DYNAMIC THIRD PARTY AUDITING AND SECURED OUTSOURCING IN CLOUD

Size: px
Start display at page:

Download "DYNAMIC THIRD PARTY AUDITING AND SECURED OUTSOURCING IN CLOUD"

Transcription

1 DYNAMIC THIRD PARTY AUDITING AND SECURED OUTSOURCING IN CLOUD S. Sindu, R. Priya 3-rd Year, Velammal Engineering College Velammal Nagar, Ambattur-Red Hills Road, T amil Nadu, Chennai, INDIA ABSTRACT Abstract- Cloud storage is a data storage technique in which there is remote approaches of services supply so security is a controversy to be taken care of. The resources are dynamic, virtualized, extensible and elastic in nature and thereby data Integrity is to be ensured. Auditing plays an indispensable role in catering elucidation to the data integrity in cloud and providing data security and reliability. Highly distributed and opaque characteristics of cloud, inflates the intricacy of auditing process. Auditing deals with SLA monitoring and compliance. A third party auditor is prescribed to perform auditing to ensure data integrity on cloud services. In this paper, a Dynamic Third Party Auditing System is proposed in which a third party entity dynamically provides auditing services on cloud computing environment. TPA verifies the integrity of data stored in cloud which has to be done by the client.the Dynamic third party auditing system performs auditing adopting public key concepts based on Homomorphic authentication. KEYWORD Cloud Computing, SLA, Auditing, Third Party Auditor I. INTRODUCTION CLOUD Computing is newer dimension proposal that is transmogrifying the IT industry. It provides the obligatory extensible utilities in on-demand basis with basal operation cost. The illustrious cloud computing vendors are Amazon, Google, Microsoft, Yahoo and Sales force. They possess unique security strategies and data services. Cloud Computing is a extremely strewn computing paradigm i n which dynamic, virtualized, on-demand, ascendable resources are lend to the cloud users. Depending on the services, the c loud services are broadly classified as software as a service (SaaS), platform as a service (PaaS), infrastructure as a service (IaaS). Based on service deployment, cloud is compartmentalized into Public Cloud, Private Cloud, Hybrid Cloud, and Community Cloud. Cloud users do not have possession of the resources. Users can admittance to the resources hosted by the proprietor on the internet. This mitigates the management overhead of the client. Moreover the highly distributed nature and scalability appends advantages to the cloud. But they turn into perilous security issue as there is no control over data. The location of data is unknown to user and they may get deleted in due course. Provisioning of shared resources to the traitorous users added a challenge in cloud environment. Cloud Computing is a model that bestows on demand services to the client in suitable and productive methodology. This model encloses a shared pool of resources akin to networks, servers, storage, Applications and services Types of Cloud Services: Software as a Service (SaaS) In this service the end users are endowed with subscription to software applications and databases on demand. The cloud users need to pay and use the same.. Infrastructure as a Service (IaaS)- The Cloud Service provider renders the hardware and software resources on demand basis from their Data centers. Platform as a Service (PaaS)- The vendor imparts a computing platform like the OS, web servers, etc to the program developers without installation or downloads. It mixes the simplicity of SaaS with IaaS so it is leveraged as finest known aspect of Cloud Computing. Network as a Service (NaaS) The Cloud Service provider implements virtual network connectivity services and inter-cloud network connectivity services to the users. Fig. 1.1: Cloud Architecture 1

2 1.2.Cloud Computing Models: Private Cloud: This infrastructure involves an exclusive environment that is owned by a sing le organization, say within the corporate firewall. Public Cloud: This model is suitable for civic, that is available in public net works with non-sensitive data. They demand more cloud structure and cloud security considerations. Community cloud: Collaborative effort in which organizations will partake infrastructure. They will supervise internally or by a third force. Hybrid cloud: Consolidation of two or more Private, Public and Community clouds. For application developers the storage area may present itself through a set of application program interface (API) calls. PUBLIC CLOUD Resources are owned and man aged by the third party and provides service with Low Cost and On Demand basis. PRIVATE CLOUD Resources are owned and man aged by a Separate organization for their cloud service in their company. HYBRID CLOUD The integration Of public and private cloud deployment model is also called hybrid where some organization share their cost of infrastructure with public cloud. Two or more organization COMMUNITY form a group and work for a CLOUD single purpose in the Cloud Fig. 1.2: Cloud Computing Types In private cloud, cloud is owned by private concern and they uphold their individual auditing ideology and procedure. Customarily private cloud will not link up with the public networks akin to internet, so the probability of exterior attacks is depleted.the private cloud user are restricted and easily can do monitoring. The public cloud can connect with public network like internet and there is boundless number of users depending upon the service providers competence. The agreement SLA between cloud service provider and cloud user is not translucent to all end users, so there is a possibility of agreement violation Cloud Based Data Storage Cloud based data storage is the ne xt step in the evolution of NAS (network attached station) de vices. Across the web (the cloud), many providers offer data storage that resides in the cloud. environment and provides service as private but less cost when compare to private. 1.4 Advantage of Cloud Based Data Storage Scalability most cloud based data storage providers let you scale your storage capacity (up or down) to align with your storage needs. Pay as per go with most cloud based data storage facilities users pay only for the storage (within a range) that they need Reliability many cloud based data storage provides transparent data replication. Ease of access most cloud based data storage solutions let users map a drive letter to the remote file storage area and then access the files through the use of a logical drive. Depending on your access needs the data may be accessible as follows Through a web browser interface that lets you move files to and from the storage area using a variety of devices. Through a mounted disk drive that appears locally to your computer as a disk drive letter or mounted file system. 2 Figure 1.3: CIA triad

3 1.5. Disadvantage of Cloud Based Data Storage Performance because the cloud based disk storage devices are accessed over the internet they will never be as fast as local drives. Security some users will never feel comfortable with their data in the cloud. Data orphans user may abandon data in cloud storage facilities, leaving confidential private or company data at risk The Security Triad or CIA Triad The three fundamentals concepts of information security Confidentiality Integrity Availability Confidentiality The prevention of intentional or un-intentional unauthorized disclosure of contents is called confidentiality. Loss of confidentiality can occur in many ways For Example: loss of confidentiality can occur through the intentional release of private company information or through a misapplication of network rights. Some of the elements of telecommunications used to ensure confidentiality are as follows: Network security protocols, Network authentication services, Data encryption services. Integrity Integrity is the guarantee that the message sent is the message received and that the message is not intentionally or unintentionally altered. Loss of integrity can occur through an intentional attack to change information (for example a website defacement) or more commonly, unintentional (data is accidentally altered by an operator). Integrity also contains the concept of non repudiation of a message source elements used to ensure integrity: Firewall services, Communication security management, and Intrusion detection services Availability This concept refers to the elements that create reliability and stability in networks and systems. It ensures that connectivity is accessible when needed, allowing authorized users to access the network or systems. Also in that assurance the guarantee that security services for the security practitioner are usable when they are needed. That concept of availability also trends to include areas in an 3 information system that are traditionally not thought of as pure security (such as guarantee of service, performance, and up-time) yet are obviously affected by breaches such as a denial-of-service Entities a.dataowner Data owner is one of the entities which contain the data to be stored in the cloud storage system which is provided by the cloud service provider the data owner may be an individual user or a small organization. b. Cloud Service Provider The cloud service provider (CSP) which provides the various cloud services in our approach CSP provides the data storage space and computational resources. c. Cloud Servers: The collection of mainframe systems or server which is owned and managed by the cloud service provider (CSP) and also it pr vides the computational resources. d. Certificate Authority The certificate authority is one of the entities in the architecture which provides a valid certificate during the identity management. e. Trusted Third Party Auditor: The trusted third party auditor is one of the entities who has versatile, skilled, computational resources that users may not have and provides the audit service on behalf of the user 1.8. Auditing The requirement for audit arises as the SLA agreement is opaque to the users. There are two types of audit based on the product under audition. Internal Au dit audits the process that takes place while imparting the service. External Audit audits the quality of service such as CPU performance, availability and SLA parameters. Audit can be mutually static and dynamic. In static auditing, auditing is done sporadically to verify the veracity of data. Samples are taken from the data and it is verified for integrity of data. In dynamic auditing, auditing is done on dynamic data. The dynamic data operations are modification, insertion and deletion. Batch auditing is required when there are multiple owners and multiple cloud servers. The issues evolves when decision is to be made on which entity can perform auditing. If auditing is done by Cloud providers they may conceal their faults and violations. On the other hand if the user does the auditing, it adds the overhead to them. The solution is to have a third party entity to do the auditing. The third party should be unbiased to

4 the source and end user Third Party Auditor (TPA) The Cloud user propels the data to service provider through the network. The user data may contain very insightful data like user personal information, Bank d etails, Password, Important keyword, Business client details etc. Cloud service providers normally employ Secure Socket Layer (SSL), Point to Point Tunneling protocol (PPTP), V PN for secure transaction. We are having memoirs th at attackers and intruders have succeeded over this type of security services. While transferring the data between user and the cloud service providers it is very hard to shun malevolent assail. But users require assurance lawfully about the safety over their data. For this we need an authentication mechanism based on the third party. This third party monitors the behavior of cloud user and cloud service provider. Routinely cloud service providers and client will have a Service Level Agreement (SLA). Both parties have to trail the rules and regulations mentioned in the SLA. This agreement includes the Cloud service provider s quality of service, Standard of the service, service monitoring and controlling. T he Cloud service may give oodles of commitment and service offers to the cloud user due to market rivalry but he need s to follow them everlastingly. The cloud service providers fo r their profit will hide the data errors from the cloud user. T o circumvent this problem and to retain the security standards w e call for a Third Party Auditor (TPA). TPA will abide by the auditing norms and techniques, also they will have cat alog of auditing strategies. The TPA should familiar with the SLA between cloud service provider and cloud user. TPA will play promising role between two parties. TPA is having knack to ensure the integrity of data which is stored in the cloud. The auditing should not impinge on the secrecy of the cloud users. Here the cloud user predominantly concern about their data security. Data Security encompasses Data integrity, Data Availability, Data Confidentiality as the data is stored. In order to verify the data integrity untrustworthy servers become a colossal concern with cloud environment. Data security means shielding the data from the unnecessary actions from unauthorized users and defending from devastating forces. The variety of forces is hardware failure, software failure, network failure, system failure, external forces, natural calamities etc. The illicit user may be an intruder. We have to monitor the all user activities, if we found any unauthorized function from any user, immediately we should chunk the particular user prior to mutilating the data. Data Integrity means sustaining the accuracy and consistency over the cloud user data continuously. The cloud user may stock up crucial information in the cloud storage; the precision of the user data information should be accurate in perpetuum. Data Confidentiality means maintaining the secrecy about the user data. Confidentiality is a collection of rules and promises to maintain the concealment over selected cloud user data information. The Cloud Service Provider should not enclose that information to any individual eternally. The auditing process embodies three diverse phases namely Planning, Execution and Reporting. In planning phase the TPA have to conclude the subsequent important tasks, substance to audit, agenda of the auditing, duration of auditing, vicinity of auditing, audit team size etc. The audit time and team size depends upon th e magnitude of the content. Execution is the important phase in which we have to analyze the security coercions in the clo ud storage, scrutinize the earlier threats and determine the echelon of preceding threats. Additionally user has to do the data integrity assessment. Reporting is the report of execution phase; this report will help the Cloud service provider to enrich their service. Fig. 1.3: TPA in Cloud Public Batch Auditing means T PA can do simultaneous integrity checks on multiple cloud user data, which is stored in numerous clouds. II. PROPOSED SYSTEM TPA is the external entity that supports the data integrity in the cloud. Cloud Service Providers relocates the data to cloud user from cloud server. Transferred data is later on checked for its integrity. The process is as follows, TPA will amass the received data and send that data for verification. If both data equivalent, then there is no contravention in the data integrity. Realistically this is impossible for outsized data. Also TPA is an external entity; if we give complete set of data again then data integrity questions will arise in closing stages. For the manifold 4

5 cloud and several users we need various auditing called batch auditing. We need to instigate a new technique with Homomorphic authenticator nd the bilinear aggregate signature method 2.1. Components: Client: Client wields the services furnished by the owner. Client retrieves the data lent by the owner through the Cloud server. But cloud server is an imperceptible entity to the Client. The Client should be an authenticated user to the data owner. Owner: The owner utilizes cloud server to stockpile the data. The proprietor provides data to the end u sers through the Cloud Server. The possessor provides on demand services to the user. The file to be sent is encrypted and positioned in the Cloud server which is reachable by the user. The owner annexes a tag with the data to be sent so that auditor can corroborate the data using the tag. Key Generation: Key generation is accomplished by the Owner. The data is encrypted using the private key of the owner and public key is transferred along with the data. Server Integrity proof: TPA wrangles over the server to give a proof of data integrity. The server sends the proof. Integrity Verification: In receipt of the proof from the Server, TPA verifies the integrity devoid of encrypting the data. The tag in the data assists the TPA to check the data efficiently. The Auditing can be done periodically on samples of data. Over the period, the samples are collected and verification is done Cloud Server: The Cloud server presents storage services to the data vendor. The owner has to register with Cloud server to provide the use the storage services. Cloud server acts as a platform to gather the owner s data to be accessed by the client. Many owners can operate on same Cloud server to provide services to their collection of users. TPA: The data are provided to server and the integrity is clueless. The owner can attest the integrity of data in Cloud server by auditing. Having an audition at t he proprietor end aggravates overhead and the elucidation is to have a third party auditor. On behalf of owner the TPA will make sure that the owner s data storage and security is appropriate. TPA should be trustworthy but then trusting a third party is not advisable. The contents are not made available for TPA for the same purpose. It also verifies encrypted data and can be done using Homomorphic authentication. The metadata is developed using the same and disputes the server for the proof of data integrity. The server gives the proof which is checkered against the owner s metadata Authentication Process (Modules Description) a. IDENTITY Based Authentication: 1. User REQUEST - Authentication, Certification REQUEST- Generation of Random Number User The TPA process works in three steps: Key Generation, Server integrity proof, integrity verification With Received random number, Generation of Public Key Cloud Server by the user 3. Cloud sends random number with the received random number and user generates token cloud. 4. Cloud server verifies the token with the generated values = True Identity (Cloud

6 session key user) b. OUTSOURCING in the Cloud: 1. Data Owner Initiate the Process 2. Splitting: File=No.of.Blocks * parity Vector 3. Encryption: Each block is encrypted using the token generated by homomorphic encryption 4. The encrypted file is send to the cloud. 5. The Set of Token of Each Block and indices is send to the Third Party Auditor(TPA) c. PERIODIC Auditing Using Third Party: 1. TPA checks the integrity of the uploaded file. It queries the Cloud Service Provider (CSP). 2. TPA challenge algorithm verify the integrity of outsourced file. f. Misbehaving Attack: 1. An attacker hacks the message of CSP verified by certificate authority 2. TPA sends the queries to the servers to send back the blocks of the r rows specified in the challenge. 3. Case 1: CSP ended the session, the attacker try to access the data in the cloud, Case 1 will not succeed because the certificate cannot be reused 4. Case 2: CSP is completely disconnected but the session was not over, in this case the attacker may hack the data in the cloud. 5. Case 2: will not succeed because the cloud ask to enter the hash key, original Cloud Service Provider (CSP) only know the hash key but the malicious user doesn t aware about the hash key 3. Cloud sends the random file block for the specified indices. 4. TPA check the response whether the response is correct or not d. Error Localization and Correctness Verification: 1. Third Party Auditor (TPA) challenges the cloud by sending block indices 2. Response values of cloud servers determines the correctness of the distributed storage 3. TPA - check values- correctness 4. Else there is occurrence of corrupted File= ERROR 5. Identification of Misbehaving server e. Dynamic Data Operations: 1. Cloud server also receives the public verifiable parameters from TPA and performs the following set of operation: Insert, Delete and Update. 2. The modified file is send to the data owner 3. Data owner verifies the modified file and send the confirmation to the TPA 4. TPA modifies the audit record. Fig.2.4: Increase in auditing verification based on no of files g. Advantages in Proposed System: 1. Audit system can support dynamic data operations and timely anomaly detection 2. Security is provided for dynamic data operations 3. Detects the malicious cloud service provider, when accessing the data in the cloud 4. Detect the malicious identity while the data owner outsourcing in the cloud. 5. GOOGLE APP Engine a) Google App Engine (often referred to as GAE or simply App Engine) is a platform as a service (PaaS), cloud computing platform for developing and hosting web applications 6

7 b) App Engine offers automatic scaling for web applications as the number of requests increases for an application. c) It automatically allocates more resources for the web application to handle the additional demand. III. CONCLUSION [4] Cong Wang, Sherman S.M. Chow, Qian Wang, Kui Ren, and Wenjing Lou (2013) Privacy Preserving Public Auditing for Secure Cloud Storage [5] Ling Li, Lin Xu, Jing Li, Changchun Zhang, Hefei, Anhui, P.R,China (2011) Study on the Third Party Audit in Cloud Storage Service. At contemporary stage, cloud computing became a big computing paradigm. Number of cloud users and cloud providers grow swiftly. As the n umber of cloud providers increases, choosing a trusted service became dreary. The auditing mechanism is indispensable to resolve the cloud integrity concern. There is an assortment of auditing framework anticipated in cloud com putting.. But most of them are static in nature and they are instigated by cloud providers. In order to have dynamic monitoring, Dynamic Third Party Auditing System is proposed. The main advantage of the proposed system is that the data integrity is verified on dynamic data by the third party auditor. As the data integrity is verified by third party auditor, auditing becomes transparent to the Client. Future works needs to be done in order to concentrate on the scalability of the cloud services audit. Scalability is the main characteristic of the cloud. As cloud is highly distributed, the number of distributed nodes in the auditing process is also a factor to be considered the main characteristics of the cloud. As cloud is highly distributed, the number of distributed nodes in the auditing process is also a factor to be considered. Thus proposed scheme also provides the secure outsourcing services by enabling periodic third party audit and dynamic operations. Also the verification process provided for the cloud service provider to access the data in the cloud. Hence the malicious cloud service providers or malicious user are get highlighted and removed from the cloud system. REFERNCES [1] Kan Yang, and Xiaohua jia (2013) An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing [2] Jachak K.B, Korde S.K, Ghorpade P.P and Gagare G.J (2012) Homomorphic Authentication with Random Masking Technique Ensuring Privacy and Security in Cloud Computing [3] Irfan Gul, Atiq ur Rehman, M.Hasan Islam, Cloud Computing Security Auditing 7

N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT

N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 1 M.Tech Student, Department of Computer Science and Engineering, S.R.M. University Chennai 2 Asst.Professor,

More information

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer

More information

PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE

PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE Abstract: Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared

More information

Secure Data transfer in Cloud Storage Systems using Dynamic Tokens.

Secure Data transfer in Cloud Storage Systems using Dynamic Tokens. Secure Data transfer in Cloud Storage Systems using Dynamic Tokens. P.Srinivas *,K. Rajesh Kumar # M.Tech Student (CSE), Assoc. Professor *Department of Computer Science (CSE), Swarnandhra College of Engineering

More information

Improving data integrity on cloud storage services

Improving data integrity on cloud storage services International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services

More information

ADVANCE SECURITY TO CLOUD DATA STORAGE

ADVANCE SECURITY TO CLOUD DATA STORAGE Journal homepage: www.mjret.in ADVANCE SECURITY TO CLOUD DATA STORAGE ISSN:2348-6953 Yogesh Bhapkar, Mitali Patil, Kishor Kale,Rakesh Gaikwad ISB&M, SOT, Pune, India Abstract: Cloud Computing is the next

More information

preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.

preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design. Privacy-Preserving Public Auditing For Secure Cloud Storage ABSTRACT: Using cloud storage, users can remotely store their data and enjoy the on-demand high-quality applications and services from a shared

More information

Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing.

Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing. Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Privacy - Preserving

More information

Near Sheltered and Loyal storage Space Navigating in Cloud

Near Sheltered and Loyal storage Space Navigating in Cloud IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 8 (August. 2013), V2 PP 01-05 Near Sheltered and Loyal storage Space Navigating in Cloud N.Venkata Krishna, M.Venkata

More information

How To Ensure Correctness Of Data In The Cloud

How To Ensure Correctness Of Data In The Cloud A MECHANICS FOR ASSURING DATA STORAGE SECURITY IN CLOUD COMPUTING 1, 2 Pratibha Gangwar, 3 Mamta Gadoria 1 M. Tech. Scholar, Jayoti Vidyapeeth Women s University, Jaipur, priya25mehta@gmail.com 2 M. Tech.

More information

Privacy preserving technique to secure cloud

Privacy preserving technique to secure cloud Vitthal S. Gutte Pune University, MIT College of engineering, Kothrud, Pune 411038, India vitthalgutte2014@gmail.com Privacy preserving technique to secure cloud Prof. Priya Deshpande Pune University,

More information

Privacy Preserving Public Auditing for Data in Cloud Storage

Privacy Preserving Public Auditing for Data in Cloud Storage Privacy Preserving Public Auditing for Data in Cloud Storage M.Priya 1, E. Anitha 2, V.Murugalakshmi 3 M.E, Department of CSE, Karpagam University, Coimbatore, Tamilnadu, India 1, 3 M.E, Department of

More information

How To Design A Cloud Data Storage Service For A Cloud Computer System

How To Design A Cloud Data Storage Service For A Cloud Computer System Ensuring Security Services for Data Storing and Data Sharing in Cloud Computing D. Raman 1, Bojja Vamshikrishna 2 1 Associate Professor Department of Computer Science and Engineering, Vardhaman College

More information

Secure Way of Storing Data in Cloud Using Third Party Auditor

Secure Way of Storing Data in Cloud Using Third Party Auditor IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 4 (Jul. - Aug. 2013), PP 69-74 Secure Way of Storing Data in Cloud Using Third Party Auditor 1 Miss.

More information

A Secure and Dependable Cloud Storage Service in Cloud Computing

A Secure and Dependable Cloud Storage Service in Cloud Computing A Secure and Dependable Cloud Storage Service in Cloud Computing Yalla Ram Charan MTech Student Department of CSE Sri Venkateswra College of Engineering & Technology Abstract: Cloud storage is a model

More information

IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD

IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD 1 Ms.Nita R. Mhaske, 2 Prof. S.M.Rokade 1 student, Master of Engineering, Dept. of Computer Engineering Sir Visvesvaraya

More information

Data Integrity for Secure Dynamic Cloud Storage System Using TPA

Data Integrity for Secure Dynamic Cloud Storage System Using TPA International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 7-12 International Research Publication House http://www.irphouse.com Data Integrity for Secure

More information

15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM

15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM Dhanashri Bamane Vinayak Pottigar Subhash Pingale Department of Computer Science and Engineering SKN

More information

A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA

A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA Mr.Mahesh S.Giri Department of Computer Science & Engineering Technocrats Institute of Technology Bhopal, India

More information

Cloud Server Storage Security Using TPA

Cloud Server Storage Security Using TPA Cloud Server Storage Security Using TPA I K.Meenakshi, II Victo Sudha George I Student (M.Tech), DR. MGR Educational and Research Institute, India II Assisstant Professo, DR. MGR Educational and Research

More information

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 3, March 3 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Using Third Party

More information

Ensuring Data Storage Security in Cloud Computing

Ensuring Data Storage Security in Cloud Computing Ensuring Data Storage Security in Cloud Computing Cong Wang 1, Qian Wang 1, Kui Ren 1, and Wenjing Lou 2 1 ECE Department, Illinois Institute of Technology 2 ECE Department, Worcester Polytechnic Institute

More information

SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING

SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING Saranya.V 1, Suganthi.J 2, R.G. Suresh Kumar 3 1,2 Master of Technology, Department of Computer Science and Engineering, Rajiv Gandhi College of Engineering

More information

Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm

Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm Twinkle Graf.F 1, Mrs.Prema.P 2 1 (M.E- CSE, Dhanalakshmi College of Engineering, Chennai, India) 2 (Asst. Professor

More information

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD Volume 1, Issue 7, PP:, JAN JUL 2015. SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD B ANNAPURNA 1*, G RAVI 2*, 1. II-M.Tech Student, MRCET 2. Assoc. Prof, Dept.

More information

Verifying Correctness of Trusted data in Clouds

Verifying Correctness of Trusted data in Clouds Volume-3, Issue-6, December-2013, ISSN No.: 2250-0758 International Journal of Engineering and Management Research Available at: www.ijemr.net Page Number: 21-25 Verifying Correctness of Trusted data in

More information

SHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING

SHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING SHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING Er. Kavin M 1, Mr.J.Jayavel 2 1 PG Scholar, 2 Teaching Assistant, Department of Information Technology, Anna University Regional

More information

To Provide Security & Integrity for Storage Services in Cloud Computing

To Provide Security & Integrity for Storage Services in Cloud Computing To Provide Security & Integrity for Storage Services in Cloud Computing 1 vinothlakshmi.s Assistant Professor, Dept of IT, Bharath Unversity, Chennai, TamilNadu, India ABSTRACT: we propose in this paper

More information

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA U.Pandi Priya 1, R.Padma Priya 2 1 Research Scholar, Department of Computer Science and Information Technology,

More information

Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.

Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption. Secure Privacy-Preserving Cloud Services. Abhaya Ghatkar, Reena Jadhav, Renju Georgekutty, Avriel William, Amita Jajoo DYPCOE, Akurdi, Pune ghatkar.abhaya@gmail.com, jadhavreena70@yahoo.com, renjug03@gmail.com,

More information

Cryptographic Data Security over Cloud

Cryptographic Data Security over Cloud Cryptographic Data Security over Cloud Er. Lalit Gehlod Asst.Professor, Dept.Of Computer Engineering, Institute Of Engineering & Technology, Devi Ahilya University, Indore, India. Govind Patidar Dept.

More information

How To Ensure Correctness Of Data In The Cloud

How To Ensure Correctness Of Data In The Cloud Ensuring Data Storage Security in Cloud Computing ABSTRACT Cloud computing has been envisioned as the next-generation architecture of IT enterprise. In contrast to traditional solutions, where the IT services

More information

Cloud Data Storage Security and Public Auditing

Cloud Data Storage Security and Public Auditing A Meticulous Description of Applying Watermarking Technique for Secure Cloud Storage 1 M. Guresh, 2 R. Suresh 1 M.Tech 2 nd Year, Department of CSE, CREC Tirupati, AP, India 2 Professor & HOD, Department

More information

Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System

Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System 1 K.Valli Madhavi A.P vallimb@yahoo.com Mobile: 9866034900 2 R.Tamilkodi A.P tamil_kodiin@yahoo.co.in Mobile:

More information

A survey on cost effective multi-cloud storage in cloud computing

A survey on cost effective multi-cloud storage in cloud computing A survey on cost effective multi-cloud storage in cloud computing Nitesh Shrivastava, Ganesh Kumar Abstract As novel storage model, cloud storage has gain attentions from both the academics and industrial

More information

Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage

Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage P. Selvigrija, Assistant Professor, Department of Computer Science & Engineering, Christ College

More information

Chapter 1: Introduction

Chapter 1: Introduction Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure

More information

EMPOWER DATA PROTECTION AND DATA STORAGE IN CLOUD COMPUTING USING SECURE HASH ALGORITHM (SHA1)

EMPOWER DATA PROTECTION AND DATA STORAGE IN CLOUD COMPUTING USING SECURE HASH ALGORITHM (SHA1) EMPOWER DATA PROTECTION AND DATA STORAGE IN CLOUD COMPUTING USING SECURE HASH ALGORITHM (SHA1) A.William Walls Research Scholar Department of Computer Science SSM College of Arts and Science Komarapalayam,

More information

Secrecy Maintaining Public Inspecting For Secure Cloud Storage

Secrecy Maintaining Public Inspecting For Secure Cloud Storage Secrecy Maintaining Public Inspecting For Secure Cloud Storage K.Sangamithra 1, S.Tamilselvan 2 M.E, M.P.Nachimuthu.M.Jaganathan Engineering College, Tamilnadu, India 1 Asst. Professor, M.P.Nachimuthu.M.Jaganathan

More information

International Journal of Advance Research in Computer Science and Management Studies

International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 12, December 2014 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online

More information

A Review of Cloud Environment and Recognition of Highly Secure Public Data Verification Architecture using Secure Public Verifier Auditor

A Review of Cloud Environment and Recognition of Highly Secure Public Data Verification Architecture using Secure Public Verifier Auditor I J C International Journal of lectrical, lectronics ISSN No. (Online): 2277-2626 and Computer ngineering 3(2): 144-148(2014) A Review of Cloud nvironment and Recognition of Highly Secure Public Data Verification

More information

PRIVACY ASSURED IMAGE STACK MANAGEMENT SERVICE IN CLOUD

PRIVACY ASSURED IMAGE STACK MANAGEMENT SERVICE IN CLOUD PRIVACY ASSURED IMAGE STACK MANAGEMENT SERVICE IN CLOUD Ms. Shubhangi Edake 1, Prof. Sunil Rathod 2 1 PG Student, Computer Engineering, Dr.D.Y.Patil School of Engineering, Lohgaon,Pune,India 2 Assistant

More information

Third Party Auditor: An Integrity Checking Technique for Client Data Security in Cloud Computing

Third Party Auditor: An Integrity Checking Technique for Client Data Security in Cloud Computing Third Party Auditor: An Integrity Checking Technique for Client Data Security in Cloud Computing Renuka Goyal, Navjot Sidhu Centre for Computer Science and Technology, Central University of Punjab Bathinda,

More information

Proof of Retrivability: A Third Party Auditor Using Cloud Computing

Proof of Retrivability: A Third Party Auditor Using Cloud Computing Proof of Retrivability: A Third Party Auditor Using Cloud Computing Vijayaraghavan U 1, Madonna Arieth R 2, Geethanjali K 3 1,2 Asst. Professor, Dept of CSE, RVS College of Engineering& Technology, Pondicherry

More information

Distributing, Ensuring and Recovery of Data Stored in Cloud

Distributing, Ensuring and Recovery of Data Stored in Cloud Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,

More information

Verification of Data Reliability and Secure Service for Dynamic Data in Cloud Storage

Verification of Data Reliability and Secure Service for Dynamic Data in Cloud Storage Verification of Data Reliability and Secure Service for Dynamic Data in Cloud Storage Nithiavathy.R 1, Suresh.J 2 Department of Computer Science &Engineering, Coimbatore Institute of Engineering and Technology

More information

Monitoring Data Integrity while using TPA in Cloud Environment

Monitoring Data Integrity while using TPA in Cloud Environment Monitoring Data Integrity while using TPA in Cloud Environment Jaspreet Kaur, Jasmeet Singh Abstract Cloud Computing is the arising technology that delivers software, platform and infrastructure as a service

More information

Secure cloud access system using JAR ABSTRACT:

Secure cloud access system using JAR ABSTRACT: Secure cloud access system using JAR ABSTRACT: Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that

More information

Efficient Integrity Checking Technique for Securing Client Data in Cloud Computing

Efficient Integrity Checking Technique for Securing Client Data in Cloud Computing International Journal of Electrical & Computer Sciences IJECS-IJENS Vol: 11 No: 05 41 Efficient Integrity Checking Technique for Securing Client Data in Cloud Computing Abstract-- It has been widely observed

More information

A Comprehensive Data Forwarding Technique under Cloud with Dynamic Notification

A Comprehensive Data Forwarding Technique under Cloud with Dynamic Notification Research Journal of Applied Sciences, Engineering and Technology 7(14): 2946-2953, 2014 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2014 Submitted: July 7, 2013 Accepted: August

More information

Trusted Public Auditing Process for Secure Cloud Storage

Trusted Public Auditing Process for Secure Cloud Storage Trusted Public Auditing Process for Secure Cloud Storage K.Adhiyaman 1, A. Jesudoss 2, D.Saravanan 3 1 Final Year MCA, Faculty of Computing, Department of MCA Sathyabama University, Chennai,Tamil Nadu,

More information

February. ISSN: 2321-8134

February. ISSN: 2321-8134 IJFEAT INTERNATIONAL JOURNAL FOR ENGINEERING APPLICATIONS AND TECHNOLOGY TITLE: DATA PLACE & MANAGE SECURITY IN CLOUD COMPUTING FOR EFFECTIVE AND FLEXIBLE DISTRIBUTED SYSTEM 1 Mr. Pritam S. Bhoyar, 2 Mr.

More information

Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao Guocui.gao@tufts.

Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao Guocui.gao@tufts. Tufts University Department of Computer Science COMP 116 Introduction to Computer Security Fall 2014 Final Project Investigating Security Issues in Cloud Computing Guocui Gao Guocui.gao@tufts.edu Mentor:

More information

ISSN 2278-3091. Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability

ISSN 2278-3091. Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability Outsourcing and Discovering Storage Inconsistencies in Cloud Through TPA Sumathi Karanam 1, GL Varaprasad 2 Student, Department of CSE, QIS College of Engineering and Technology, Ongole, AndhraPradesh,India

More information

Selective dependable storage services for providing security in cloud computing

Selective dependable storage services for providing security in cloud computing Selective dependable storage services for providing security in cloud computing Gade Lakshmi Thirupatamma*1, M.Jayaram*2, R.Pitchaiah*3 M.Tech Scholar, Dept of CSE, UCET, Medikondur, Dist: Guntur, AP,

More information

AN INVESTIGATION OF SECURITY THEME FOR CLOUD COMPUTING

AN INVESTIGATION OF SECURITY THEME FOR CLOUD COMPUTING AN INVESTIGATION OF SECURITY THEME FOR CLOUD COMPUTING Mrs. J. Pavithra 1 Mr. A. Naveen 2 1 (MRIT, Hyderabad, India, jpav23@gmail.com) 2 (Asst. Professor, MRIT, Hyderabad, India, a.naveen21@gmail.com)

More information

Cloud Database Storage Model by Using Key-as-a-Service (KaaS)

Cloud Database Storage Model by Using Key-as-a-Service (KaaS) www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 7 July 2015, Page No. 13284-13288 Cloud Database Storage Model by Using Key-as-a-Service (KaaS) J.Sivaiah

More information

A NOVEL GRAPHICAL PASSWORD APPROACH FOR ACCESSING CLOUD & DATA VERIFICATION

A NOVEL GRAPHICAL PASSWORD APPROACH FOR ACCESSING CLOUD & DATA VERIFICATION A NOVEL GRAPHICAL PASSWORD APPROACH FOR ACCESSING CLOUD & DATA VERIFICATION Rupal Rawat 1, Sreeja Nair 2 1 M.Tech (CSE), Oriental college of science & Technology, Bhopal, Affiliated to RGPV, Bhopal, M.P,

More information

A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing

A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing International Journal of Emerging Engineering Research and Technology Volume 3, Issue 5, May 2015, PP 1-7 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) A Survey on Security Issues and Security Schemes

More information

A Survey on Cloud Security Issues and Techniques

A Survey on Cloud Security Issues and Techniques A Survey on Cloud Security Issues and Techniques Garima Gupta 1, P.R.Laxmi 2 and Shubhanjali Sharma 3 1 Department of Computer Engineering, Government Engineering College, Ajmer Guptagarima09@gmail.com

More information

Survey Paper on Integrity Auditing of Storage

Survey Paper on Integrity Auditing of Storage International Journal of Computational Engineering Research Vol, 04 Issue, 3 Survey Paper on Integrity Auditing of Storage Ugale Santosh A 1 1M.E. Computer AVCOE, Sangmner, India ABSTRACT: Cloud servers

More information

Enabling Public Auditing for Secured Data Storage in Cloud Computing

Enabling Public Auditing for Secured Data Storage in Cloud Computing IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 5 (May. 2013), V3 PP 01-05 Enabling Public Auditing for Secured Data Storage in Cloud Computing 1 Er.Amandeep Kaur,

More information

Index Terms: Data integrity, dependable distributed storage, Cloud Computing

Index Terms: Data integrity, dependable distributed storage, Cloud Computing Volume 5, Issue 5, May 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Cloud Data Protection

More information

Data Integrity and Dynamic Storage Way in Cloud Computing

Data Integrity and Dynamic Storage Way in Cloud Computing 1 Data Integrity and Dynamic Storage Way in Cloud Computing Dinesh.C, P.G Scholar, Computer Science and Engineering, Mailam Engineering College, Mailam, Tamilnadu. Abstract It is not an easy task to securely

More information

Secure and Dependable Cloud Storage Services for CRM

Secure and Dependable Cloud Storage Services for CRM Secure and Dependable Cloud Storage Services for CRM U. Rama Govinda Reddy PG Student, Bonam Venkata Chalamayya Engineering College, Odalarevu, Andhra Pradesh, India Abstract: Cloud storage allows users

More information

Efficient and Secure Dynamic Auditing Protocol for Integrity Verification In Cloud Storage

Efficient and Secure Dynamic Auditing Protocol for Integrity Verification In Cloud Storage Efficient and Secure Dynamic Auditing Protocol for Integrity Verification In Cloud Storage Priyanga.R 1, Maheswari.B 2, Karthik.S 3 PG Scholar, Department of CSE, SNS College of technology, Coimbatore-35,

More information

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction Enhancing Data Security in Cloud Storage Auditing With Key Abstraction 1 Priyadharshni.A, 2 Geo Jenefer.G 1 Master of engineering in computer science, Ponjesly College of Engineering 2 Assistant Professor,

More information

INTENSIFICATION OF EDUCATIONAL CLOUD COMPUTING AND CRISIS OF DATA SECURITY IN PUBLIC CLOUDS

INTENSIFICATION OF EDUCATIONAL CLOUD COMPUTING AND CRISIS OF DATA SECURITY IN PUBLIC CLOUDS INTENSIFICATION OF EDUCATIONAL CLOUD COMPUTING AND CRISIS OF DATA SECURITY IN PUBLIC CLOUDS P.Shanthi Bala Lecturer, Department of Computer Science, Pondicherry University, Puducherry. Abstract Cloud computing

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 2, February 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Review on

More information

A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS

A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS *Dr Umesh Sehgal, #Shalini Guleria *Associate Professor,ARNI School of Computer Science,Arni University,KathagarhUmeshsehgalind@gmail.com

More information

How To Ensure Data Integrity In Cloud Computing

How To Ensure Data Integrity In Cloud Computing A Novel Approach for public exploration Data with Effective user Denial in the cloud Mahankali Anitha PG Scholar Department of CSE J.Vijayasree Assistant professor Department of CSE Dr.M.V.Siva Prasad

More information

Research Paper on Data Integrity Checking In Cloud Computing

Research Paper on Data Integrity Checking In Cloud Computing Research Paper on Data Integrity Checking In Cloud Computing Indu Bala 1, Savita Bishnoi 2 1 Department of Computer Science & Engineering, Rohtak Institute of Engineering& Management Rohtak, Haryana, India

More information

Analysis of Secure Cloud Data Sharing Within a Group

Analysis of Secure Cloud Data Sharing Within a Group Analysis of Secure Cloud Data Sharing Within a Group Ms. uri Pande* Department of CSE, GHRAET Nagpur (M.S), India, Prof. Vikrant Chole Dept of Computer Science & Engg Nagpur (M.S.), India Abstract In this

More information

RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES

RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES 1 MD ISMAIL Z, 2 ASHFAQUE AHAMED K. 1 PG Scholar,Department of Computer Science, C.Abdul Hakeem College Of Arts and Science,Melvisharam.

More information

Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving,

Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving, Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Third Party

More information

Insuring Security for Outsourced Data Stored in Cloud Environment

Insuring Security for Outsourced Data Stored in Cloud Environment Insuring Security for Outsourced Data Stored in Cloud Environment Durga Priya.G Department of Information Technology Sri Sairam Engineering College Chennai-45, India Soma Prathibha Department of Information

More information

Ensuring Data Storage Security in Clouds using Public Audit Services

Ensuring Data Storage Security in Clouds using Public Audit Services Ensuring Data Storage Security in Clouds using Public Audit Services Amala. U M.E. student, Department of Computer Science & Engineering Adhiyamaan College of Engineering Hosur, Tamilnadu, India Abstract

More information

CONSIDERATION OF DYNAMIC STORAGE ATTRIBUTES IN CLOUD

CONSIDERATION OF DYNAMIC STORAGE ATTRIBUTES IN CLOUD INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE CONSIDERATION OF DYNAMIC STORAGE ATTRIBUTES IN CLOUD Ravi Sativada 1, M.Prabhakar Rao 2 1 M.Tech Student, Dept of CSE, Chilkur Balaji

More information

Cloud Data Storage Services Considering Public Audit for Security

Cloud Data Storage Services Considering Public Audit for Security Global Journal of Computer Science and Technology Cloud and Distributed Volume 13 Issue 1 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

Implementing Efficient Monitoring And Data Dynamics For Data Storage Security in Cloud Computing

Implementing Efficient Monitoring And Data Dynamics For Data Storage Security in Cloud Computing Implementing Efficient Monitoring And Data Dynamics For Data Storage Security in Cloud Computing 1 Pavithra S., 1 Assistant Professor, Vel Tech Multitech Dr.RR & Dr. SR Engg College E-mail: pavi_eye@yahoo.co.in

More information

Dynamic Query Updation for User Authentication in cloud Environment

Dynamic Query Updation for User Authentication in cloud Environment Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,

More information

PERFORMANCE OF BALANCED STORAGE SERVICES IN CLOUD SYSTEM

PERFORMANCE OF BALANCED STORAGE SERVICES IN CLOUD SYSTEM INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE PERFORMANCE OF BALANCED STORAGE SERVICES IN CLOUD SYSTEM Byagari Kumar 1, K.Pradeep Kumar 2 1 M.Tech Student, Dept of CSE, RRS College

More information

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD S.REVATHI B.HASEENA M.NOORUL IZZATH PG Student PG Student PG Student II- ME CSE II- ME CSE II- ME CSE Al-Ameen Engineering

More information

Keywords : audit, cloud, integrity, station to station protocol, SHA-2, third party auditor, XOR. GJCST-B Classification : C.2.4, H.2.

Keywords : audit, cloud, integrity, station to station protocol, SHA-2, third party auditor, XOR. GJCST-B Classification : C.2.4, H.2. Global Journal of Computer Science and Technology Cloud and Distributed Volume 13 Issue 3 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

An Efficient Data Correctness Approach over Cloud Architectures

An Efficient Data Correctness Approach over Cloud Architectures International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 8, Issue 12 (October 2013), PP. 33-37 An Efficient Data Correctness Approach over

More information

A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments

A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining

More information

Data Security in Cloud Using Elliptic Curve Crytography

Data Security in Cloud Using Elliptic Curve Crytography Data Security in Cloud Using Elliptic Curve Crytography Puneetha C 1, Dr. M Dakshayini 2 PG Student, Dept. of Information Science & Engineering, B.M.S.C.E, Karnataka, Bangalore,India 1 Professor, Dept.

More information

A Survey and a Data Integrity Proofs In Cloud Storage

A Survey and a Data Integrity Proofs In Cloud Storage IJCSNS International Journal of Computer Science and Network Security, VOL.15 No.11, November 2015 39 A Survey and a Data Integrity Proofs In Cloud Storage V.Kiruthika B.R.Laxmi Sree School Of IT & Science

More information

AN EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA IN TEGRITY IN CLOUDS

AN EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA IN TEGRITY IN CLOUDS AN EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA IN TEGRITY IN CLOUDS Mrs.K.Saranya, M.E.,(CSE), Jay Shriram Group of Institutions, Tirupur. Saranya17113@gmail.com Dr.S.Rajalakshmi, Associate Professor/CSE,

More information

Secure Cloud StorageForPrivacy-Preserving Public Audit

Secure Cloud StorageForPrivacy-Preserving Public Audit RESEARCH ARTICLE OPEN ACCESS Secure Cloud StorageForPrivacy-Preserving Public Audit ShekhAhamadhusen D., Prof. Rahul Deshmukh Abstract- In Cloud Environment, using cloud storage service, users can remotely

More information

IJCSIET-ISSUE5-VOLUME1-SERIES1 Page 1

IJCSIET-ISSUE5-VOLUME1-SERIES1 Page 1 ENHANCED DATA SECURITY IN CLOUD COMPUTING TO PRESERVING DATA IN CLOUD STOREHOUSE USING THIRD PARTY AUDITOR Dr.M.V. BRAHMANANDA REDDY, PRINCIPAL, MEKAPATI RAJA REDDY INSTITUTE OF TECHNOLOGY & SCIENCE UDAYAGIRI,SPS

More information

PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING

PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING T.Vidhya Sree M.Phil Research Scholar,CS, MGR College, Hosur (India) ABSTRACT Cloud Computing is the long dreamed vision

More information

IMPLEMENTING DATA SECURITY IN MULTI CLOUD

IMPLEMENTING DATA SECURITY IN MULTI CLOUD IMPLEMENTING DATA SECURITY IN MULTI CLOUD Ms. Renu Nagendra Shinde Information Technology SKNCOE Pune 41,India renunikhilp@gmail.com Prof. Mrs. Varsha Khandekar Information Technology SKNCOE Pune 41, India

More information

Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication

Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication Sanjay Kumar Baghel Mtech Scholar, CSE, CSIT DURG Sanju5878@gmail.com Bhupesh Kumar Dewangan Assistant Professor,CSE,

More information

SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE

SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE International Journal of Computer Network and Security(IJCNS) Vol 7. No.1 2015 Pp. 1-8 gopalax Journals, Singapore available at : www.ijcns.com ISSN: 0975-8283 ----------------------------------------------------------------------------------------------------------------------------------------------------------

More information

Remote Data Integrity Checking in Cloud Computing

Remote Data Integrity Checking in Cloud Computing ISSN 2321 8169 Remote Data Integrity Checking in Cloud Computing Khaba M.V (Assistant Professor/CSE) RVS School of Engineering,dindigul khabarose@gmail.com M.Santhanalakshmi(Assistant Professor/CSE) RVS

More information

Performance Evaluation Panda for Data Storage and Sharing Services in Cloud Computing

Performance Evaluation Panda for Data Storage and Sharing Services in Cloud Computing Performance Evaluation Panda for Data Storage and Sharing Services in Cloud Computing Gunnala Ajay Kumar M.Tech Student Department of CSE Global Group Of Institutions Batasingaram, Ranga Reddy (Dist),

More information