 Department of Computer Engineering, GSMCOE, Balewadi, Savitribai Phule

More information

SECURE RE-ENCRYPTION IN UNRELIABLE CLOUD USINGSYNCHRONOUS CLOCK

SECURE RE-ENCRYPTION IN UNRELIABLE CLOUD USINGSYNCHRONOUS CLOCK International Journal of Advance Research In Science And Engineering IJARSE, Vol. No.4, Issue No.01, January 2015 http:// SECURE RE-ENCRYPTION IN UNRELIABLE CLOUD USINGSYNCHRONOUS CLOCK Arudra Gopala Rao

More information

Policy-based Pre-Processing in Hadoop

Policy-based Pre-Processing in Hadoop Policy-based Pre-Processing in Hadoop Yi Cheng, Christian Schaefer Ericsson Research Stockholm, Sweden yi.cheng@ericsson.com, christian.schaefer@ericsson.com Abstract While big data analytics provides

More information

PRIVACY PRESERVING ASSOCIATION RULE MINING

PRIVACY PRESERVING ASSOCIATION RULE MINING Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 10, October 2014,

More information

PRIVACY PRESERVING PUBLIC AUDITING FOR SECURED DATA STORAGE IN CLOUD USING BLOCK AUTHENTICATION CODE

PRIVACY PRESERVING PUBLIC AUDITING FOR SECURED DATA STORAGE IN CLOUD USING BLOCK AUTHENTICATION CODE PRIVACY PRESERVING PUBLIC AUDITING FOR SECURED DATA STORAGE IN CLOUD USING BLOCK AUTHENTICATION CODE R.REVATHI # PG Scholar #, Bharathiyar Institute Of Engineering for Women, Deviyakurichi, Salem(DT) India

More information

PRIVACY-PRESERVING DATA ANALYSIS AND DATA SHARING

PRIVACY-PRESERVING DATA ANALYSIS AND DATA SHARING PRIVACY-PRESERVING DATA ANALYSIS AND DATA SHARING Chih-Hua Tai Dept. of Computer Science and Information Engineering, National Taipei University New Taipei City, Taiwan BENEFIT OF DATA ANALYSIS Many fields

More information

Improving data integrity on cloud storage services

Improving data integrity on cloud storage services International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services

More information

Practical Approach for Achieving Minimum Data Sets Storage Cost In Cloud

Practical Approach for Achieving Minimum Data Sets Storage Cost In Cloud Practical Approach for Achieving Minimum Data Sets Storage Cost In Cloud M.Sasikumar 1, R.Sindhuja 2, R.Santhosh 3 ABSTRACT Traditionally, computing has meant calculating results and then storing those

More information

Secure Authentication of Distributed Networks by Single Sign-On Mechanism

Secure Authentication of Distributed Networks by Single Sign-On Mechanism Secure Authentication of Distributed Networks by Single Sign-On Mechanism Swati Sinha 1, Prof. Sheerin Zadoo 2 P.G.Student, Department of Computer Application, TOCE, Bangalore, Karnataka, India 1 Asst.Professor,

More information

An Overview on Important Aspects of Cloud Computing

An Overview on Important Aspects of Cloud Computing An Overview on Important Aspects of Cloud Computing 1 Masthan Patnaik, 2 Ruksana Begum 1 Asst. Professor, 2 Final M Tech Student 1,2 Dept of Computer Science and Engineering 1,2 Laxminarayan Institute

More information

Data Grid Privacy and Secure Storage Service in Cloud Computing

Data Grid Privacy and Secure Storage Service in Cloud Computing Data Grid Privacy and Secure Storage Service in Cloud Computing L.Revathi 1, S.Karthikeyan 2 1 Research Scholar, Department of Computer Applications, Dr. M.G.R. Educational and Research Institute University,

More information

International Journal of Engineering Research ISSN: 2348-4039 & Management Technology November-2015 Volume 2, Issue-6

International Journal of Engineering Research ISSN: 2348-4039 & Management Technology November-2015 Volume 2, Issue-6 International Journal of Engineering Research ISSN: 2348-4039 & Management Technology Email: editor@ijermt.org November-2015 Volume 2, Issue-6 www.ijermt.org Modeling Big Data Characteristics for Discovering

More information

Swathi matha P.G,Student,Jyothi.S,Asst professor,neetha Natesh,Associate professor,dr.ait,bangalore. A) Examples Of model:

Swathi matha P.G,Student,Jyothi.S,Asst professor,neetha Natesh,Associate professor,dr.ait,bangalore. A) Examples Of model: PRESERVING PRIVACY FOR SHARED DATA ON CLOUD STORAGE SYSTEM WITH SECURITY Swathi matha P.G,Student,Jyothi.S,Asst professor,neetha Natesh,Associate professor,dr.ait,bangalore Abstract- Cloud computing is

More information

EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM

EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM Macha Arun 1, B.Ravi Kumar 2 1 M.Tech Student, Dept of CSE, Holy Mary

More information

Optimal Service Pricing for a Cloud Cache

Optimal Service Pricing for a Cloud Cache Optimal Service Pricing for a Cloud Cache K.SRAVANTHI Department of Computer Science & Engineering (M.Tech.) Sindura College of Engineering and Technology Ramagundam,Telangana G.LAKSHMI Asst. Professor,

More information

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD Volume 1, Issue 7, PP:, JAN JUL 2015. SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD B ANNAPURNA 1*, G RAVI 2*, 1. II-M.Tech Student, MRCET 2. Assoc. Prof, Dept.

More information

An Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud

An Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud , pp.246-252 http://dx.doi.org/10.14257/astl.2014.49.45 An Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud Jiangang Shu ab Xingming Sun ab Lu Zhou ab Jin Wang ab

More information

Data management using Virtualization in Cloud Computing

Data management using Virtualization in Cloud Computing Data management using Virtualization in Cloud Computing A.S.R. Krishna Kanth M.Tech (CST), Department of Computer Science & Systems Engineering, Andhra University, India. M.Sitha Ram Research Scholar Department

More information

Performance and Cost Evaluation of Adaptive Architecture with dual Layer Encryption

Performance and Cost Evaluation of Adaptive Architecture with dual Layer Encryption ISSN (ONLINE): 2349-7084 GLOBAL IMPACT FACTOR 0.238 DIIF 0.876 Performance and Cost Evaluation of Adaptive Architecture with dual Layer Encryption 1 Barma Udayashanth Kumar, 2 N.Poorna Chandra Rao, 3 Dr.S.Prem

More information

Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies

Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com ISSN: 2321-7782

More information

CLOUD STORAGE SYSTEM MANAGING SECURE FILE EXCLUSION

CLOUD STORAGE SYSTEM MANAGING SECURE FILE EXCLUSION INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE CLOUD STORAGE SYSTEM MANAGING SECURE FILE EXCLUSION M.Sreenivasa Reddy 1, B.Sudhakar 2 1 M.Tech Student, Dept of CSE, Mannan

More information

Efficient and Secure Dynamic Auditing Protocol for Integrity Verification In Cloud Storage

Efficient and Secure Dynamic Auditing Protocol for Integrity Verification In Cloud Storage Efficient and Secure Dynamic Auditing Protocol for Integrity Verification In Cloud Storage Priyanga.R 1, Maheswari.B 2, Karthik.S 3 PG Scholar, Department of CSE, SNS College of technology, Coimbatore-35,

More information

A Data Dependency Based Strategy for Intermediate Data Storage in Scientific Cloud Workflow Systems *

A Data Dependency Based Strategy for Intermediate Data Storage in Scientific Cloud Workflow Systems * A Data Dependency Based Strategy for Intermediate Data Storage in Scientific Cloud Workflow Systems * Dong Yuan, Yun Yang, Xiao Liu, Gaofeng Zhang, Jinjun Chen Faculty of Information and Communication

More information

International Journal of Advanced Computer Technology (IJACT) ISSN:2319-7900 PRIVACY PRESERVING DATA MINING IN HEALTH CARE APPLICATIONS

International Journal of Advanced Computer Technology (IJACT) ISSN:2319-7900 PRIVACY PRESERVING DATA MINING IN HEALTH CARE APPLICATIONS PRIVACY PRESERVING DATA MINING IN HEALTH CARE APPLICATIONS First A. Dr. D. Aruna Kumari, Ph.d, ; Second B. Ch.Mounika, Student, Department Of ECM, K L University, chittiprolumounika@gmail.com; Third C.

More information

Keywords: Authentication, Third party audit, cloud storage, cloud service provider, Access control.

Keywords: Authentication, Third party audit, cloud storage, cloud service provider, Access control. Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Identity Based

More information

MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph

MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph Janani K 1, Narmatha S 2 Assistant Professor, Department of Computer Science and Engineering, Sri Shakthi Institute of

More information

Differentially Private Analysis of

Differentially Private Analysis of Title: Name: Affil./Addr. Keywords: SumOriWork: Differentially Private Analysis of Graphs Sofya Raskhodnikova, Adam Smith Pennsylvania State University Graphs, privacy, subgraph counts, degree distribution

More information