Enhanced Algorithm for Efficient Retrieval of Data from a Secure Cloud

Size: px
Start display at page:

Download "Enhanced Algorithm for Efficient Retrieval of Data from a Secure Cloud"

Transcription

1 OPEN JOURNAL OF MOBILE COMPUTING AND CLOUD COMPUTING Volume 1, Number 2, November 2014 OPEN JOURNAL OF MOBILE COMPUTING AND CLOUD COMPUTING Enhanced Algorithm for Efficient Retrieval of Data from a Secure Cloud NISHA T. M. 1*, LIJO V. P. 2 1 Information Technology Department, MES College of Engineering, Kuttippuram, Malappuram, India. 2 Computer Science & Engineering, MES College of Engineering, Kuttippuram, Malappuram, India. *Corresponding author: nishunni@gmail.com Abstract: In this technical era of computing, one of the most important words used is Cloud Computing. It is growing day by day due to its rich features of services. Cloud computing uses internet and central remote servers to maintain data and applications. The data in the cloud are stored in off premises as encrypted form. One of the most popular ways is selectively retrieve files through keyword-based search instead of retrieving all the encrypted files back. There are so many challenges in cloud computing. One of the main challenges is to increase the efficiency of data retrieval and searching. There are several keyword search mechanisms for data retrieval. Currently many researches are focusing on the fuzzy keyword search, which searches and retrieves the data in most secure and privacy preserving manner. The existing system uses single fuzzy keyword search mechanism, which struggling with inefficiency of search and that may be overloaded with resultant files of irrelevant data. In the proposed system a conjunctive keyword search is introducing so that more efficient and relevant data files can be retrieved. The conjunctive keyword search automatically generate a ranked result so that the searching relevancy and efficiency will be improved. This will reduce the searching time and improve the efficiency by reducing time for index generation. Keywords: Cloud Computing; Fuzzy Keyword; Trie-tree; Advanced Trie-tree;Conjunctive Keyword; Encryption 1. INTRODUCTION In the 1960s, J.C.R.Licklider introduced the term intergalactic computer network [1] at the Advanced Research Projects Agency, introduced the most important concept Internet. The term Cloud originates from the telecommunications world of 1990s. It is the collection of servers, where all the applications or data are stored. All the servers are not installed in same location. They are distributed geographically desperate locations. It provides a scalable service delivery platform. Resources are being shared at various levels and they offer different services. The main modes of services are Software as a service (SaaS), Platform as a service (PaaS), and Infrastructure as a service (IaaS). There are so many security issues. The main security issues arise in data storage, data retrieval, searching etc. There are so many issues in storing the data securely in the cloud because most of the 50

2 Enhanced Algorithm for Efficient Retrieval of Data from a Secure Cloud sensitive information is centralized in to clouds. Examples are personal health records, different types of medicines, government documents, private videos and photos, company finance data etc. But the most important aspect arises in data retrieval part. The data owner stores their data in the cloud and any authorized person can access those files. If an unauthorized person enters, on retrieval they can do modification, insertion and deletion in the original files and can store back in clouds. Here the original data can be interrupted, which may cause security problems. So these sensitive data are encrypted before outsourcing. One of the most popular ways or techniques is to selectively retrieve files through keyword-based search instead of retrieving all the encrypted files back. The data encryption also demands the protection of keyword privacy since keywords usually contain important information related to the data files. The existing searchable encryption techniques do not suit for cloud computing scenario because they support only exact keyword search. This significant drawback of existing schemes signifies the important need for new techniques that support searching edibility, tolerating both minor typos and format inconsistencies. A secure fuzzy search [2] capability is demanded for achieving enhanced system usability in cloud computing. The main problem is how efficiently searching the data and retrieves the results in most secure and privacy preserving manner. So it is clear that one of the main challenges in cloud computing is the data retrieval and searching. For retrieving the data in a most secure and privacy preserving manner the keyword searching technique is used. To search the data in more efficient manner, the fuzzy keyword search is introduced. When the files are retrieved in an efficient manner, most relevant data can be retrieved. That is the fuzzy keyword search will provide a privacy preserving keyword search mechanism. In the existing system it is mainly focusing on the fuzzy keyword search method. The data that is outsourced is encrypted, constructs fuzzy sets based on both wild card technique and gram based technique, and has introduced a symbol-based trie-traverse search scheme, where a multi-way tree has constructed for storing the fuzzy keyword set and finally retrieving the data. All fuzzy words in the trie tree can be found by a depth first search. 2. RELATED WORKS The main challenge in cloud computing is its security. Security in data storage, efficient data retrieval from the centralized cloud storage, relevant data retrieval by keyword searching, etc. The security in searching is important because, each keyword should contain the meaning of the underlying information. So the keyword search should retrieve the most relevant data in an efficient manner. As cloud computing is in its growing stage, so many researches are going on in this area. D. Boneh, proposed a method [3], which deals with the problem of searching data that is encrypted using a public key system. The mechanism is known as Public Key Encryption with keyword Search. S. Ji, proposed a new computing paradigm, called interactive, fuzzy search [4]. It has two unique features such as Interactive and Fuzzy. It gives the idea about the queries with a single keyword, and presents an incremental algorithm for computing keyword prefixes [4]. It also gives an idea about various techniques for computing the intersection of the inverted lists of query keywords. J. Li, proposed another fuzzy keyword search method which includes Wild card [2] based method and Gram based [2] method for constructing fuzzy keyword sets, a symbol-based trie-traverse search scheme where a multi-way tree was constructed for storing the fuzzy keyword set and finally retrieving the data. This greatly reduces the storage and representation overheads. It also exploits Edit distance [2] to quantify keywords similarity, to build storage-efficient fuzzy keyword sets to facilitate the searching process. In order to enrich the search functionalities, introducing a conjunctive [5, 6] fuzzy keyword search over encrypted data. Conjunctive keyword search returns all-or-nothing, which means it only returns those 51

3 OPEN JOURNAL OF MOBILE COMPUTING AND CLOUD COMPUTING Figure 1. Architecture of Fuzzy Keyword Search documents in which all the keywords specified by the search query appear. In the previous work [7] it is proposed the conjunction of fuzzy keyword search mechanism. Here it is introducing a new algorithm for this conjunction of fuzzy keyword search and it increases the efficiency and reduces the complexity. 3. SEARCH AND RETRIEVAL BY CONJUNCTION OF FUZZY KEYWORDS 3.1 Single Fuzzy Keyword Search The existing fuzzy keyword search using single fuzzy keyword is described here. A cloud data system consisting of data owner, data user and cloud server. The architecture of fuzzy keyword search [2] is shown in the Figure 1. The working principle of fuzzy keyword search [2, 8] is given here. Initially given n encrypted data, C = (F 1,F 2,...,F n ) which is stored in the cloud server. Along with that an encrypted predefined set of distinct keywords W = {w 1,w 2,...,w p }are also stored in the cloud server. Cloud server provides the authorization to the users who want to access the encrypted files. Only the authorized person can access the stored data. The authorized user types the request that they want to search. The cloud server maps the request to the data files, which is indexed by a file ID and is linked to a set of keywords. The execution of fuzzy keyword search returns these set of file IDs whose corresponding data files possibly contain the word w, denoted as FID w, if w = w i 2 W, then return FID wi. Fuzzy keyword search will return the results by keeping the following two rules. 1. If the user s searching input exactly matches the predefined keyword, then the server is expected to return the files containing that keyword. 2. If there is no exact match or some inconstancies in the searching input, the server will return the closest possible results based on pre-defined similarity semantics. 52

4 Enhanced Algorithm for Efficient Retrieval of Data from a Secure Cloud 3.2 Fuzzy Keyword Set Construction In single fuzzy keyword search method, different keyword set construction mechanisms is discussed. From that it is cleared that wildcard method is the best keyword set construction method in the security aspect. So in the current method we are using wildcard method for fuzzy keyword set construction. So it will generate all the variants of the given keyword. When an encrypted file is outsourcing in to the cloud server, fuzzy set for all the keywords in the file should be generated by wild card method and stored in the cloud server. An authorized user wants to search for a conjunction of request (AND, OR, NOT, BOTH), its fuzzy set also want to generate by the same wild card technique. 3.3 Efficiency of Data Retrieval In the proposed work, the data owner stores the conjunction of keywords and their fuzzy set in the advanced trie-tree data structure. Here the Conjunction of keywords can be stored in the same advanced trie-tree. This is because the fuzzy set s offsets for each keyword with different edit distance (d = 1; d = 2...) can store in the fuzzy pointers. (FUZZY 1; FUZZY 2... ) in the same data structure. In the same method the user can also generate the search request. In general for a keyword of average length m, the number of variants constructed are 2* m So for conjunction of keywords having n number of keywords n (2 * m ) variants are constructed. For gram based method for the key word SIMPLE with the pre-set edit distance 1, the total number of variants constructed is m + 1. So for conjunction of keywords having n number of keywords n (m + 1) variants are constructed. The complexity of searching will reduce from O (mˆ2*n) in to O (m* n). The space complexity is reduced from O (mˆ2* n* p) in to O (m* n* p). So the search complexity is O (m)*o (n). That is the order is reduced from O (mˆ2* n) in to O (m*n). One m is eliminated due to the fuzzy pointer in the advanced trie-tree (Fuzzy set list). The space complexity is O (m* n* p). The space complexity is O (mˆ2*n *p) in to O (m* n* p). So the search complexity is O (m) *O (n). That is the order is reduced from O (mˆ2* n) in to O (m* n). One m is eliminated due to the fuzzy pointer in the advanced trie-tree (Fuzzy set list). The space complexity is O (m* n* p). The space complexity is also reduced. 3.4 Implementation When a single keyword and its fuzzy set is wanted to insert in the advanced trie- tree, the main processes are: Insertion 1. Initially each character in the given keyword is added in to the node. 2. The exact index field is is set to -1 until reaches at the end of the word. 3. When the word s end is reached, the exact index field stores the offset of the file where the word is stored or stores the file ID (FID). 4. The fuzzy pointer will stores the offsets of the fuzzy keywords set. Each fuzzy pointer can store the fuzzy set with different edit distance. 5. Then the next word reads and the process goes on until all the keyword sets are inserted in the trie-tree. The node defined in an advanced trie tree typdef struct TrieNode 53

5 OPEN JOURNAL OF MOBILE COMPUTING AND CLOUD COMPUTING Figure 2. Example for Keyword Set Construction { char data; //for storing character struct TrieNode*child[26] ; int exactindex; pfuzzynode head; }TrieNode; *ptrienode; Searching The searching is carried out in a depth First search manner. The algorithm for conjunction of keyword search is given in the Algorithm 1. Example An example is shown in Figure 2. Suppose a small file calls FILE, that want to store in the cloud server by the data owner contains the following keywords, and file ID FID DATA, OS, BASE, MOBILE, DESIGN, MATHS, GRAPH, MINING, MODEL. These keywords are stored in the advanced trie-tree data structure. For each keyword contains an exact index and fuzzy pointers. The fuzzy pointer FUZZY1 contains the offsets of the fuzzy set generated by applying wild card method with edit distance 1. FUZZY2 contains the offsets of fuzzy set generated by wildcard method with edit distance 2. Exact field contains the FID of corresponding file. Now the user search for a conjunction of search request that is the input query. DATA AND BASE AND DESIGN NOT MINING The searching request is shown in the Figure 3. The first keyword DATA is searched in advanced trietree by using its hash value and then its fuzzy set is also searched. After that it checks for the conjunction keyword. If it is AND, checking the next keyword BASE and so on. If it is the conjunction keyword NOT neglects the next keyword MINING. 54

6 Enhanced Algorithm for Efficient Retrieval of Data from a Secure Cloud Figure 3. Representation of Input Request 4. RESULTS AND DISCUSSION It contains a cloud database, which consists of almost one thousand of data files, and has an Administrator 55

7 OPEN JOURNAL OF MOBILE COMPUTING AND CLOUD COMPUTING (owner) and user. The administrator can add, view and delete the data. When a data or file is added it should be encrypted and stored in the database that is the data entered will be stored as encrypted files. AES encryption algorithm is used for encryption. The administrator can also view the encrypted data and delete the data. This encryption provides the security of the stored data. When a user wants to access the data by keyword search mechanism, first he wants to get the authorization. That is the authorized person can only retrieve the data. The authorization is provided by a key which is randomly generated. That key is unique for each user. The user should remember this key throughout the searching process. The user can enter the key words which is the conjunction of single keywords. That is AND, OR, BOTH and he get a search result which is very efficient and also in a ranked order. The efficiency is increased by introducing an advanced trie-tree data structure instead of normal trie-tree data structure. That is for normal trie-tree method, for each single keyword request, the search cost only O(m) at the server side, where m is the length of hash value. That is for each character a hash value is calculated. By using this hash value it is directly find the next character. In order to pointing in to the child node each 56

8 Enhanced Algorithm for Efficient Retrieval of Data from a Secure Cloud hash value is added with key value, which is specifically defined for each levels in the advanced trie-tree. Space complexity is of O (m* s), s is the width of the tree. So by introducing conjunction of keyword in normal trie-tree data structure, for n conjunction of keywords having average keyword length l keeping the edit distance 1 is of O (l*n)* O(m). That is O (l * m * n). Space complexity is O (l * m * n * s). Here each fuzzy set is storing separately in the normal trie-tree. So conjunction of keyword will produce the combination of different small normal trie-tree joint together by the root nodes containing AND, OR, NOT etc: But our proposed work the storage complexity and searching complexity is reduced. Which is of the order of O (m* n * s) and O(m) * O(n) respectively. The relevancy is improved by introducing the ranking method. A ranking rules performance should be based on the total ranking it imposes on the collection with respect to the query. The two important measures of effectiveness for retrieving the data are Recall and Precision. The most common way to describe retrieval performance is to calculate how many of the relevant documents have been retrieved and how early in the ranking they were listed. The Precision Pr of a ranking method for some cutoff point r is the fraction of the top r ranked documents that are relevant to the query. Pr = (Number retrieved that are relevant) / (Total number retrieved) The recall Rr of a method at some value are r is the proportion of the total number of relevant documents that were retrieved in the top r. Rr = (Number relevant that are retrieved) / (Total number relevant) Suppose the searching query contains n keywords, from this m keywords are available in the file, where m * n, that is n m 0. Then the ranking ratio h = m/n, where 0 0 apple h apple 1. If the value of h = 1, that means the searching result contains all the keywords in the input query. This file will come first in the search result. The search result will display the files according to the decreasing order of the ranking ratio. Figure 4. Relevancy of Data (h = m/n) Suppose a searching query contains the sequence of 10 keywords. If all the searching keywords contain in the file, that is m = n, then the value of h = 1. The file with highest ranking ratio comes first in the search result. A graphical representation is given in the Figure 4. Where the straight line represents the value h =1. The curve represents the value of h < 1, that is 0 apple h < 1. C. Wang, in his paper Secure ranked key word search over encrypted cloud data, analytically proved that if the ranking ratio is greater than 0.6, the data will be relevant. As the value increases above 0.6 the relevancy also increases. 57

9 OPEN JOURNAL OF MOBILE COMPUTING AND CLOUD COMPUTING 5. CONCLUSIONS Searching and retrieving the relevant data from the cloud is one of the main challenges in the cloud computing scenario. Privacy-preserving fuzzy search is the search technique for achieving effective utilization of remotely stored encrypted data in Cloud Computing. Here it is introduced an enhanced algorithm for searching and retrieving the data by conjunction/sequence of fuzzy-keyword search. Conjunction of keywords automatically generates ranking according to the relevancy of the retrieved files. It is ensured that the proposed system retrieves highly relevant data by more efficient search, without compromising privacy and security. References [1] L. M. Kaufman, Data Security in the World of Cloud Computing, IEEE Security and Privacy, vol. 7, no. 4, pp , [2] J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou, Fuzzy keyword search over encrypted data in cloud computing, in INFOCOM10 Mini- Conference, 2010 Proceedings IEEE, pp. 1 5, IEEE, [3] D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano, Public key encryption with keyword search, in Proc. of EUROCRYP04, [4] S. Ji, G. Li, C. Li, and J. Feng, Efficient interactive fuzzy keyword search, in Proceedings of the 18th International Conference on World Wide Web, pp , ACM, [5] P. Golle, J. Staddon, and B. Waters, Secure Conjunctive Keyword Search Over Encrypted Data, in Applied Cryptography and Network Security, pp , Springer, [6] L. Ballard, S. Kamara, and F. Monrose, Achieving efficient conjunctive keyword searches over encrypted data, in Information and Communications Security, pp , Springer, [7] T. Nisha and V. Lijo, Improving the Efficiency of Data Retrieval in Secure Cloud, International Journal of Computer Applications, vol. ICACT Nov , [8] S. Ji, G. Li, C. Li, and J. Feng, Efficient interactive fuzzy keyword search, in Proceedings of the 18th International Conference on World Wide Web, pp , ACM,

10 About This Journal MCCC is an open access journal published by Scientific Online Publishing. This journal focus on the following scopes (but not limited to): Autonomic Business Process and Workflow Management in Clouds Cloud Composition, Federation, Bridging and Bursting Cloud Computing Consulting Cloud Configuration, Performance and Capacity Management Cloud DevOps Cloud Game Design Cloud Migration Cloud Programming Models and Paradigms Cloud Provisioning Orchestration Cloud Quality Management and Service Level Agreement (SLA) Cloud Resource Virtualization and Composition Cloud Software Patch and License Management Cloud Workload Profiling and Deployment Control Cloud Video and Audio Applications Economic, Business and ROI Models for Cloud Computing Green Cloud Computing High Performance Cloud Computing Infrastructure, Platform, Application, Business, Social and Mobile Clouds Innovative Cloud Applications and Experiences Security, Privacy and Compliance Management for Public, Private and Hybrid Clouds Self-service Cloud Portal, Dashboard and Analytics Storage, Data and Analytics Clouds Welcome to submit your original manuscripts to us. For more information, please visit our website: You can click the bellows to follow us: Facebook: Twitter: LinkedIn: Google+:

11 SOP welcomes authors to contribute their research outcomes under the following rules: Although glad to publish all original and new research achievements, SOP can t bear any misbehavior: plagiarism, forgery or manipulation of experimental data. As an international publisher, SOP highly values different cultures and adopts cautious attitude towards religion, politics, race, war and ethics. SOP helps to propagate scientific results but shares no responsibility of any legal risks or harmful effects caused by article along with the authors. SOP maintains the strictest peer review, but holds a neutral attitude for all the published articles. SOP is an open platform, waiting for senior experts serving on the editorial boards to advance the progress of research together.

An Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud

An Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud , pp.246-252 http://dx.doi.org/10.14257/astl.2014.49.45 An Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud Jiangang Shu ab Xingming Sun ab Lu Zhou ab Jin Wang ab

More information

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA U.Pandi Priya 1, R.Padma Priya 2 1 Research Scholar, Department of Computer Science and Information Technology,

More information

Ranked Search over Encrypted Cloud Data using Multiple Keywords

Ranked Search over Encrypted Cloud Data using Multiple Keywords Ranked Search over Encrypted Cloud Data using Multiple Keywords [1] Nita Elizabeth Samuel, [2] Revathi B. R, [3] Sangeetha.M, [4] SreelekshmySelvin, [5] Dileep.V.K [1][2][3][4] LBS Institute of Technology

More information

Fuzzy Keyword Search over Encrypted Data using Symbol-Based Trie-traverse Search Scheme in Cloud Computing

Fuzzy Keyword Search over Encrypted Data using Symbol-Based Trie-traverse Search Scheme in Cloud Computing Fuzzy Keyword Search over Encrypted Data using Symbol-Based Trie-traverse Search Scheme in Cloud Computing P. Naga Aswani, K. Chandra Shekar M. Tech Student, Associate Professor, CSE Dept. puduru.aswani@gmail.com,chandhra2k7@gmail.com

More information

Security over Cloud Data through Encryption Standards

Security over Cloud Data through Encryption Standards Security over Cloud Data through Encryption Standards Santhi Baskaran 1, Surya A 2, Stephen Pius C 3, Sudesh Goud G 4 1 Professor, 2,3,4 Student, Department of Information Technology, Pondicherry Engineering

More information

An Efficient Multi-Keyword Ranked Secure Search On Crypto Drive With Privacy Retaining

An Efficient Multi-Keyword Ranked Secure Search On Crypto Drive With Privacy Retaining An Efficient Multi-Keyword Ranked Secure Search On Crypto Drive With Privacy Retaining 1 B.Sahaya Emelda and 2 Mrs. P. Maria Jesi M.E.,Ph.D., 1 PG Student and 2 Associate Professor, Department of Computer

More information

Enabling Public Accountability and Data Sharing for Storage Security in Cloud Computing

Enabling Public Accountability and Data Sharing for Storage Security in Cloud Computing VOLUME 1, NUMBER 1, JUNE 2014 OPEN JOURNAL OF INFORMATION SECURITY AND APPLICATIONS Enabling Public Accountability and Data Sharing for Storage Security in Cloud Computing K. Mohammed Aaqib Ameen, A. Anny

More information

Key Laboratory of Computer Networks and Information Security Xidian University, Xi an, P.R. China e-mail: xfchen@xidian.edu.cn

Key Laboratory of Computer Networks and Information Security Xidian University, Xi an, P.R. China e-mail: xfchen@xidian.edu.cn Computing and Informatics, Vol. 32, 2013, 723 738 EFFICIENT MULTI-USER KEYWORD SEARCH OVER ENCRYPTED DATA IN CLOUD COMPUTING Jin Li Department of Computer Science, Guangzhou University Guangzhou, P.R.

More information

Providing Data Protection as a Service in Cloud Computing

Providing Data Protection as a Service in Cloud Computing International Journal of Scientific and Research Publications, Volume 3, Issue 6, June 2013 1 Providing Data Protection as a Service in Cloud Computing Sunumol Cherian *, Kavitha Murukezhan ** * Department

More information

Ranked Keyword Search Using RSE over Outsourced Cloud Data

Ranked Keyword Search Using RSE over Outsourced Cloud Data Ranked Keyword Search Using RSE over Outsourced Cloud Data Payal Akriti 1, Ms. Preetha Mary Ann 2, D.Sarvanan 3 1 Final Year MCA, Sathyabama University, Tamilnadu, India 2&3 Assistant Professor, Sathyabama

More information

Assuring Integrity in Privacy Preserving Multikeyword Ranked Search over Encrypted Cloud Data

Assuring Integrity in Privacy Preserving Multikeyword Ranked Search over Encrypted Cloud Data Assuring Integrity in Privacy Preserving Multikeyword Ranked Search over Encrypted Cloud Data CH. Keerthi prathyusha Department of Computer Science and Engineering, JNTUA College of Engineering, Anantapuramu,

More information

Secure and Efficient Data Retrieval Process based on Hilbert Space Filling Curve

Secure and Efficient Data Retrieval Process based on Hilbert Space Filling Curve Secure and Efficient Data Retrieval Process based on Hilbert Space Filling Curve N.S. Jeya karthikka PG Scholar Sri Ramakrishna Engg Collg S.Bhaggiaraj Assistant Professor Sri Ramakrishna Engg Collg V.Sumathy

More information

Data Security Issues in Cloud Computing

Data Security Issues in Cloud Computing OPEN JOURNAL OF MOBILE COMPUTING AND CLOUD COMPUTING Volume 1, Number 1, August 2014 OPEN JOURNAL OF MOBILE COMPUTING AND CLOUD COMPUTING Data Security Issues in Cloud Computing Neha Rawat*, Ratnesh Srivastava,

More information

Secure semantic based search over cloud

Secure semantic based search over cloud Volume: 2, Issue: 5, 162-167 May 2015 www.allsubjectjournal.com e-issn: 2349-4182 p-issn: 2349-5979 Impact Factor: 3.762 Sarulatha.M PG Scholar, Dept of CSE Sri Krishna College of Technology Coimbatore,

More information

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD Volume 1, Issue 7, PP:, JAN JUL 2015. SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD B ANNAPURNA 1*, G RAVI 2*, 1. II-M.Tech Student, MRCET 2. Assoc. Prof, Dept.

More information

15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM

15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM Dhanashri Bamane Vinayak Pottigar Subhash Pingale Department of Computer Science and Engineering SKN

More information

Near Sheltered and Loyal storage Space Navigating in Cloud

Near Sheltered and Loyal storage Space Navigating in Cloud IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 8 (August. 2013), V2 PP 01-05 Near Sheltered and Loyal storage Space Navigating in Cloud N.Venkata Krishna, M.Venkata

More information

SECURITY FOR ENCRYPTED CLOUD DATA BY USING TOP-KEY TREE TECHNOLOGIES

SECURITY FOR ENCRYPTED CLOUD DATA BY USING TOP-KEY TREE TECHNOLOGIES SECURITY FOR ENCRYPTED CLOUD DATA BY USING TOP-KEY TREE TECHNOLOGIES 1 MANJOORULLASHA SHAIK, 2 SYED.ABDULHAQ, 3 P.BABU 1 PG SCHOLAR, CSE (CN), QCET, NELLORE 2,3 ASSOCIATE PROFESSOR, CSE, QCET, NELLORE

More information

RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES

RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES 1 MD ISMAIL Z, 2 ASHFAQUE AHAMED K. 1 PG Scholar,Department of Computer Science, C.Abdul Hakeem College Of Arts and Science,Melvisharam.

More information

SURVEY ON: CLOUD DATA RETRIEVAL FOR MULTIKEYWORD BASED ON DATA MINING TECHNOLOGY

SURVEY ON: CLOUD DATA RETRIEVAL FOR MULTIKEYWORD BASED ON DATA MINING TECHNOLOGY SURVEY ON: CLOUD DATA RETRIEVAL FOR MULTIKEYWORD BASED ON DATA MINING TECHNOLOGY 1 Kavya G, 2 K.S. Rajesh 1 P.G Scholar, Dept. of Computer Science & Engineering RajaRajeswari College of Engineering, Bangalore,

More information

A Full-Text Retrieval Algorithm for Encrypted Data in Cloud Storage Applications

A Full-Text Retrieval Algorithm for Encrypted Data in Cloud Storage Applications A Full-Text Retrieval Algorithm for Encrypted Data in Cloud Storage Applications Wei Song 1,2, Yihui Cui 2, and Zhiyong Peng 1,2(B) 1 State Key Laboratory of Software Engineering, Wuhan University, Wuhan,

More information

IMPLEMENTATION OF NETWORK SECURITY MODEL IN CLOUD COMPUTING USING ENCRYPTION TECHNIQUE

IMPLEMENTATION OF NETWORK SECURITY MODEL IN CLOUD COMPUTING USING ENCRYPTION TECHNIQUE IMPLEMENTATION OF NETWORK SECURITY MODEL IN CLOUD COMPUTING USING ENCRYPTION TECHNIQUE 1 Rajesh L Gaikwad, 2 Dhananjay M Dakhane, 3 Ravindra L Pardhi M.E Student, Associate Professor, Assistant Professor,

More information

Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication

Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication Volume 4, Issue 6, June 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Three Layered

More information

EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM

EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM Macha Arun 1, B.Ravi Kumar 2 1 M.Tech Student, Dept of CSE, Holy Mary

More information

How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System

How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System REVIEW ARTICAL A Novel Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage Dumala Harisha 1, V.Gouthami 2 1 Student, Computer Science & Engineering-Department, JNTU Hyderabad India

More information

Secure Way of Storing Data in Cloud Using Third Party Auditor

Secure Way of Storing Data in Cloud Using Third Party Auditor IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 4 (Jul. - Aug. 2013), PP 69-74 Secure Way of Storing Data in Cloud Using Third Party Auditor 1 Miss.

More information

Proof of Retrivability: A Third Party Auditor Using Cloud Computing

Proof of Retrivability: A Third Party Auditor Using Cloud Computing Proof of Retrivability: A Third Party Auditor Using Cloud Computing Vijayaraghavan U 1, Madonna Arieth R 2, Geethanjali K 3 1,2 Asst. Professor, Dept of CSE, RVS College of Engineering& Technology, Pondicherry

More information

Data Integrity for Secure Dynamic Cloud Storage System Using TPA

Data Integrity for Secure Dynamic Cloud Storage System Using TPA International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 7-12 International Research Publication House http://www.irphouse.com Data Integrity for Secure

More information

Efficient and Secure Dynamic Auditing Protocol for Integrity Verification In Cloud Storage

Efficient and Secure Dynamic Auditing Protocol for Integrity Verification In Cloud Storage Efficient and Secure Dynamic Auditing Protocol for Integrity Verification In Cloud Storage Priyanga.R 1, Maheswari.B 2, Karthik.S 3 PG Scholar, Department of CSE, SNS College of technology, Coimbatore-35,

More information

Survey on Efficient Information Retrieval for Ranked Query in Cost-Efficient Clouds

Survey on Efficient Information Retrieval for Ranked Query in Cost-Efficient Clouds Survey on Efficient Information Retrieval for Ranked Query in Cost-Efficient Clouds Ms. Jyotsna T. Kumbhar 1 ME Student, Department of Computer Engineering, TSSM S, P.V.P.I.T., Bavdhan, Pune University,

More information

Cryptographic Data Security over Cloud

Cryptographic Data Security over Cloud Cryptographic Data Security over Cloud Er. Lalit Gehlod Asst.Professor, Dept.Of Computer Engineering, Institute Of Engineering & Technology, Devi Ahilya University, Indore, India. Govind Patidar Dept.

More information

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction Enhancing Data Security in Cloud Storage Auditing With Key Abstraction 1 Priyadharshni.A, 2 Geo Jenefer.G 1 Master of engineering in computer science, Ponjesly College of Engineering 2 Assistant Professor,

More information

ADVANCE SECURITY TO CLOUD DATA STORAGE

ADVANCE SECURITY TO CLOUD DATA STORAGE Journal homepage: www.mjret.in ADVANCE SECURITY TO CLOUD DATA STORAGE ISSN:2348-6953 Yogesh Bhapkar, Mitali Patil, Kishor Kale,Rakesh Gaikwad ISB&M, SOT, Pune, India Abstract: Cloud Computing is the next

More information

Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment

Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment Chih Hung Wang Computer Science and Information Engineering National Chiayi University Chiayi City 60004,

More information

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer

More information

IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD

IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD 1 Ms.Nita R. Mhaske, 2 Prof. S.M.Rokade 1 student, Master of Engineering, Dept. of Computer Engineering Sir Visvesvaraya

More information

A Review of Cloud Environment and Recognition of Highly Secure Public Data Verification Architecture using Secure Public Verifier Auditor

A Review of Cloud Environment and Recognition of Highly Secure Public Data Verification Architecture using Secure Public Verifier Auditor I J C International Journal of lectrical, lectronics ISSN No. (Online): 2277-2626 and Computer ngineering 3(2): 144-148(2014) A Review of Cloud nvironment and Recognition of Highly Secure Public Data Verification

More information

ISSN 2278-3091. Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability

ISSN 2278-3091. Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability Outsourcing and Discovering Storage Inconsistencies in Cloud Through TPA Sumathi Karanam 1, GL Varaprasad 2 Student, Department of CSE, QIS College of Engineering and Technology, Ongole, AndhraPradesh,India

More information

Keywords Distributed Computing, On Demand Resources, Cloud Computing, Virtualization, Server Consolidation, Load Balancing

Keywords Distributed Computing, On Demand Resources, Cloud Computing, Virtualization, Server Consolidation, Load Balancing Volume 5, Issue 1, January 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Survey on Load

More information

Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment

Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment Deepa Noorandevarmath 1, Rameshkumar H.K 2, C M Parameshwarappa 3 1 PG Student, Dept of CS&E, STJIT, Ranebennur. Karnataka, India

More information

Email: shravankumar.elguri@gmail.com. 2 Prof, Dept of CSE, Institute of Aeronautical Engineering, Hyderabad, Andhrapradesh, India,

Email: shravankumar.elguri@gmail.com. 2 Prof, Dept of CSE, Institute of Aeronautical Engineering, Hyderabad, Andhrapradesh, India, www.semargroup.org, www.ijsetr.com ISSN 2319-8885 Vol.03,Issue.06, May-2014, Pages:0963-0968 Improving Efficiency of Public Cloud Using Load Balancing Model SHRAVAN KUMAR 1, DR. N. CHANDRA SEKHAR REDDY

More information

Facilitating Efficient Encrypted Document Storage and Retrieval in a Cloud Framework

Facilitating Efficient Encrypted Document Storage and Retrieval in a Cloud Framework IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 5, Ver. IV (Sep Oct. 2014), PP 18-24 Facilitating Efficient Encrypted Document Storage and Retrieval

More information

How To Create A Multi-Keyword Ranked Search Over Encrypted Cloud Data (Mrse)

How To Create A Multi-Keyword Ranked Search Over Encrypted Cloud Data (Mrse) JJT-029-2015 SEARCHABLE SYMMETRIC ENCRYPTION METHOD FOR ENCRYPTED DATA IN CLOUD P.Vidyasagar, R.Karthikeyan, Dr.C.Nalini M.Tech Student, Dept of CSE,Bharath University, Email.Id: vsagarp@rediffmail.com

More information

Fuzzy Keyword Search over Encrypted Stego in Cloud

Fuzzy Keyword Search over Encrypted Stego in Cloud International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-02 E-ISSN: 2347-2693 Fuzzy Keyword Search over Encrypted Stego in Cloud TanmayDahake 1*, MirsohailShaikh

More information

Data management using Virtualization in Cloud Computing

Data management using Virtualization in Cloud Computing Data management using Virtualization in Cloud Computing A.S.R. Krishna Kanth M.Tech (CST), Department of Computer Science & Systems Engineering, Andhra University, India. M.Sitha Ram Research Scholar Department

More information

A study on keyword searchable frameworks for efficient data utilization in cloud storage

A study on keyword searchable frameworks for efficient data utilization in cloud storage A study on able frameworks for efficient data utilization in cloud storage Bhagyashree M V 1, Pushpalatha M N 2 1 Student, Dept. of ISE, M S Ramaiah institute of technology, Karnataka, India 2Asst. professor,

More information

International Journal of Advance Research in Computer Science and Management Studies

International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 12, December 2014 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online

More information

Verifying Correctness of Trusted data in Clouds

Verifying Correctness of Trusted data in Clouds Volume-3, Issue-6, December-2013, ISSN No.: 2250-0758 International Journal of Engineering and Management Research Available at: www.ijemr.net Page Number: 21-25 Verifying Correctness of Trusted data in

More information

SHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING

SHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING SHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING Er. Kavin M 1, Mr.J.Jayavel 2 1 PG Scholar, 2 Teaching Assistant, Department of Information Technology, Anna University Regional

More information

Privacy Preserving Public Auditing for Data in Cloud Storage

Privacy Preserving Public Auditing for Data in Cloud Storage Privacy Preserving Public Auditing for Data in Cloud Storage M.Priya 1, E. Anitha 2, V.Murugalakshmi 3 M.E, Department of CSE, Karpagam University, Coimbatore, Tamilnadu, India 1, 3 M.E, Department of

More information

Improving data integrity on cloud storage services

Improving data integrity on cloud storage services International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services

More information

SECURITY ARCHITECTURE FOR MOBILE CLOUD COMPUTING

SECURITY ARCHITECTURE FOR MOBILE CLOUD COMPUTING SECURITY ARCHITECTURE FOR MOBILE CLOUD COMPUTING Ali Newaz Bahar 1*, Md. Ahsan Habib 2, Md. Manowarul Islam 3 1, 2, 3 Department of Information and Communication Technology, Mawlana Bhashani Science and

More information

Security Considerations for Public Mobile Cloud Computing

Security Considerations for Public Mobile Cloud Computing Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea rdcaytiles@gmail.com 2 Research Institute of

More information

1 st Symposium on Colossal Data and Networking (CDAN-2016) March 18-19, 2016 Medicaps Group of Institutions, Indore, India

1 st Symposium on Colossal Data and Networking (CDAN-2016) March 18-19, 2016 Medicaps Group of Institutions, Indore, India 1 st Symposium on Colossal Data and Networking (CDAN-2016) March 18-19, 2016 Medicaps Group of Institutions, Indore, India Call for Papers Colossal Data Analysis and Networking has emerged as a de facto

More information

International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015 36 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015 36 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015 36 An Efficient Approach for Load Balancing in Cloud Environment Balasundaram Ananthakrishnan Abstract Cloud computing

More information

Cloud-Assisted Mobile-Access of Health Data With Privacy and Audit Ability

Cloud-Assisted Mobile-Access of Health Data With Privacy and Audit Ability Cloud-Assisted Mobile-Access of Health Data With Privacy and Audit Ability Nallabothula Aruna M.Tech Student, Department of CSE, KLR College of Engineering and Technology. R.Adinarayana Assistant Professor,

More information

A survey on cost effective multi-cloud storage in cloud computing

A survey on cost effective multi-cloud storage in cloud computing A survey on cost effective multi-cloud storage in cloud computing Nitesh Shrivastava, Ganesh Kumar Abstract As novel storage model, cloud storage has gain attentions from both the academics and industrial

More information

Reverse Auction-based Resource Allocation Policy for Service Broker in Hybrid Cloud Environment

Reverse Auction-based Resource Allocation Policy for Service Broker in Hybrid Cloud Environment Reverse Auction-based Resource Allocation Policy for Service Broker in Hybrid Cloud Environment Sunghwan Moon, Jaekwon Kim, Taeyoung Kim, Jongsik Lee Department of Computer and Information Engineering,

More information

Privacy-preserving Ranked Multi-Keyword Search Leveraging Polynomial Function in Cloud Computing

Privacy-preserving Ranked Multi-Keyword Search Leveraging Polynomial Function in Cloud Computing Privacy-preserving Ranked Multi-Keyword Search Leveraging Polynomial Function in Cloud Computing Yanzhi Ren, Yingying Chen, Jie Yang, Bin Xie 3 Department of ECE, Stevens Institute of Technology, Hoboken,

More information

Role Based Encryption with Efficient Access Control in Cloud Storage

Role Based Encryption with Efficient Access Control in Cloud Storage Role Based Encryption with Efficient Access Control in Cloud Storage G. V. Bandewar 1, R. H. Borhade 2 1 Department of Information Technology, Sinhgad Technical Education Society s SKNCOE, Pune, India

More information

An Approach to Load Balancing In Cloud Computing

An Approach to Load Balancing In Cloud Computing An Approach to Load Balancing In Cloud Computing Radha Ramani Malladi Visiting Faculty, Martins Academy, Bangalore, India ABSTRACT: Cloud computing is a structured model that defines computing services,

More information

Mobile Image Offloading Using Cloud Computing

Mobile Image Offloading Using Cloud Computing Mobile Image Offloading Using Cloud Computing Chintan Shah, Aruna Gawade Student, Dept. of Computer., D.J.Sanghvi College of Engineering, Mumbai University, Mumbai, India Assistant Professor, Dept. of

More information

Public Cloud Partition Balancing and the Game Theory

Public Cloud Partition Balancing and the Game Theory Statistics Analysis for Cloud Partitioning using Load Balancing Model in Public Cloud V. DIVYASRI 1, M.THANIGAVEL 2, T. SUJILATHA 3 1, 2 M. Tech (CSE) GKCE, SULLURPETA, INDIA v.sridivya91@gmail.com thaniga10.m@gmail.com

More information

AN EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA IN TEGRITY IN CLOUDS

AN EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA IN TEGRITY IN CLOUDS AN EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA IN TEGRITY IN CLOUDS Mrs.K.Saranya, M.E.,(CSE), Jay Shriram Group of Institutions, Tirupur. Saranya17113@gmail.com Dr.S.Rajalakshmi, Associate Professor/CSE,

More information

SECURE VARIOUS-KEYWORD STRATIFIED SEARCH THROUGH ENCRYPTED DATA IN CLOUD

SECURE VARIOUS-KEYWORD STRATIFIED SEARCH THROUGH ENCRYPTED DATA IN CLOUD SECURE VARIOUS-KEYWORD STRATIFIED SEARCH THROUGH ENCRYPTED DATA IN CLOUD 1 SK. MASTAN, 2 RADHA 1 M.Tech Student, Department of CSE, Malla Reddy College of Engineering, Dulapally(v), Medchal(m), RangaReddy(d),

More information

[Sudhagar*, 5(5): May, 2016] ISSN: 2277-9655 Impact Factor: 3.785

[Sudhagar*, 5(5): May, 2016] ISSN: 2277-9655 Impact Factor: 3.785 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY AVOID DATA MINING BASED ATTACKS IN RAIN-CLOUD D.Sudhagar * * Assistant Professor, Department of Information Technology, Jerusalem

More information

Secure Attack Measure Selection and Intrusion Detection in Virtual Cloud Networks. Karnataka. www.ijreat.org

Secure Attack Measure Selection and Intrusion Detection in Virtual Cloud Networks. Karnataka. www.ijreat.org Secure Attack Measure Selection and Intrusion Detection in Virtual Cloud Networks Kruthika S G 1, VenkataRavana Nayak 2, Sunanda Allur 3 1, 2, 3 Department of Computer Science, Visvesvaraya Technological

More information

IMPROVING BUSINESS PROCESS MODELING USING RECOMMENDATION METHOD

IMPROVING BUSINESS PROCESS MODELING USING RECOMMENDATION METHOD Journal homepage: www.mjret.in ISSN:2348-6953 IMPROVING BUSINESS PROCESS MODELING USING RECOMMENDATION METHOD Deepak Ramchandara Lad 1, Soumitra S. Das 2 Computer Dept. 12 Dr. D. Y. Patil School of Engineering,(Affiliated

More information

Development of enhanced Third party Auditing Scheme for Secure Cloud Storage

Development of enhanced Third party Auditing Scheme for Secure Cloud Storage Development of enhanced Third party Auditing Scheme for Secure Cloud Storage Bhanu Prakash Chamakuri*1, D. Srikar*2, Dr. M.Suresh Babu*3 M.Tech Scholar, Dept of CSE, Grandhi Varalakshmi Institute Of Technology,

More information

Secure Keyword Based Search in Cloud Computing: A Review

Secure Keyword Based Search in Cloud Computing: A Review Secure Keyword Based Search in Cloud Computing: A Review Manjeet Gupta 1,Sonia Sindhu 2 1 Assistant Professor, Department of Computer Science & Engineering,Seth Jai Prakash Mukund Lal Institute of Engineering

More information

Security issues for Cloud Computing

Security issues for Cloud Computing 274 Security issues for Cloud Computing Vikas Goyal [1], Dr. Chander Kant [2] [1] Research Scholar, [2] Assistant Professor Deptt. of Comp. Sc. & Appl., Kurukshetra University, Kurukshetra, India. vikas.goyal_85@yahoo.co.in,

More information

A Brief Analysis on Architecture and Reliability of Cloud Based Data Storage

A Brief Analysis on Architecture and Reliability of Cloud Based Data Storage Volume 2, No.4, July August 2013 International Journal of Information Systems and Computer Sciences ISSN 2319 7595 Tejaswini S L Jayanthy et al., Available International Online Journal at http://warse.org/pdfs/ijiscs03242013.pdf

More information

Cloud Database Storage Model by Using Key-as-a-Service (KaaS)

Cloud Database Storage Model by Using Key-as-a-Service (KaaS) www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 7 July 2015, Page No. 13284-13288 Cloud Database Storage Model by Using Key-as-a-Service (KaaS) J.Sivaiah

More information

Index Terms: Cloud Computing, Cloud Security, Mitigation Attack, Service Composition, Data Integrity. 1. Introduction

Index Terms: Cloud Computing, Cloud Security, Mitigation Attack, Service Composition, Data Integrity. 1. Introduction Real-Time Service Composition and Deployment for Secure Computing in Cloud Environment R. Ushadevi 1, V. Rajamani 2 1 Research Scholar, Department of Computer Applications, St. Peter s University, Chennai

More information

Privacy-Preserving Multi-Keyword Fuzzy Search over Encrypted Data in the Cloud

Privacy-Preserving Multi-Keyword Fuzzy Search over Encrypted Data in the Cloud Privacy-Preserving Multi-Keyword Fuzzy Search over Encrypted Data in the Cloud Bing Wang Shucheng Yu Wening Lou Y. Thomas Hou Virginia Polytechnic Institute and State University, Blacksburg, VA, USA University

More information

SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE

SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE International Journal of Computer Network and Security(IJCNS) Vol 7. No.1 2015 Pp. 1-8 gopalax Journals, Singapore available at : www.ijcns.com ISSN: 0975-8283 ----------------------------------------------------------------------------------------------------------------------------------------------------------

More information

Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage

Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage P. Selvigrija, Assistant Professor, Department of Computer Science & Engineering, Christ College

More information

A Load Balancing Model Based on Cloud Partitioning for the Public Cloud

A Load Balancing Model Based on Cloud Partitioning for the Public Cloud International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 16 (2014), pp. 1605-1610 International Research Publications House http://www. irphouse.com A Load Balancing

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 Load Balancing Heterogeneous Request in DHT-based P2P Systems Mrs. Yogita A. Dalvi Dr. R. Shankar Mr. Atesh

More information

A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA

A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA Mr.Mahesh S.Giri Department of Computer Science & Engineering Technocrats Institute of Technology Bhopal, India

More information

Sla Aware Load Balancing Algorithm Using Join-Idle Queue for Virtual Machines in Cloud Computing

Sla Aware Load Balancing Algorithm Using Join-Idle Queue for Virtual Machines in Cloud Computing Sla Aware Load Balancing Using Join-Idle Queue for Virtual Machines in Cloud Computing Mehak Choudhary M.Tech Student [CSE], Dept. of CSE, SKIET, Kurukshetra University, Haryana, India ABSTRACT: Cloud

More information

A Security Integrated Data Storage Model for Cloud Environment

A Security Integrated Data Storage Model for Cloud Environment Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 8, August 2014,

More information

Profile Based Personalized Web Search and Download Blocker

Profile Based Personalized Web Search and Download Blocker Profile Based Personalized Web Search and Download Blocker 1 K.Sheeba, 2 G.Kalaiarasi Dhanalakshmi Srinivasan College of Engineering and Technology, Mamallapuram, Chennai, Tamil nadu, India Email: 1 sheebaoec@gmail.com,

More information

Implementation of Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage

Implementation of Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage Implementation of Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage 1 A. MsVaishali Patil, 2 B. Prof. Archana Lomte Dept of Computer,BSIOTR, Pune ABSTRACT Cloud computing is speculated

More information

Loss Less and Privacy Preserved Data Retrieval in Cloud Environment using TRSE

Loss Less and Privacy Preserved Data Retrieval in Cloud Environment using TRSE I.J. Wireless and Microwave Technologies, 2015, 6, 19-25 Published Online November 2015 in MECS(http://www.mecs-press.net) DOI: 10.5815/ijwmt.2015.06.03 Available online at http://www.mecs-press.net/ijwmt

More information

AN ENHANCED ATTRIBUTE BASED ENCRYPTION WITH MULTI PARTIES ACCESS IN CLOUD AREA

AN ENHANCED ATTRIBUTE BASED ENCRYPTION WITH MULTI PARTIES ACCESS IN CLOUD AREA Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,

More information

Resource Selection in Collaborative Cloud Computing Based on User Preference

Resource Selection in Collaborative Cloud Computing Based on User Preference Resource Selection in Collaborative Cloud Computing Based on User Preference W.Renuka Devi 1, K.Sudhakar 2 P.G Student. Department of Computer Engineering, GPREC Engineering College, Kurnool, Andhra Pradesh,

More information

Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud

Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud M.Jayanthi, Assistant Professor, Hod of MCA.E mail: badini_jayanthi@yahoo.co.in MahatmaGandhi University,Nalgonda, INDIA. B.Ranganatha

More information

International journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online http://www.ijoer.

International journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online http://www.ijoer. RESEARCH ARTICLE ISSN: 2321-7758 GLOBAL LOAD DISTRIBUTION USING SKIP GRAPH, BATON AND CHORD J.K.JEEVITHA, B.KARTHIKA* Information Technology,PSNA College of Engineering & Technology, Dindigul, India Article

More information

International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 Software as a Model for Security in Cloud over Virtual Environments S.Vengadesan, B.Muthulakshmi PG Student,

More information

Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage

Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage Pranita Bakka 1, Dr. Jayashree Agarkhed 2 1 P.G.Student, Department of Computer Science & Engineering,

More information

Using Peer to Peer Dynamic Querying in Grid Information Services

Using Peer to Peer Dynamic Querying in Grid Information Services Using Peer to Peer Dynamic Querying in Grid Information Services Domenico Talia and Paolo Trunfio DEIS University of Calabria HPC 2008 July 2, 2008 Cetraro, Italy Using P2P for Large scale Grid Information

More information

Implementing Efficient Monitoring And Data Dynamics For Data Storage Security in Cloud Computing

Implementing Efficient Monitoring And Data Dynamics For Data Storage Security in Cloud Computing Implementing Efficient Monitoring And Data Dynamics For Data Storage Security in Cloud Computing 1 Pavithra S., 1 Assistant Professor, Vel Tech Multitech Dr.RR & Dr. SR Engg College E-mail: pavi_eye@yahoo.co.in

More information

Cloud Information Accountability Framework for Auditing the Data Usage in Cloud Environment

Cloud Information Accountability Framework for Auditing the Data Usage in Cloud Environment International Journal of Computational Engineering Research Vol, 03 Issue, 11 Cloud Information Accountability Framework for Auditing the Data Usage in Cloud Environment D.Dhivya 1, S.CHINNADURAI 2 1,M.E.(Cse),

More information

3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India

3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India 3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India Call for Papers Cloud computing has emerged as a de facto computing

More information

How To Make A Secure Storage On A Mobile Device Secure

How To Make A Secure Storage On A Mobile Device Secure Outsourcing with secure accessibility in mobile cloud computing Monika Waghmare 1, Prof T.A.Chavan 2 Department of Information technology, Smt.Kashibai Navale College of Engineering, Pune, India. Abstract

More information

REVIEW OF SECURITY AND PRIVACY ISSUES IN CLOUD STORAGE SYSTEM

REVIEW OF SECURITY AND PRIVACY ISSUES IN CLOUD STORAGE SYSTEM International Journal of Computer Science and Engineering (IJCSE) ISSN(P): 2278-9960; ISSN(E): 2278-9979 Vol. 2, Issue 5, Nov 2013, 55-60 IASET REVIEW OF SECURITY AND PRIVACY ISSUES IN CLOUD STORAGE SYSTEM

More information

Cloud Data Storage Services Considering Public Audit for Security

Cloud Data Storage Services Considering Public Audit for Security Global Journal of Computer Science and Technology Cloud and Distributed Volume 13 Issue 1 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

A COMPARATIVE STUDY OF SECURE SEARCH PROTOCOLS IN PAY- AS-YOU-GO CLOUDS

A COMPARATIVE STUDY OF SECURE SEARCH PROTOCOLS IN PAY- AS-YOU-GO CLOUDS A COMPARATIVE STUDY OF SECURE SEARCH PROTOCOLS IN PAY- AS-YOU-GO CLOUDS V. Anand 1, Ahmed Abdul Moiz Qyser 2 1 Muffakham Jah College of Engineering and Technology, Hyderabad, India 2 Muffakham Jah College

More information