Australian Journal of Basic and Applied Sciences. Secure and Efficient Dynamic Data Operations in Cloud Computing

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Australian Journal of Basic and Applied Sciences. Secure and Efficient Dynamic Data Operations in Cloud Computing"

Transcription

1 AENSI Journals Australian Journal of Basic and Applied Sciences ISSN: Journal home page: Secure and Efficient Dynamic Data Operations in Cloud Computing 1 S.K. Mouleeswaran, 2 Dr.A. Grace Selvarani, 3 J. Kanya Devi 1 Assistant Professor, Department of Computer Science and Engineering, RVS Technical Campus, Coimbatore, TamilNadu, India. 2 Professor & Head, Department of Computer Science and Engineering(PG), Sri Ramakrishna Engineering College, Coimbatore, TamilNadu, India. 3 Assistant Professor, Department of Computer Science and Engineering, Sri Shakthi Institute of Engineering and Technology, Coimbatore, TamilNadu, India. A R T I C L E I N F O Article history: Received 25 June 2014 Received in revised form 8 July 2014 Accepted 25 August July 2014 Available online 29 September 2014 Keywords: Cloud Computing, Third Party Auditing, Dynamic, Outsourced, Token Pre-Computation. A B S T R A C T High quality of remote storage for on demand data without worrying about hardware and software running is provided by cloud computing. The user need not to physically posses their outsourced data since it creates new threats towards the stored data on cloud. A solution to address the new problem for achieving secure and reliable cloud services the paper proposes a trusted third party auditing, token pre-computation and erasure rule data are deployed. The scheme allows users to audit cloud storage with minimum computing and communication costs. The results guarantee storage correctness and fast access to misbehaving servers. The cloud data are considered to be dynamic, the proposed system supports for secure and efficient dynamic operations onto outsourced data including chunk alteration, erasure, add AENSI Publisher All rights reserved. To Cite This Article: S.K.Mouleeswaran, Dr.A.Grace Selvarani, J.Kanya Devi, Secure and Efficient Dynamic Data Operations in Cloud Computing.Paper title. Aust. J. Basic & Appl. Sci., 8(15): , 2014 INTRODUCTION Due to the remarkable growth in computer technology and internet, the age of cloud computing gave arise to software as a service (SaaS) framework. SaaS holds cheaper but powerful processors for converting data centers into massive collection of computer services. It is possible for the users to access high quality services using data and applications which reside on the servers by using flexible and increased bandwidth network connections. It is possible to utilize large storage space and modifiable computing resources with the help of online services. These internet based services eliminates the data maintenance on local machines over a period of time. This is due to the availability and integrity of data over the internet (Sun Microsystems, Inc., 2009). Though the cloud acts as a reliable computing medium than the personal computing techniques the data reliability arises over time (Arrington, M., 2006; Kincaid, J., 2008; Amazon.com, 2008; Wilson, S., 2008; Krebs, B., 2009). The providers of cloud retards access to the rare data over the internet without being detected in order to cut down cost which parallel increases the profit (Juels, A., et al., 2007). The data losses are hidden from the users to retain the name of cloud providers (Ateniese, G., et al., 2007; Shah, M.A., et al., 2007). The cost benefit for long term data storage is offered by cloud due to outsourcing but it fails to provide data availability. Good cloud storage must be adamant to guarantee availability and integrity of stored data on demand for the users. The users do not physically posses the data (Juels, A., et al., 2007; Ateniese, G., et al., 2007; Shah, M.A., et al., 2007; Shah, M.A., et al., 2008). The cloud is not just a warehouse which allows for accessing the data on demand but also needs to be updated by users involving inserting, deleting, modifying, appending, etc. The key challenge involved here is combining dynamic feature into the cloud. The data can be stored by the user s surplus across the cloud storage for reducing the data integrity and availability threats. The distributed protocols provide healthy and secure cloud storage. Inspiration For The Work: It is important to highlight the data integrity for inaccessible information under different working conditions (Dodis, Y., et al., 2009). On focusing the single server situation it is possible to ensure storage correctness by restricting the user s to posses local data. The drawback occurs here is the data availability during server failure. By applying these techniques directly over multiple servers it happen increased operating costs between linear servers. The solution to this problem is provided by the distributed protocols which guarantee data availability Corresponding Author: S.K.Mouleeswaran, Assistant Professor, Department of Computer Science and Engineering, RVS Technical Campus, Coimbatore, TamilNadu, India.

2 212 S.K.Mouleeswaran et al, 2014 within these multiple servers (Bowers, K.D., et al., 2009; Schwarz, T. and E.L. Miller, 2006; Lillibridge, M., et al., 2003). The solution remains unfinished since their capacity for handling the dynamic data is not clear which limits the usage in cloud storage. The paper proposes a scheme for dynamic data support for making the user data available on cloud. For situations like storage failure it depends upon erasure accuracy code. The file distribution deploys redundancy for data availability in complex servers (Castro, M. and B. Liskov, 2002). It indirectly reduces the operating costs needed for communication and storage as compared to traditional replication mechanism which guarantee the recognition of misbehaving servers using erasure rule data along with distributed verification. A good relation between the erasure rule data and dynamic data is achieved by performing further studies upon algebraic property of token computing and erasure rule data. Challenges In Solution: Dependability on data and guarantee in security for cloud storage needs a dynamic data authentication. The key challenges addressed are, the foremost is ensuring the user data stored in appropriate place. Second is the ability to identify malfunctioning server. Third is that the data must be stored at same location over a period of time even after every update, deletion, modification to the data. The fourth is to ensure data availability during complex server failures. Finally the user should gain access to the stored data with operation costs. Challenges In Solution: The user storage space provided by the cloud providers runs continuously in a distributed manner. For which, erasure rule is deployed for handling server crashes to address the growth in size and importance of user data. During demand user contacts the provider of cloud for access and retrieval of data. For handling chunk operations like delete, update, insert, modify the data will not be stored locally so, the stored data of the user and its maintenance must be guaranteed. The data storage on cloud must remain secured for which a trusted third party agent is introduced which avoids the data leakage while outsourcing and sustains upon internal and external attacks. A. Guarantee for Cloud Data Storage: The key feature of cloud is that it eliminates the need of storing user data locally, which literally means that the availability of data stored on distributed storage must be guaranteed. The key task to focus is unfaithful modification to data and data corruption due to server compromise will arise. These inconsistencies like error in particular server must be addressed to recover from threats/storage losses. The addresses to the key problems are, A1. File Sharing: The erasure correction rule handles multiple failures within a distributed cloud storage system. This technique is utilized to route the data file DF surplus across the n distributed servers. These n distributed servers are accounted as n = d + r, where n stands for distributed servers and d is the data vectors. The original data d is reconstructed from any d + r data and redundancy vectors. By placing these d + r vectors on n different servers without any data loss it survives failure. Let d = {d 1, d 2,.., d n } and dx = {d 1x, d 2x,, d xn } T where {x ϵ [1,..,n]}. Here, d x represents the column vector and l represents the data vector size in chunks. Then d(d+r) is achieved by, The encoded file are obtained as, C = d. A = { C (1), C (2),, C (n), C (n+1), C (m) } = {d 1,d 2,..,d n, C (m+1),., C (n)} Here, the original data is obtained by multiplication. C term is generated based on d. A2. Token Pre-Computing: This technique acts as a verification scheme to assure exactness in stored data and data error localization. Initially, before signaling the file sharing for each and every vector C (j) the token is computed by the user by taking random sets of data chunks. The exactness on stored data can be performed by the cloud server using a signature over the chunk after which is returned back to the user. The value of signature will match the precomputed user tokens. Since the user utilizes a random set of generated chinks, the response to the request should also be valid. After generation of token the user can hold the pre-computed token either locally (or) encrypting them to store them on cloud. Here, the user store the tokens locally to reduce the bandwidth overhead

3 213 S.K.Mouleeswaran et al, 2014 since, it is a dynamic data operation. Upon calculation of all the tokens and before file sharing is to screen similarity in C (m+1),., C (n) by, C x (i) C x (i) + f si (C sxi ), i ϵ [i,, l] Here, s i is the secret key, C sxi denotes the cloud server and g x (i) is the encoded vector. A3. Error Localization: The per-requirements for eliminating errors in storage are locating the errors. The threats from external factors must also be focused equally. The paper defines a challenge reply protocol where the values are returned by the servers upon every challenge. It verifies the correctness in stored data and also contains the description for locating possible errors in data. A4. Revival of Errors: The proposed verification scheme is based on unsystematic spot checking, the exactness guarantee is achieved by allowing enough verification time so, that it guarantee successful file retrieval. During corruption by comparing pre-computed tokens and the reply values from servers guarantee the identification of misbehaving servers. The user can request the server to send the chunks back as specified in challenge and regenerate chunks using erasure alteration. Algorithm1: Revival of Errors Procedure Presume the chunk corruptions have been detected among the specified r l rows; Presume C sxi < S i servers have been identified as misbehaving; Download r l rows of chunks from servers; Treat C sxi servers as erasures and perform chunk recovery; Resend the recovered chunks to corresponding servers. End procedure A5. Trusted Party Auditing: Due the lack of time and resource for the user the verification is performed by a trusted third party agent. The goal of the auditing is to retard new threats to the user data content. It ensures privacy preservation by not considering the blind values from the server reply rather it verifies directly. The third party auditor does not have the knowledge about the secret key so, it is impossible to grasp the information during audition. Dynamic Data Operations: The above discussed represents static data scenarios which do not suite all the situations. It occurs some situation in cloud to handle dynamic data where the user performs update, delete, append (or) modify data chunks Fig 1. There are two key challenges one is dynamic data operations since the data are not stored locally. Another is the providers of cloud should the process the request without the knowledge about secret key. These problems can be addressed by verification token. It guarantees that the cloud providers process the dynamic data request else the cloud providers are identified as cheating. It is also not practical to download all the data stored into the cloud and re-computing the verification tokens. The following scheme explains the dynamic data operations onto the data stored into cloud. B1. Insert Procedure: It is performed within the same chunk structure for the entire data file by adding at the desired position. Inserting into DF (x) denotes shifting all chunks with addresses x + 1 by one slot. Drawback: It can affect many rows in the data file and requires a number of computations to re-number the successive chunks and also re-compute challenge reply token. It is not possible to directly support insert operation. B2. Update Procedure: The user may need to modify some of the data chunks stored into cloud. It is performed from its current value to a new one. If the current value is DF (x) it uses linear property of Random Solomon rule for update operation. It generates updated chunks DF (x) without the involvement of any unchanged chunks. It means that all the unused tokens is omitted by the user where the occurrence of new chunks replaces the new one.

4 214 S.K.Mouleeswaran et al, 2014 DA 1 * DA 2 * DA 3 * DA 1 DA 2 DA 3 DA 1 DA 2 DA 3 f 21 f 22* f 23 f 21 f 22 f 23 0 f22 0 f 31 f 32 f 33 = f 31 f 32 f f 51 f 52 f f 51 f 52 f 53 Fig. 1: Dynamic Data Operation B3. Delete Procedure; After finishing storage into cloud, certain chunks may need to be deleted. It is a special case wherein the original data chunks are replaced. The deletion is achieved by replacing the data chunk with zero (or) some reserved symbols. B4. Append Procedure: The size of the stored data can be increased by adding chunks to the end of the data file. The most frequent operation in cloud is appending large number of blocks by the user at the same time. The appending procedure is similar to concatenate corresponding row at the end of file. Suppose r l rows in a file be the initial file and n blocks are to be appended to the end of file as {DA rl+1,1, DA rl+1,2,., DAr l+1,n). The newly appended token is covered by the challenge tokens by slightly modifying the pre-computed tokens. Performance Analysis: The analysis is done based on the security and efficiency. The file sharing and token pre-computing is experimented which involves encoding as well as screening the corresponding encoded part. The two sets of parameters d and r are considered with changeable data values. The r denotes foremost since before outsourcing the similarity generation. The r value increases linearly which requires large number of similar chunks to be screened. Fig 2 represents the scheme is efficient since an additional layer of structure called erasure modification rule is deployed. The traditional two layers of error correction increases the communication and operation costs. But here good balance is maintained by updates to specific row and is sufficiently large and are distributed before the file is being shared. Fig. 2: Performance comparison between chosen parameters Conclusion: In distributed cloud storage system the problem in data security is addressed. The integrity and availability of cloud data impose quality of cloud servers which can be depended by user is a distributed scheme with dynamic data support including chunk update, delete and append. The ensure rule in distributed file sharing is deployed to provide redundancy and ensure data availability. The verification token achieves storage precision and identifies misbehaving servers. A trusted party auditing is provided based upon the user time and resources for tension-free usage of cloud storage. By a detailed analysis the proposed scheme is highly resistant to complex failure, unauthorized modifications to data and even server crash attacks. REFERENCES Amazon.com, Amazon s3 availability event: July 20, Online at Amazon.com, Amazon web services (aws). Online at aws.amazon.com/. Arrington, M., Gmail disaster: Reports of mass deletions. Online at

5 215 S.K.Mouleeswaran et al, 2014 Ateniese, G., R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson and D. Song, Provable data possession at untrusted stores. in Proc. of CCS 07, Alexandria. Pp: Ateniese, G., R.D. Pietro, L.V. Mancini and G. Tsudik, Scalable and efficient provable data possession, in Proc. of SecureComm 08: Bowers, K.D., A. Juels and A. Oprea, Hail: A high-availability and integrity layer for cloud storage. in Proc. of CCS 09. pp: Bowers, K.D., A. Juels and A. Oprea, Proofs of retrievability: Theory and implementation. in Proc. of ACM workshop on Cloud Computing security (CCSW 09). pp: Carter, L. and M. Wegman, Universal hash functions. Journal of Computer and System Sciences, 18(2): Castro, M. and B. Liskov, Practical byzantine fault tolerance and proactive recovery. ACM Transaction on Computer Systems, 2(4): Cong Wang, Qiang Wang, Kui Ren, Ning Cao, Wenjing Lou. 17 th IEEE International workshop i=on Quality of service. Curtmola, R., O. Khan, R. Burns and G. Ateniese, Mr-pdp: Multiple-replica provable data possession. in Proc. of ICDCS 08. IEEE Computer Society. pp: Dodis, Y., S. Vadhan and D. Wichs, Proofs of retrievability via hardness amplification. in Proc. of the 6th Theory of Cryptography Conference (TCC 09), San Francisco, CA, USA. Erway, C., A. Kupcu, C. Papamanthou and R. Tamassia, Dynamic provable data possession. in Proc. of CCS 09. pp: Juels, A., and J. Burton, S. Kaliski, Pors: Proofs of retrievability for large files. in Proc. of CCS 07, Alexandria, VA. Pp: Kincaid, J., MediaMax/TheLinkup Closes Its Doors. Online at /2008/07/10/ mediamaxthelinkup-closes-its-doors/. Krebs, B., Payment Processor Breach May Be Largest Ever. Online at payment processor breach may b.html. Lillibridge, M., S. Elnikety, A. Birrell, M. Burrows and M. Isard, A cooperative internet backup scheme. in Proc. of the 2003 USENIX Annual Technical Conference (General Track). pp: Schwarz, T. and E.L. Miller, Store, forget, and check: Using algebraic signatures to check remotely administered storage. in Proc. of ICDCS 06. pp: Shacham, H and B. Waters, Compact proofs of retrievability. in Proc. of Asiacrypt 08, volume 5350 of LNCS. pp: Shah, M.A., M. Baker, J.C. Mogul and R. Swaminathan, Auditing to keep online storage services honest, in Proc. of HotOS 07. Berkeley, CA, USA: USENIX Association. pp: 1-6. Shah, M.A., R. Swaminathan and M. Baker, Privacy-preserving audit and extraction of digital contents. Cryptology eprint Archive, Report 2008/186, 2008, Sun Microsystems, Inc., Building customer trust in cloud computing with transparent security. Online at https://www.sun. com/offers/details/sun transparency.xml. Wang, C., Q. Wang, K. Ren and W. Lou, Ensuring data storage security in cloud computing. in Proc. of IWQoS 09: 1-9. Wang, Q., C. Wang, J. Li, K. Ren and W. Lou, Enabling public verifiability and data dynamics for storage security in cloud computing. in Proc. of ESORICS 09, volume 5789 of LNCS. Springer- Verlag. pp: Wilson, S., Appengine outage. Online at cio-weblog.com/ /appengine outage.php.

Erasure correcting to enhance data security in cloud data storage

Erasure correcting to enhance data security in cloud data storage Erasure correcting to enhance data security in cloud data storage K.Shrividhya Department of computer science- Vels University shrividhya224@gmail.com A.Sajeevram Department of computer science Vels University

More information

Index Terms : cloud computing, Distributed Storage, error detection, data recovery, SHA, dynamic block operations

Index Terms : cloud computing, Distributed Storage, error detection, data recovery, SHA, dynamic block operations Revisiting Secure Cloud Storage by Replacing Token Generation With SHA Ms. Bhagyashree Alhat (1), Prof. Amar Buchade(2) Pune Institute of Computer Technology, University of Pune,PG Student(1), Assistant

More information

Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System

Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System 1 K.Valli Madhavi A.P vallimb@yahoo.com Mobile: 9866034900 2 R.Tamilkodi A.P tamil_kodiin@yahoo.co.in Mobile:

More information

CLOUD BASED STORAGE SERVICES FOR SECURITY FOLLOWED BY THE DATA AUTHENTICATION

CLOUD BASED STORAGE SERVICES FOR SECURITY FOLLOWED BY THE DATA AUTHENTICATION INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE CLOUD BASED STORAGE SERVICES FOR SECURITY FOLLOWED BY THE DATA AUTHENTICATION Akheel Mohammed 1, Dr.Vasumathi 2, Mir Ahmed Ali

More information

AN EXPOSURE TO RELIABLE STORAGE SERVICES IN CLOUD COMPUTING

AN EXPOSURE TO RELIABLE STORAGE SERVICES IN CLOUD COMPUTING INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EXPOSURE TO RELIABLE STORAGE SERVICES IN CLOUD COMPUTING Ayesha Romana 1, Akheel Mohammed 2, Ayesha 3 1 M.Tech Student, Dept

More information

Securing Cloud Data Storage

Securing Cloud Data Storage IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661 Volume 1, Issue 6 (July-Aug. 2012), PP 43-49 Securing Cloud Data Storage S. P. Jaikar 1, M. V. Nimbalkar 2 1,2 (Department of Information

More information

Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication

Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication Sanjay Kumar Baghel Mtech Scholar, CSE, CSIT DURG Sanju5878@gmail.com Bhupesh Kumar Dewangan Assistant Professor,CSE,

More information

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department

More information

Selective dependable storage services for providing security in cloud computing

Selective dependable storage services for providing security in cloud computing Selective dependable storage services for providing security in cloud computing Gade Lakshmi Thirupatamma*1, M.Jayaram*2, R.Pitchaiah*3 M.Tech Scholar, Dept of CSE, UCET, Medikondur, Dist: Guntur, AP,

More information

February. ISSN: 2321-8134

February. ISSN: 2321-8134 IJFEAT INTERNATIONAL JOURNAL FOR ENGINEERING APPLICATIONS AND TECHNOLOGY TITLE: DATA PLACE & MANAGE SECURITY IN CLOUD COMPUTING FOR EFFECTIVE AND FLEXIBLE DISTRIBUTED SYSTEM 1 Mr. Pritam S. Bhoyar, 2 Mr.

More information

Secure Way of Storing Data in Cloud Using Third Party Auditor

Secure Way of Storing Data in Cloud Using Third Party Auditor IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 4 (Jul. - Aug. 2013), PP 69-74 Secure Way of Storing Data in Cloud Using Third Party Auditor 1 Miss.

More information

Enhance Data Security in Cloud Computing using Layered Interleaving Approach

Enhance Data Security in Cloud Computing using Layered Interleaving Approach Enhance Data Security in Cloud Computing using Layered Interleaving Approach Mr. Pradeep Semwal Assistant Professor Dept of Computer Application & IT SGRR-Institute of Technology & Sciences, Dehradun Mr.

More information

Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing.

Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing. Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Privacy - Preserving

More information

Improving data integrity on cloud storage services

Improving data integrity on cloud storage services International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services

More information

Efficient Remote Data Possession Checking In Critical Information Infrastructures Ensuring Data Storage Security In Cloud Computing

Efficient Remote Data Possession Checking In Critical Information Infrastructures Ensuring Data Storage Security In Cloud Computing Efficient Remote Data Possession Checking In Critical Information Infrastructures Ensuring Data Storage Security In Cloud Computing Dr. T.Nalini 1, Dr.K.Manivannan 2,Vaishnavi Moorthy 3 1 Professor, Department

More information

Secure Distribution of File on Cloud

Secure Distribution of File on Cloud Secure Distribution of File on Cloud Niyamat I. Ujloomwale, Ranjana Badre Dept. of Computer, MIT Academy of Engineering, Alandi, Savitri Phule Pune University, Pune, India Dept. of Computer, MIT Academy

More information

PERFORMANCE OF BALANCED STORAGE SERVICES IN CLOUD SYSTEM

PERFORMANCE OF BALANCED STORAGE SERVICES IN CLOUD SYSTEM INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE PERFORMANCE OF BALANCED STORAGE SERVICES IN CLOUD SYSTEM Byagari Kumar 1, K.Pradeep Kumar 2 1 M.Tech Student, Dept of CSE, RRS College

More information

Ensuring Data Integrity in Cloud Computing

Ensuring Data Integrity in Cloud Computing Journal of Computer Applications ISSN: 0974 1925, Volume-5, Issue EICA2012-4, February 10, 2012 Ensuring Data Integrity in Cloud Computing Venkatesa Kumar V Asst.Professor, Dept of Computer Science and

More information

CONSIDERATION OF DYNAMIC STORAGE ATTRIBUTES IN CLOUD

CONSIDERATION OF DYNAMIC STORAGE ATTRIBUTES IN CLOUD INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE CONSIDERATION OF DYNAMIC STORAGE ATTRIBUTES IN CLOUD Ravi Sativada 1, M.Prabhakar Rao 2 1 M.Tech Student, Dept of CSE, Chilkur Balaji

More information

Data Storage Security in Cloud Computing

Data Storage Security in Cloud Computing Data Storage Security in Cloud Computing Manoj Kokane 1, Premkumar Jain 2, Poonam Sarangdhar 3 1, 2, 3 Government College of Engineering and Research, Awasari, Pune, India Abstract: Cloud computing is

More information

Secure Storage Services and Erasure Code Implementation in Cloud Servers

Secure Storage Services and Erasure Code Implementation in Cloud Servers Secure Storage Services and Erasure Code Implementation in Cloud Servers G. Rahul Reddy 1, N. J. Subashini 2 1 Research Scholar, M.Tech, Cloud Computing, Dept of Information Technology, SRM University,

More information

To Assure Factual Information Storage Security in Cloud Computing

To Assure Factual Information Storage Security in Cloud Computing To Assure Factual Information Storage Security in Cloud Computing Archana M, Shirisha K, Bhavani V Abstract Abstract-Cloud computing has evolved from virtualization, utility computing and client-server

More information

Implementing Remote Data Integrity Checking Protocol for Secured Storage Services with Data Dynamics and Public Verifiability In Cloud Computing

Implementing Remote Data Integrity Checking Protocol for Secured Storage Services with Data Dynamics and Public Verifiability In Cloud Computing Implementing Remote Data Integrity Checking Protocol for Secured Storage Services with Data Dynamics and Public Verifiability In Cloud Computing Ms. Vaishnavi Moorthy 1, Dr. S. Sivasubramaniam 2 1 (M.Tech-Final

More information

Data storage security in Cloud

Data storage security in Cloud IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 6, Ver. III (Nov Dec. 2014), PP 50-56 Data storage security in Cloud Mrs. Niyamat Ujloomwale, Mrs.

More information

Near Sheltered and Loyal storage Space Navigating in Cloud

Near Sheltered and Loyal storage Space Navigating in Cloud IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 8 (August. 2013), V2 PP 01-05 Near Sheltered and Loyal storage Space Navigating in Cloud N.Venkata Krishna, M.Venkata

More information

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD Volume 1, Issue 7, PP:, JAN JUL 2015. SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD B ANNAPURNA 1*, G RAVI 2*, 1. II-M.Tech Student, MRCET 2. Assoc. Prof, Dept.

More information

Keywords: Cloud Computing, Data Dynamics, Data Integrity, Error Localization, Third Party Auditor.

Keywords: Cloud Computing, Data Dynamics, Data Integrity, Error Localization, Third Party Auditor. www.semargroup.org, www.ijsetr.com ISSN 2319-8885 Vol.03,Issue.11 June-2014, Pages:2300-2307 Secure Cloud: Storage with Privacy Preserving Public Auditing and Data Dynamics Dept of CSE, Malabar College

More information

Development of enhanced Third party Auditing Scheme for Secure Cloud Storage

Development of enhanced Third party Auditing Scheme for Secure Cloud Storage Development of enhanced Third party Auditing Scheme for Secure Cloud Storage Bhanu Prakash Chamakuri*1, D. Srikar*2, Dr. M.Suresh Babu*3 M.Tech Scholar, Dept of CSE, Grandhi Varalakshmi Institute Of Technology,

More information

Analysis of Secure Cloud Data Sharing Within a Group

Analysis of Secure Cloud Data Sharing Within a Group Analysis of Secure Cloud Data Sharing Within a Group Ms. uri Pande* Department of CSE, GHRAET Nagpur (M.S), India, Prof. Vikrant Chole Dept of Computer Science & Engg Nagpur (M.S.), India Abstract In this

More information

Index Terms: Data integrity, dependable distributed storage, Cloud Computing

Index Terms: Data integrity, dependable distributed storage, Cloud Computing Volume 5, Issue 5, May 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Cloud Data Protection

More information

EFFICIENT DISCOVERY OF INTEGRITY AUTOMATION IN HYBRID CLOUD COMPUTING

EFFICIENT DISCOVERY OF INTEGRITY AUTOMATION IN HYBRID CLOUD COMPUTING INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE EFFICIENT DISCOVERY OF INTEGRITY AUTOMATION IN HYBRID CLOUD COMPUTING K.Saipriya 1, A.Ravi Kumar 2 1 M.Tech Student, Dept of

More information

ISSN 2278-3091. Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability

ISSN 2278-3091. Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability Outsourcing and Discovering Storage Inconsistencies in Cloud Through TPA Sumathi Karanam 1, GL Varaprasad 2 Student, Department of CSE, QIS College of Engineering and Technology, Ongole, AndhraPradesh,India

More information

Secure Data transfer in Cloud Storage Systems using Dynamic Tokens.

Secure Data transfer in Cloud Storage Systems using Dynamic Tokens. Secure Data transfer in Cloud Storage Systems using Dynamic Tokens. P.Srinivas *,K. Rajesh Kumar # M.Tech Student (CSE), Assoc. Professor *Department of Computer Science (CSE), Swarnandhra College of Engineering

More information

Dependable and Secure Storage Services in Cloud Computing

Dependable and Secure Storage Services in Cloud Computing Dependable and Secure Storage Services in Cloud Computing D.Veena Sanjitha #1, M.Himaswanthi #2, T.V.N.Sai Sindhura #3, K.V.V. Satyanarayana * # CSE Department, KL University Guntur, AndhraPradesh * K.V.V.

More information

15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM

15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM Dhanashri Bamane Vinayak Pottigar Subhash Pingale Department of Computer Science and Engineering SKN

More information

A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA

A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA Mr.Mahesh S.Giri Department of Computer Science & Engineering Technocrats Institute of Technology Bhopal, India

More information

Security in Cloud Audit Using the Key Based Homomorphic Linear Authenticator

Security in Cloud Audit Using the Key Based Homomorphic Linear Authenticator Security in Cloud Audit Using the Key Based Homomorphic Linear Authenticator S.Muralitharan 1, M.Vijayaraj 2 Assistant Professor, Department of Information Technology, Mohamed Sathak Engineering College,

More information

A Novel Re-Authentication Scheme on Cloud Based Storage Services T.G.V.V.Srinivas 1, P.Suresh Babu 2 1 Final M.Tech Student, 2 Associate professor

A Novel Re-Authentication Scheme on Cloud Based Storage Services T.G.V.V.Srinivas 1, P.Suresh Babu 2 1 Final M.Tech Student, 2 Associate professor A Novel Re-Authentication Scheme on Cloud Based Storage Services T.G.V.V.Srinivas 1, P.Suresh Babu 2 1 Final M.Tech Student, 2 Associate professor 1,2 Dept of CSE, Kaushik College of engineering, JNTUK

More information

Privacy-Preserving Public Auditing & Data Intrgrity for Secure Cloud Storage

Privacy-Preserving Public Auditing & Data Intrgrity for Secure Cloud Storage Privacy-Preserving Public Auditing & Data Intrgrity for Secure Cloud Storage Imran Ahmad Student, M.Tech Dept. Computer Science & Engineering Patel Institute of Technology Bhopal, India imimran86@gmail.com

More information

A MECHANICS FOR ASSURING DATA STORAGE SECURITY IN CLOUD COMPUTING

A MECHANICS FOR ASSURING DATA STORAGE SECURITY IN CLOUD COMPUTING A MECHANICS FOR ASSURING DATA STORAGE SECURITY IN CLOUD COMPUTING 1, 2 Pratibha Gangwar, 3 Mamta Gadoria 1 M. Tech. Scholar, Jayoti Vidyapeeth Women s University, Jaipur, priya25mehta@gmail.com 2 M. Tech.

More information

Incorporation of Third Party Auditor for Safe and Secure Data Storage in Cloud Computing

Incorporation of Third Party Auditor for Safe and Secure Data Storage in Cloud Computing Incorporation of Third Party Auditor for Safe and Secure Data Storage in Cloud Computing Abstract: Sanjeeva Polepaka Associate Professor, Department of CSE, Malla Reddy Engineering College. Cloud Computing

More information

Ensuring Data Integrity of Cloud Storage Services In Cloud Computing

Ensuring Data Integrity of Cloud Storage Services In Cloud Computing Ensuring Data Integrity of Cloud Storage Services In Cloud Computing Gunjal Yogita S. 1 P.G. Student, Department of IT, Amrutvahini College of Engineering, Sangamner, Maharashtra, India 1. ABSTRACT: Cloud

More information

Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage

Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage Pranita Bakka 1, Dr. Jayashree Agarkhed 2 1 P.G.Student, Department of Computer Science & Engineering,

More information

AN APPROACH TOWARDS FUNCTIONING OF PUBLIC AUDITABILITY FOR CLOUD ENRICHMENT

AN APPROACH TOWARDS FUNCTIONING OF PUBLIC AUDITABILITY FOR CLOUD ENRICHMENT INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN APPROACH TOWARDS FUNCTIONING OF PUBLIC AUDITABILITY FOR CLOUD ENRICHMENT Mohd Abdul Shoaib 1, Akheel Mohammed 2, Ayesha 3

More information

PRIVACY PRESERVING PUBLIC AUDITING FOR SECURED DATA STORAGE IN CLOUD USING BLOCK AUTHENTICATION CODE

PRIVACY PRESERVING PUBLIC AUDITING FOR SECURED DATA STORAGE IN CLOUD USING BLOCK AUTHENTICATION CODE PRIVACY PRESERVING PUBLIC AUDITING FOR SECURED DATA STORAGE IN CLOUD USING BLOCK AUTHENTICATION CODE R.REVATHI # PG Scholar #, Bharathiyar Institute Of Engineering for Women, Deviyakurichi, Salem(DT) India

More information

Cloud Data Service for Issues in Scalable Data Integration Using Multi Authority Attribute Based Encryption

Cloud Data Service for Issues in Scalable Data Integration Using Multi Authority Attribute Based Encryption Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,

More information

Enabling Data Storage Security in Cloud Computing for Banking Enterprise

Enabling Data Storage Security in Cloud Computing for Banking Enterprise Enabling Data Storage Security in Cloud Computing for Banking Enterprise S.BIRUNTHA V.VENKATESA KUMAR, S.PALANISWAMI, II ME CSE Lect/CSE, Registrar Anna University Coimbatore, Anna University Coimbatore,

More information

International Journal of Infinite Innovations in Engineering and Technology. ISSN (Online): 2349-2287, ISSN (Print): 2349-2279 2015

International Journal of Infinite Innovations in Engineering and Technology. ISSN (Online): 2349-2287, ISSN (Print): 2349-2279 2015 SECURED AUDITING SYSTEM FOR CLOUD DATA STORAGE WITH ERROR CORRECTION GUARANTEES 1 S.Sathya, 2 S.Sivakumar 1 Research Scholar, Department of Computer Science & Applications, PGP College of Arts & Science,

More information

A Novel Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage

A Novel Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage REVIEW ARTICAL A Novel Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage Dumala Harisha 1, V.Gouthami 2 1 Student, Computer Science & Engineering-Department, JNTU Hyderabad India

More information

Verifying Correctness of Trusted data in Clouds

Verifying Correctness of Trusted data in Clouds Volume-3, Issue-6, December-2013, ISSN No.: 2250-0758 International Journal of Engineering and Management Research Available at: www.ijemr.net Page Number: 21-25 Verifying Correctness of Trusted data in

More information

Remote Data Integrity Checking in Cloud Computing

Remote Data Integrity Checking in Cloud Computing ISSN 2321 8169 Remote Data Integrity Checking in Cloud Computing Khaba M.V (Assistant Professor/CSE) RVS School of Engineering,dindigul khabarose@gmail.com M.Santhanalakshmi(Assistant Professor/CSE) RVS

More information

Distributing, Ensuring and Recovery of Data Stored in Cloud

Distributing, Ensuring and Recovery of Data Stored in Cloud Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,

More information

SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING

SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING Saranya.V 1, Suganthi.J 2, R.G. Suresh Kumar 3 1,2 Master of Technology, Department of Computer Science and Engineering, Rajiv Gandhi College of Engineering

More information

A Secure and Dependable Cloud Storage Service in Cloud Computing

A Secure and Dependable Cloud Storage Service in Cloud Computing A Secure and Dependable Cloud Storage Service in Cloud Computing Yalla Ram Charan MTech Student Department of CSE Sri Venkateswra College of Engineering & Technology Abstract: Cloud storage is a model

More information

Secure Storage Service Using Homomorphic Tokens and Dependable Erasure Coded Data in Cloud Computing

Secure Storage Service Using Homomorphic Tokens and Dependable Erasure Coded Data in Cloud Computing Secure Storage Service Using Homomorphic Tokens and Dependable Erasure Coded Data in Cloud Computing 1 K.SARANYA, 2 I.SIBIYA, 3 M.SASIKALA, 4 D.SUVITHA Assistant Professor, Department of Computer Science

More information

Keywords: Cloud Computing, Third Party Auditor, Integrity.

Keywords: Cloud Computing, Third Party Auditor, Integrity. Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Implementation of

More information

An Integrated Approach of Data storage and Security in Cloud Computing

An Integrated Approach of Data storage and Security in Cloud Computing An Integrated Approach of Data storage and Security in Cloud Computing K.SHIRISHA REDDY 1, Dr.M.BALARAJU 2 1 Associate Professor, CSE, VIGNAN BHARATHI INSTITUTE OF TECHNOLOGY, Hyderabad, Andhra Pradesh,

More information

SHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING

SHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING SHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING Er. Kavin M 1, Mr.J.Jayavel 2 1 PG Scholar, 2 Teaching Assistant, Department of Information Technology, Anna University Regional

More information

I. Introduction. A. Related Work

I. Introduction. A. Related Work PUBLIC VERIFIABILITY AND DATA DYNAMICS IN CLOUD SERVER P.Saranya, Roever Engineering College; S.Vishnupriya, Roever Engineering College; E.Elangovan, PRIST University Abstract- Cloud computing stores the

More information

Surveying Cloud Storage Correctness using TPA with BLS

Surveying Cloud Storage Correctness using TPA with BLS Surveying Cloud Storage Correctness using TPA with BLS Priyanka Dehariya 1, Prof. Shweta Shrivastava 2, Dr. Vineet Richaraya 3 1 M.Tech Scholar (CSE), LNCT, Bhopal 2 Asst.Professors, (CSE Department),

More information

ADVANCE SECURITY TO CLOUD DATA STORAGE

ADVANCE SECURITY TO CLOUD DATA STORAGE Journal homepage: www.mjret.in ADVANCE SECURITY TO CLOUD DATA STORAGE ISSN:2348-6953 Yogesh Bhapkar, Mitali Patil, Kishor Kale,Rakesh Gaikwad ISB&M, SOT, Pune, India Abstract: Cloud Computing is the next

More information

An Efficient Data Correctness Approach over Cloud Architectures

An Efficient Data Correctness Approach over Cloud Architectures International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 8, Issue 12 (October 2013), PP. 33-37 An Efficient Data Correctness Approach over

More information

Privacy-Preserving Public Auditing For Secure Cloud Storage

Privacy-Preserving Public Auditing For Secure Cloud Storage IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 4, Ver. III (Jul Aug. 2014), PP 33-38 Privacy-Preserving Public Auditing For Secure Cloud Storage Salve

More information

Data Security And Integrity Of Cloud Storage In Cloud Computing

Data Security And Integrity Of Cloud Storage In Cloud Computing Data Security And Integrity Of Cloud Storage In Cloud Computing Yogita Gunjal 1, Prof. J.Rethna Virjil Jeny 2 ME.student, Dept. Of Information technology, Amrutvahini College of Engineering,Sangamner,

More information

Energy Efficiency in Secure and Dynamic Cloud Storage

Energy Efficiency in Secure and Dynamic Cloud Storage Energy Efficiency in Secure and Dynamic Cloud Storage Adilet Kachkeev Ertem Esiner Alptekin Küpçü Öznur Özkasap Koç University Department of Computer Science and Engineering, İstanbul, Turkey {akachkeev,eesiner,akupcu,oozkasap}@ku.edu.tr

More information

Data Dynamics for Storage Security and Public Auditability in Cloud Computing

Data Dynamics for Storage Security and Public Auditability in Cloud Computing Journal of Computer Applications ISSN: 0974 1925, Volume-5, Issue EICA2012-1, February 10, 2012 Data Dynamics for Storage Security and Public Auditability in Cloud Computing Kayalvizhi S M.E - Software

More information

IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD

IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD 1 Ms.Nita R. Mhaske, 2 Prof. S.M.Rokade 1 student, Master of Engineering, Dept. of Computer Engineering Sir Visvesvaraya

More information

Cloud Data Storage Services Considering Public Audit for Security

Cloud Data Storage Services Considering Public Audit for Security Global Journal of Computer Science and Technology Cloud and Distributed Volume 13 Issue 1 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

IJCSIET-ISSUE4-VOLUME2-SERIES1 Page 1

IJCSIET-ISSUE4-VOLUME2-SERIES1 Page 1 Hash Message Authentication for Public Auditing in Secure Cloud Storage MK Siva Krishna Kanth 1, Dr.N. Chandra Sekhar Reddy 2, A. Praveen 3 Professor 2, CSE Dept., Professor 3, IT Dept., Institute of Aeronautical

More information

A Survey on Secure Storage Services in Cloud Computing

A Survey on Secure Storage Services in Cloud Computing Global Journal of Computer Science and Technology Cloud & Distributed Volume 12 Issue 12 Version 1.0 Year 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

Survey Paper on Integrity Auditing of Storage

Survey Paper on Integrity Auditing of Storage International Journal of Computational Engineering Research Vol, 04 Issue, 3 Survey Paper on Integrity Auditing of Storage Ugale Santosh A 1 1M.E. Computer AVCOE, Sangmner, India ABSTRACT: Cloud servers

More information

Trusted Public Auditing Process for Secure Cloud Storage

Trusted Public Auditing Process for Secure Cloud Storage Trusted Public Auditing Process for Secure Cloud Storage K.Adhiyaman 1, A. Jesudoss 2, D.Saravanan 3 1 Final Year MCA, Faculty of Computing, Department of MCA Sathyabama University, Chennai,Tamil Nadu,

More information

PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING

PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING T.Vidhya Sree M.Phil Research Scholar,CS, MGR College, Hosur (India) ABSTRACT Cloud Computing is the long dreamed vision

More information

To Provide Security & Integrity for Storage Services in Cloud Computing

To Provide Security & Integrity for Storage Services in Cloud Computing To Provide Security & Integrity for Storage Services in Cloud Computing 1 vinothlakshmi.s Assistant Professor, Dept of IT, Bharath Unversity, Chennai, TamilNadu, India ABSTRACT: we propose in this paper

More information

Remote Data Integrity Checking for Public Clouds

Remote Data Integrity Checking for Public Clouds IBM Student Workshop for Frontiers of Cloud Computing 01 Remote Data Integrity Checking for Public Clouds Bo (Irvine) Chen Department of Computer Science New Jersey Institute of Technology joint work with

More information

Enabling Data Security in Cloud Computing Using Third Party Auditing and Encryption Services

Enabling Data Security in Cloud Computing Using Third Party Auditing and Encryption Services Enabling Data Security in Cloud Computing Using Third Party Auditing and Encryption Services Amal Jose, M.Sambath, S.Ravi PG Scholar, Department of Computer Science & Engineering, Hindustan University,

More information

Data Integrity and Dynamic Storage Way in Cloud Computing

Data Integrity and Dynamic Storage Way in Cloud Computing 1 Data Integrity and Dynamic Storage Way in Cloud Computing Dinesh.C, P.G Scholar, Computer Science and Engineering, Mailam Engineering College, Mailam, Tamilnadu. Abstract It is not an easy task to securely

More information

IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD ENVIRONMENT

IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD ENVIRONMENT IJRRECS/November 2014/Volume-2/Issue-11/3699-3703 ISSN 2321-5461 INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD

More information

Survey of Data Storage Security in Cloud Computing

Survey of Data Storage Security in Cloud Computing Survey of Data Storage Security in Cloud Computing Mr. Kiran Nagargoje, Patel College of Science & Technology Ralamandal Indore, India Abstract: Mr.Niranjan Mahanwar Patel College of Science & Technology

More information

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) PERCEIVING AND RECOVERING DEGRADED DATA ON SECURE CLOUD

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) PERCEIVING AND RECOVERING DEGRADED DATA ON SECURE CLOUD INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4,

More information

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD S.REVATHI B.HASEENA M.NOORUL IZZATH PG Student PG Student PG Student II- ME CSE II- ME CSE II- ME CSE Al-Ameen Engineering

More information

Security in Cloud Network

Security in Cloud Network Security in Cloud Network Vimula Shwetha, (M.Tech) CSE Dept, KCEA, Nizamabad, ABSTRACT: Cloud computing, large number of computers that are connected through a real-time communication network. The users

More information

PRIVACY PRESERVING AND BATCH AUDITING IN SECURE CLOUD DATA STORAGE USING AES

PRIVACY PRESERVING AND BATCH AUDITING IN SECURE CLOUD DATA STORAGE USING AES PRIVACY PRESERVING AND BATCH AUDITING IN SECURE CLOUD DATA STORAGE USING AES 1 SANTOSH P. JADHAV, 2 B. R. NANDWALKAR 1,2 Department of Computer Engineering, Late G.N.Sapkal collage of engineering, University

More information

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction Enhancing Data Security in Cloud Storage Auditing With Key Abstraction 1 Priyadharshni.A, 2 Geo Jenefer.G 1 Master of engineering in computer science, Ponjesly College of Engineering 2 Assistant Professor,

More information

DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION

DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION Prof. M. Ben Swarup Professor, Department of CSE Vignan's Institute of Information Technology Visakhapatnam-49, India Chukkala

More information

SECURED DATA STORAGE IN CLOUD

SECURED DATA STORAGE IN CLOUD International Journal of Information Technology & Management Information System (IJITMIS) Volume 6, Issue 2, July-December-2015, pp. 44-48, Article ID: IJITMIS_06_02_007 Available online at http://http://www.iaeme.com/issue.asp?jtype=ijitmis&vtype=6&itype=2

More information

Secrecy Maintaining Public Inspecting For Secure Cloud Storage

Secrecy Maintaining Public Inspecting For Secure Cloud Storage Secrecy Maintaining Public Inspecting For Secure Cloud Storage K.Sangamithra 1, S.Tamilselvan 2 M.E, M.P.Nachimuthu.M.Jaganathan Engineering College, Tamilnadu, India 1 Asst. Professor, M.P.Nachimuthu.M.Jaganathan

More information

Ensuring Data Storage Security in Cloud Computing

Ensuring Data Storage Security in Cloud Computing Ensuring Data Storage Security in Cloud Computing Cong Wang 1, Qian Wang 1, Kui Ren 1, and Wenjing Lou 2 1 ECE Department, Illinois Institute of Technology 2 ECE Department, Worcester Polytechnic Institute

More information

Enable Public Audit ability for Secure Cloud Storage

Enable Public Audit ability for Secure Cloud Storage Enable Public Audit ability for Secure Cloud Storage Leela Poornima 1, D.Hari Krishna 2 1 Student, Nova College of Engineering and Technology, Ibrahimpatnam,Krishna Dist., Andhra Pradesh, India 2 Assistant

More information

Proficient Audit Services Outsourced for Data Availability in Clouds

Proficient Audit Services Outsourced for Data Availability in Clouds Proficient Audit Services Outsourced for Data Availability in Clouds N Praveen Kumar Reddy #1, Dr Subhash Chandra *2 N Praveen Kumar Reddy, pursuing M.Tech from Holy Mary Institute of Technology and Science,,

More information

Verification of Data Reliability and Secure Service for Dynamic Data in Cloud Storage

Verification of Data Reliability and Secure Service for Dynamic Data in Cloud Storage Verification of Data Reliability and Secure Service for Dynamic Data in Cloud Storage Nithiavathy.R 1, Suresh.J 2 Department of Computer Science &Engineering, Coimbatore Institute of Engineering and Technology

More information

Replicated Data Integrity Verification in Cloud

Replicated Data Integrity Verification in Cloud Replicated Data Integrity Verification in Cloud Raghul Mukundan Department of Computer Science Missouri University of Science and Technology rmgq8@mst.edu Sanjay Madria Department of Computer Science Missouri

More information

Dynamic Resource Allocation and Data Security for Cloud

Dynamic Resource Allocation and Data Security for Cloud Dynamic Resource Allocation and Data Security for Cloud Rajesh M. Devakate Annasaheb Dange College of Engg. & Technology, Ashta, Maharashtra, India. Amol B. Rajmane Ashokrao Mane Group of Institutions,

More information

A Meticulous Description of Applying Watermarking Technique for Secure Cloud Storage

A Meticulous Description of Applying Watermarking Technique for Secure Cloud Storage A Meticulous Description of Applying Watermarking Technique for Secure Cloud Storage 1 M. Guresh, 2 R. Suresh 1 M.Tech 2 nd Year, Department of CSE, CREC Tirupati, AP, India 2 Professor & HOD, Department

More information

OVERVIEW OF SECURITY ISSUES IN CLOUD COMPUTING

OVERVIEW OF SECURITY ISSUES IN CLOUD COMPUTING OVERVIEW OF SECURITY ISSUES IN CLOUD COMPUTING K. Arumugam 1, P. Sumathi 2 1 Research Scholar/Department Of Computer Science, Government Arts College, Coimbatore (India) 2 Assistant Professor/Department

More information

RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES

RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES 1 MD ISMAIL Z, 2 ASHFAQUE AHAMED K. 1 PG Scholar,Department of Computer Science, C.Abdul Hakeem College Of Arts and Science,Melvisharam.

More information

Authorized Auditing of Big Data Stored on Cloud with Auditability Aware Data Scheduling

Authorized Auditing of Big Data Stored on Cloud with Auditability Aware Data Scheduling Authorized Auditing of Big Data Stored on Cloud with Auditability Aware Data Scheduling Surapriya Swain 1, Prof. Saurabh Gupta 2 1 Department of Computer Engineering, GSMCOE, Balewadi, Savitribai Phule

More information

A Survey on Data Integrity of Cloud Storage in Cloud Computing

A Survey on Data Integrity of Cloud Storage in Cloud Computing A Survey on Data Integrity of Cloud Storage in Cloud Computing A B S T R A C T Mr.Vitthal Raut, Prof. Suhasini Itkar Department Computer Engineering, PES Modern College of Engineering, Pune, India. raut.vitthal@gmail.com,

More information

Public Auditability and Privacy preserving in Cloud Storage

Public Auditability and Privacy preserving in Cloud Storage Public Auditability and Privacy preserving in Cloud Storage Kishan Lathkar, Ambulgekar H. P SGGS IE&T Nanded, Maharashtra India lathkarkishan@sggs.ac.in, ambulgekar@sggs.ac.in Abstract: Cloud computing

More information

Identifying Data Integrity in the Cloud Storage

Identifying Data Integrity in the Cloud Storage www.ijcsi.org 403 Identifying Data Integrity in the Cloud Storage Saranya Eswaran 1 and Dr.Sunitha Abburu 2 1 Adhiyamaan College of Engineering, Department of Computer Application, Hosur. 2 Professor and

More information