Privacy Preservation and Integrity Auditing In Cloud Storage or Web Servers

Size: px
Start display at page:

Download "Privacy Preservation and Integrity Auditing In Cloud Storage or Web Servers"

Transcription

1 Privacy Preservation and Integrity Auditing In Cloud Storage or Web Servers Ugale Santosh A 1, Vaidya Milindkumar B 2 1,2 M.E Computer & Sangamner, India Abstract Cloud is growing technology for enabling ondemand access to a shared pool of configurable server resources (applications, networks, memory, storage, processors and services) with infrastructure that can be rapidly provisioned and released with minimal management efforts. Cloud offers the promise of massive cost savings combined with increased IT agility due to different advantages like pay per use, resources flexibility, and geographical independence. However, this technology challenges many traditional approaches to hosting service provider and enterprise application design and management. Large number of enterprises and personal user s use cloud services; however, storage security as a major problem to adopt cloud storage. User uploads data on server and use on demand or for the applications without keeping any copy on local machine. User can upload data on cloud servers without hassle to verify integrity or other security threats which can effect on data integrity. Hence, auditing process for cloud storage is important task to ensure data integrity. Normal users are not skillful for performing such auditing tasks. Also they are not aware about security risks and actions. So, to perform such audit user need to be dependent on the TPA (Third Party Auditor). He will check and verify that the data integrity on the cloud storage is maintained. TPA can be a physical system or a personal expertise with exuberant knowledge and highly capable handling such task. He audits the integrity of cloud storage and provides appropriate results to the user. Results contain removed, uploaded and modified files so that user can take appropriate actions. User has to make sure that privacy is preserved from TPA with minimal consumption of cloud resources while auditing process. In this paper, we proposed the system which checks and verifies the integrity of data without downloading files avoiding additional resources and vulnerability. Keywords Auditing, Cloud, Cloud servers, Data integrity, Data privacy, Security, Storage. I. INTRODUCTION In recent years, internet becomes necessity of the users. Users rely on remote storage instead of keeping any local copy and access as per requirement. Different cloud service provider provides a remote storage with cloud technology. It provides different advantage like for pay per use basis, geographical independent, availability, security, relief burden of storage, software, hardware and capital expenditure [14]. As remote storage fully managed by CSP, users keep faith on service provider and upload important data on cloud server without worrying about the security concern. Users are not aware about different backend security threats. To ensure data correctness on the cloud is being put at risk due to different reasons. First of all, although the infrastructures under the cloud servers are much more reliable and powerful compare to personal s computing devices but they are still facing an issue of threats for data integrity [7]. Also most of the cloud service provider behave unfaithfully towards the users for their outsource data. Cloud Service provider might hide the data loss incidents to maintain industry reputation [3] [12]. As a user does not have physically possess their data storage. The reason different cryptographic algorithms cannot be adopted directly on the remotely [10]. Also downloading data on local storage to check data integrity is not practical solution due to slow bandwidth and communication cost. It is necessity of user to audit data on cloud server itself to identify changes and take appropriate actions. In this paper, we proposed the protocol to check integrity auditing with privacy preservation with the help of TPA. II. PROBLEM STATEMENT The cloud system model, we considered is Linux platform cloud data storage which stores user s data remotely. In this system, we considered three different entities. As illustrated in fig. 1 [1]. First, a cloud user who uploads downloads data as per requirement. Another is cloud servers, which are hosted under the cloud service provider infrastructure and fully managed. Third entity is third party administrator who is responsible for the data auditing task on behalf of cloud user. TPA is the system or personal having knowledge and expertise of data security and data auditing task. 376

2 Figure 1 Architecture of system [1] Design Goals following are different security and performance parameters which proposed system should be achieve. Public Auditability: It allows TPA to check the correctness of the cloud data on demand without downloading or retrieving user s data locally. Storage Correctness: It ensures users that cloud data store appropriately and store securely without any intact. Privacy Preserving: It ensures auditing process does not create new vulnerability and TPA should not derive user data using auditing information. High performance: It ensures design should be create minimum overheads on the cloud server. As most of the cloud resources are pay per consume basis. Design allows auditing task with less communication cost and computation overload on cloud server. Batch Auditing: TPA able to audit multiples cloud users and multiple cloud servers. Secure communication: communication between user, cloud and TPA be highly secure and free from vulnerability. Central Management server To ensure design should be support to multi users and multi cloud from different infrastructures and cloud service provider. Figure 2 Mac-based Solution This scheme suffers from different drawbacks: 1. Auditing protocol demands retrieval of data; this is not privacy-preserving. 2. Communication and computation complexity is linear with the sample size which poses additional online burden to users, and cloud server. 3. Auditing problem is still not easy to solve even if system introduced a TPA. 4. The TPA has to maintain the state between audits. Keeping track on the revealed MAC key. 5. This scheme supports the static files. It cannot audit dynamic file efficiently. B. Homomorphic linear authenticators In homomorphic linear authenticators protocol metadata of the files store along with files on the server [1] and used keygen, Genproof, Siggen, Verifyproof algorithms used as illustrated in figure 3 [1]. A. Mac Based solution III. LITERATURE SURVEY In MAC-based solution, TPA demands a random number of blocks and their code from CSP and TPA uses the key to verify the correctness of the file blocks, as illustrated in figure 2 [1]. 377

3 Clouds keep copy of data on remote storage. TPA is responsible for auditing process. Figure 4 illustrate the overview of integrity auditing structure Figure 3. Homomorphic linear authenticators This scheme suffers from different demerits such as block numbers of the stored file must know to the TPA which is difficult due to the virtual storage on cloud. Also, due to the moving properly of data storage from one data storage to another at run time it difficult to keep same block for storage. A basic property of cloud server is auto scaling the reason storage is always virtual storage for easy extension of disk space. So getting block number to calculate the aggregate authenticator is difficult. TPA should be technical person having knowledge and capabilities handling protocol. Demerits: 1. This scheme stores the metadata on the server along with data which unnecessary consume disk space on the cloud server. 2. Auditing process perform by human, efficiency, accuracy and security are the main concern. It s difficult to get block numbers to TPA of cloud storage due to virtual environment. 3. All computation and masking procedure computed on the cloud storage which consumes unnecessary resources. The analysis of these schemes leads to main result, which overcomes all drawbacks of basic schemes. Proposed scheme to be presented based on files storage on Linux based cloud storage. IV. PROPOSED WORK This section presents our auditing scheme which provides solution for data integrity checking. Considering three entities in our scheme users upload data using credential provided by cloud service provider. 378 Figure 4. Proposed System Architecture [15] V. AUDITING ALGORITHM Definition and framework Inode: Inode is an data structure found in many linux system, every inode stores all information about a file system. Inode does not store the file s contents and file name excepts for certain modern file system. MD5: MD5 digital signature is like a fingerprint for a file; changing just one single byte in a file will result in a different MD5 hash value. MD5 hashes can be used to catalog files on a file system and then determine at a later date that the files have not been modified in any way, for example if someone broke into a system and altered system files. Client Program: It is the preconfigured client program installed on remote cloud server. It is responsible for the secure socket communication between TPA system and cloud servers, directory traversal, and get file stats and different hash value. Client configured such way that it listen on the predefined port and IP address to improve security. Client program also include the different optimized c language programs for directory traversal and stats for files and folders based on the TPA requirement. Socket connection: Considering all security aspect TPA connect to the server with predefined ports and IP address with three way full duplex socket programming connection.

4 Based on the TPA request both system connect and communicate each other. This improves the security parameter for the communication between TPA and cloud. Figure 5 Auditing Protocol [15] Proposed system work in three steps initialize, update and audit stage called check integrity. S={x, e, i, o, f, DD, NDD, success, failure} Let S be the solution perspective of the class x= Initial state of the class Initialize () x= {Initialize ()} sets the default values for all variables. Input i =(I1,I2) I1= {{U}{V}{F}{σ}} DD=deterministic data it helps identifying the load store functions or assignment functions. NDD=Non deterministic data of the system S to be solved. Success-desired outcome generated. Failure-Desired outcome not generated or forced exit due to system error. Set of k cloud users U = {u1, u2, u3, u4...uk} Set of m cloud servers V = {v1, v2, v3, v4....vm} Set of files on cloud storage F = {f1, f2, f3,. fn} Set of file tags σi = { f+t+i+u+g+b+d+s+p+pr+md5}, i ϵ (1, n) F= File Name. pr= File permissions. t= File type. i= File Inode number. u=file User ID. g= File Group ID. 379 s= File Size. p= file path. b= File Block count. n= Number of links For file. md5= md5 hash value I = Initial Values in Database, N = Interval of auditing process, M = New Value database, LI= List Of files. d= depth of file. ST= Detail info of modified files. Set of file tags σ calculated based on the file types. γ= directory path α = query v=cloud IP address ß= set of results μ= consist of file stats. Initialize Integrity Auditing Algorithm A. Initiate This is first stage of algorithm. In this step TPA send a init () request to the client program install on cloud servers which include paths and user information of the files. Once receiving init request server compute the stats and an information for all files mentioned in the init request. Initialize () α = ( γ, vj ) Where, γ ϵ n and vj is a jth cloud server. (γ is set or path of (n) files and vj is cloud IP address) vj cloud server produces ß= (μ1, μ2, μ3, μ4 μi) Where, μi comes from (f1, f2, f3, f4, f5 fn) consists of pair (fi, σi ). TPA store the received values in (I) database Figure 6. Sets of variables [15]

5 Figure 6 illustrate sets of variables and values. I = {ui, vj, fi, σi} Where, ui is user, vj cloud server and σi consist of signature tag of file fi B. Update This step required when user uploads/modify the files on cloud server. Users inform TPA to update information. TPA send Query Update α = (γ, vj ) Where γ ϵ n and vj is a jth cloud server. n updated files. Set of tags σ i = { f+t+i+u+g+b+d+s+p+pr+md5} i ϵ (1, n ) where σ updated files tags Number of files F = {f1, f2, f3, f4,. f n} Cloud server produces ß = {μ 1, μ 2, μ 3 μ i} Where μi comes from (f1, f2, f3, f3 fn ) consists of pair (fi, σ i ) TPA add/replace the ß values {ui, vi, fi, σ i} in I = {ui, vi, fi, σi} I = {ui, vi, fi, σi} Where ui is user, vi cloud server and σi consist of signature tag of file fi C. Check Integrity Schedule of periodic verification phase of the scheme cloud users need to specify the scan interval of the integrity checking protocol. User can keep the auditing interval minimum but it will consume computing resources of the cloud and indirectly increase the cost. Basically it will be few hours to users get the integrity auditing report as early as possible. So that user can take the necessary action to get modified file restored. Frequent auditing process would lead to a waste of network bandwidth and computing resources of TPA, CSPs, and Clients. On the other hand, loose auditing process is not conducive to detect the exceptions in time to take action. For example, if a file owner authorizes TPA system to audit the data once a day, week or month TPA arranges this task at a fixed time on every day, each weekend or month end. Based on the interval (N), in this phase TPA send the check request to the cloud servers, based on request client program on the cloud servers compute the file stats and information for the paths or directory in TPA request and sent result to the TPA system (M). Result of the files stats and hash are in the form of file or database. TPA system stores the new database (M). TPA system is having two databases. Initial database (I) and one after check request (M). TPA system compares the stored databases (I) and (M) and concludes the results based on the comparisons and send list of modified files to users. As TPA system contains files stat and hash value of the files it not possible to get files contents. It preserves the privacy of user s data from keeping copy information outside the cloud server. Also in this scheme I am utilizing fully automated TPA so it s not necessary to mask the results from client program. Initial values I = {ui, vi, fi, σi} Where, ui user, vi cloud sever IP, μi = (fi, σi ) file name with file stats. Interval to check integrity (N) Set of tags σ i = { f+t+i+u+g+b+d+s+p+pr+md5} i ϵ (1, n ) where σ updated files tags Number of files F = { f1, f2, f3, f4,. fn } TPA to cloud server Query Check α = (γ, vj ) Produces ß = {μ 1, μ 2, μ 3 μ i} Where μi comes from (f 1, f 2, f 3.f n) TPA store the received ß values {f i, σ i } in database (M) along with user and server details. M = {ui, vi, f i, σ i } TPA Search M {ui, vi, f i, σ i } in to the database I {ui, vi, fi, σi} If M {ui, vi, f i, σ i } ϵ I {ui, vi, fi, σi} Figure 7. Results comparison [15] As illustrated in Figure 7 TPA system compares the values. Success If M {ui, vi, f i, σ i } Search result I {ui, vi, fi, σi} Results: Files modified lists (f i) Else M {ui, vi, f i, σ i } = Search result I {ui, vi, fi, σi} Results: Uploaded/removed/modified files Failure Desired results are not generated. f= {update ( ), Check integrity ( )} 380

6 Using above results TPA informs to users and users take appropriate actions. Users easily identify uploaded, deleted and modified files keeping privacy preservation in auditing process and minimum resources consumption. TABLE I DATA SETS FName FType finode fuser fgrp fblock FLink test.sh F stat.c F FDepth FSize fpath Fper fmd bytes bytes./test.sh /stat.c VI. RESULT ANALYSIS A. Traverse directories and computes stats 401Xms1xIAU0x ge9ifwu9q== jhb1o64smacido EOYLjuwe== Client to program to traverse directory and computes files stats. root@cloud1 [~]# cd /home/santosh/imp/ root@cloud1 [/home/santosh/imp]# ls -a -rw-r--r-- 1 root root 2152 Jan 8 00:56 client1.c -rw-r--r-- 1 root root 1523 Jan 8 01:23 output1.txt -rw-r--r-- 1 root root 1248 Jan 8 01:23 output2.txt root@cloud1[/home/santosh/imp]#./workingtraval /home/santosh/imp/ client1.c,f, ,0,0,8,1,1,2152,/home/santosh/imp/clien t1.c,42,100644, a62c910ca8d5b b7cb3bfdd861 output1.txt,f, ,0,0,8,1,1,1523,/home/santosh/ imp/output1.txt,42,100644, 1cc9a4b76749a87cdca88bf79a4f9a57 output2.txt,f, ,0,0,8,1,1,1248,/home/santosh/ imp/output2.txt,42,100644, 3042fa5e1bf700092c617b8cfda089c5 Output of directory traversal and file tags save in output.txt We retrieve file using two ways socket communication. B. Socket communication between system and cloud material[root@ cloud1~]#./cloudsystemclient [cloud1] Obtaining socket descriptor successfully. [cloud1] Bind tcp port in add successfully. [cloud1] Listening the port successfully. [cloud1] Server has got connected from Initialize received from client! [cloud1] Sending output.txt to the Client...Ok sent to client! [cloud1] Connection with Client closed. Cloud Server will wait now... [root@auditsystem ]#./auditsystemclient [asystem] Connected to Cloud server at port ok! [asystem] Sending Initialize () to the Server Data Sent 0 = 1 [asystem] Receiving file from Server and save it as output.txt...ok received from server! [asystem] Connection close. C. Auditing Initial stat contain on (I), If unauthorized file get uploaded called hacked.txt and deleted file name client1.c modified stats are root@cloud1[/home/santosh/imp]#./workingtraval /home/santosh/imp/ output1.txt,f, ,0,0,8,1,1,1523,/home/santosh/imp/ou tput1.txt,42,100644, 1cc9a4b76749a87cdca88bf79a4f9a57 output2.txt,f, ,0,0,8,1,1,1248,/home/santosh/imp/ou tput2.txt,42,100644, 3042fa5e1bf700092c617b8cfda089c5 hacked.txt,f, ,0,0,8,1,1,17,/home/santosh/ /imp/hacked.txt,42,100644,6d6fe48f956a4bc88345c84d326 1d407 D. Results Auditing server compares initial values (I) and modified results (M) and provides results. File deleted for user ID:1 File name client1.c File Path,/home/santosh/imp/client1.c Updated files for user ID 1 File name hacked.txt File Path,/home/santosh/ /imp/hacked.txt 381

7 Figure 8. Snapshot of entering cloud details Merits of proposed system 1. TPA auditing process is fully computerized and automatic the reason it is efficient than manual process. 2. This scheme avoids files tags/stats and hash storage on the cloud server. It saves disk space and cost on the cloud storage. 3. TPA does not retrieve any file contents locally which ensures public auditing by privacy preservation process. 4. TPA system does not require any prior knowledge of files blocks to compute the results. 5. All check are done on the TPA system will avoid unnecessary computation of cloud server it saves resources and cost. 6. TPA system audit files from multiuser from same cloud or from different cloud servers. 7. CSP unable make any changes in the computed stats and hashes as database stored on the TPA system. 8. Auditing process bases on the files it easier to recover the modified files instead of complete storage. Figure 9. Snapshot of initializing system. Figure 10. Snapshot of Integrity Auditing 382 VII. CONCLUSION AND FUTURE SCOPE In this paper, we have proposed an integrity auditing system for Linux platform cloud data storage. We have utilized file based and fully automatic and computerized TPA auditing system for efficient and avoiding new vulnerability threats, while eliminate burden of the users from auditing task. The system completely based on the file tags and checksum value. TPA may concurrently handle multiple audit sessions from different users for their cloud data on request. We further extend integrity auditing process to multi cloud server. In this system our client program installed on multiple servers and communicates with automated TPA on request. In this system, communication secure with help of socket programming. Cloud servers listen on the predefined port and IP address to accept connection from TPA system. It makes secure communication between TPA and cloud server. Also to increase efficiency, we considered the highly efficient program for directory traversal in c programming which is light weighted for storage and execution. In this system cloud users able to specify specific files or directory and excludes unnecessary files which to check integrity which minimize the computing resources of CSP and TPA system. We leave the some feature extension like immediate notification of modified files, optimization and report the exact changes made in files to users, so user data will be easily recoverable.

8 REFERENCES [1] Cong Wang,Sherman S.M Chow, Qian Wang, Kui Ren and wening Lou, Privacy-Preserving Public Auditing for Secure cloud storage in IEEE transaction on computers vol 62 No 2 February [2] Cong Wang, Qian Wang, Kui Ren, Ning Cao, and Wenjing Lou Toward Secure and Dependable Storage Services in Cloud Computing IEEE Transaction on Services Computing vol 5 No 2 April-June [3] Qian Wang, Cong Wang, Kui Ren, Wenjing Lou And Jin Li Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing" IEEE transaction Paper on Parallel and Distributed Systems vol 22 No 5, pp , May [4] Kan Yang and Xiaohua Jia An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing IEEE transaction on parallel distributed system, Vol 24 No 9 September [5] Yan Zhu, Hongxin Hu, Gail-Joon Ahn and mengyang Yu Cooperative Provable Data possession for Integrity Verification in Multicloud Storage. IEEE Transactions on parallel and distributed system, Vol 23, No. 12, pp ,December [6] Shucheng Yu, C. Wang, K. Ren, and Wenjing Lou, Achieving secure, scalable, and fine-grained access control in cloud computing, in Proc. of IEEE NFOCOM 10, San Diego, CA, USA, March [7] Cloud Security Alliance, Security guidance for critical areas of focus in cloud computing, 2009, [8] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, Provable data possession at untrusted Stores, in Proc. of CCS 07, Alexandria, VA, October 2007, pp [9] Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, Enabling public verifiability and data dynamics for storage security in cloud computing, in Proc. of ESORICS 09, volume 5789 of LNCS. Springer-Verlag, Sep. 2009, pp [10] A. Juels and J. Burton S. Kaliski, Pors: Proofs of retrievability or large files, in Proc. of CCS 07, Alexandria, VA, October 2007, pp [11] H. Shacham and B. Waters, Compact proofs of retrievability, in Proc. of Asiacrypt 2008, vol. 5350, Dec 2008, pp [12] M. A. Shah, M. Baker, J. C. Mogul, and R. Swaminathan, Auditing to keep online storage services honest, in Proc. Of HotOS 07. Berkeley, CA, USA: USENIX Association, 2007, pp.1 6. [13] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, Above the clouds: A berkeley view of cloud computing, University of California, Berkeley, Tech. Rep. [14] P. Mell and T. Grance, Draft NIST working definition of cloud computing, Referenced on June. 3rd, 2009 online at [15] Ugale Santosh A Survey Paper on Integrity Auditing of storage IJCER vol. 4 issue 3 March /L pdf

Survey Paper on Integrity Auditing of Storage

Survey Paper on Integrity Auditing of Storage International Journal of Computational Engineering Research Vol, 04 Issue, 3 Survey Paper on Integrity Auditing of Storage Ugale Santosh A 1 1M.E. Computer AVCOE, Sangmner, India ABSTRACT: Cloud servers

More information

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department

More information

PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING

PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING T.Vidhya Sree M.Phil Research Scholar,CS, MGR College, Hosur (India) ABSTRACT Cloud Computing is the long dreamed vision

More information

Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.

Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption. Secure Privacy-Preserving Cloud Services. Abhaya Ghatkar, Reena Jadhav, Renju Georgekutty, Avriel William, Amita Jajoo DYPCOE, Akurdi, Pune ghatkar.abhaya@gmail.com, jadhavreena70@yahoo.com, renjug03@gmail.com,

More information

Data Integrity for Secure Dynamic Cloud Storage System Using TPA

Data Integrity for Secure Dynamic Cloud Storage System Using TPA International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 7-12 International Research Publication House http://www.irphouse.com Data Integrity for Secure

More information

Development of enhanced Third party Auditing Scheme for Secure Cloud Storage

Development of enhanced Third party Auditing Scheme for Secure Cloud Storage Development of enhanced Third party Auditing Scheme for Secure Cloud Storage Bhanu Prakash Chamakuri*1, D. Srikar*2, Dr. M.Suresh Babu*3 M.Tech Scholar, Dept of CSE, Grandhi Varalakshmi Institute Of Technology,

More information

Enable Public Audit ability for Secure Cloud Storage

Enable Public Audit ability for Secure Cloud Storage Enable Public Audit ability for Secure Cloud Storage Leela Poornima 1, D.Hari Krishna 2 1 Student, Nova College of Engineering and Technology, Ibrahimpatnam,Krishna Dist., Andhra Pradesh, India 2 Assistant

More information

CONSIDERATION OF DYNAMIC STORAGE ATTRIBUTES IN CLOUD

CONSIDERATION OF DYNAMIC STORAGE ATTRIBUTES IN CLOUD INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE CONSIDERATION OF DYNAMIC STORAGE ATTRIBUTES IN CLOUD Ravi Sativada 1, M.Prabhakar Rao 2 1 M.Tech Student, Dept of CSE, Chilkur Balaji

More information

Security in Cloud Audit Using the Key Based Homomorphic Linear Authenticator

Security in Cloud Audit Using the Key Based Homomorphic Linear Authenticator Security in Cloud Audit Using the Key Based Homomorphic Linear Authenticator S.Muralitharan 1, M.Vijayaraj 2 Assistant Professor, Department of Information Technology, Mohamed Sathak Engineering College,

More information

PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE

PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE Abstract: Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared

More information

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD Volume 1, Issue 7, PP:, JAN JUL 2015. SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD B ANNAPURNA 1*, G RAVI 2*, 1. II-M.Tech Student, MRCET 2. Assoc. Prof, Dept.

More information

Ensuring Data Integrity of Cloud Storage Services In Cloud Computing

Ensuring Data Integrity of Cloud Storage Services In Cloud Computing Ensuring Data Integrity of Cloud Storage Services In Cloud Computing Gunjal Yogita S. 1 P.G. Student, Department of IT, Amrutvahini College of Engineering, Sangamner, Maharashtra, India 1. ABSTRACT: Cloud

More information

A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA

A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA Mr.Mahesh S.Giri Department of Computer Science & Engineering Technocrats Institute of Technology Bhopal, India

More information

PRIVACY PRESERVING PUBLIC AUDITING FOR SECURED DATA STORAGE IN CLOUD USING BLOCK AUTHENTICATION CODE

PRIVACY PRESERVING PUBLIC AUDITING FOR SECURED DATA STORAGE IN CLOUD USING BLOCK AUTHENTICATION CODE PRIVACY PRESERVING PUBLIC AUDITING FOR SECURED DATA STORAGE IN CLOUD USING BLOCK AUTHENTICATION CODE R.REVATHI # PG Scholar #, Bharathiyar Institute Of Engineering for Women, Deviyakurichi, Salem(DT) India

More information

Enabling Public Auditing for Secured Data Storage in Cloud Computing

Enabling Public Auditing for Secured Data Storage in Cloud Computing IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 5 (May. 2013), V3 PP 01-05 Enabling Public Auditing for Secured Data Storage in Cloud Computing 1 Er.Amandeep Kaur,

More information

IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD

IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD 1 Ms.Nita R. Mhaske, 2 Prof. S.M.Rokade 1 student, Master of Engineering, Dept. of Computer Engineering Sir Visvesvaraya

More information

SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE

SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE International Journal of Computer Network and Security(IJCNS) Vol 7. No.1 2015 Pp. 1-8 gopalax Journals, Singapore available at : www.ijcns.com ISSN: 0975-8283 ----------------------------------------------------------------------------------------------------------------------------------------------------------

More information

How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System

How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System REVIEW ARTICAL A Novel Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage Dumala Harisha 1, V.Gouthami 2 1 Student, Computer Science & Engineering-Department, JNTU Hyderabad India

More information

Third Party Auditing For Secure Data Storage in Cloud through Trusted Third Party Auditor Using RC5

Third Party Auditing For Secure Data Storage in Cloud through Trusted Third Party Auditor Using RC5 Third Party Auditing For Secure Data Storage in Cloud through Trusted Third Party Auditor Using RC5 Miss. Nupoor M. Yawale 1, Prof. V. B. Gadicha 2 1 Student, M.E. Second year CSE, P R Patil COET, Amravati.INDIA.

More information

AN APPROACH TOWARDS FUNCTIONING OF PUBLIC AUDITABILITY FOR CLOUD ENRICHMENT

AN APPROACH TOWARDS FUNCTIONING OF PUBLIC AUDITABILITY FOR CLOUD ENRICHMENT INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN APPROACH TOWARDS FUNCTIONING OF PUBLIC AUDITABILITY FOR CLOUD ENRICHMENT Mohd Abdul Shoaib 1, Akheel Mohammed 2, Ayesha 3

More information

Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving,

Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving, Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Third Party

More information

A Survey on Privacy-Preserving Techniques for Secure Cloud Storage

A Survey on Privacy-Preserving Techniques for Secure Cloud Storage Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,

More information

preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.

preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design. Privacy-Preserving Public Auditing For Secure Cloud Storage ABSTRACT: Using cloud storage, users can remotely store their data and enjoy the on-demand high-quality applications and services from a shared

More information

ADVANCE SECURITY TO CLOUD DATA STORAGE

ADVANCE SECURITY TO CLOUD DATA STORAGE Journal homepage: www.mjret.in ADVANCE SECURITY TO CLOUD DATA STORAGE ISSN:2348-6953 Yogesh Bhapkar, Mitali Patil, Kishor Kale,Rakesh Gaikwad ISB&M, SOT, Pune, India Abstract: Cloud Computing is the next

More information

Secure Cloud StorageForPrivacy-Preserving Public Audit

Secure Cloud StorageForPrivacy-Preserving Public Audit RESEARCH ARTICLE OPEN ACCESS Secure Cloud StorageForPrivacy-Preserving Public Audit ShekhAhamadhusen D., Prof. Rahul Deshmukh Abstract- In Cloud Environment, using cloud storage service, users can remotely

More information

Secrecy Maintaining Public Inspecting For Secure Cloud Storage

Secrecy Maintaining Public Inspecting For Secure Cloud Storage Secrecy Maintaining Public Inspecting For Secure Cloud Storage K.Sangamithra 1, S.Tamilselvan 2 M.E, M.P.Nachimuthu.M.Jaganathan Engineering College, Tamilnadu, India 1 Asst. Professor, M.P.Nachimuthu.M.Jaganathan

More information

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD S.REVATHI B.HASEENA M.NOORUL IZZATH PG Student PG Student PG Student II- ME CSE II- ME CSE II- ME CSE Al-Ameen Engineering

More information

Cloud Data Storage Security and Public Auditing

Cloud Data Storage Security and Public Auditing A Meticulous Description of Applying Watermarking Technique for Secure Cloud Storage 1 M. Guresh, 2 R. Suresh 1 M.Tech 2 nd Year, Department of CSE, CREC Tirupati, AP, India 2 Professor & HOD, Department

More information

Cloud Data Storage Services Considering Public Audit for Security

Cloud Data Storage Services Considering Public Audit for Security Global Journal of Computer Science and Technology Cloud and Distributed Volume 13 Issue 1 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

Improving data integrity on cloud storage services

Improving data integrity on cloud storage services International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services

More information

Performance Evaluation Panda for Data Storage and Sharing Services in Cloud Computing

Performance Evaluation Panda for Data Storage and Sharing Services in Cloud Computing Performance Evaluation Panda for Data Storage and Sharing Services in Cloud Computing Gunnala Ajay Kumar M.Tech Student Department of CSE Global Group Of Institutions Batasingaram, Ranga Reddy (Dist),

More information

How To Ensure Data Integrity In Cloud Computing

How To Ensure Data Integrity In Cloud Computing A Novel Approach for public exploration Data with Effective user Denial in the cloud Mahankali Anitha PG Scholar Department of CSE J.Vijayasree Assistant professor Department of CSE Dr.M.V.Siva Prasad

More information

15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM

15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM Dhanashri Bamane Vinayak Pottigar Subhash Pingale Department of Computer Science and Engineering SKN

More information

ISSN 2278-3091. Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability

ISSN 2278-3091. Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability Outsourcing and Discovering Storage Inconsistencies in Cloud Through TPA Sumathi Karanam 1, GL Varaprasad 2 Student, Department of CSE, QIS College of Engineering and Technology, Ongole, AndhraPradesh,India

More information

Security in Cloud Network

Security in Cloud Network Security in Cloud Network Vimula Shwetha, (M.Tech) CSE Dept, KCEA, Nizamabad, ABSTRACT: Cloud computing, large number of computers that are connected through a real-time communication network. The users

More information

Trusted Public Auditing Process for Secure Cloud Storage

Trusted Public Auditing Process for Secure Cloud Storage Trusted Public Auditing Process for Secure Cloud Storage K.Adhiyaman 1, A. Jesudoss 2, D.Saravanan 3 1 Final Year MCA, Faculty of Computing, Department of MCA Sathyabama University, Chennai,Tamil Nadu,

More information

Enabling Data Security in Cloud Computing Using Third Party Auditing and Encryption Services

Enabling Data Security in Cloud Computing Using Third Party Auditing and Encryption Services Enabling Data Security in Cloud Computing Using Third Party Auditing and Encryption Services Amal Jose, M.Sambath, S.Ravi PG Scholar, Department of Computer Science & Engineering, Hindustan University,

More information

PRIVACY PRESERVING AND BATCH AUDITING IN SECURE CLOUD DATA STORAGE USING AES

PRIVACY PRESERVING AND BATCH AUDITING IN SECURE CLOUD DATA STORAGE USING AES PRIVACY PRESERVING AND BATCH AUDITING IN SECURE CLOUD DATA STORAGE USING AES 1 SANTOSH P. JADHAV, 2 B. R. NANDWALKAR 1,2 Department of Computer Engineering, Late G.N.Sapkal collage of engineering, University

More information

Privacy-Preserving Public Auditing & Data Intrgrity for Secure Cloud Storage

Privacy-Preserving Public Auditing & Data Intrgrity for Secure Cloud Storage Privacy-Preserving Public Auditing & Data Intrgrity for Secure Cloud Storage Imran Ahmad Student, M.Tech Dept. Computer Science & Engineering Patel Institute of Technology Bhopal, India imimran86@gmail.com

More information

Secure Privacy Preserving Public Auditing for Cloud storage

Secure Privacy Preserving Public Auditing for Cloud storage Secure Privacy Preserving Public Auditing for Cloud storage Sathiskumar R 1, Dr.Jeberson Retnaraj 2 Department of Information Technology, Sathyabama University, Chennai, India 1 Department of Information

More information

Selective dependable storage services for providing security in cloud computing

Selective dependable storage services for providing security in cloud computing Selective dependable storage services for providing security in cloud computing Gade Lakshmi Thirupatamma*1, M.Jayaram*2, R.Pitchaiah*3 M.Tech Scholar, Dept of CSE, UCET, Medikondur, Dist: Guntur, AP,

More information

SHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING

SHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING SHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING Er. Kavin M 1, Mr.J.Jayavel 2 1 PG Scholar, 2 Teaching Assistant, Department of Information Technology, Anna University Regional

More information

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction Enhancing Data Security in Cloud Storage Auditing With Key Abstraction 1 Priyadharshni.A, 2 Geo Jenefer.G 1 Master of engineering in computer science, Ponjesly College of Engineering 2 Assistant Professor,

More information

How To Ensure Data Storage Security In Cloud Computing

How To Ensure Data Storage Security In Cloud Computing Incorporation of Third Party Auditor for Safe and Secure Data Storage in Cloud Computing Abstract: Sanjeeva Polepaka Associate Professor, Department of CSE, Malla Reddy Engineering College. Cloud Computing

More information

Authorized Auditing of Big Data Stored on Cloud with Auditability Aware Data Scheduling

Authorized Auditing of Big Data Stored on Cloud with Auditability Aware Data Scheduling Authorized Auditing of Big Data Stored on Cloud with Auditability Aware Data Scheduling Surapriya Swain 1, Prof. Saurabh Gupta 2 1 Department of Computer Engineering, GSMCOE, Balewadi, Savitribai Phule

More information

Index Terms : cloud computing, Distributed Storage, error detection, data recovery, SHA, dynamic block operations

Index Terms : cloud computing, Distributed Storage, error detection, data recovery, SHA, dynamic block operations Revisiting Secure Cloud Storage by Replacing Token Generation With SHA Ms. Bhagyashree Alhat (1), Prof. Amar Buchade(2) Pune Institute of Computer Technology, University of Pune,PG Student(1), Assistant

More information

Public Auditability and Privacy preserving in Cloud Storage

Public Auditability and Privacy preserving in Cloud Storage Public Auditability and Privacy preserving in Cloud Storage Kishan Lathkar, Ambulgekar H. P SGGS IE&T Nanded, Maharashtra India lathkarkishan@sggs.ac.in, ambulgekar@sggs.ac.in Abstract: Cloud computing

More information

Verifying Correctness of Trusted data in Clouds

Verifying Correctness of Trusted data in Clouds Volume-3, Issue-6, December-2013, ISSN No.: 2250-0758 International Journal of Engineering and Management Research Available at: www.ijemr.net Page Number: 21-25 Verifying Correctness of Trusted data in

More information

Cloud Server Storage Security Using TPA

Cloud Server Storage Security Using TPA Cloud Server Storage Security Using TPA I K.Meenakshi, II Victo Sudha George I Student (M.Tech), DR. MGR Educational and Research Institute, India II Assisstant Professo, DR. MGR Educational and Research

More information

Preserving Data Integrity and Public Auditing for Data Storage in Cloud Computing

Preserving Data Integrity and Public Auditing for Data Storage in Cloud Computing www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Issue - 8 August, 2014 Page No. 7829-7833 Preserving Data Integrity and Public Auditing for Data Storage

More information

Keywords: Cloud Storage, Shared Data, Privacy Preserving, Secret Sharing, Authentication, Third Party Auditor(TPA).

Keywords: Cloud Storage, Shared Data, Privacy Preserving, Secret Sharing, Authentication, Third Party Auditor(TPA). Volume 5, Issue 4, April 215 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Data Security in

More information

Public Auditing For Shared Data with Symposium on Security in the Cloud

Public Auditing For Shared Data with Symposium on Security in the Cloud DOI 10.4010/2015.463 ISSN2321 3361 2015 IJESC Research Article October 2015 Issue Public Auditing For Shared Data with Symposium on Security in the Cloud M. SUBHA, M.Sc, M.Phil, M.CA (Phd) 1, R.NIRMALA

More information

Keywords: - Ring Signature, Homomorphic Authenticable Ring Signature (HARS), Privacy Preserving, Public Auditing, Cloud Computing.

Keywords: - Ring Signature, Homomorphic Authenticable Ring Signature (HARS), Privacy Preserving, Public Auditing, Cloud Computing. Survey on Privacy Preserving Public Auditing Techniques for Shared Data in the Cloud Kedar Jayesh Rasal 1, Dr. S.V.Gumaste 2, Sandip A. Kahate 3 Computer Engineering, Pune University, SPCOE, Otur, Pune,

More information

Privacy Preserving Public Auditing for Data in Cloud Storage

Privacy Preserving Public Auditing for Data in Cloud Storage Privacy Preserving Public Auditing for Data in Cloud Storage M.Priya 1, E. Anitha 2, V.Murugalakshmi 3 M.E, Department of CSE, Karpagam University, Coimbatore, Tamilnadu, India 1, 3 M.E, Department of

More information

A Review on Privateness-Retaining Public Auditing for Secure Cloud Storage

A Review on Privateness-Retaining Public Auditing for Secure Cloud Storage Volume 3 Issue 1 March 2015 ISSN: 2320-9984 (Online) International Journal of Modern Engineering & Management Research Website: www.ijmemr.org A Review on Privateness-Retaining Public Auditing for Secure

More information

Near Sheltered and Loyal storage Space Navigating in Cloud

Near Sheltered and Loyal storage Space Navigating in Cloud IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 8 (August. 2013), V2 PP 01-05 Near Sheltered and Loyal storage Space Navigating in Cloud N.Venkata Krishna, M.Venkata

More information

Implementation of Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage

Implementation of Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage Implementation of Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage 1 A. MsVaishali Patil, 2 B. Prof. Archana Lomte Dept of Computer,BSIOTR, Pune ABSTRACT Cloud computing is speculated

More information

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer

More information

Surveying Cloud Storage Correctness using TPA with BLS

Surveying Cloud Storage Correctness using TPA with BLS Surveying Cloud Storage Correctness using TPA with BLS Priyanka Dehariya 1, Prof. Shweta Shrivastava 2, Dr. Vineet Richaraya 3 1 M.Tech Scholar (CSE), LNCT, Bhopal 2 Asst.Professors, (CSE Department),

More information

SECURE EFFICIENT STORAGE IN CLOUD COMPUTING USING KEY AGGREGATE ENCRYPTION

SECURE EFFICIENT STORAGE IN CLOUD COMPUTING USING KEY AGGREGATE ENCRYPTION SECURE EFFICIENT STORAGE IN CLOUD COMPUTING USING KEY AGGREGATE ENCRYPTION * Ms.K.V.Vidhya Kumari, # Mrs.K.L.Neela * PG, # Assistant professor Department Of CSE, University College Of Engineering-629004

More information

Securing Cloud Data Storage

Securing Cloud Data Storage IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661 Volume 1, Issue 6 (July-Aug. 2012), PP 43-49 Securing Cloud Data Storage S. P. Jaikar 1, M. V. Nimbalkar 2 1,2 (Department of Information

More information

How To Design A Cloud Data Storage Service For A Cloud Computer System

How To Design A Cloud Data Storage Service For A Cloud Computer System Ensuring Security Services for Data Storing and Data Sharing in Cloud Computing D. Raman 1, Bojja Vamshikrishna 2 1 Associate Professor Department of Computer Science and Engineering, Vardhaman College

More information

Efficient Remote Data Possession Checking In Critical Information Infrastructures Ensuring Data Storage Security In Cloud Computing

Efficient Remote Data Possession Checking In Critical Information Infrastructures Ensuring Data Storage Security In Cloud Computing Efficient Remote Data Possession Checking In Critical Information Infrastructures Ensuring Data Storage Security In Cloud Computing Dr. T.Nalini 1, Dr.K.Manivannan 2,Vaishnavi Moorthy 3 1 Professor, Department

More information

CLOUD BASED STORAGE SERVICES FOR SECURITY FOLLOWED BY THE DATA AUTHENTICATION

CLOUD BASED STORAGE SERVICES FOR SECURITY FOLLOWED BY THE DATA AUTHENTICATION INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE CLOUD BASED STORAGE SERVICES FOR SECURITY FOLLOWED BY THE DATA AUTHENTICATION Akheel Mohammed 1, Dr.Vasumathi 2, Mir Ahmed Ali

More information

Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing.

Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing. Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Privacy - Preserving

More information

M. Nathiya 2 B.Tech. (IT), M.E. (CSE), Assistant Professor, Shivani Engineering College, Trichy, Tamilnadu, India.

M. Nathiya 2 B.Tech. (IT), M.E. (CSE), Assistant Professor, Shivani Engineering College, Trichy, Tamilnadu, India. ISSN: 2321-7782 (Online) Volume 2, Issue 5, May 2014 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com Robust Data

More information

Cloud Data Service for Issues in Scalable Data Integration Using Multi Authority Attribute Based Encryption

Cloud Data Service for Issues in Scalable Data Integration Using Multi Authority Attribute Based Encryption Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,

More information

RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES

RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES 1 MD ISMAIL Z, 2 ASHFAQUE AHAMED K. 1 PG Scholar,Department of Computer Science, C.Abdul Hakeem College Of Arts and Science,Melvisharam.

More information

Erasure correcting to enhance data security in cloud data storage

Erasure correcting to enhance data security in cloud data storage Erasure correcting to enhance data security in cloud data storage K.Shrividhya Department of computer science- Vels University shrividhya224@gmail.com A.Sajeevram Department of computer science Vels University

More information

Privacy-Preserving Public Auditing For Secure Cloud Storage

Privacy-Preserving Public Auditing For Secure Cloud Storage IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 4, Ver. III (Jul Aug. 2014), PP 33-38 Privacy-Preserving Public Auditing For Secure Cloud Storage Salve

More information

Insuring Security for Outsourced Data Stored in Cloud Environment

Insuring Security for Outsourced Data Stored in Cloud Environment Insuring Security for Outsourced Data Stored in Cloud Environment Durga Priya.G Department of Information Technology Sri Sairam Engineering College Chennai-45, India Soma Prathibha Department of Information

More information

Secure Public Auditing for Cloud Data Storage

Secure Public Auditing for Cloud Data Storage Secure Public Auditing for Cloud Data Storage Madhumati B. Shinde 1, Dr. Sonkamble Sulochana B 2 1 P.G. Student, Computer Department, JSPM, NTC, RSSOER, Narhe, Savitribai Phule Pune University, Pune, India

More information

International Journal of Advance Research in Computer Science and Management Studies

International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 12, December 2014 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online

More information

N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT

N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 1 M.Tech Student, Department of Computer Science and Engineering, S.R.M. University Chennai 2 Asst.Professor,

More information

Identifying Data Integrity in the Cloud Storage

Identifying Data Integrity in the Cloud Storage www.ijcsi.org 403 Identifying Data Integrity in the Cloud Storage Saranya Eswaran 1 and Dr.Sunitha Abburu 2 1 Adhiyamaan College of Engineering, Department of Computer Application, Hosur. 2 Professor and

More information

ENABLING AUDITABILITY FOR SECURE CLOUD STORAGE USING TPA

ENABLING AUDITABILITY FOR SECURE CLOUD STORAGE USING TPA ENABLING AUDITABILITY FOR SECURE CLOUD STORAGE USING TPA 1 Chennuri. Kranthi kumar, 2 Vishakha Lokhande 1 M.Tech Student, Department of CSE, KG reddy College Of Engineering and Technology, Chilkur village,

More information

Secure Data transfer in Cloud Storage Systems using Dynamic Tokens.

Secure Data transfer in Cloud Storage Systems using Dynamic Tokens. Secure Data transfer in Cloud Storage Systems using Dynamic Tokens. P.Srinivas *,K. Rajesh Kumar # M.Tech Student (CSE), Assoc. Professor *Department of Computer Science (CSE), Swarnandhra College of Engineering

More information

Data Integrity and Dynamic Storage Way in Cloud Computing

Data Integrity and Dynamic Storage Way in Cloud Computing 1 Data Integrity and Dynamic Storage Way in Cloud Computing Dinesh.C, P.G Scholar, Computer Science and Engineering, Mailam Engineering College, Mailam, Tamilnadu. Abstract It is not an easy task to securely

More information

Efficient Integrity Checking Technique for Securing Client Data in Cloud Computing

Efficient Integrity Checking Technique for Securing Client Data in Cloud Computing International Journal of Electrical & Computer Sciences IJECS-IJENS Vol: 11 No: 05 41 Efficient Integrity Checking Technique for Securing Client Data in Cloud Computing Abstract-- It has been widely observed

More information

Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage

Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage Pranita Bakka 1, Dr. Jayashree Agarkhed 2 1 P.G.Student, Department of Computer Science & Engineering,

More information

A Survey on Data Integrity of Cloud Storage in Cloud Computing

A Survey on Data Integrity of Cloud Storage in Cloud Computing A Survey on Data Integrity of Cloud Storage in Cloud Computing A B S T R A C T Mr.Vitthal Raut, Prof. Suhasini Itkar Department Computer Engineering, PES Modern College of Engineering, Pune, India. raut.vitthal@gmail.com,

More information

An Empirical Model of Data Monitoring Service over cloud

An Empirical Model of Data Monitoring Service over cloud An Empirical Model of Data Monitoring Service over cloud 1 N.Sowjanya, 2 Ch. Swapna Priya 1 Final M.Tech Student, 2 Assistant Professor 1,2 Dept of Computer Science and Engineering 1,2 Pydah College of

More information

Privacy preserving technique to secure cloud

Privacy preserving technique to secure cloud Vitthal S. Gutte Pune University, MIT College of engineering, Kothrud, Pune 411038, India vitthalgutte2014@gmail.com Privacy preserving technique to secure cloud Prof. Priya Deshpande Pune University,

More information

EFFICIENT DISCOVERY OF INTEGRITY AUTOMATION IN HYBRID CLOUD COMPUTING

EFFICIENT DISCOVERY OF INTEGRITY AUTOMATION IN HYBRID CLOUD COMPUTING INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE EFFICIENT DISCOVERY OF INTEGRITY AUTOMATION IN HYBRID CLOUD COMPUTING K.Saipriya 1, A.Ravi Kumar 2 1 M.Tech Student, Dept of

More information

OVERVIEW OF SECURITY ISSUES IN CLOUD COMPUTING

OVERVIEW OF SECURITY ISSUES IN CLOUD COMPUTING OVERVIEW OF SECURITY ISSUES IN CLOUD COMPUTING K. Arumugam 1, P. Sumathi 2 1 Research Scholar/Department Of Computer Science, Government Arts College, Coimbatore (India) 2 Assistant Professor/Department

More information

Efficient Cloud Computing with Secure Data Storage using AES

Efficient Cloud Computing with Secure Data Storage using AES Efficient Cloud Computing with Secure Data Storage using AES Mr. Santosh P. Jadhav 1, Prof. B. R. Nandwalkar 2 Department of Computer Engineering, Late G.N.Sapkal Collage of Engineering, University of

More information

Remote Data Auditing Scheme in Secured Cloud Storage Environment

Remote Data Auditing Scheme in Secured Cloud Storage Environment Remote Data Auditing Scheme in Secured Cloud Storage Environment Sangeetha.T 1,Saranya.M 2 PG Scholar 1, Assistant Professor 2 Nandha College of Technology, Erode, India sangee9110@gmail.com 1,saranyamcse88@gmail.com

More information

Analysis of Secure Cloud Data Sharing Within a Group

Analysis of Secure Cloud Data Sharing Within a Group Analysis of Secure Cloud Data Sharing Within a Group Ms. uri Pande* Department of CSE, GHRAET Nagpur (M.S), India, Prof. Vikrant Chole Dept of Computer Science & Engg Nagpur (M.S.), India Abstract In this

More information

A Survey on Secure Auditing and Deduplicating Data in Cloud

A Survey on Secure Auditing and Deduplicating Data in Cloud A Survey on Secure Auditing and Deduplicating Data in Cloud Tejaswini Jaybhaye 1 ; D. H. Kulkarni 2 PG Student, Dept. of Computer Engineering, SKNCOE, Pune, India 1 Assistant Professor, Dept. of Computer

More information

ENABLING PUBLIC AUDITABILITY AND DATA DYNAMICS FOR STORAGE SECURITY IN CLOUD COMPUTING

ENABLING PUBLIC AUDITABILITY AND DATA DYNAMICS FOR STORAGE SECURITY IN CLOUD COMPUTING ENABLING PUBLIC AUDITABILITY AND DATA DYNAMICS FOR STORAGE SECURITY IN CLOUD COMPUTING 1 P.ILAMATHY M.TECH-INFORMATION TECHNOLOGY AMS ENGINEERING COLLEGE NAMAKKAL, INDIA ilamathyponnuvel@gmail.com 2 V.ANITHA,M.E.

More information

Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System

Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System 1 K.Valli Madhavi A.P vallimb@yahoo.com Mobile: 9866034900 2 R.Tamilkodi A.P tamil_kodiin@yahoo.co.in Mobile:

More information

Data Integrity Check using Hash Functions in Cloud environment

Data Integrity Check using Hash Functions in Cloud environment Data Integrity Check using Hash Functions in Cloud environment Selman Haxhijaha 1, Gazmend Bajrami 1, Fisnik Prekazi 1 1 Faculty of Computer Science and Engineering, University for Business and Tecnology

More information

Secure Distribution of File on Cloud

Secure Distribution of File on Cloud Secure Distribution of File on Cloud Niyamat I. Ujloomwale, Ranjana Badre Dept. of Computer, MIT Academy of Engineering, Alandi, Savitri Phule Pune University, Pune, India Dept. of Computer, MIT Academy

More information

Public Auditing for Shared Data in the Cloud by Using AES

Public Auditing for Shared Data in the Cloud by Using AES Public Auditing for Shared Data in the Cloud by Using AES 1 Syagamreddy Subbareddy, 2 P.Tejaswi, 3 D.Krishna 1 M.Tech(CSE) Pursuing, 2 Associate Professor, 3 Associate Professor,HOD, 1,2,3 Dept. of Computer

More information

IJCSIET-ISSUE4-VOLUME2-SERIES1 Page 1

IJCSIET-ISSUE4-VOLUME2-SERIES1 Page 1 Hash Message Authentication for Public Auditing in Secure Cloud Storage MK Siva Krishna Kanth 1, Dr.N. Chandra Sekhar Reddy 2, A. Praveen 3 Professor 2, CSE Dept., Professor 3, IT Dept., Institute of Aeronautical

More information

A Secure and Dependable Cloud Storage Service in Cloud Computing

A Secure and Dependable Cloud Storage Service in Cloud Computing A Secure and Dependable Cloud Storage Service in Cloud Computing Yalla Ram Charan MTech Student Department of CSE Sri Venkateswra College of Engineering & Technology Abstract: Cloud storage is a model

More information

A Survey on Secure Storage Services in Cloud Computing

A Survey on Secure Storage Services in Cloud Computing Global Journal of Computer Science and Technology Cloud & Distributed Volume 12 Issue 12 Version 1.0 Year 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

A Survey Paper on Secure Auditing and Maintaining Block Level Integrity with Reliability of Data in Cloud

A Survey Paper on Secure Auditing and Maintaining Block Level Integrity with Reliability of Data in Cloud A Survey Paper on Secure Auditing and Maintaining Block Level Integrity with Reliability of Data in Cloud Aishwarya R. Kumthekar 1, Prof. Jyoti Raghatwan 2 1 M.E. II Computer, aish275@gmail.com, 8806967523

More information

Data Storage Security in Cloud Computing

Data Storage Security in Cloud Computing Data Storage Security in Cloud Computing Manoj Kokane 1, Premkumar Jain 2, Poonam Sarangdhar 3 1, 2, 3 Government College of Engineering and Research, Awasari, Pune, India Abstract: Cloud computing is

More information

Privacy-Preserving Public Auditing for Secure Cloud Storage

Privacy-Preserving Public Auditing for Secure Cloud Storage Privacy-Preserving Public Auditing for Secure Cloud Storage Prof. N.L. Chourasiya, Dayanand Lature, Arun Kumavat, Vipul Kalaskar, Sanket Thaware. kptarun74@gmail.com Contact no: 9970131164 Abstract The

More information