ENHANCEMENT OF CLOUD SECURITY THROUGH SCHEDULED HIDING OF DATA

Size: px
Start display at page:

Download "ENHANCEMENT OF CLOUD SECURITY THROUGH SCHEDULED HIDING OF DATA"

Transcription

1 INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) International Journal of Computer Engineering and Technology (IJCET), ISSN (Print), ISSN (Print) ISSN (Online) Volume 6, Issue 3, March (2015), pp IAEME: Journal Impact Factor (2015): (Calculated by GISI) IJCET I A E M E ENHANCEMENT OF CLOUD SECURITY THROUGH SCHEDULED HIDING OF DATA Aslam B Nandyal 1, Rupesh Mishra 2, Shripad Thombare 3 1 Departement of Computer Engineering SFIT/University of Mumbai, India 2 Department of Computer Engineering SFIT/ University of Mumbai, India 3 Department of Information Technology SFIT/ University of Mumbai, India ABSTRACT People now a days have adapted themselves towards cloud computing and its unparallel advantages for making their life, much simpler and easier one. Often, cloud users are asked to post their valuable and private information to the cloud, such as credit/debit card numbers, passwords, PINs, account numbers etc. These data are stored in various locations during their computations and cached as well without the user s intervention and concern. Hence there is a need to provide security to the data stored in the cloud. The proposed system mainly aims at restricting the access to the cloud data in a systematic manner. Whenever users are entering their private information to the cloud they can specify the timeto-live value. After the specified time-to-live value the data becomes inaccessible. On the other hand if the user still wants to access, he should request the admin for the access grant. On approval by the admin the user will receive the key from the system through which the data can be accessed. Data encryption techniques and Shamir secret sharing algorithm enhances the overall security of the proposed system, as the private keys itself are not stored, only the shares generated are stored. Keywords: Cached Copies, Cloud Computing, Cloud Security, Scheduled Hiding. 1. INTRODUCTION Security issue has played the most important role in hindering cloud computing acceptance. Without doubt, putting your data, running your software on someone else s hard disk using someone else s CPU appears daunting to many. Well known security issues such as data loss, phishing pose serious threat to organization s data and software. 24

2 As people depend more and more on the internet and cloud technology, security of their privacy takes more and more risks. Data on the cloud needs to be processed, transformed and stored by the current computer system or network. Several copies of the data are produced and stored in the network of systems. People are unaware of all these processes and possess no knowledge about the copies of data and hence cannot control them. There is a serious threat that the copies of data may get leaked. Data on the cloud may also get leaked by the negligence of the service providers of the cloud. Such problems of security present challenges to protect privacy of the people. This privacy can be leaked via the Cloud service Providers (CSP s) negligence, hacker s intrusion or some legal actions. These problems present formidable challenges to protect people s privacy. This system presents a solution to implement scheduled hiding of data. This system defines two new modules, a self destruct method object that is associated with each secret key part and a survival time parameter for each secret key part. This system can meet the requirements of self-destructing data with controllable survival time while users can use this system as a general object storage system. Scheduled hiding of data mainly aims at protecting the privacy of the data of the user. All the data corresponding to the respective users become untraceable after a user-specified time, without any user intervention. However if the respective users still wants the data back after the user specified time, the user can send a request, which is to be approved by the admin. After which the user can gain access to the data. This system meets the challenge of data privacy through a novel integration of cryptographic techniques with active storage techniques based on T10 OSD standard. Through functionality and security properties evaluations of the system prototype, the results demonstrate this system is practical to use and meet all the privacy preserving goals described. Previous works on the cloud security, such as system named vanish, in this they have implemented the self destructing data which can be used in various scenarios one such example is of .[1] In vanish, suppose if you are sending an to someone, once the content has been read by the recipient it is no longer of use. To elaborate, suppose if a person named Ramu wants to discuss some sensitive topic with his friend Somu, over an . Once Somu has read the content of the , it need not be residing in his client; more specifically it need not be in readable format. That is, should be self destructive after the user specified time. Let us say Ramu had sent an mentioning it should be in the readable format only till 10 am tomorrow. In fact, Ramu would prefer that these s disappear early and not be read by his friend rather than risk disclosure to unintended parties. After that particular time period the will become corrupt or unreadable, and the recipient will not be able to read that after that mentioned time. Safevanish, an improvement of the previous version vanish. [2] The previous system vanish was vulnerable to the hopping attacks and the sniffing attacks. SafeVanish proposes a new scheme to prevent hopping attacks by way of extending the length range of the key shares to increase the attack cost substantially, and do some improvement on the Shamir secret sharing algorithm implemented in the original Vanish system. In both systems mentioned above after the user stipulated time, the data loss was inevitable. That is after the user specified time the data once lost cannot be traced back. There was no chance of getting the data back from the system after self destruction. To overcome this drawback this system of scheduled hiding of data is introduced where in the data can be recovered back after the user specified time as well. Let us say a person wants to store his/her data for a specified period of time after which the data should be inaccessible. For example some Organization wants to keep some data in the cloud for their business partners for a particular time period and after that time period it should not be accessible. And still after that time any of the business partners still requires access to that particular data, they can send the requests to the organization. After the approval from the organization the respective Business partners can access that data from the one time password 25

3 provided from the system. Thus through the scheduled hiding of the data system the vulnerability of the data loss can be restricted. 1.1 Methodologies In this system Shamir secret sharing scheme has been used to store the respective private keys for each file stored. The Shamir secret Sharing Scheme has been explained in brief below. Shamir's Secret Sharing is an algorithm in cryptography created by Adi Shamir. It is a form of secret sharing, where a secret is divided into parts, giving each participant its own unique part, where some of the parts or all of them are needed in order to reconstruct the secret. Here the main motive is to hide a secret may be any information or data. In order to do this securely, in Shamir secret sharing scheme, a secret is divided into N number of shares. These shares will not resemble to the actual data in any manner it will be totally different, we actually use the term shadows for the secret shares generated. The original idea for recovering a secret is to divide it into several pieces so that if later on, you have some of these pieces, not all of them necessarily, it is possible to recover the secret that had been hidden. eg. Consider an example of writing a secret on a piece of paper and cutting it into several pieces, later distributing these pieces. In order to reconstruct it we need all the pieces previously generated. But in such case even if we lose one piece of paper then you will not be able to regenerate the hidden data. The actual scenario is much more complicated. The aim is to obtain different values from the secret, so that these values don t give clues about the content of the secret. Working of the Shamir secret sharing scheme is given below. N shadows/shares are generated from the secret data that is to be hidden. We need a minimum of K shadows/shares out of N to regenerate the hidden data. This adds to the overall security to the system, where only the shares generated from the keys are stored in the system and keys will not be stored corresponding to each file respectively. Apart from using the Shamir secret sharing algorithm, the limitation of the various systems that were working on the self destructive data such as Vanish or SafeVanish, was that the data loss was inevitable. That is after the user specified time the data pertaining to the respective user would be destructed forever, that the user cannot trace the data back. Using the Scheduled hiding of data system, this limitation came be overcome. In the scheduled hiding of Data system the contents of the file will be in the encrypted manner using the AES algorithm, Also the keys corresponding to the files will not be stored rather only the shares generated will be stored. Here the user can get the data back even after the expiration period or the time-to-live value. This system helps in gaining the customer s faith in cloud service providers by giving them the data security without fearing the data loss. 2. CLOUD COMPUTING Cloud computing is a technology that provides an on request network access to a pool of computing resources that are shared, and that can be managed with minimum efforts. Cloud is a distributed and parallel computing system that consists of computers that are inter connected and virtualized, which can be made available dynamically on demand and presented as one more computing resources based on the agreement made between the consumers and the providers. It is a form of computing where the user accepts the IT related capabilities as services rather than a product on the internet. The main purpose of the cloud computing technology is to provide cost effective service on request of computing infrastructure with good quality of service levels. Most of the application developers on cloud struggle to imbibe security. In other cases, developers are incapable of providing real security with currently available technological capabilities. 26

4 The architecture of cloud computing involves multiple cloud components interacting with each other about the various data they are holding on to, thus helping the user to get to the required data at a faster rate. Cloud is more focused on the concepts of frontend and backend. The front end is the consumer who requests for the data, whereas the backend is the numerous data storage device, server which makes the cloud. 2.1 Understanding Cloud Computing Users connect the cloud as a single application, a device or a document. All the things inside the cloud system such as the hardware in the cloud and the operating system that manages the hardware connections are invisible. Cloud computing starts with the user interface seen by the individual users. This is how the users give their request which then gets passed to the system management, which finds the appropriate resources and then calls the system s appropriate provisioning services. Data storage is mainly achieved by cloud computing. Data is stored on multiple servers which are maintained by the third party. The user finds a virtual server, it appears as if the data is stored in a particular place with a specific name on a particular server, but in reality this does not happen. It s just used to reference the virtual space of the cloud. In reality, the user s data could be stored on any one or more of the computers used to create the cloud. 2.2 Cloud Computing Services Models The cloud service providers provide three different services based on different capabilities such as SaaS(Software as a Service), PaaS(Platform as Service), IaaS(Infrastructure as a service). Software as a Service (SaaS): when a user demands for a service through the thin client such as a browser over the internet, then the software running on the provider s cloud infrastructure is the provided to the client. Examples are Google Docs and salesforce.com. Platform as a Service (PaaS): The user can create and develop applications on the provider s platform. The provider gives the client a completely virtualized platform that consists of one or more servers, operating systems and specific applications. The main services that are provided by the providers are storage, database and scalability. Examples are Google App Engine, Mosso. Infrastructure as a Service (IaaS): The user or client gets access to the networking, storage and servers through a service API. IaaS provides the virtual infrastructure to the client, when the client pays on a per use basis. Examples are Flexiscale, AWS: Ec2 (Amazon web services). 2.3 Cloud computing Deployment models The security issues start with cloud deployment models. Depending on the infrastructure ownership, there are four deployment models of cloud computing as described below. The public cloud describes cloud computing in the traditional mainstream sense. Resources are dynamically made available on a self service basis over the Internet. It is usually owned and governed by a large organization. Examples include Amazon, Google s App Engine and Microsoft Azure. This is the most cost effective model providing the user with privacy and security issues since the physical location of the provider s infrastructure usually traverses numerous national boundaries. The private cloud is different from the traditional mainstream due to the use of the virtualization. It creates a single tenant environment. They have been criticized on the basis that the users or clients have to buy, build and manage them as such do not benefit from lower capital costs and less hands on management. This cloud is more suitable for the enterprises especially in mission and safety critical organizations. The community cloud is shared by various organizations among the specific community.the clouds may be managed by any one of the organizations or a third party. A typical example is the Open Cirrus Cloud Computing Testbed, which is a collection of Federated data centers across six 27

5 sites spanning from North America to Asia. The Hybrid cloud consists of any two of the three models mentioned above. Standardizations of APIs have lead to easier distribution of applications cross different cloud models. 3. CLOUD COMPUTING SECURITY ISSUE 3.1 Layered Framework for cloud Security It consists of Virtual Machine layer, Cloud Storage layer, Cloud Data Layer and Virtual Network Monitor Layer. The Cloud Storage Layer has a storage infrastructure which integrates resources from multiple cloud service providers to build a huge virtual storage system. The Virtual Network Monitor Layer combines both the hardware and software solutions in virtual machines to handle problems. However, there are many groups that are working and interested in developing standards and security for clouds. The Cloud Standards web sites are collecting and coordinating information about cloud related standards under development by other groups. The Cloud Security Alliance (CSA) is one of them. The CSA gathers solution providers, non profits and individuals to enter into discussion about the current and future best practices for information assurance in the cloud. Another group is Open web Application Security Project (OWASP). OWASP maintains a list of vulnerabilities to cloud based or software as a Service deployment model which is updated as the threat landscape changes. The Open Grid Forum publishes documents that contain security and infrastructural specification and information for grid computing developers and researchers. 3.2 Components Affecting Cloud Security There are various security issues for cloud computing as it consists of many technologies such as transaction management, resource allocation, operating systems, virtualization, cloud networks, load balancing, databases, memory management and concurrency control. For Instance, security in a cloud network should be secure which interconnects the systems in a cloud. Load balancing algorithms has to be executed very securely. Virtualizations in the cloud computing is also a security concerns. For example, mapping the virtual machines with the physical machines has to be carried out securely. Resource allocation and memory management algorithms need to be secure. Concurrency control involves encrypting the data as well as ensuring that appropriate policies are enforced for data sharing. Data mining techniques may be applicable to malware detection in clouds. 3.3 Security Issues Faced By Cloud Computing There are many security issues related to the cloud. The service provider of the cloud makes sure that the consumer does not face any problem such as data theft or loss of data. The cloud computing infrastructure uses latest technologies and services which are not fully evaluated with respect to security. Hence there is a lot of possibility that a user can penetrate the cloud by impersonating a legitimate user, thereby the entire cloud gets infected. Hence all the users that are using the cloud are affected. The security issues faced by the cloud computing are discussed as below Data Access Control Sometimes data that is confidential can be accessed illegally due to lack of the secured data access control. Protection of the secured data in cloud environment has become a major issue in a cloud based system. The longer the data exists in the cloud, the greater is the risk. 28

6 3.3.2 Data Integrity Sometimes the data may contain error while it is entered into the system by means of human error. Errors may even take place when the data is transmitted. Even malfunctions such as a disk crash can cause errors. Viruses in the cloud also can create errors. Hence a Data Integrity method is required in cloud computing so that data is kept intact Data Loss Data Loss is a very serious problem in cloud computing. Sometime the research and development teams may be sharing their important data online meanwhile if some intruder accesses the shared information illegally then there data is vulnerable. If everything is secure, if a sever goes down or crashes or is attacked by virus, the whole system would go down and data loss may occur. If the vendor closes due to legal or financial problems then there will be a loss of data for the consumers. The consumers won t be able to access the data because the data is no more available for the consumer as the vendor has shut down Data Theft External servers are used in cloud computing for the storage of data. The data that is stored in these servers is vulnerable and there is a chance that it can be stolen Data Location Consumers do not always know about the location of the data stored in the cloud. The vendor does not reveal where all the data is stored. High degree of data mobility is provided in the cloud computing. The data is stored in different countries. The data can be in particular location as requested by the consumer but it requires a contractual agreement between the cloud service provider and the consumer Security issues in provider level A cloud is secure only when there is a good security provided by the vendor to the customers. Provider should make a good security layer for the consumer and the user. And make sure that the server is well secured from all the external threats it may come across Privacy Issues Security of the customer s personal information is very important in case of cloud computing. Since most of the servers are external, the vendor should make sure that it is well secured from the operators Infected Application Service provider should have the full access to the server with all the rights for the purpose of maintenance and monitoring of server. So this will prevent any malicious user from uploading any infected application onto the cloud which will severely affect the customer and cloud computing services User level Issues User should take care that the data is not lost or tampered while entering the data into the system. 4. DESIGN AND IMPLEMENTATION The architecture of the Scheduled hiding of data system, it mainly consists of the following components. 29

7 4.1. Metadata Server (MDS) MDS is responsible for user management, server management, session management and file metadata management Application Node The application node is a client to use storage service for the scheduled hiding of data Storage Node Each storage node is an OSD. It contains two core subsystems :{key,value} store subsystem and active storage object(aso) runtime subsystem. The {key,value}store subsystem that is based on the object storage component is used for managing objects stored in storage nodes: lookup object, read/write object and so on. The object ID is used as key. The associated data and attributes are stored as values. The ASO runtime subsystem based on the active storage agent module n the object based storage system is used to process active storage request from users and manage method objects and policy objects. An Active storage object derives from a user object and has time to live (ttl) value property [3] [4]. The ttl value is used to trigger the self destruct operation. The ttl value of a user object is infinite so that a user object will not be deleted until a user deletes it manually. The ttl value of an active storage object is limited so an active object will be deleted when the value of the associated policy object is true. Fig 4.1 Scheduled data hiding system Design 4.4 Data process In the data process the users can upload the file to scheduled hiding system or they can download previously uploaded file. These two logics are explained below Uploading file process To upload a file user should specify the file, Key and ttl (Time to live) parameter. When the user uploads the file, the key will not be stored in the system. But the shadow parts generated from the actual key will be stored. This adds to the overall security of the system as the key itself will not 30

8 be stored only the shares generated from the Shamir Secret Sharing algorithm will be stored. Encrypt File procedure is used to encrypt the content of the file which has been uploaded. AES Encryption algorithm to encrypt the content of the file uploaded is been deployed Downloading File process While downloading the file, respective users must furnish file which they want to download along with corresponding key to that file. Once the user submits the key, then in the downloadfile procedure, key is generated from the key shares which are stored in the system. Then this key is matched with the entered key specified by the user. If these two keys match then the user will be given access to the file that is the download process begins. If there is a mismatch in the two keys then the download process will not initiated. Moreover before downloading we need to check the status of the file. That is once if the time-to-live value time has elapsed then the status of the file will be changed to inactive. In such cases even if the keys match the access to file will not be provided as the time-to-live value is elapsed. Once if the keys match and the file s status is still active then the content of the file will be decrypted. 5. CONCLUSION More and more people are moving towards cloud computing. Data privacy has become increasingly important in the Cloud environment. Scheduled hiding of data system is a new approach for protecting data privacy from attackers who retroactively obtain, through legal or other means, a user s stored data and private decryption keys. In this system, access is provided to the respective users of the file only during the stipulated time period, after which the user cannot access the file. Moreover, even if the user wants to access any file after the expiration period, then he has to request the admin for access. Only after the access grant from the admin the user can access the file. The usage of Shamir secret sharing scheme to store the private keys corresponding to the respective files, adds to the overall security of the system. As the shares created from the keys are stored rather than storing the key itself. Hence scheduled hiding of data system helps in tackling the data privacy concern. 6. REFERENCES 1. Roxana Gaembasu, Tadayo shikohne, Amit A Levy and Henry M Levy, Vanish: Increasing Data Privacy with self destructing data, 18th USENIX Security Symposium, USENIX Association, Montreal Canada on August 10-14, LingfangZeng, ShengjieXu, and DanFeng, SafeVanish: An Improved Data Self-Destruction for protecting Data privacy, 2nd IEEE International Conference on Cloud Computing Technology and Science (CloudCom), 2010 Date Nov Dec Tina Miriam John and John A. Chandy, Active Storage using Object based devices, Second International Workshop on High Performance I/O Systems and Data Intensive Computing (HiperIO 08). 4. 4] Yu ZHANG and Dan FENG, An Active Storage system for high performance computing, 22 nd International Conference on Advanced Information Networking and Applications. 5. LingjunQin and DinFeng, Active storage Framework for object based storage device, Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 06). 6. Seung Woo Son, et al., Enabling Active Storage on Parallel I/O Software Stacks, Mass Storage Systems and Technologies (MSST), 2010 IEEE 26th Symposium. pp

9 7. Yulai Xiett et al., Design and Evaluation of Oasis: An Active Storage Framework based on TIO OSD Standard, Mass Storage Systems and Technologies (MSST), 2011 IEEE 27 th Symposium pp Yang Tang, Patrick P.C. Lee, John C.S. Lui, and Radia Perlman, Secure Overlay Cloud Storage with Access Control and Assured Deletion. IEEE transactions on dependable and secure computing vol. 9, no. 6, Cong Wang, Qian Wang, Kui Ren and Wenjing Lou, Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing, INFOCOM, Proceedings IEEE Radia Perlman, File System Design with Assured Delete, Proceedings of the Third IEEE International Security in Storage Workshop (SISW'05) Mesnier M, Ganger G and Riedel. E, Object-based storage: pushing more functionality into storage, Potentials, IEEE Volume: 24, Issue: Yingping Lu, David H. C. Du and Tom Ruwart, QoS Provisioning Framework for an OSDbased Storage System, Proceedings of the 22nd IEEE / 13th NASA Goddard Conference on Mass Storage Systems and Technologies (MSST 2005) 13. Zhongying Niu et al., Implementing and Evaluating Security Controls for an Object- Based Storage System, 24 th IEEE Conference on Mass Storage Systems and Technologies (MSST 2007) 14. Yangwook Kang, Jingpei Yang and Ethan L. Miller, Object-based SCM: An Efficient Interface for Storage Class Memories, Mass Storage Systems and Technologies (MSST), 27th Symposium IEEE V. V. Dimakopoulos, A. Kinalis, S. Mastrogiannakis, E. Pitoura, The Smart Autonomous Storage (SMAS) System, Communications, Computers and signal Processing,. PACRIM. IEEE Pacific Rim Conference Rajiv Wickremesinghe, Jeffrey S. Chase and Jeffrey S. Vitter, Distributed Computing with Load-Managed Active Storage, Proceedings of the 11 th IEEE International Symposium on High Performance Distributed Computing HPDC (HPDC 02) 17. Supriya Mandhare, Dr.A.K.Sen and Rajkumar Shende, A Proposal on Protecting Data Leakages In Cloud Computing International journal of Computer Engineering & Technology (IJCET), Volume 6, Issue 2, 2015, pp , ISSN Print: , ISSN Online: Sujay Pawar and Prof. Mrs. U. M. Patil, A Survey on Secured Data Outsourcing In Cloud Computing International journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 3, 2013, pp , ISSN Print: , ISSN Online: Abhishek Pandey, R.M.Tugnayat and A.K.Tiwari, Data Security Framework For Cloud Computing Networks International journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 1, 2013, pp , ISSN Print: , ISSN Online: Bhavik Agrawal, Green Cloud Computing International journal of Electronics and Communication Engineering &Technology (IJECET), Volume 4, Issue 7, 2013, pp , ISSN Print: , ISSN Online:

Security Considerations for Public Mobile Cloud Computing

Security Considerations for Public Mobile Cloud Computing Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea [email protected] 2 Research Institute of

More information

An Intelligent Approach for Data Fortification in Cloud Computing

An Intelligent Approach for Data Fortification in Cloud Computing An Intelligent Approach for Data Fortification in Cloud Computing Supriya Mandhare 1, Prof. A. K. Sen 2, Asso. Prof. Rajkumar Shende 3 1,3 Department of Computer Engineering, St. Francis Institute of Technology,

More information

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer

More information

SADDs Self Annihilation and Downloadable Data system in Cloud Storage Service

SADDs Self Annihilation and Downloadable Data system in Cloud Storage Service SADDs Self Annihilation and Downloadable Data system in Cloud Storage Service I R.Ramachandran, II M.P. Revathi I M.E Dept. of CSE, J J College of Engineering and Technology, Tiruchirappalli, India II

More information

Cloud Computing Services and its Application

Cloud Computing Services and its Application Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 1 (2014), pp. 107-112 Research India Publications http://www.ripublication.com/aeee.htm Cloud Computing Services and its

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK REVIEW ON MOBILE APPLICATION IN A CLOUD COMPUTING SECURE AND SCALABLE USING CLOUD

More information

DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION

DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION Hasna.R 1, S.Sangeetha 2 1 PG Scholar, Dhanalakshmi Srinivasan College of Engineering, Coimbatore. 2 Assistant Professor, Dhanalakshmi Srinivasan

More information

Verifying Correctness of Trusted data in Clouds

Verifying Correctness of Trusted data in Clouds Volume-3, Issue-6, December-2013, ISSN No.: 2250-0758 International Journal of Engineering and Management Research Available at: www.ijemr.net Page Number: 21-25 Verifying Correctness of Trusted data in

More information

How To Make A Secure Storage On A Mobile Device Secure

How To Make A Secure Storage On A Mobile Device Secure Outsourcing with secure accessibility in mobile cloud computing Monika Waghmare 1, Prof T.A.Chavan 2 Department of Information technology, Smt.Kashibai Navale College of Engineering, Pune, India. Abstract

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 3, March 3 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Using Third Party

More information

N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT

N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 1 M.Tech Student, Department of Computer Science and Engineering, S.R.M. University Chennai 2 Asst.Professor,

More information

A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments

A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining

More information

A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing

A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing International Journal of Emerging Engineering Research and Technology Volume 3, Issue 5, May 2015, PP 1-7 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) A Survey on Security Issues and Security Schemes

More information

A Review of Cloud Environment and Recognition of Highly Secure Public Data Verification Architecture using Secure Public Verifier Auditor

A Review of Cloud Environment and Recognition of Highly Secure Public Data Verification Architecture using Secure Public Verifier Auditor I J C International Journal of lectrical, lectronics ISSN No. (Online): 2277-2626 and Computer ngineering 3(2): 144-148(2014) A Review of Cloud nvironment and Recognition of Highly Secure Public Data Verification

More information

ADVANCE SECURITY TO CLOUD DATA STORAGE

ADVANCE SECURITY TO CLOUD DATA STORAGE Journal homepage: www.mjret.in ADVANCE SECURITY TO CLOUD DATA STORAGE ISSN:2348-6953 Yogesh Bhapkar, Mitali Patil, Kishor Kale,Rakesh Gaikwad ISB&M, SOT, Pune, India Abstract: Cloud Computing is the next

More information

AN INVESTIGATION OF SECURITY THEME FOR CLOUD COMPUTING

AN INVESTIGATION OF SECURITY THEME FOR CLOUD COMPUTING AN INVESTIGATION OF SECURITY THEME FOR CLOUD COMPUTING Mrs. J. Pavithra 1 Mr. A. Naveen 2 1 (MRIT, Hyderabad, India, [email protected]) 2 (Asst. Professor, MRIT, Hyderabad, India, [email protected])

More information

Mobile Cloud Computing Security Considerations

Mobile Cloud Computing Security Considerations 보안공학연구논문지 (Journal of Security Engineering), 제 9권 제 2호 2012년 4월 Mobile Cloud Computing Security Considerations Soeung-Kon(Victor) Ko 1), Jung-Hoon Lee 2), Sung Woo Kim 3) Abstract Building applications

More information

Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing.

Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing. Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Privacy - Preserving

More information

A survey on cost effective multi-cloud storage in cloud computing

A survey on cost effective multi-cloud storage in cloud computing A survey on cost effective multi-cloud storage in cloud computing Nitesh Shrivastava, Ganesh Kumar Abstract As novel storage model, cloud storage has gain attentions from both the academics and industrial

More information

A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS

A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS *Dr Umesh Sehgal, #Shalini Guleria *Associate Professor,ARNI School of Computer Science,Arni University,[email protected]

More information

Cloud Database Storage Model by Using Key-as-a-Service (KaaS)

Cloud Database Storage Model by Using Key-as-a-Service (KaaS) www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 7 July 2015, Page No. 13284-13288 Cloud Database Storage Model by Using Key-as-a-Service (KaaS) J.Sivaiah

More information

PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE

PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE Abstract: Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared

More information

A SELF-DESTRUCTION SYSTEM FOR DYNAMIC GROUP DATA SHARING IN CLOUD

A SELF-DESTRUCTION SYSTEM FOR DYNAMIC GROUP DATA SHARING IN CLOUD A SELF-DESTRUCTION SYSTEM FOR DYNAMIC GROUP DATA SHARING IN CLOUD Ranjith.K 1, P.G.Kathiravan 2 1 PG Scholar, Department of Information Technology, V.S.B Engineering College, Tamilnadu, India 2 Assistant

More information

SECURING CLOUD DATA COMMUNICATION USING AUTHENTICATION TECHNIQUE

SECURING CLOUD DATA COMMUNICATION USING AUTHENTICATION TECHNIQUE SECURING CLOUD DATA COMMUNICATION USING AUTHENTICATION TECHNIQUE 1 PARISHA TYAGI, 2 VIRENDRA KUMAR 1Department of Information Technology, Suresh Gyan Vihar University, Rajasthan, India 2 Department of

More information

Cloud SQL Security. Swati Srivastava 1 and Meenu 2. Engineering College., Gorakhpur, U.P. Gorakhpur, U.P. Abstract

Cloud SQL Security. Swati Srivastava 1 and Meenu 2. Engineering College., Gorakhpur, U.P. Gorakhpur, U.P. Abstract International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 5 (2014), pp. 479-484 International Research Publications House http://www. irphouse.com /ijict.htm Cloud

More information

Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage

Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage P. Selvigrija, Assistant Professor, Department of Computer Science & Engineering, Christ College

More information

Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm

Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm Twinkle Graf.F 1, Mrs.Prema.P 2 1 (M.E- CSE, Dhanalakshmi College of Engineering, Chennai, India) 2 (Asst. Professor

More information

How To Design A Cloud Data Storage Service For A Cloud Computer System

How To Design A Cloud Data Storage Service For A Cloud Computer System Ensuring Security Services for Data Storing and Data Sharing in Cloud Computing D. Raman 1, Bojja Vamshikrishna 2 1 Associate Professor Department of Computer Science and Engineering, Vardhaman College

More information

Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst

Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst Clouds on the Horizon Cloud Security in Today s DoD Environment Bill Musson Security Analyst Agenda O Overview of Cloud architectures O Essential characteristics O Cloud service models O Cloud deployment

More information

CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY

CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY Varun Gandhi 1 Department of Computer Science and Engineering, Dronacharya College of Engineering, Khentawas,

More information

Application Based Access Control on Cloud Networks for Data Security

Application Based Access Control on Cloud Networks for Data Security Application Based Access Control on Cloud Networks for Data Security Ms. Smitha P M.Tech in DCN, Department of ECE GSSSIETW, Mysuru Karnataka, India Smitha.21sn @gmail.com Mrs. Manjula G Associate. Proffesor,

More information

Secure Cloud Computing through IT Auditing

Secure Cloud Computing through IT Auditing Secure Cloud Computing through IT Auditing 75 Navita Agarwal Department of CSIT Moradabad Institute of Technology, Moradabad, U.P., INDIA Email: [email protected] ABSTRACT In this paper we discuss the

More information

Identifying Data Integrity in the Cloud Storage

Identifying Data Integrity in the Cloud Storage www.ijcsi.org 403 Identifying Data Integrity in the Cloud Storage Saranya Eswaran 1 and Dr.Sunitha Abburu 2 1 Adhiyamaan College of Engineering, Department of Computer Application, Hosur. 2 Professor and

More information

Chapter 1: Introduction

Chapter 1: Introduction Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure

More information

International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING &

International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4, Issue 6, November - December (2013), pp. 62-69 IAEME: www.iaeme.com/ijcet.asp Journal

More information

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department

More information

A Survey of Different Encryption Techniques for Secure Cloud Storage

A Survey of Different Encryption Techniques for Secure Cloud Storage Journal homepage: www.mjret.in ISSN: 2348-6953 Rutuja R. Sadul KJCOEMR,Pune, India. Asawari Rankhambe KJCOEMR,Pune, India. Neha Subhekar KJCOEMR,Pune, India. A Survey of Different Encryption Techniques

More information

Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud

Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud Arpitha.K 1,Aawini.T 2,Divya J. 3, Kalyani P 4, Prof. Sudhakar Avareddy 5 1,2,3,4 Department of CSE, BITM Bellary, Karnataka. 5 Department

More information

15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM

15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM Dhanashri Bamane Vinayak Pottigar Subhash Pingale Department of Computer Science and Engineering SKN

More information

Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.

Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption. Secure Privacy-Preserving Cloud Services. Abhaya Ghatkar, Reena Jadhav, Renju Georgekutty, Avriel William, Amita Jajoo DYPCOE, Akurdi, Pune [email protected], [email protected], [email protected],

More information

Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao Guocui.gao@tufts.

Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao Guocui.gao@tufts. Tufts University Department of Computer Science COMP 116 Introduction to Computer Security Fall 2014 Final Project Investigating Security Issues in Cloud Computing Guocui Gao [email protected] Mentor:

More information

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft) 1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction

More information

Cryptographic Data Security over Cloud

Cryptographic Data Security over Cloud Cryptographic Data Security over Cloud Er. Lalit Gehlod Asst.Professor, Dept.Of Computer Engineering, Institute Of Engineering & Technology, Devi Ahilya University, Indore, India. Govind Patidar Dept.

More information

IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD

IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD 1 Ms.Nita R. Mhaske, 2 Prof. S.M.Rokade 1 student, Master of Engineering, Dept. of Computer Engineering Sir Visvesvaraya

More information

Keyword: Cloud computing, service model, deployment model, network layer security.

Keyword: Cloud computing, service model, deployment model, network layer security. Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging

More information

Security Issues In Cloud Computing and Countermeasures

Security Issues In Cloud Computing and Countermeasures Security Issues In Cloud Computing and Countermeasures Shipra Dubey 1, Suman Bhajia 2 and Deepika Trivedi 3 1 Department of Computer Science, Banasthali University, Jaipur, Rajasthan / India 2 Department

More information

Scientific Journal Impact Factor (SJIF): 1.711

Scientific Journal Impact Factor (SJIF): 1.711 Scientific Journal Impact Factor (SJIF): 1.711 e-issn: 2349-9745 p-issn: 2393-8161 International Journal of Modern Trends in Engineering and Research www.ijmter.com OneTK: Key Distribution Center at Cloud

More information

Secure Way of Storing Data in Cloud Using Third Party Auditor

Secure Way of Storing Data in Cloud Using Third Party Auditor IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 4 (Jul. - Aug. 2013), PP 69-74 Secure Way of Storing Data in Cloud Using Third Party Auditor 1 Miss.

More information

Secrecy Maintaining Public Inspecting For Secure Cloud Storage

Secrecy Maintaining Public Inspecting For Secure Cloud Storage Secrecy Maintaining Public Inspecting For Secure Cloud Storage K.Sangamithra 1, S.Tamilselvan 2 M.E, M.P.Nachimuthu.M.Jaganathan Engineering College, Tamilnadu, India 1 Asst. Professor, M.P.Nachimuthu.M.Jaganathan

More information

How To Understand Cloud Computing

How To Understand Cloud Computing A STUDY OF CLOUD COMPUTING: APPLICATIONS AND CHALLENGE 1 DR. NEERAJ BHARGAVA, 2 ANCHAL KUMAWAT, 3 DR. RITU BHARGAVA, 4 SONIYA DAYMA 1 Associate Professor, Dept. of Computer Science, School of Engineering

More information

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD Volume 1, Issue 7, PP:, JAN JUL 2015. SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD B ANNAPURNA 1*, G RAVI 2*, 1. II-M.Tech Student, MRCET 2. Assoc. Prof, Dept.

More information

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA U.Pandi Priya 1, R.Padma Priya 2 1 Research Scholar, Department of Computer Science and Information Technology,

More information

Secure cloud access system using JAR ABSTRACT:

Secure cloud access system using JAR ABSTRACT: Secure cloud access system using JAR ABSTRACT: Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that

More information

A Model for Data Protection Based on the Concept of Secure Cloud Computing

A Model for Data Protection Based on the Concept of Secure Cloud Computing International Journal of Scientific and Research Publications, Volume 2, Issue 3, March 2012 1 A Model for Data Protection Based on the Concept of Secure Cloud Computing Gargee Sharma 1, Prakriti Trivedi

More information

A Survey on Cloud Security Issues and Techniques

A Survey on Cloud Security Issues and Techniques A Survey on Cloud Security Issues and Techniques Garima Gupta 1, P.R.Laxmi 2 and Shubhanjali Sharma 3 1 Department of Computer Engineering, Government Engineering College, Ajmer [email protected]

More information

Data Protection: From PKI to Virtualization & Cloud

Data Protection: From PKI to Virtualization & Cloud Data Protection: From PKI to Virtualization & Cloud Raymond Yeung CISSP, CISA Senior Regional Director, HK/TW, ASEAN & A/NZ SafeNet Inc. Agenda What is PKI? And Value? Traditional PKI Usage Cloud Security

More information

Exploration on Security System Structure of Smart Campus Based on Cloud Computing. Wei Zhou

Exploration on Security System Structure of Smart Campus Based on Cloud Computing. Wei Zhou 3rd International Conference on Science and Social Research (ICSSR 2014) Exploration on Security System Structure of Smart Campus Based on Cloud Computing Wei Zhou Information Center, Shanghai University

More information

Customer Security Issues in Cloud Computing

Customer Security Issues in Cloud Computing Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IJCSMC, Vol. 2, Issue.

More information

DATA SECURITY MODEL FOR CLOUD COMPUTING

DATA SECURITY MODEL FOR CLOUD COMPUTING DATA SECURITY MODEL FOR CLOUD COMPUTING POOJA DHAWAN Assistant Professor, Deptt of Computer Application and Science Hindu Girls College, Jagadhri 135 001 [email protected] ABSTRACT Cloud Computing

More information

Secure Data transfer in Cloud Storage Systems using Dynamic Tokens.

Secure Data transfer in Cloud Storage Systems using Dynamic Tokens. Secure Data transfer in Cloud Storage Systems using Dynamic Tokens. P.Srinivas *,K. Rajesh Kumar # M.Tech Student (CSE), Assoc. Professor *Department of Computer Science (CSE), Swarnandhra College of Engineering

More information

preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.

preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design. Privacy-Preserving Public Auditing For Secure Cloud Storage ABSTRACT: Using cloud storage, users can remotely store their data and enjoy the on-demand high-quality applications and services from a shared

More information

VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui

VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui School of Engineering and Computer Science Te Kura Mātai Pūkaha, Pūrorohiko PO Box 600 Wellington New Zealand Tel: +64 4 463

More information

International Research Journal of Engineering and Technology (IRJET) e-issn: 2395-0056. Volume: 02 Issue: 05 Aug-2015 www.irjet.net p-issn: 2395-0072

International Research Journal of Engineering and Technology (IRJET) e-issn: 2395-0056. Volume: 02 Issue: 05 Aug-2015 www.irjet.net p-issn: 2395-0072 Fear of Cloud Vinnakota Saran Chaitanya 1, G. Harshavardhan Reddy 2 1 UG Final year student, Department of Computer Science and Engineering, G. Pulla Reddy Engineering College, Andhra Pradesh, India 2

More information

MIGRATION FROM SINGLE TO MULTI-CLOUDS TO SHRIVEL SECURITY RISKS IN CLOUD COMPUTING. K.Sireesha 1 and S. Suresh 2

MIGRATION FROM SINGLE TO MULTI-CLOUDS TO SHRIVEL SECURITY RISKS IN CLOUD COMPUTING. K.Sireesha 1 and S. Suresh 2 IJCITP Volume.8* Number 2* December 2013, pp. 53-58 Serials Publications MIGRATION FROM SINGLE TO MULTI-CLOUDS TO SHRIVEL SECURITY RISKS IN CLOUD COMPUTING K.Sireesha 1 and S. Suresh 2 1 M.Tech. Student,

More information

DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION

DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION Prof. M. Ben Swarup Professor, Department of CSE Vignan's Institute of Information Technology Visakhapatnam-49, India Chukkala

More information

Data Integrity Check using Hash Functions in Cloud environment

Data Integrity Check using Hash Functions in Cloud environment Data Integrity Check using Hash Functions in Cloud environment Selman Haxhijaha 1, Gazmend Bajrami 1, Fisnik Prekazi 1 1 Faculty of Computer Science and Engineering, University for Business and Tecnology

More information

Dynamic Query Updation for User Authentication in cloud Environment

Dynamic Query Updation for User Authentication in cloud Environment Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,

More information

Improving data integrity on cloud storage services

Improving data integrity on cloud storage services International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services

More information

Data Security in Cloud

Data Security in Cloud Data Security in Cloud Mr. Pankaj Sareen Assistant Professor, Department of Computer Applications SPN College, Mukerian, Punjab [email protected] Dr. Tripat Deep Singh Assistant Professor, Department

More information

Research on Storage Techniques in Cloud Computing

Research on Storage Techniques in Cloud Computing American Journal of Mobile Systems, Applications and Services Vol. 1, No. 1, 2015, pp. 59-63 http://www.aiscience.org/journal/ajmsas Research on Storage Techniques in Cloud Computing Dapeng Song *, Lei

More information

Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment

Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment Deepa Noorandevarmath 1, Rameshkumar H.K 2, C M Parameshwarappa 3 1 PG Student, Dept of CS&E, STJIT, Ranebennur. Karnataka, India

More information

Secure & Encrypted Accessing and Sharing of Data in Distributed Virtual Cloud

Secure & Encrypted Accessing and Sharing of Data in Distributed Virtual Cloud Secure & Encrypted Accessing and Sharing of Data in Distributed Virtual Cloud Ashish G. Ahuja 1, Prof. Komal B. Bijwe 2 1. M.E. Scholar, Dept Of CSE 2. Asst. Prof. Dept. Of CSE at P.R.P.C.E& M, Amravati

More information

[Sudhagar*, 5(5): May, 2016] ISSN: 2277-9655 Impact Factor: 3.785

[Sudhagar*, 5(5): May, 2016] ISSN: 2277-9655 Impact Factor: 3.785 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY AVOID DATA MINING BASED ATTACKS IN RAIN-CLOUD D.Sudhagar * * Assistant Professor, Department of Information Technology, Jerusalem

More information

Distributed auditing mechanism in order to strengthen user s control over data in Cloud computing Environment

Distributed auditing mechanism in order to strengthen user s control over data in Cloud computing Environment Distributed auditing mechanism in order to strengthen user s control over data in Cloud computing Environment Chandra Sekhar Murakonda M.Tech Student, Department of Computer Science Engineering, NRI Institute

More information

Optimal Service Pricing for a Cloud Cache

Optimal Service Pricing for a Cloud Cache Optimal Service Pricing for a Cloud Cache K.SRAVANTHI Department of Computer Science & Engineering (M.Tech.) Sindura College of Engineering and Technology Ramagundam,Telangana G.LAKSHMI Asst. Professor,

More information

COSC 472 Network Security

COSC 472 Network Security COSC 472 Network Security Instructor: Dr. Enyue (Annie) Lu Office hours: http://faculty.salisbury.edu/~ealu/schedule.htm Office room: HS114 Email: [email protected] Course information: http://faculty.salisbury.edu/~ealu/cosc472/cosc472.html

More information

Overview - Snort Intrusion Detection System in Cloud Environment

Overview - Snort Intrusion Detection System in Cloud Environment International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 3 (2014), pp. 329-334 International Research Publications House http://www. irphouse.com /ijict.htm Overview

More information

Security in Data Storage and Transmission in Cloud Computing

Security in Data Storage and Transmission in Cloud Computing Security in Data Storage and Transmission in Cloud Computing Ramawat Lokesh Kumar B. Tech 3 rd year, Alliance College of Engineering and Design Alliance University, Bengaluru, India P Dhananjay B. Tech

More information

10/25/2012 BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH [email protected]. Agenda. Security Cases What is Cloud? Road Map Security Concerns

10/25/2012 BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH VORAPOJ.L@G-ABLE.COM. Agenda. Security Cases What is Cloud? Road Map Security Concerns BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH [email protected] Agenda Security Cases What is Cloud? Road Map Security Concerns 1 Security Cases on Cloud Data Protection - Two arrested in ipad

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 1, Jan-Feb 2015

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 1, Jan-Feb 2015 RESEARCH ARTICLE OPEN ACCESS A Survey on Cloud Computing Security and Solutions N. Sugavaneswaran, D.Saravanan Assistant Professor Department of Computer Science Srimad Andavan Arts and Science College

More information

CLOUD COMPUTING SECURITY ISSUES

CLOUD COMPUTING SECURITY ISSUES CLOUD COMPUTING SECURITY ISSUES Florin OGIGAU-NEAMTIU IT Specialist The Regional Department of Defense Resources Management Studies, Brasov, Romania The term cloud computing has been in the spotlights

More information

Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving,

Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving, Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Third Party

More information

Near Sheltered and Loyal storage Space Navigating in Cloud

Near Sheltered and Loyal storage Space Navigating in Cloud IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 8 (August. 2013), V2 PP 01-05 Near Sheltered and Loyal storage Space Navigating in Cloud N.Venkata Krishna, M.Venkata

More information

CLOUD COMPUTING, SECURITY IMPLICATIONS AND BEST PRACTICES

CLOUD COMPUTING, SECURITY IMPLICATIONS AND BEST PRACTICES CLOUD COMPUTING, SECURITY IMPLICATIONS AND BEST PRACTICES Snehlata Kothari 1 and Dr. Sanjay Gaur 2 1 Assistant Professor (FCA), Pacific University, Udaipur, India Email: [email protected] 2 Associate

More information

FEDERATED CLOUD: A DEVELOPMENT IN CLOUD COMPUTING AND A SOLUTION TO EDUCATIONAL NEEDS

FEDERATED CLOUD: A DEVELOPMENT IN CLOUD COMPUTING AND A SOLUTION TO EDUCATIONAL NEEDS International Journal of Computer Engineering and Applications, Volume VIII, Issue II, November 14 FEDERATED CLOUD: A DEVELOPMENT IN CLOUD COMPUTING AND A SOLUTION TO EDUCATIONAL NEEDS Saju Mathew 1, Dr.

More information

Attacks from the Inside

Attacks from the Inside Attacks from the Inside Eddy Willems, G Data Righard J. Zwienenberg, Norman Attacks from the Inside. Agenda - Social Networking / Engineering - Where are the threats coming from - Infection vectors - The

More information

Third Party Auditor: An Integrity Checking Technique for Client Data Security in Cloud Computing

Third Party Auditor: An Integrity Checking Technique for Client Data Security in Cloud Computing Third Party Auditor: An Integrity Checking Technique for Client Data Security in Cloud Computing Renuka Goyal, Navjot Sidhu Centre for Computer Science and Technology, Central University of Punjab Bathinda,

More information

Module 1: Facilitated e-learning

Module 1: Facilitated e-learning Module 1: Facilitated e-learning CHAPTER 3: OVERVIEW OF CLOUD COMPUTING AND MOBILE CLOUDING: CHALLENGES AND OPPORTUNITIES FOR CAs... 3 PART 1: CLOUD AND MOBILE COMPUTING... 3 Learning Objectives... 3 1.1

More information

CLOUD COMPUTING PHYSIOGNOMIES A 1.1 CLOUD COMPUTING BENEFITS

CLOUD COMPUTING PHYSIOGNOMIES A 1.1 CLOUD COMPUTING BENEFITS 193 APPENDIX 1 CLOUD COMPUTING PHYSIOGNOMIES A 1.1 CLOUD COMPUTING BENEFITS A 1.1.1 Cost Savings The biggest reason for shifting to cloud computing is cost. Any company or enterprise has to face sizable

More information

How To Ensure Correctness Of Data In The Cloud

How To Ensure Correctness Of Data In The Cloud A MECHANICS FOR ASSURING DATA STORAGE SECURITY IN CLOUD COMPUTING 1, 2 Pratibha Gangwar, 3 Mamta Gadoria 1 M. Tech. Scholar, Jayoti Vidyapeeth Women s University, Jaipur, [email protected] 2 M. Tech.

More information