Distributing, Ensuring and Recovery of Data Stored in Cloud
|
|
|
- Oswin Bruce
- 10 years ago
- Views:
Transcription
1 Available Online at International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014, pg.1 7 RESEARCH ARTICLE ISSN X Distributing, Ensuring and Recovery of Data Stored in Cloud Dr. B. F. Momin 1, Mr. Girish Bamane 2 ¹Computer Science and Engineering, Shivaji University, Walchand College of Engineering, India ²Computer Science and Engineering, Shivaji University, Walchand College of Engineering, India 1 [email protected]; 2 [email protected] Abstract Cloud Computing can be seen as buzzword these days. As sight to traditional systems where IT services are under the control of Limitations like computing, hardware etc and everything is in personal. The Cloud Computing moves all things like applications, databases, and huge data to the large data centres, where management of the data and services may not be trustful and reliable. So, new attributes are arriving to security, which are still not well understood. Here in this paper we are going to know about data storage security. To ensure the correctness of data stored in a cloud, we are going to propose a new scheme of distributed storage. In this scheme, we are verifying the correctness of data stored in the cloud and also identifying the storage server which is misbehaving or being compromised (data error localization). Though there are lots of methods are present to prevent the data modification also for the recovery of data, like data replication method, and parity generation. The scheme proposed in this paper is more efficient than others because it prevents data loss from single point to multipoint failure storage servers. Keywords Data and services; Correctness of data; Parity generation; Multipoint failure I. INTRODUCTION The Cloud Computing provides internet based on demand services.it allows end users to use or access software s and hardware s from a remote location and managed by third parties. The cloud allows access to the information and computer resources from any place where a network connection is available. The cloud provides data storage, networks, computing power, shared resources, different applications to end user. In short Cloud is Set of IT resources located on a remote server, where content and applications stored and used. The impression of Cloud Computing is cultivated across IT industries because it has a large number of solutions for huge challenges faced by IT industries today like poor performing servers and their aging infrastructure, ondemand provision of technology, complexities comes while deploying new applications, frequently unable to achieve optimal utilization or resources. So Cloud Computing is a paradigm shift that provides computing over internet. Cloud consist of highly optimized virtual data centres. They provide various software s hardware s and information resources for use when we need it. Organizations can simply connect to cloud and use the available resources to pay as you go basis. This helps uses or organizations to avoid capital expenditure on additional expenses on premises infrastructure resources and instantly scale up and scale down as per business requirements. Fig. 1 shows basic architecture of cloud. 2014, IJCSMC All Rights Reserved 1
2 Fig 1 Cloud basic diagram At the cheaper but powerful processor with SaaS (Software-as-Service) model are transforming large data to huge data centres. As the reliability and increasing bandwidth of networks made it possible such that the end user can easily subscribe for high quality service from data centres remotely. While moving the data to cloud end user doesn t have to care about the hardware complexities because Cloud vendors like Amazon Simple Storage Service (S3), Amazon elastic compute cloud (EC2) [1]. Web Services provides huge storages to end user along with scalable computing resources, which causes removal of the responsibilities maintaining local machines for data maintenance. One side of the Cloud is powerful and reliable infrastructure as compared to personal computers but still internal and external threads on securing the data are exist like data loss, availability [2]. But on the other hand user don t have data in his hand, he always conscious about the unfaithful behaviour of a Cloud Service Provider (CSP), or even sometimes CSP tries to hide the accident of data loss to maintain the reputation. If high value data stored in the cloud then, the necessity of CSP to provide strong assurance of the data integrity with availability. To ensure the integrity and availability of data along with quality of cloud storage services, the correctness verification of data has been designed on behalf of the user. The facts say that the user doesn t have physical control over data and also the cloud doesn t adapt directly the traditional cryptosystems for the protection of data integrity. So verification of cloud storage must be done without knowing the data from files. Some of the techniques are there to check the integrity of data stored in cloud but they are focused on the single server scenario. This is useful for testing of QoS (Quality of Service) but not guarantees the availability of data in case of server failure [8]. So in this paper we are going to use the distributed approach to ensure the storage correctness across a number of servers. This technique can drastically reduce the storage overhead problem that caused by traditional system like the data replication method, it also reduces the problem of communication overhead. The data dependability can be provided by using erasure correcting code i.e. parity mechanism. This scheme focuses on archive or static data only. When we go for checking the data tampering or corruption simultaneously we find the misbehaving servers. This can be done by utilizing the homomorphic token. Our work done is by considering the distributed data storages. So as only binary results are provided by old systems, our method moves further and identifying misbehaving servers. Considering the performance and security issues our scheme is much strong against Byzantine failures, data tampering II. PROBLEM STATEMENT The figure 2 shows the basic architecture of cloud data storage [5]. Cloud entities user who stores data in the cloud, CSP (Cloud Service Provider) who has storage servers, TPA [6] (Third Party Auditor) which is optional but has extra-ordinary capabilities that don t have to user. Though the data not stored locally the owner of the data must have some security means so that he makes assurance of his data stored in the cloud. If the user doesn t want the overhead of checking the data then he may take help of TPA. Note that we don t take the issue of data privacy in our mind. 2014, IJCSMC All Rights Reserved 2
3 Fig 2 architecture of cloud data storage We have threats from two sides; one is from CSP itself when it tries to hide the occurred data loss accidents and second is people who are interested in data like hackers and crackers. Once they compromise the server/s they can pull all the data from servers and introduce their own fake data to the original file. A. Design Goals: To ensure the correctness of user s data stored in cloud servers and target is to design data verification. The goals are: I. Storage Correctness of the user s data to ensure that data stored is appropriate. II. Fast localization of data errors to locate malfunctioning servers. III. Dependability against modification of data and Byzantine failure. IV. Lightweight such that user can check with minimum overhead. B. Preliminaries and Notations: F- data file Dispersal/Distribution matrix G- Encoded file matrix fkey ( ) -pseudorandom function key ( ) -pseudorandom permutation ver- version number var S ij - seed for PRF III. ENSURING CLOUD DATA STORAGE As the data stored in cloud by, data no longer in control of the user. So it must be needed to validate the correctness and availability of data, for unauthorized data modification, corruption, and server compromise like key issues. And also, does the identification of the data server/s where data errors are present. To solve these problems we have solutions, first part contains the file distribution across cloud storage servers and the second part consists of homomorphic token. Functions used for the computation of the token are chosen from the family of universal hash functions [4] to preserve homomorphic properties, which are combined with the verification of erasure coded data [5]. A. File Distribution Preparation To allow multiple distributed storage failures in file distribution system the erasure correcting codes can be used. So we trust in the system and distribute the file F across n file distribution servers redundantly. The n 2014, IJCSMC All Rights Reserved 3
4 servers we are using, out of my servers are for storing the data vectors and remaining k servers are for storing the parity (n=m+k). The Reed-Solomon erasure correcting codes are used to create k parity vectors. From m data vectors, k parity vectors are generated, such that we can easily recover the original data from the loss using those k parity vectors. As we are placing those m+k vectors across n servers, we can survive from the failure of any k servers out of m+k servers. But on the other side it has a space overhead of k/m. Let data file F can be divided into (F 1,F 2,F 3 F m ), and further each Fi=(f 1i,f 2i,f 3i.f li ) T where l 2 p - 1 and these blocks are elements of Galois Field GF(2 p )[7]. The file distribution matrix A can be computed form Vandermonde matrix of m* m+k size. So matrix A is derived from Vandermonde matrix it consumes the invertible property such that m columns from m+k form invertible property. A = (I P) = I is Identity matrix of size m*m and P is secrete parity generation matrix. Encoded file can be obtained by multiplying F by A G= F A = (G (1), G (2),,G (m), G (m+1), G (n) ) = (F 1, F 2,, F m, G (m+1),, G (n) ) B. Challenge Token Pre-computation Pre-computed token verification scheme used to check the correctness of users data and error localization. Before the distribution of file across storage servers the token pre-computation is done, such that these tokens are used for the verification of the individual data vector G (j) where jє (1,,n) and each token has randomly selected data blocks. When user wants to ensure the correctness of data stored in cloud he challenges the cloud server by randomly selecting the blocks indices. When the server receives the challenge he generates the signature for the specified blocks and then returns the value to the user. The signature generated by the server should match with the tokens, pre-computed by the user. When a token is generated than the user can store it anywhere in a safe, like in encrypted form or locally. The user can generate t number of tokens to challenge cloud servers t times for checking correctness of data. So for each G (j) pre-computation of tokens is done using PRF, PRP, Challenge key and master permutation key. This is done to compute i th token for server j. The token is indicated as v i (j ), when user challenges server for specific data blocks that time he have faith that severs will send same token. C. Correctness Verification and Error Localization Legacy systems provides binary results only, but our scheme combines correctness verification along with error localization so the response values received from server not only checks the correctness, but also goes for error localization that is provides methods to locate data error/s. The protocol for checking the correctness of data i. e challenge-response protocol for i th token on j th server can be done s follow: (i ) User knows the α i and permutation key k prp for all servers. Index values specified in permutation key, used by servers to aggregate the rows specified in the (j permutation key to linear combination and generates R ) i. When a user receives Ri (j ) (j he takes away blind values and generates actual R ) i. The secrete matrix is used to validate codeword which verifies the received values. ( R i (1 ),...,R i (m ) ) P = ( R i (m+1),...,r i (n ) ) The equation shown above is if holds then the data is correct else there exists an error in the blocks in specified rows. 2014, IJCSMC All Rights Reserved 4
5 Once it have been detected that error lies in specified blocks then we can go for using the pre-computed tokens to identify where the errors lies in data. The R i (1 ) is computed in same way as v i (1 ),so it is very much easy to user to identify the server from which data is tampered. As follow equation: R i (1 ) =v i (1 ) where j Є (1,,n) D. File Retrieval and Error Recovery As we are using the matrix file representation user can easily able to construe the file by downloading the data vectors from the first m servers which are only used for storing the data by users while remaining are used for storing the parity. The storage correctness assurance is probabilistic because of the random spot checking used by our scheme. As we are using unique parameters like (i, j, l, r), we can assure that the file is retrieved successfully. When data corruption is detected response values received form servers and pre-computed token are compared, so that misbehaving server/s are identified. The erasure correcting code is used to correct the lost data and that recovered data blocks are redistributed. The error recovery is done by following: Corrupted block are detected amongst specified r rows. Suppose s r servers are misbehaving. Download those blocks. S servers are treated as erasure and are used as recovery. Re-distribute blocks across servers. IV. PROVIDING DYNAMIC DATA OPERATION SUPPORT Till here we are only considered the static data, but in some cases the data stored in cloud is dynamic in nature like electronic documents, log files. Hence it is very important to consider the dynamic data case where user wants to perform the operations on data blocks like Update, Append, Delete and Insert with maintaining the correctness assurance of data. The simple way to do all such update operation is to download all files from all servers concatenate it and do operations. This scheme is totally inefficient, so it is necessary to handle dynamic data. A. Update Operation: As when user updates some data block/s then value of that block changes from f ij to f ij + Δf ij. The Reed-Solomon code has linear property, so by using only Δf ij update operation of data and parity can be done. The update matrix is as shown: = ( ΔF 1, ΔF 2, ΔF m ) Note, unchanged blocks are denoted by 0. Parity vectors are maintained by multiplying ΔF by A,so the update information for data vectors and parity vectors can be generated as: ΔF A = (ΔF 1, ΔF 2,, ΔF m, ΔG (m+1),, ΔG (n) ), ΔG (m+1) denotes the update information of parity vectors. As the pre-computed tokens having old value of updated data, it needed to replace it with new value. This can be done using homomorphic design of tokens.the a version number var used with the index for each blocks, it keeps the information about number of times the block is modified. B. Delete Operation When the data is stored on cloud sometimes user interested in deleting the data blocks from storage or sometimes certain data blocks are needed to be deleted. It is simple to delete data blocks but rather than directly 2014, IJCSMC All Rights Reserved 5
6 deleting the data block, if we look at it it is just an update operation of data block. We simply keep the value of Δf ij in ΔF as - Δf ij along this modification are performed in both data and parity vectors. C. Append Operation For files stored in storage server, user wants to append data like to log files auditing records. Appending the data blocks is nothing but adding some extra rows at the bottom of matrix format for file F. As matrix shows, it has l rows initially so we have to add m rows for m data blocks at the end of file. User append blocks at end of file and it is denoted as ( f l+1,1, f l+1,2, f l+1,m ). Also append blocks for each parity server are calculated. D. Insert Operation An append operation is referred to perform the insert operation, to insert data block in at particular position without breaking the structure of whole file. By shifting all blocks by j+1, the F [j] block is inserted. The re-computation of many tokens is done because insert operation may affect the all subsequent blocks CONCLUSIONS In this paper we have discussed the problem of data security in cloud as well we proposed the effective and flexible scheme to ensure our data stored across distributed storage serves. Our scheme also provides dynamic data support. To ensure the erasure coded data our scheme uses distributed verification by utilizing homomorphic token. So the integrity of data and data error localization is done. The storage server where data corruption is detected during verification, we can guarantee the identification of misbehaving server. Our scheme is highly efficient against Byzantine failure and even with server colluding attacks.. ACKNOWLEDGMENT I would like to express my gratitude towards my Seminar Guide Dr. B. F. Momin for their constant guidance during my seminar, and to the college, especially to the Computer Science and Engineering Department for making its facilities available to me. I take this opportunity to express my sincere thanks to all the staff members of Information Technology Department for their help whenever required. Finally I express my sincere thanks to all those who helped me directly or indirectly in this seminar. REFERENCES [1].Joseph Baron, Sanjay Kotecha Amazon Web Services Storage Options in the AWS Cloud October 2013 [2]. Cloud Security Alliance Top Threats to Cloud Computing V1.0 March 2010 [3]. Cong Wang,, Qian Wang,Kui Ren, Ning Cao, and Wenjing Lou, Toward Secure and Dependable Storage Services in Cloud Computing IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. 5, NO. 2, APRIL-JUNE 2012 [4]. T. S. J. Schwarz and E. L. Miller, Store, Forget, and Check: Using Algebraic Signatures to Check Remotely Administered Storage, Proc. of ICDCS 06, pp , [5] J. Hendricks, G. Ganger, and M. Reiter, Verifying Distributed Erasure coded Data, Proc. 26th ACM Symposium on Principles of Distributed Computing, pp , [6] Shuai Han, Jianchuan Xing Ensuring Data Storage Security Through A Novel Third Party Auditor Scheme In Cloud Computing, Proceedings of IEEE CCIS /11/$ IEEE 2014, IJCSMC All Rights Reserved 6
7 [7] James Westall,James Martin An Introduction to Galois Fields and Reed-Solomon Coding, School of Computing Clemson University Clemson, SC , October 4, 2010 [8] Xiao Zhang, Hong-tao Du,Jian-quan Chen, Yi Lin, Lei-jie Zeng Ensure Data Security in Cloud Storage /11 $ IEEE DOI /NCIS , IJCSMC All Rights Reserved 7
Secure Way of Storing Data in Cloud Using Third Party Auditor
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 4 (Jul. - Aug. 2013), PP 69-74 Secure Way of Storing Data in Cloud Using Third Party Auditor 1 Miss.
How To Ensure Correctness Of Data In The Cloud
A MECHANICS FOR ASSURING DATA STORAGE SECURITY IN CLOUD COMPUTING 1, 2 Pratibha Gangwar, 3 Mamta Gadoria 1 M. Tech. Scholar, Jayoti Vidyapeeth Women s University, Jaipur, [email protected] 2 M. Tech.
Ensuring Data Storage Security in Cloud Computing
Ensuring Data Storage Security in Cloud Computing Cong Wang 1, Qian Wang 1, Kui Ren 1, and Wenjing Lou 2 1 ECE Department, Illinois Institute of Technology 2 ECE Department, Worcester Polytechnic Institute
Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System
Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System 1 K.Valli Madhavi A.P [email protected] Mobile: 9866034900 2 R.Tamilkodi A.P [email protected] Mobile:
Index Terms: Data integrity, dependable distributed storage, Cloud Computing
Volume 5, Issue 5, May 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Cloud Data Protection
Secure Data transfer in Cloud Storage Systems using Dynamic Tokens.
Secure Data transfer in Cloud Storage Systems using Dynamic Tokens. P.Srinivas *,K. Rajesh Kumar # M.Tech Student (CSE), Assoc. Professor *Department of Computer Science (CSE), Swarnandhra College of Engineering
February. ISSN: 2321-8134
IJFEAT INTERNATIONAL JOURNAL FOR ENGINEERING APPLICATIONS AND TECHNOLOGY TITLE: DATA PLACE & MANAGE SECURITY IN CLOUD COMPUTING FOR EFFECTIVE AND FLEXIBLE DISTRIBUTED SYSTEM 1 Mr. Pritam S. Bhoyar, 2 Mr.
Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication
Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication Sanjay Kumar Baghel Mtech Scholar, CSE, CSIT DURG [email protected] Bhupesh Kumar Dewangan Assistant Professor,CSE,
Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing.
Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Privacy - Preserving
Verification of Data Reliability and Secure Service for Dynamic Data in Cloud Storage
Verification of Data Reliability and Secure Service for Dynamic Data in Cloud Storage Nithiavathy.R 1, Suresh.J 2 Department of Computer Science &Engineering, Coimbatore Institute of Engineering and Technology
Erasure correcting to enhance data security in cloud data storage
Erasure correcting to enhance data security in cloud data storage K.Shrividhya Department of computer science- Vels University [email protected] A.Sajeevram Department of computer science Vels University
Data Storage Security in Cloud Computing
Data Storage Security in Cloud Computing Manoj Kokane 1, Premkumar Jain 2, Poonam Sarangdhar 3 1, 2, 3 Government College of Engineering and Research, Awasari, Pune, India Abstract: Cloud computing is
Improving data integrity on cloud storage services
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services
Data storage security in Cloud
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 6, Ver. III (Nov Dec. 2014), PP 50-56 Data storage security in Cloud Mrs. Niyamat Ujloomwale, Mrs.
Data Security And Integrity Of Cloud Storage In Cloud Computing
Data Security And Integrity Of Cloud Storage In Cloud Computing Yogita Gunjal 1, Prof. J.Rethna Virjil Jeny 2 ME.student, Dept. Of Information technology, Amrutvahini College of Engineering,Sangamner,
How To Design A Cloud Data Storage Service For A Cloud Computer System
Ensuring Security Services for Data Storing and Data Sharing in Cloud Computing D. Raman 1, Bojja Vamshikrishna 2 1 Associate Professor Department of Computer Science and Engineering, Vardhaman College
Keywords: Cloud Computing, Data Dynamics, Data Integrity, Error Localization, Third Party Auditor.
www.semargroup.org, www.ijsetr.com ISSN 2319-8885 Vol.03,Issue.11 June-2014, Pages:2300-2307 Secure Cloud: Storage with Privacy Preserving Public Auditing and Data Dynamics Dept of CSE, Malabar College
Ensuring Data Storage Security in Cloud Computing
IOSR Journal of Engineering e-issn: 2250-3021, p-issn: 2278-8719, Vol. 2, Issue 12 (Dec. 2012) V2 PP 17-21 Ensuring Data Storage Security in Cloud Computing Rampal Singh, Sawan Kumar, Shani Kumar Agrahari
Secure Distribution of File on Cloud
Secure Distribution of File on Cloud Niyamat I. Ujloomwale, Ranjana Badre Dept. of Computer, MIT Academy of Engineering, Alandi, Savitri Phule Pune University, Pune, India Dept. of Computer, MIT Academy
SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING
SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING Saranya.V 1, Suganthi.J 2, R.G. Suresh Kumar 3 1,2 Master of Technology, Department of Computer Science and Engineering, Rajiv Gandhi College of Engineering
A Secure and Dependable Cloud Storage Service in Cloud Computing
A Secure and Dependable Cloud Storage Service in Cloud Computing Yalla Ram Charan MTech Student Department of CSE Sri Venkateswra College of Engineering & Technology Abstract: Cloud storage is a model
PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE
PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE Abstract: Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared
Analysis of Secure Cloud Data Sharing Within a Group
Analysis of Secure Cloud Data Sharing Within a Group Ms. uri Pande* Department of CSE, GHRAET Nagpur (M.S), India, Prof. Vikrant Chole Dept of Computer Science & Engg Nagpur (M.S.), India Abstract In this
Data Security in Cloud Using Elliptic Curve Crytography
Data Security in Cloud Using Elliptic Curve Crytography Puneetha C 1, Dr. M Dakshayini 2 PG Student, Dept. of Information Science & Engineering, B.M.S.C.E, Karnataka, Bangalore,India 1 Professor, Dept.
Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm
Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm Twinkle Graf.F 1, Mrs.Prema.P 2 1 (M.E- CSE, Dhanalakshmi College of Engineering, Chennai, India) 2 (Asst. Professor
Efficient Remote Data Possession Checking In Critical Information Infrastructures Ensuring Data Storage Security In Cloud Computing
Efficient Remote Data Possession Checking In Critical Information Infrastructures Ensuring Data Storage Security In Cloud Computing Dr. T.Nalini 1, Dr.K.Manivannan 2,Vaishnavi Moorthy 3 1 Professor, Department
AN EXPOSURE TO RELIABLE STORAGE SERVICES IN CLOUD COMPUTING
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EXPOSURE TO RELIABLE STORAGE SERVICES IN CLOUD COMPUTING Ayesha Romana 1, Akheel Mohammed 2, Ayesha 3 1 M.Tech Student, Dept
How To Ensure Correctness Of Data In The Cloud
Ensuring Data Storage Security in Cloud Computing ABSTRACT Cloud computing has been envisioned as the next-generation architecture of IT enterprise. In contrast to traditional solutions, where the IT services
A survey on cost effective multi-cloud storage in cloud computing
A survey on cost effective multi-cloud storage in cloud computing Nitesh Shrivastava, Ganesh Kumar Abstract As novel storage model, cloud storage has gain attentions from both the academics and industrial
ADVANCE SECURITY TO CLOUD DATA STORAGE
Journal homepage: www.mjret.in ADVANCE SECURITY TO CLOUD DATA STORAGE ISSN:2348-6953 Yogesh Bhapkar, Mitali Patil, Kishor Kale,Rakesh Gaikwad ISB&M, SOT, Pune, India Abstract: Cloud Computing is the next
Near Sheltered and Loyal storage Space Navigating in Cloud
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 8 (August. 2013), V2 PP 01-05 Near Sheltered and Loyal storage Space Navigating in Cloud N.Venkata Krishna, M.Venkata
Privacy preserving technique to secure cloud
Vitthal S. Gutte Pune University, MIT College of engineering, Kothrud, Pune 411038, India [email protected] Privacy preserving technique to secure cloud Prof. Priya Deshpande Pune University,
AN INVESTIGATION OF SECURITY THEME FOR CLOUD COMPUTING
AN INVESTIGATION OF SECURITY THEME FOR CLOUD COMPUTING Mrs. J. Pavithra 1 Mr. A. Naveen 2 1 (MRIT, Hyderabad, India, [email protected]) 2 (Asst. Professor, MRIT, Hyderabad, India, [email protected])
PRIVACY ASSURED IMAGE STACK MANAGEMENT SERVICE IN CLOUD
PRIVACY ASSURED IMAGE STACK MANAGEMENT SERVICE IN CLOUD Ms. Shubhangi Edake 1, Prof. Sunil Rathod 2 1 PG Student, Computer Engineering, Dr.D.Y.Patil School of Engineering, Lohgaon,Pune,India 2 Assistant
Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption
Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer
preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.
Privacy-Preserving Public Auditing For Secure Cloud Storage ABSTRACT: Using cloud storage, users can remotely store their data and enjoy the on-demand high-quality applications and services from a shared
Secure Storage Services and Erasure Code Implementation in Cloud Servers
Secure Storage Services and Erasure Code Implementation in Cloud Servers G. Rahul Reddy 1, N. J. Subashini 2 1 Research Scholar, M.Tech, Cloud Computing, Dept of Information Technology, SRM University,
Dependable and Secure Storage Services in Cloud Computing
Dependable and Secure Storage Services in Cloud Computing D.Veena Sanjitha #1, M.Himaswanthi #2, T.V.N.Sai Sindhura #3, K.V.V. Satyanarayana * # CSE Department, KL University Guntur, AndhraPradesh * K.V.V.
Enhance Data Security in Cloud Computing using Layered Interleaving Approach
Enhance Data Security in Cloud Computing using Layered Interleaving Approach Mr. Pradeep Semwal Assistant Professor Dept of Computer Application & IT SGRR-Institute of Technology & Sciences, Dehradun Mr.
Verifying Correctness of Trusted data in Clouds
Volume-3, Issue-6, December-2013, ISSN No.: 2250-0758 International Journal of Engineering and Management Research Available at: www.ijemr.net Page Number: 21-25 Verifying Correctness of Trusted data in
An Efficient Data Correctness Approach over Cloud Architectures
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 8, Issue 12 (October 2013), PP. 33-37 An Efficient Data Correctness Approach over
N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT
N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 1 M.Tech Student, Department of Computer Science and Engineering, S.R.M. University Chennai 2 Asst.Professor,
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department
A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA
A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA Mr.Mahesh S.Giri Department of Computer Science & Engineering Technocrats Institute of Technology Bhopal, India
Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving,
Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Third Party
15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM
RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM Dhanashri Bamane Vinayak Pottigar Subhash Pingale Department of Computer Science and Engineering SKN
Index Terms : cloud computing, Distributed Storage, error detection, data recovery, SHA, dynamic block operations
Revisiting Secure Cloud Storage by Replacing Token Generation With SHA Ms. Bhagyashree Alhat (1), Prof. Amar Buchade(2) Pune Institute of Computer Technology, University of Pune,PG Student(1), Assistant
How To Secure Cloud Data Storage
Enabling Data Storage Security in Cloud Computing for Banking Enterprise S.BIRUNTHA V.VENKATESA KUMAR, S.PALANISWAMI, II ME CSE Lect/CSE, Registrar Anna University Coimbatore, Anna University Coimbatore,
Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.
Secure Privacy-Preserving Cloud Services. Abhaya Ghatkar, Reena Jadhav, Renju Georgekutty, Avriel William, Amita Jajoo DYPCOE, Akurdi, Pune [email protected], [email protected], [email protected],
SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD
Volume 1, Issue 7, PP:, JAN JUL 2015. SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD B ANNAPURNA 1*, G RAVI 2*, 1. II-M.Tech Student, MRCET 2. Assoc. Prof, Dept.
Enabling Public Auditing for Secured Data Storage in Cloud Computing
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 5 (May. 2013), V3 PP 01-05 Enabling Public Auditing for Secured Data Storage in Cloud Computing 1 Er.Amandeep Kaur,
Data Integrity for Secure Dynamic Cloud Storage System Using TPA
International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 7-12 International Research Publication House http://www.irphouse.com Data Integrity for Secure
How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System
REVIEW ARTICAL A Novel Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage Dumala Harisha 1, V.Gouthami 2 1 Student, Computer Science & Engineering-Department, JNTU Hyderabad India
A Comprehensive Data Forwarding Technique under Cloud with Dynamic Notification
Research Journal of Applied Sciences, Engineering and Technology 7(14): 2946-2953, 2014 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2014 Submitted: July 7, 2013 Accepted: August
Cryptographic Data Security over Cloud
Cryptographic Data Security over Cloud Er. Lalit Gehlod Asst.Professor, Dept.Of Computer Engineering, Institute Of Engineering & Technology, Devi Ahilya University, Indore, India. Govind Patidar Dept.
Performance Evaluation Panda for Data Storage and Sharing Services in Cloud Computing
Performance Evaluation Panda for Data Storage and Sharing Services in Cloud Computing Gunnala Ajay Kumar M.Tech Student Department of CSE Global Group Of Institutions Batasingaram, Ranga Reddy (Dist),
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) PERCEIVING AND RECOVERING DEGRADED DATA ON SECURE CLOUD
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4,
SHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING
SHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING Er. Kavin M 1, Mr.J.Jayavel 2 1 PG Scholar, 2 Teaching Assistant, Department of Information Technology, Anna University Regional
IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD
IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD 1 Ms.Nita R. Mhaske, 2 Prof. S.M.Rokade 1 student, Master of Engineering, Dept. of Computer Engineering Sir Visvesvaraya
How To Encrypt Data With A Power Of N On A K Disk
Towards High Security and Fault Tolerant Dispersed Storage System with Optimized Information Dispersal Algorithm I Hrishikesh Lahkar, II Manjunath C R I,II Jain University, School of Engineering and Technology,
A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA
A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA U.Pandi Priya 1, R.Padma Priya 2 1 Research Scholar, Department of Computer Science and Information Technology,
Third Party Auditor: An Integrity Checking Technique for Client Data Security in Cloud Computing
Third Party Auditor: An Integrity Checking Technique for Client Data Security in Cloud Computing Renuka Goyal, Navjot Sidhu Centre for Computer Science and Technology, Central University of Punjab Bathinda,
Index Terms: Cloud Computing, Cloud Security, Mitigation Attack, Service Composition, Data Integrity. 1. Introduction
Real-Time Service Composition and Deployment for Secure Computing in Cloud Environment R. Ushadevi 1, V. Rajamani 2 1 Research Scholar, Department of Computer Applications, St. Peter s University, Chennai
Enhancing Data Integrity in Cloud Storage by Ensuring Maximum Availability
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X Enhancing Data Integrity in Cloud Storage by Ensuring Maximum Availability Sivasankaran.
Security in Data Storage and Transmission in Cloud Computing
Security in Data Storage and Transmission in Cloud Computing Ramawat Lokesh Kumar B. Tech 3 rd year, Alliance College of Engineering and Design Alliance University, Bengaluru, India P Dhananjay B. Tech
Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage
Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage Pranita Bakka 1, Dr. Jayashree Agarkhed 2 1 P.G.Student, Department of Computer Science & Engineering,
Data Integrity and Dynamic Storage Way in Cloud Computing
1 Data Integrity and Dynamic Storage Way in Cloud Computing Dinesh.C, P.G Scholar, Computer Science and Engineering, Mailam Engineering College, Mailam, Tamilnadu. Abstract It is not an easy task to securely
A Survey on Data Integrity of Cloud Storage in Cloud Computing
A Survey on Data Integrity of Cloud Storage in Cloud Computing A B S T R A C T Mr.Vitthal Raut, Prof. Suhasini Itkar Department Computer Engineering, PES Modern College of Engineering, Pune, India. [email protected],
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING T.Vidhya Sree M.Phil Research Scholar,CS, MGR College, Hosur (India) ABSTRACT Cloud Computing is the long dreamed vision
SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD
SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD S.REVATHI B.HASEENA M.NOORUL IZZATH PG Student PG Student PG Student II- ME CSE II- ME CSE II- ME CSE Al-Ameen Engineering
Cloud Data Storage Services Considering Public Audit for Security
Global Journal of Computer Science and Technology Cloud and Distributed Volume 13 Issue 1 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
International Journal of Infinite Innovations in Engineering and Technology. ISSN (Online): 2349-2287, ISSN (Print): 2349-2279 2015
SECURED AUDITING SYSTEM FOR CLOUD DATA STORAGE WITH ERROR CORRECTION GUARANTEES 1 S.Sathya, 2 S.Sivakumar 1 Research Scholar, Department of Computer Science & Applications, PGP College of Arts & Science,
Data Integrity Check using Hash Functions in Cloud environment
Data Integrity Check using Hash Functions in Cloud environment Selman Haxhijaha 1, Gazmend Bajrami 1, Fisnik Prekazi 1 1 Faculty of Computer Science and Engineering, University for Business and Tecnology
Enable Public Audit ability for Secure Cloud Storage
Enable Public Audit ability for Secure Cloud Storage Leela Poornima 1, D.Hari Krishna 2 1 Student, Nova College of Engineering and Technology, Ibrahimpatnam,Krishna Dist., Andhra Pradesh, India 2 Assistant
Cloud Data Service for Issues in Scalable Data Integration Using Multi Authority Attribute Based Encryption
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,
PRIVACY PRESERVING PUBLIC AUDITING FOR SECURED DATA STORAGE IN CLOUD USING BLOCK AUTHENTICATION CODE
PRIVACY PRESERVING PUBLIC AUDITING FOR SECURED DATA STORAGE IN CLOUD USING BLOCK AUTHENTICATION CODE R.REVATHI # PG Scholar #, Bharathiyar Institute Of Engineering for Women, Deviyakurichi, Salem(DT) India
Data Integrity by Aes Algorithm ISSN 2319-9725
Data Integrity by Aes Algorithm ISSN 2319-9725 Alpha Vijayan Nidhiya Krishna Sreelakshmi T N Jyotsna Shukla Abstract: In the cloud computing, data is moved to a remotely located cloud server. Cloud will
Monitoring Data Integrity while using TPA in Cloud Environment
Monitoring Data Integrity while using TPA in Cloud Environment Jaspreet Kaur, Jasmeet Singh Abstract Cloud Computing is the arising technology that delivers software, platform and infrastructure as a service
How To Ensure Data Integrity In Cloud Computing
A Novel Approach for public exploration Data with Effective user Denial in the cloud Mahankali Anitha PG Scholar Department of CSE J.Vijayasree Assistant professor Department of CSE Dr.M.V.Siva Prasad
Remote Data Integrity Checking in Cloud Computing
ISSN 2321 8169 Remote Data Integrity Checking in Cloud Computing Khaba M.V (Assistant Professor/CSE) RVS School of Engineering,dindigul [email protected] M.Santhanalakshmi(Assistant Professor/CSE) RVS
International Journal of Advanced Research in Computer Science and Software Engineering
Volume 3, Issue 3, March 3 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Using Third Party
Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage
Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage P. Selvigrija, Assistant Professor, Department of Computer Science & Engineering, Christ College
