Enhanced Algorithm for Efficient Retrieval of Data from a Secure Cloud
|
|
- Dorothy Parrish
- 8 years ago
- Views:
Transcription
1 OPEN JOURNAL OF MOBILE COMPUTING AND CLOUD COMPUTING Volume 1, Number 2, November 2014 OPEN JOURNAL OF MOBILE COMPUTING AND CLOUD COMPUTING Enhanced Algorithm for Efficient Retrieval of Data from a Secure Cloud NISHA T. M. 1*, LIJO V. P. 2 1 Information Technology Department, MES College of Engineering, Kuttippuram, Malappuram, India. 2 Computer Science & Engineering, MES College of Engineering, Kuttippuram, Malappuram, India. *Corresponding author: nishunni@gmail.com Abstract: In this technical era of computing, one of the most important words used is Cloud Computing. It is growing day by day due to its rich features of services. Cloud computing uses internet and central remote servers to maintain data and applications. The data in the cloud are stored in off premises as encrypted form. One of the most popular ways is selectively retrieve files through keyword-based search instead of retrieving all the encrypted files back. There are so many challenges in cloud computing. One of the main challenges is to increase the efficiency of data retrieval and searching. There are several keyword search mechanisms for data retrieval. Currently many researches are focusing on the fuzzy keyword search, which searches and retrieves the data in most secure and privacy preserving manner. The existing system uses single fuzzy keyword search mechanism, which struggling with inefficiency of search and that may be overloaded with resultant files of irrelevant data. In the proposed system a conjunctive keyword search is introducing so that more efficient and relevant data files can be retrieved. The conjunctive keyword search automatically generate a ranked result so that the searching relevancy and efficiency will be improved. This will reduce the searching time and improve the efficiency by reducing time for index generation. Keywords: Cloud Computing; Fuzzy Keyword; Trie-tree; Advanced Trie-tree;Conjunctive Keyword; Encryption 1. INTRODUCTION In the 1960s, J.C.R.Licklider introduced the term intergalactic computer network [1] at the Advanced Research Projects Agency, introduced the most important concept Internet. The term Cloud originates from the telecommunications world of 1990s. It is the collection of servers, where all the applications or data are stored. All the servers are not installed in same location. They are distributed geographically desperate locations. It provides a scalable service delivery platform. Resources are being shared at various levels and they offer different services. The main modes of services are Software as a service (SaaS), Platform as a service (PaaS), and Infrastructure as a service (IaaS). There are so many security issues. The main security issues arise in data storage, data retrieval, searching etc. There are so many issues in storing the data securely in the cloud because most of the 50
2 Enhanced Algorithm for Efficient Retrieval of Data from a Secure Cloud sensitive information is centralized in to clouds. Examples are personal health records, different types of medicines, government documents, private videos and photos, company finance data etc. But the most important aspect arises in data retrieval part. The data owner stores their data in the cloud and any authorized person can access those files. If an unauthorized person enters, on retrieval they can do modification, insertion and deletion in the original files and can store back in clouds. Here the original data can be interrupted, which may cause security problems. So these sensitive data are encrypted before outsourcing. One of the most popular ways or techniques is to selectively retrieve files through keyword-based search instead of retrieving all the encrypted files back. The data encryption also demands the protection of keyword privacy since keywords usually contain important information related to the data files. The existing searchable encryption techniques do not suit for cloud computing scenario because they support only exact keyword search. This significant drawback of existing schemes signifies the important need for new techniques that support searching edibility, tolerating both minor typos and format inconsistencies. A secure fuzzy search [2] capability is demanded for achieving enhanced system usability in cloud computing. The main problem is how efficiently searching the data and retrieves the results in most secure and privacy preserving manner. So it is clear that one of the main challenges in cloud computing is the data retrieval and searching. For retrieving the data in a most secure and privacy preserving manner the keyword searching technique is used. To search the data in more efficient manner, the fuzzy keyword search is introduced. When the files are retrieved in an efficient manner, most relevant data can be retrieved. That is the fuzzy keyword search will provide a privacy preserving keyword search mechanism. In the existing system it is mainly focusing on the fuzzy keyword search method. The data that is outsourced is encrypted, constructs fuzzy sets based on both wild card technique and gram based technique, and has introduced a symbol-based trie-traverse search scheme, where a multi-way tree has constructed for storing the fuzzy keyword set and finally retrieving the data. All fuzzy words in the trie tree can be found by a depth first search. 2. RELATED WORKS The main challenge in cloud computing is its security. Security in data storage, efficient data retrieval from the centralized cloud storage, relevant data retrieval by keyword searching, etc. The security in searching is important because, each keyword should contain the meaning of the underlying information. So the keyword search should retrieve the most relevant data in an efficient manner. As cloud computing is in its growing stage, so many researches are going on in this area. D. Boneh, proposed a method [3], which deals with the problem of searching data that is encrypted using a public key system. The mechanism is known as Public Key Encryption with keyword Search. S. Ji, proposed a new computing paradigm, called interactive, fuzzy search [4]. It has two unique features such as Interactive and Fuzzy. It gives the idea about the queries with a single keyword, and presents an incremental algorithm for computing keyword prefixes [4]. It also gives an idea about various techniques for computing the intersection of the inverted lists of query keywords. J. Li, proposed another fuzzy keyword search method which includes Wild card [2] based method and Gram based [2] method for constructing fuzzy keyword sets, a symbol-based trie-traverse search scheme where a multi-way tree was constructed for storing the fuzzy keyword set and finally retrieving the data. This greatly reduces the storage and representation overheads. It also exploits Edit distance [2] to quantify keywords similarity, to build storage-efficient fuzzy keyword sets to facilitate the searching process. In order to enrich the search functionalities, introducing a conjunctive [5, 6] fuzzy keyword search over encrypted data. Conjunctive keyword search returns all-or-nothing, which means it only returns those 51
3 OPEN JOURNAL OF MOBILE COMPUTING AND CLOUD COMPUTING Figure 1. Architecture of Fuzzy Keyword Search documents in which all the keywords specified by the search query appear. In the previous work [7] it is proposed the conjunction of fuzzy keyword search mechanism. Here it is introducing a new algorithm for this conjunction of fuzzy keyword search and it increases the efficiency and reduces the complexity. 3. SEARCH AND RETRIEVAL BY CONJUNCTION OF FUZZY KEYWORDS 3.1 Single Fuzzy Keyword Search The existing fuzzy keyword search using single fuzzy keyword is described here. A cloud data system consisting of data owner, data user and cloud server. The architecture of fuzzy keyword search [2] is shown in the Figure 1. The working principle of fuzzy keyword search [2, 8] is given here. Initially given n encrypted data, C = (F 1,F 2,...,F n ) which is stored in the cloud server. Along with that an encrypted predefined set of distinct keywords W = {w 1,w 2,...,w p }are also stored in the cloud server. Cloud server provides the authorization to the users who want to access the encrypted files. Only the authorized person can access the stored data. The authorized user types the request that they want to search. The cloud server maps the request to the data files, which is indexed by a file ID and is linked to a set of keywords. The execution of fuzzy keyword search returns these set of file IDs whose corresponding data files possibly contain the word w, denoted as FID w, if w = w i 2 W, then return FID wi. Fuzzy keyword search will return the results by keeping the following two rules. 1. If the user s searching input exactly matches the predefined keyword, then the server is expected to return the files containing that keyword. 2. If there is no exact match or some inconstancies in the searching input, the server will return the closest possible results based on pre-defined similarity semantics. 52
4 Enhanced Algorithm for Efficient Retrieval of Data from a Secure Cloud 3.2 Fuzzy Keyword Set Construction In single fuzzy keyword search method, different keyword set construction mechanisms is discussed. From that it is cleared that wildcard method is the best keyword set construction method in the security aspect. So in the current method we are using wildcard method for fuzzy keyword set construction. So it will generate all the variants of the given keyword. When an encrypted file is outsourcing in to the cloud server, fuzzy set for all the keywords in the file should be generated by wild card method and stored in the cloud server. An authorized user wants to search for a conjunction of request (AND, OR, NOT, BOTH), its fuzzy set also want to generate by the same wild card technique. 3.3 Efficiency of Data Retrieval In the proposed work, the data owner stores the conjunction of keywords and their fuzzy set in the advanced trie-tree data structure. Here the Conjunction of keywords can be stored in the same advanced trie-tree. This is because the fuzzy set s offsets for each keyword with different edit distance (d = 1; d = 2...) can store in the fuzzy pointers. (FUZZY 1; FUZZY 2... ) in the same data structure. In the same method the user can also generate the search request. In general for a keyword of average length m, the number of variants constructed are 2* m So for conjunction of keywords having n number of keywords n (2 * m ) variants are constructed. For gram based method for the key word SIMPLE with the pre-set edit distance 1, the total number of variants constructed is m + 1. So for conjunction of keywords having n number of keywords n (m + 1) variants are constructed. The complexity of searching will reduce from O (mˆ2*n) in to O (m* n). The space complexity is reduced from O (mˆ2* n* p) in to O (m* n* p). So the search complexity is O (m)*o (n). That is the order is reduced from O (mˆ2* n) in to O (m*n). One m is eliminated due to the fuzzy pointer in the advanced trie-tree (Fuzzy set list). The space complexity is O (m* n* p). The space complexity is O (mˆ2*n *p) in to O (m* n* p). So the search complexity is O (m) *O (n). That is the order is reduced from O (mˆ2* n) in to O (m* n). One m is eliminated due to the fuzzy pointer in the advanced trie-tree (Fuzzy set list). The space complexity is O (m* n* p). The space complexity is also reduced. 3.4 Implementation When a single keyword and its fuzzy set is wanted to insert in the advanced trie- tree, the main processes are: Insertion 1. Initially each character in the given keyword is added in to the node. 2. The exact index field is is set to -1 until reaches at the end of the word. 3. When the word s end is reached, the exact index field stores the offset of the file where the word is stored or stores the file ID (FID). 4. The fuzzy pointer will stores the offsets of the fuzzy keywords set. Each fuzzy pointer can store the fuzzy set with different edit distance. 5. Then the next word reads and the process goes on until all the keyword sets are inserted in the trie-tree. The node defined in an advanced trie tree typdef struct TrieNode 53
5 OPEN JOURNAL OF MOBILE COMPUTING AND CLOUD COMPUTING Figure 2. Example for Keyword Set Construction { char data; //for storing character struct TrieNode*child[26] ; int exactindex; pfuzzynode head; }TrieNode; *ptrienode; Searching The searching is carried out in a depth First search manner. The algorithm for conjunction of keyword search is given in the Algorithm 1. Example An example is shown in Figure 2. Suppose a small file calls FILE, that want to store in the cloud server by the data owner contains the following keywords, and file ID FID DATA, OS, BASE, MOBILE, DESIGN, MATHS, GRAPH, MINING, MODEL. These keywords are stored in the advanced trie-tree data structure. For each keyword contains an exact index and fuzzy pointers. The fuzzy pointer FUZZY1 contains the offsets of the fuzzy set generated by applying wild card method with edit distance 1. FUZZY2 contains the offsets of fuzzy set generated by wildcard method with edit distance 2. Exact field contains the FID of corresponding file. Now the user search for a conjunction of search request that is the input query. DATA AND BASE AND DESIGN NOT MINING The searching request is shown in the Figure 3. The first keyword DATA is searched in advanced trietree by using its hash value and then its fuzzy set is also searched. After that it checks for the conjunction keyword. If it is AND, checking the next keyword BASE and so on. If it is the conjunction keyword NOT neglects the next keyword MINING. 54
6 Enhanced Algorithm for Efficient Retrieval of Data from a Secure Cloud Figure 3. Representation of Input Request 4. RESULTS AND DISCUSSION It contains a cloud database, which consists of almost one thousand of data files, and has an Administrator 55
7 OPEN JOURNAL OF MOBILE COMPUTING AND CLOUD COMPUTING (owner) and user. The administrator can add, view and delete the data. When a data or file is added it should be encrypted and stored in the database that is the data entered will be stored as encrypted files. AES encryption algorithm is used for encryption. The administrator can also view the encrypted data and delete the data. This encryption provides the security of the stored data. When a user wants to access the data by keyword search mechanism, first he wants to get the authorization. That is the authorized person can only retrieve the data. The authorization is provided by a key which is randomly generated. That key is unique for each user. The user should remember this key throughout the searching process. The user can enter the key words which is the conjunction of single keywords. That is AND, OR, BOTH and he get a search result which is very efficient and also in a ranked order. The efficiency is increased by introducing an advanced trie-tree data structure instead of normal trie-tree data structure. That is for normal trie-tree method, for each single keyword request, the search cost only O(m) at the server side, where m is the length of hash value. That is for each character a hash value is calculated. By using this hash value it is directly find the next character. In order to pointing in to the child node each 56
8 Enhanced Algorithm for Efficient Retrieval of Data from a Secure Cloud hash value is added with key value, which is specifically defined for each levels in the advanced trie-tree. Space complexity is of O (m* s), s is the width of the tree. So by introducing conjunction of keyword in normal trie-tree data structure, for n conjunction of keywords having average keyword length l keeping the edit distance 1 is of O (l*n)* O(m). That is O (l * m * n). Space complexity is O (l * m * n * s). Here each fuzzy set is storing separately in the normal trie-tree. So conjunction of keyword will produce the combination of different small normal trie-tree joint together by the root nodes containing AND, OR, NOT etc: But our proposed work the storage complexity and searching complexity is reduced. Which is of the order of O (m* n * s) and O(m) * O(n) respectively. The relevancy is improved by introducing the ranking method. A ranking rules performance should be based on the total ranking it imposes on the collection with respect to the query. The two important measures of effectiveness for retrieving the data are Recall and Precision. The most common way to describe retrieval performance is to calculate how many of the relevant documents have been retrieved and how early in the ranking they were listed. The Precision Pr of a ranking method for some cutoff point r is the fraction of the top r ranked documents that are relevant to the query. Pr = (Number retrieved that are relevant) / (Total number retrieved) The recall Rr of a method at some value are r is the proportion of the total number of relevant documents that were retrieved in the top r. Rr = (Number relevant that are retrieved) / (Total number relevant) Suppose the searching query contains n keywords, from this m keywords are available in the file, where m * n, that is n m 0. Then the ranking ratio h = m/n, where 0 0 apple h apple 1. If the value of h = 1, that means the searching result contains all the keywords in the input query. This file will come first in the search result. The search result will display the files according to the decreasing order of the ranking ratio. Figure 4. Relevancy of Data (h = m/n) Suppose a searching query contains the sequence of 10 keywords. If all the searching keywords contain in the file, that is m = n, then the value of h = 1. The file with highest ranking ratio comes first in the search result. A graphical representation is given in the Figure 4. Where the straight line represents the value h =1. The curve represents the value of h < 1, that is 0 apple h < 1. C. Wang, in his paper Secure ranked key word search over encrypted cloud data, analytically proved that if the ranking ratio is greater than 0.6, the data will be relevant. As the value increases above 0.6 the relevancy also increases. 57
9 OPEN JOURNAL OF MOBILE COMPUTING AND CLOUD COMPUTING 5. CONCLUSIONS Searching and retrieving the relevant data from the cloud is one of the main challenges in the cloud computing scenario. Privacy-preserving fuzzy search is the search technique for achieving effective utilization of remotely stored encrypted data in Cloud Computing. Here it is introduced an enhanced algorithm for searching and retrieving the data by conjunction/sequence of fuzzy-keyword search. Conjunction of keywords automatically generates ranking according to the relevancy of the retrieved files. It is ensured that the proposed system retrieves highly relevant data by more efficient search, without compromising privacy and security. References [1] L. M. Kaufman, Data Security in the World of Cloud Computing, IEEE Security and Privacy, vol. 7, no. 4, pp , [2] J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou, Fuzzy keyword search over encrypted data in cloud computing, in INFOCOM10 Mini- Conference, 2010 Proceedings IEEE, pp. 1 5, IEEE, [3] D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano, Public key encryption with keyword search, in Proc. of EUROCRYP04, [4] S. Ji, G. Li, C. Li, and J. Feng, Efficient interactive fuzzy keyword search, in Proceedings of the 18th International Conference on World Wide Web, pp , ACM, [5] P. Golle, J. Staddon, and B. Waters, Secure Conjunctive Keyword Search Over Encrypted Data, in Applied Cryptography and Network Security, pp , Springer, [6] L. Ballard, S. Kamara, and F. Monrose, Achieving efficient conjunctive keyword searches over encrypted data, in Information and Communications Security, pp , Springer, [7] T. Nisha and V. Lijo, Improving the Efficiency of Data Retrieval in Secure Cloud, International Journal of Computer Applications, vol. ICACT Nov , [8] S. Ji, G. Li, C. Li, and J. Feng, Efficient interactive fuzzy keyword search, in Proceedings of the 18th International Conference on World Wide Web, pp , ACM,
10 About This Journal MCCC is an open access journal published by Scientific Online Publishing. This journal focus on the following scopes (but not limited to): Autonomic Business Process and Workflow Management in Clouds Cloud Composition, Federation, Bridging and Bursting Cloud Computing Consulting Cloud Configuration, Performance and Capacity Management Cloud DevOps Cloud Game Design Cloud Migration Cloud Programming Models and Paradigms Cloud Provisioning Orchestration Cloud Quality Management and Service Level Agreement (SLA) Cloud Resource Virtualization and Composition Cloud Software Patch and License Management Cloud Workload Profiling and Deployment Control Cloud Video and Audio Applications Economic, Business and ROI Models for Cloud Computing Green Cloud Computing High Performance Cloud Computing Infrastructure, Platform, Application, Business, Social and Mobile Clouds Innovative Cloud Applications and Experiences Security, Privacy and Compliance Management for Public, Private and Hybrid Clouds Self-service Cloud Portal, Dashboard and Analytics Storage, Data and Analytics Clouds Welcome to submit your original manuscripts to us. For more information, please visit our website: You can click the bellows to follow us: Facebook: Twitter: LinkedIn: Google+:
11 SOP welcomes authors to contribute their research outcomes under the following rules: Although glad to publish all original and new research achievements, SOP can t bear any misbehavior: plagiarism, forgery or manipulation of experimental data. As an international publisher, SOP highly values different cultures and adopts cautious attitude towards religion, politics, race, war and ethics. SOP helps to propagate scientific results but shares no responsibility of any legal risks or harmful effects caused by article along with the authors. SOP maintains the strictest peer review, but holds a neutral attitude for all the published articles. SOP is an open platform, waiting for senior experts serving on the editorial boards to advance the progress of research together.
An Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud
, pp.246-252 http://dx.doi.org/10.14257/astl.2014.49.45 An Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud Jiangang Shu ab Xingming Sun ab Lu Zhou ab Jin Wang ab
More informationA NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA
A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA U.Pandi Priya 1, R.Padma Priya 2 1 Research Scholar, Department of Computer Science and Information Technology,
More informationRanked Search over Encrypted Cloud Data using Multiple Keywords
Ranked Search over Encrypted Cloud Data using Multiple Keywords [1] Nita Elizabeth Samuel, [2] Revathi B. R, [3] Sangeetha.M, [4] SreelekshmySelvin, [5] Dileep.V.K [1][2][3][4] LBS Institute of Technology
More informationFuzzy Keyword Search over Encrypted Data using Symbol-Based Trie-traverse Search Scheme in Cloud Computing
Fuzzy Keyword Search over Encrypted Data using Symbol-Based Trie-traverse Search Scheme in Cloud Computing P. Naga Aswani, K. Chandra Shekar M. Tech Student, Associate Professor, CSE Dept. puduru.aswani@gmail.com,chandhra2k7@gmail.com
More informationSecurity over Cloud Data through Encryption Standards
Security over Cloud Data through Encryption Standards Santhi Baskaran 1, Surya A 2, Stephen Pius C 3, Sudesh Goud G 4 1 Professor, 2,3,4 Student, Department of Information Technology, Pondicherry Engineering
More informationAn Efficient Multi-Keyword Ranked Secure Search On Crypto Drive With Privacy Retaining
An Efficient Multi-Keyword Ranked Secure Search On Crypto Drive With Privacy Retaining 1 B.Sahaya Emelda and 2 Mrs. P. Maria Jesi M.E.,Ph.D., 1 PG Student and 2 Associate Professor, Department of Computer
More informationEnabling Public Accountability and Data Sharing for Storage Security in Cloud Computing
VOLUME 1, NUMBER 1, JUNE 2014 OPEN JOURNAL OF INFORMATION SECURITY AND APPLICATIONS Enabling Public Accountability and Data Sharing for Storage Security in Cloud Computing K. Mohammed Aaqib Ameen, A. Anny
More informationKey Laboratory of Computer Networks and Information Security Xidian University, Xi an, P.R. China e-mail: xfchen@xidian.edu.cn
Computing and Informatics, Vol. 32, 2013, 723 738 EFFICIENT MULTI-USER KEYWORD SEARCH OVER ENCRYPTED DATA IN CLOUD COMPUTING Jin Li Department of Computer Science, Guangzhou University Guangzhou, P.R.
More informationProviding Data Protection as a Service in Cloud Computing
International Journal of Scientific and Research Publications, Volume 3, Issue 6, June 2013 1 Providing Data Protection as a Service in Cloud Computing Sunumol Cherian *, Kavitha Murukezhan ** * Department
More informationRanked Keyword Search Using RSE over Outsourced Cloud Data
Ranked Keyword Search Using RSE over Outsourced Cloud Data Payal Akriti 1, Ms. Preetha Mary Ann 2, D.Sarvanan 3 1 Final Year MCA, Sathyabama University, Tamilnadu, India 2&3 Assistant Professor, Sathyabama
More informationAssuring Integrity in Privacy Preserving Multikeyword Ranked Search over Encrypted Cloud Data
Assuring Integrity in Privacy Preserving Multikeyword Ranked Search over Encrypted Cloud Data CH. Keerthi prathyusha Department of Computer Science and Engineering, JNTUA College of Engineering, Anantapuramu,
More informationSecure and Efficient Data Retrieval Process based on Hilbert Space Filling Curve
Secure and Efficient Data Retrieval Process based on Hilbert Space Filling Curve N.S. Jeya karthikka PG Scholar Sri Ramakrishna Engg Collg S.Bhaggiaraj Assistant Professor Sri Ramakrishna Engg Collg V.Sumathy
More informationData Security Issues in Cloud Computing
OPEN JOURNAL OF MOBILE COMPUTING AND CLOUD COMPUTING Volume 1, Number 1, August 2014 OPEN JOURNAL OF MOBILE COMPUTING AND CLOUD COMPUTING Data Security Issues in Cloud Computing Neha Rawat*, Ratnesh Srivastava,
More informationSecure semantic based search over cloud
Volume: 2, Issue: 5, 162-167 May 2015 www.allsubjectjournal.com e-issn: 2349-4182 p-issn: 2349-5979 Impact Factor: 3.762 Sarulatha.M PG Scholar, Dept of CSE Sri Krishna College of Technology Coimbatore,
More informationSECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD
Volume 1, Issue 7, PP:, JAN JUL 2015. SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD B ANNAPURNA 1*, G RAVI 2*, 1. II-M.Tech Student, MRCET 2. Assoc. Prof, Dept.
More information15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM
RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM Dhanashri Bamane Vinayak Pottigar Subhash Pingale Department of Computer Science and Engineering SKN
More informationNear Sheltered and Loyal storage Space Navigating in Cloud
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 8 (August. 2013), V2 PP 01-05 Near Sheltered and Loyal storage Space Navigating in Cloud N.Venkata Krishna, M.Venkata
More informationSECURITY FOR ENCRYPTED CLOUD DATA BY USING TOP-KEY TREE TECHNOLOGIES
SECURITY FOR ENCRYPTED CLOUD DATA BY USING TOP-KEY TREE TECHNOLOGIES 1 MANJOORULLASHA SHAIK, 2 SYED.ABDULHAQ, 3 P.BABU 1 PG SCHOLAR, CSE (CN), QCET, NELLORE 2,3 ASSOCIATE PROFESSOR, CSE, QCET, NELLORE
More informationRSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES
RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES 1 MD ISMAIL Z, 2 ASHFAQUE AHAMED K. 1 PG Scholar,Department of Computer Science, C.Abdul Hakeem College Of Arts and Science,Melvisharam.
More informationSURVEY ON: CLOUD DATA RETRIEVAL FOR MULTIKEYWORD BASED ON DATA MINING TECHNOLOGY
SURVEY ON: CLOUD DATA RETRIEVAL FOR MULTIKEYWORD BASED ON DATA MINING TECHNOLOGY 1 Kavya G, 2 K.S. Rajesh 1 P.G Scholar, Dept. of Computer Science & Engineering RajaRajeswari College of Engineering, Bangalore,
More informationA Full-Text Retrieval Algorithm for Encrypted Data in Cloud Storage Applications
A Full-Text Retrieval Algorithm for Encrypted Data in Cloud Storage Applications Wei Song 1,2, Yihui Cui 2, and Zhiyong Peng 1,2(B) 1 State Key Laboratory of Software Engineering, Wuhan University, Wuhan,
More informationIMPLEMENTATION OF NETWORK SECURITY MODEL IN CLOUD COMPUTING USING ENCRYPTION TECHNIQUE
IMPLEMENTATION OF NETWORK SECURITY MODEL IN CLOUD COMPUTING USING ENCRYPTION TECHNIQUE 1 Rajesh L Gaikwad, 2 Dhananjay M Dakhane, 3 Ravindra L Pardhi M.E Student, Associate Professor, Assistant Professor,
More informationAuthentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication
Volume 4, Issue 6, June 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Three Layered
More informationEFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM Macha Arun 1, B.Ravi Kumar 2 1 M.Tech Student, Dept of CSE, Holy Mary
More informationHow To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System
REVIEW ARTICAL A Novel Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage Dumala Harisha 1, V.Gouthami 2 1 Student, Computer Science & Engineering-Department, JNTU Hyderabad India
More informationSecure Way of Storing Data in Cloud Using Third Party Auditor
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 4 (Jul. - Aug. 2013), PP 69-74 Secure Way of Storing Data in Cloud Using Third Party Auditor 1 Miss.
More informationProof of Retrivability: A Third Party Auditor Using Cloud Computing
Proof of Retrivability: A Third Party Auditor Using Cloud Computing Vijayaraghavan U 1, Madonna Arieth R 2, Geethanjali K 3 1,2 Asst. Professor, Dept of CSE, RVS College of Engineering& Technology, Pondicherry
More informationData Integrity for Secure Dynamic Cloud Storage System Using TPA
International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 7-12 International Research Publication House http://www.irphouse.com Data Integrity for Secure
More informationEfficient and Secure Dynamic Auditing Protocol for Integrity Verification In Cloud Storage
Efficient and Secure Dynamic Auditing Protocol for Integrity Verification In Cloud Storage Priyanga.R 1, Maheswari.B 2, Karthik.S 3 PG Scholar, Department of CSE, SNS College of technology, Coimbatore-35,
More informationSurvey on Efficient Information Retrieval for Ranked Query in Cost-Efficient Clouds
Survey on Efficient Information Retrieval for Ranked Query in Cost-Efficient Clouds Ms. Jyotsna T. Kumbhar 1 ME Student, Department of Computer Engineering, TSSM S, P.V.P.I.T., Bavdhan, Pune University,
More informationCryptographic Data Security over Cloud
Cryptographic Data Security over Cloud Er. Lalit Gehlod Asst.Professor, Dept.Of Computer Engineering, Institute Of Engineering & Technology, Devi Ahilya University, Indore, India. Govind Patidar Dept.
More informationEnhancing Data Security in Cloud Storage Auditing With Key Abstraction
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction 1 Priyadharshni.A, 2 Geo Jenefer.G 1 Master of engineering in computer science, Ponjesly College of Engineering 2 Assistant Professor,
More informationADVANCE SECURITY TO CLOUD DATA STORAGE
Journal homepage: www.mjret.in ADVANCE SECURITY TO CLOUD DATA STORAGE ISSN:2348-6953 Yogesh Bhapkar, Mitali Patil, Kishor Kale,Rakesh Gaikwad ISB&M, SOT, Pune, India Abstract: Cloud Computing is the next
More informationSecure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment
Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment Chih Hung Wang Computer Science and Information Engineering National Chiayi University Chiayi City 60004,
More informationKeywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption
Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer
More informationIMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD
IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD 1 Ms.Nita R. Mhaske, 2 Prof. S.M.Rokade 1 student, Master of Engineering, Dept. of Computer Engineering Sir Visvesvaraya
More informationA Review of Cloud Environment and Recognition of Highly Secure Public Data Verification Architecture using Secure Public Verifier Auditor
I J C International Journal of lectrical, lectronics ISSN No. (Online): 2277-2626 and Computer ngineering 3(2): 144-148(2014) A Review of Cloud nvironment and Recognition of Highly Secure Public Data Verification
More informationISSN 2278-3091. Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability
Outsourcing and Discovering Storage Inconsistencies in Cloud Through TPA Sumathi Karanam 1, GL Varaprasad 2 Student, Department of CSE, QIS College of Engineering and Technology, Ongole, AndhraPradesh,India
More informationKeywords Distributed Computing, On Demand Resources, Cloud Computing, Virtualization, Server Consolidation, Load Balancing
Volume 5, Issue 1, January 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Survey on Load
More informationSharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment
Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment Deepa Noorandevarmath 1, Rameshkumar H.K 2, C M Parameshwarappa 3 1 PG Student, Dept of CS&E, STJIT, Ranebennur. Karnataka, India
More informationEmail: shravankumar.elguri@gmail.com. 2 Prof, Dept of CSE, Institute of Aeronautical Engineering, Hyderabad, Andhrapradesh, India,
www.semargroup.org, www.ijsetr.com ISSN 2319-8885 Vol.03,Issue.06, May-2014, Pages:0963-0968 Improving Efficiency of Public Cloud Using Load Balancing Model SHRAVAN KUMAR 1, DR. N. CHANDRA SEKHAR REDDY
More informationFacilitating Efficient Encrypted Document Storage and Retrieval in a Cloud Framework
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 5, Ver. IV (Sep Oct. 2014), PP 18-24 Facilitating Efficient Encrypted Document Storage and Retrieval
More informationHow To Create A Multi-Keyword Ranked Search Over Encrypted Cloud Data (Mrse)
JJT-029-2015 SEARCHABLE SYMMETRIC ENCRYPTION METHOD FOR ENCRYPTED DATA IN CLOUD P.Vidyasagar, R.Karthikeyan, Dr.C.Nalini M.Tech Student, Dept of CSE,Bharath University, Email.Id: vsagarp@rediffmail.com
More informationFuzzy Keyword Search over Encrypted Stego in Cloud
International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-02 E-ISSN: 2347-2693 Fuzzy Keyword Search over Encrypted Stego in Cloud TanmayDahake 1*, MirsohailShaikh
More informationData management using Virtualization in Cloud Computing
Data management using Virtualization in Cloud Computing A.S.R. Krishna Kanth M.Tech (CST), Department of Computer Science & Systems Engineering, Andhra University, India. M.Sitha Ram Research Scholar Department
More informationA study on keyword searchable frameworks for efficient data utilization in cloud storage
A study on able frameworks for efficient data utilization in cloud storage Bhagyashree M V 1, Pushpalatha M N 2 1 Student, Dept. of ISE, M S Ramaiah institute of technology, Karnataka, India 2Asst. professor,
More informationInternational Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 12, December 2014 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
More informationVerifying Correctness of Trusted data in Clouds
Volume-3, Issue-6, December-2013, ISSN No.: 2250-0758 International Journal of Engineering and Management Research Available at: www.ijemr.net Page Number: 21-25 Verifying Correctness of Trusted data in
More informationSHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING
SHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING Er. Kavin M 1, Mr.J.Jayavel 2 1 PG Scholar, 2 Teaching Assistant, Department of Information Technology, Anna University Regional
More informationPrivacy Preserving Public Auditing for Data in Cloud Storage
Privacy Preserving Public Auditing for Data in Cloud Storage M.Priya 1, E. Anitha 2, V.Murugalakshmi 3 M.E, Department of CSE, Karpagam University, Coimbatore, Tamilnadu, India 1, 3 M.E, Department of
More informationImproving data integrity on cloud storage services
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services
More informationSECURITY ARCHITECTURE FOR MOBILE CLOUD COMPUTING
SECURITY ARCHITECTURE FOR MOBILE CLOUD COMPUTING Ali Newaz Bahar 1*, Md. Ahsan Habib 2, Md. Manowarul Islam 3 1, 2, 3 Department of Information and Communication Technology, Mawlana Bhashani Science and
More informationSecurity Considerations for Public Mobile Cloud Computing
Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea rdcaytiles@gmail.com 2 Research Institute of
More information1 st Symposium on Colossal Data and Networking (CDAN-2016) March 18-19, 2016 Medicaps Group of Institutions, Indore, India
1 st Symposium on Colossal Data and Networking (CDAN-2016) March 18-19, 2016 Medicaps Group of Institutions, Indore, India Call for Papers Colossal Data Analysis and Networking has emerged as a de facto
More informationInternational Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015 36 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015 36 An Efficient Approach for Load Balancing in Cloud Environment Balasundaram Ananthakrishnan Abstract Cloud computing
More informationCloud-Assisted Mobile-Access of Health Data With Privacy and Audit Ability
Cloud-Assisted Mobile-Access of Health Data With Privacy and Audit Ability Nallabothula Aruna M.Tech Student, Department of CSE, KLR College of Engineering and Technology. R.Adinarayana Assistant Professor,
More informationA survey on cost effective multi-cloud storage in cloud computing
A survey on cost effective multi-cloud storage in cloud computing Nitesh Shrivastava, Ganesh Kumar Abstract As novel storage model, cloud storage has gain attentions from both the academics and industrial
More informationReverse Auction-based Resource Allocation Policy for Service Broker in Hybrid Cloud Environment
Reverse Auction-based Resource Allocation Policy for Service Broker in Hybrid Cloud Environment Sunghwan Moon, Jaekwon Kim, Taeyoung Kim, Jongsik Lee Department of Computer and Information Engineering,
More informationPrivacy-preserving Ranked Multi-Keyword Search Leveraging Polynomial Function in Cloud Computing
Privacy-preserving Ranked Multi-Keyword Search Leveraging Polynomial Function in Cloud Computing Yanzhi Ren, Yingying Chen, Jie Yang, Bin Xie 3 Department of ECE, Stevens Institute of Technology, Hoboken,
More informationRole Based Encryption with Efficient Access Control in Cloud Storage
Role Based Encryption with Efficient Access Control in Cloud Storage G. V. Bandewar 1, R. H. Borhade 2 1 Department of Information Technology, Sinhgad Technical Education Society s SKNCOE, Pune, India
More informationAn Approach to Load Balancing In Cloud Computing
An Approach to Load Balancing In Cloud Computing Radha Ramani Malladi Visiting Faculty, Martins Academy, Bangalore, India ABSTRACT: Cloud computing is a structured model that defines computing services,
More informationMobile Image Offloading Using Cloud Computing
Mobile Image Offloading Using Cloud Computing Chintan Shah, Aruna Gawade Student, Dept. of Computer., D.J.Sanghvi College of Engineering, Mumbai University, Mumbai, India Assistant Professor, Dept. of
More informationPublic Cloud Partition Balancing and the Game Theory
Statistics Analysis for Cloud Partitioning using Load Balancing Model in Public Cloud V. DIVYASRI 1, M.THANIGAVEL 2, T. SUJILATHA 3 1, 2 M. Tech (CSE) GKCE, SULLURPETA, INDIA v.sridivya91@gmail.com thaniga10.m@gmail.com
More informationAN EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA IN TEGRITY IN CLOUDS
AN EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA IN TEGRITY IN CLOUDS Mrs.K.Saranya, M.E.,(CSE), Jay Shriram Group of Institutions, Tirupur. Saranya17113@gmail.com Dr.S.Rajalakshmi, Associate Professor/CSE,
More informationSECURE VARIOUS-KEYWORD STRATIFIED SEARCH THROUGH ENCRYPTED DATA IN CLOUD
SECURE VARIOUS-KEYWORD STRATIFIED SEARCH THROUGH ENCRYPTED DATA IN CLOUD 1 SK. MASTAN, 2 RADHA 1 M.Tech Student, Department of CSE, Malla Reddy College of Engineering, Dulapally(v), Medchal(m), RangaReddy(d),
More information[Sudhagar*, 5(5): May, 2016] ISSN: 2277-9655 Impact Factor: 3.785
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY AVOID DATA MINING BASED ATTACKS IN RAIN-CLOUD D.Sudhagar * * Assistant Professor, Department of Information Technology, Jerusalem
More informationSecure Attack Measure Selection and Intrusion Detection in Virtual Cloud Networks. Karnataka. www.ijreat.org
Secure Attack Measure Selection and Intrusion Detection in Virtual Cloud Networks Kruthika S G 1, VenkataRavana Nayak 2, Sunanda Allur 3 1, 2, 3 Department of Computer Science, Visvesvaraya Technological
More informationIMPROVING BUSINESS PROCESS MODELING USING RECOMMENDATION METHOD
Journal homepage: www.mjret.in ISSN:2348-6953 IMPROVING BUSINESS PROCESS MODELING USING RECOMMENDATION METHOD Deepak Ramchandara Lad 1, Soumitra S. Das 2 Computer Dept. 12 Dr. D. Y. Patil School of Engineering,(Affiliated
More informationDevelopment of enhanced Third party Auditing Scheme for Secure Cloud Storage
Development of enhanced Third party Auditing Scheme for Secure Cloud Storage Bhanu Prakash Chamakuri*1, D. Srikar*2, Dr. M.Suresh Babu*3 M.Tech Scholar, Dept of CSE, Grandhi Varalakshmi Institute Of Technology,
More informationSecure Keyword Based Search in Cloud Computing: A Review
Secure Keyword Based Search in Cloud Computing: A Review Manjeet Gupta 1,Sonia Sindhu 2 1 Assistant Professor, Department of Computer Science & Engineering,Seth Jai Prakash Mukund Lal Institute of Engineering
More informationSecurity issues for Cloud Computing
274 Security issues for Cloud Computing Vikas Goyal [1], Dr. Chander Kant [2] [1] Research Scholar, [2] Assistant Professor Deptt. of Comp. Sc. & Appl., Kurukshetra University, Kurukshetra, India. vikas.goyal_85@yahoo.co.in,
More informationA Brief Analysis on Architecture and Reliability of Cloud Based Data Storage
Volume 2, No.4, July August 2013 International Journal of Information Systems and Computer Sciences ISSN 2319 7595 Tejaswini S L Jayanthy et al., Available International Online Journal at http://warse.org/pdfs/ijiscs03242013.pdf
More informationCloud Database Storage Model by Using Key-as-a-Service (KaaS)
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 7 July 2015, Page No. 13284-13288 Cloud Database Storage Model by Using Key-as-a-Service (KaaS) J.Sivaiah
More informationIndex Terms: Cloud Computing, Cloud Security, Mitigation Attack, Service Composition, Data Integrity. 1. Introduction
Real-Time Service Composition and Deployment for Secure Computing in Cloud Environment R. Ushadevi 1, V. Rajamani 2 1 Research Scholar, Department of Computer Applications, St. Peter s University, Chennai
More informationPrivacy-Preserving Multi-Keyword Fuzzy Search over Encrypted Data in the Cloud
Privacy-Preserving Multi-Keyword Fuzzy Search over Encrypted Data in the Cloud Bing Wang Shucheng Yu Wening Lou Y. Thomas Hou Virginia Polytechnic Institute and State University, Blacksburg, VA, USA University
More informationSECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE
International Journal of Computer Network and Security(IJCNS) Vol 7. No.1 2015 Pp. 1-8 gopalax Journals, Singapore available at : www.ijcns.com ISSN: 0975-8283 ----------------------------------------------------------------------------------------------------------------------------------------------------------
More informationPublic Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage
Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage P. Selvigrija, Assistant Professor, Department of Computer Science & Engineering, Christ College
More informationA Load Balancing Model Based on Cloud Partitioning for the Public Cloud
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 16 (2014), pp. 1605-1610 International Research Publications House http://www. irphouse.com A Load Balancing
More informationInternational Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 Load Balancing Heterogeneous Request in DHT-based P2P Systems Mrs. Yogita A. Dalvi Dr. R. Shankar Mr. Atesh
More informationA Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA
A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA Mr.Mahesh S.Giri Department of Computer Science & Engineering Technocrats Institute of Technology Bhopal, India
More informationSla Aware Load Balancing Algorithm Using Join-Idle Queue for Virtual Machines in Cloud Computing
Sla Aware Load Balancing Using Join-Idle Queue for Virtual Machines in Cloud Computing Mehak Choudhary M.Tech Student [CSE], Dept. of CSE, SKIET, Kurukshetra University, Haryana, India ABSTRACT: Cloud
More informationA Security Integrated Data Storage Model for Cloud Environment
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 8, August 2014,
More informationProfile Based Personalized Web Search and Download Blocker
Profile Based Personalized Web Search and Download Blocker 1 K.Sheeba, 2 G.Kalaiarasi Dhanalakshmi Srinivasan College of Engineering and Technology, Mamallapuram, Chennai, Tamil nadu, India Email: 1 sheebaoec@gmail.com,
More informationImplementation of Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage
Implementation of Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage 1 A. MsVaishali Patil, 2 B. Prof. Archana Lomte Dept of Computer,BSIOTR, Pune ABSTRACT Cloud computing is speculated
More informationLoss Less and Privacy Preserved Data Retrieval in Cloud Environment using TRSE
I.J. Wireless and Microwave Technologies, 2015, 6, 19-25 Published Online November 2015 in MECS(http://www.mecs-press.net) DOI: 10.5815/ijwmt.2015.06.03 Available online at http://www.mecs-press.net/ijwmt
More informationAN ENHANCED ATTRIBUTE BASED ENCRYPTION WITH MULTI PARTIES ACCESS IN CLOUD AREA
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,
More informationResource Selection in Collaborative Cloud Computing Based on User Preference
Resource Selection in Collaborative Cloud Computing Based on User Preference W.Renuka Devi 1, K.Sudhakar 2 P.G Student. Department of Computer Engineering, GPREC Engineering College, Kurnool, Andhra Pradesh,
More informationAnalysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud
Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud M.Jayanthi, Assistant Professor, Hod of MCA.E mail: badini_jayanthi@yahoo.co.in MahatmaGandhi University,Nalgonda, INDIA. B.Ranganatha
More informationInternational journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online http://www.ijoer.
RESEARCH ARTICLE ISSN: 2321-7758 GLOBAL LOAD DISTRIBUTION USING SKIP GRAPH, BATON AND CHORD J.K.JEEVITHA, B.KARTHIKA* Information Technology,PSNA College of Engineering & Technology, Dindigul, India Article
More informationInternational Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 Software as a Model for Security in Cloud over Virtual Environments S.Vengadesan, B.Muthulakshmi PG Student,
More informationEnabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage
Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage Pranita Bakka 1, Dr. Jayashree Agarkhed 2 1 P.G.Student, Department of Computer Science & Engineering,
More informationUsing Peer to Peer Dynamic Querying in Grid Information Services
Using Peer to Peer Dynamic Querying in Grid Information Services Domenico Talia and Paolo Trunfio DEIS University of Calabria HPC 2008 July 2, 2008 Cetraro, Italy Using P2P for Large scale Grid Information
More informationImplementing Efficient Monitoring And Data Dynamics For Data Storage Security in Cloud Computing
Implementing Efficient Monitoring And Data Dynamics For Data Storage Security in Cloud Computing 1 Pavithra S., 1 Assistant Professor, Vel Tech Multitech Dr.RR & Dr. SR Engg College E-mail: pavi_eye@yahoo.co.in
More informationCloud Information Accountability Framework for Auditing the Data Usage in Cloud Environment
International Journal of Computational Engineering Research Vol, 03 Issue, 11 Cloud Information Accountability Framework for Auditing the Data Usage in Cloud Environment D.Dhivya 1, S.CHINNADURAI 2 1,M.E.(Cse),
More information3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India
3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India Call for Papers Cloud computing has emerged as a de facto computing
More informationHow To Make A Secure Storage On A Mobile Device Secure
Outsourcing with secure accessibility in mobile cloud computing Monika Waghmare 1, Prof T.A.Chavan 2 Department of Information technology, Smt.Kashibai Navale College of Engineering, Pune, India. Abstract
More informationREVIEW OF SECURITY AND PRIVACY ISSUES IN CLOUD STORAGE SYSTEM
International Journal of Computer Science and Engineering (IJCSE) ISSN(P): 2278-9960; ISSN(E): 2278-9979 Vol. 2, Issue 5, Nov 2013, 55-60 IASET REVIEW OF SECURITY AND PRIVACY ISSUES IN CLOUD STORAGE SYSTEM
More informationCloud Data Storage Services Considering Public Audit for Security
Global Journal of Computer Science and Technology Cloud and Distributed Volume 13 Issue 1 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
More informationA COMPARATIVE STUDY OF SECURE SEARCH PROTOCOLS IN PAY- AS-YOU-GO CLOUDS
A COMPARATIVE STUDY OF SECURE SEARCH PROTOCOLS IN PAY- AS-YOU-GO CLOUDS V. Anand 1, Ahmed Abdul Moiz Qyser 2 1 Muffakham Jah College of Engineering and Technology, Hyderabad, India 2 Muffakham Jah College
More information