A Review of Security Techniques in Public Cloud Database
|
|
|
- Claude Flowers
- 10 years ago
- Views:
Transcription
1 A Review of Security Techniques in Public Cloud Database Pooja1, Dr.Dheerendra Singh2 Shaheed Udham Singh College of Engg, Tangori,Mohali, Punjab, India Abstract Cloud computing is an on demand, Efficient, Convenient Network access to the all types of resources, like Software, Platform, Network resources, Data storage etc. As the data is stored on the Centralized server. So Security is the major issue in the cloud computing. The main Objective of this Paper is to Study and analyze the various techniques to prevent the attack from malicious users, by applying the various encryption techniques on the Database. Keywords Third party Auditor,Virtual machine, Fully homorphic Encryption I. INTRODUCTION Cloud computing is most revolutionary technique in the IT companies or even for individual users. This term is basically defined as the distribution of the resources over the internet. Cloud computing is a model which enables convenient, efficient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. It is online technology, means till users are connected to the internet, they will be able to take benefits of the cloud computing. It provides benefits to the user like elasticity,scalability,reliability.cloud computing is under rapid development. Architecture of Cloud Computing[1]:- Basically Cloud computing includes following entities:- 1.Customers: the entities who are using the services. 2.VM:VM stand for virtual Machine,which is the medium to make interaction between the customers and the CSP. 3.Cloud service Provider(CSP):CSP plays important role to upload the data of customers on the Virtual Servers. 4.Virtual Server:-Virtual server are the database servers on which database is actually sotred. 5.Third Party: Third party server is used to reduce the overhead of the CSP. The two types of the models provided by the cloud computing are:- Service models: Cloud computing provides services according to three fundamental models: Iaas(infrastructure as a service),paas(platform as a service),saas(software as a service):- 1.Saas(Software as a service): This service model[2] enables customers to use the applications running on the cloud infrastructure. The applications are accessible by the customers through thin client inferface such as web browser. The consumer does not manage or control the underlying cloud infrastructure including network,server,operating system,storage or even individual application. The customers are aware of the coding behind the particular application.cloud computing provides the black box view of the applications means users are concerned with the only input and output. They can not control the way of functionality of the applications. It reduces the overhead of the customers. 2. Paas (Platform as service): This service provides the platform to the customers so that they can execute or deploy their applications on the platform provided by the cloud service provider.the customers have no control on the network,server,operating system,storage. But they can control their own applications on the platform. 3. Iaas(Infrastructure as a service):- The capability provided to the coutomer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications. The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, and deployed applications; and possibly limited control of select networking components (e.g., host firewalls). Deployment models in Cloud computing:- There are four types of clouds available in the cloud computing.private,public,hybrid,and Community Cloud. These Deployment models[3] describe,who owns,manages and is responsible for the services. 1.Private cloud: The cloud infrastructure is provisioned for exclusive use by a single organization comprising multiple consumers(e.g. business units). It may be owned, managed, and operated by the organization, a third party, or some combination of them, and it may exist on or off premises. 2. Public cloud: The cloud infrastructure is provisioned for open use by the general public. It may be owned, managed, and operated by a business, academic, or 15
2 government organization, or some combination of them. It exists on the premises of the cloud provider. 3. Community cloud: The cloud infrastructure is provisioned for exclusive use by a specific community of consumers from organizations that have shared concerns (e.g., mission, security requirements, policy, and compliance considerations). It may be owned, managed, and operated by one or more of the organizations in the community, a third party, or some combination of them, and it may exist on or off premises. 4. Hybrid cloud: Hybrid cloud infrastructure is a composition of two or more distinct cloud infrastructures (private, community, or public) that will be unique entities, but bound together by standardized technology that enables data and application portability (e.g., cloud bursting for load balancing between clouds). Figure 1 Deployment Models Of Cloud Computing[3] II Literature Review Security is the major concern in the cloud computing. Most of the bigger organizations feel insecure to give access of their data to the third party. And it is quite costly if they think to have their own cloud. lots of technologies has been applied to provide the more security in the cloud computing. The major issue in the security of cloud computing is the security in the cloud database. The different factors in the security of data are,data integrity,data privacy affects in terms of encryptions techniques. Confidentiality can be achieved through encrypted storage[4][5][6][7]. 1. The author Cong Wang et al. [8] used the public key based homomorphic authenticator and to achieve a privacy-preserving public auditing system for cloud data storage security while keeping all above requirements in mind, it uniquely integrate it with random mask technique.for efficiently handling multiple auditing tasks,the technique of bilinear aggregate signature can be explored to extend the main result into a multi-user setting, where TPA can perform multiple auditing tasks simultaneously. A keyed hash function hk(f) is used in Proof of retrievability (POR)[9][10] scheme. The verifier, pre-computes the cryptographic hash of F using hk(f) before archiving the data file F in the cloud storage, and stores this hash as well as the secret key K. The verifier releases the secret key K to the cloud archive to check the integrity. 2. SUNDR[11] stands for secure untrusted data repository. This is network file system which lets clients detect any modification by the malicious server. SUNDR Protocol achieves the property called Fork Consistency[27] which guarantees that cliens can detect any integrity or consistency failure by cryptographically protecting the file system, as long as they see each others modifications. The author jinyuan li implemented Serialized and Concurrent SUNDR in order to overcome the drawbacks of straw man file system, serialized SUNDR was used,in whichall files writable by the particular user are aggregated into single single hash value called i-hanle hash tree[28] and each i handle is tied to the latest version of every other i handle using version vector. I handles are stored in digitally signed messages known as version structure(vs). Each VS[29] must contain other user s i handle to which the user belongs. In serialized SUNDR,each client must wait for previous client s version vector before computing and signing it s own. It will be beneficial for most operation to proceed concurrently, Where one User should wait for another,when it reads a file,the other is in process of writing. 3. SPORC[13] is gerenal framework for building a wide variety of collaborative applications. SPORC provides a general collaborative services in which users can create a document, modify its access control, edit it concurrently experience fully automated merging of updated and perform these operations even while disconnected. SPORC provides the features of both OT[14] and Fork * consistency. SPORC includes application specific composition function which consolidated two operations i.e OT and Fork*consistency[25]. OT is used to recover from the Fork*consistency. Fork*consistency is used to detect the malicious server and clients. and OT is used to resolve from such attacks. OT Provides a general model for synchronizing shared state, OT allows each client to apply local updated optimistically when clients generate new operations then apply them through locally and then sending them to others. Each client accepts modification by others and apply them to locally. But the problem in OT may be due to order, to avoid this problem, transformation function was used. The assumption in this paper is that the server is potentially malicious and misbehaving server.to prevent from malicious attack,clients in SPORC digitally sign all their operations with their user s private key.digital signatures are not sufficient, because the server may still equivocate, to overcome this server equivocation, SPORC clients enforce Fork*consistency by maintaining hash chain over its view of committed history. Hash chain is 16
3 basically list of hash of its elements, H(.) is cryptographic function which is applied in this way like hi=h(hi- 1 H(opi)) and shows concatenation. And hi is value of hash chain over history upto opi.when a client with history upto opn submits new operation,it includes hn in its message. On receiving the operation,another clients check whether the included hn matches its own history, if they do not match, it means server is malicious.the server may be able to learn about which users and clients are sharing document, but it s not visible to them, what is in the document. SPORC supports large number of users and documents by replicating functionality. Clients are not trustworthy, They should not be able to see the state, modify user s authentication keys/(public/private) keys and access previleges. Hence the above procedure Detects the malicious server and attacks.sporc provides two types of protocols one of them is based on the Key value store which means simple dictionary mapping string to string by applying simple transformation function. Last writer wins policy is used in the key value store and the Data type used in this is list of keys to update or remove and composite function to merge the list of keys. And the Second is based on the web based collaborative text editor,which allows multiple users to access,modify documents simultaneously like Google Docs[17] and ether Pad[18] to reuse data types and transformation composite function. 2.The author Luca Ferretti,Michele Colajanni and Mirco Marchetti Distributed,Independent and Concurrent Access to Encrypted Database [19] provides the Secure DBaas to Protect the data from the unauthorized access or malicious users. Secure DBaas provides computations on the encrypted data. This paper provides three fold model i.e. Independent, Concurrent access to the geographically distributed clients in multi tenant form[22]. The SQL commands like Insert,Update,Delete are applied on encrypted data without intermediate proxy server. Because even a single Proxy server can cause any type of failure.this service acquires to install Secure DBaas on the client side and encrypted data will be sent through the network to Cloud service provider. The whole procedure is implemented through Emulab and network latency of applying the operations(sql commands like Select, Insert, Update) on the plain text and encrypted text is compared. III Results And Discussions The runtime,latency and throughput of the above three papers is compared in this section. In SUNDR protocol, LFS small file benchmark is used to test SUNDR s performance on the simple file operations like Create, Read, Unlink. The acronyms used in the figure stands for:- NFS2 means Network File System version 2 NFS3 means Network File System version 3 SUNDR/NVRAM means SUNDR with Non Volatile Random Access Memory. SUNDR only detects the attacks by fork*consistency. In the following figure comparison is shown between runtime for Create phase is shown:- Figure 2: Concurrent LFS Small File Benchmark, Create phase.1000 creations of 1KB files[11] In order to resolve the attacks, two types of SPORC protocols are used,sporc with Key-value Store and SPORC with Text editor is used. OpenJDK Java VM (version IcedTea6 1.6) is used to implement the experiment. For RSA signatures, however the Network Security Services for Java (JSS) library from the Mozilla Project [26] is used. Both the protocols are implemented with high load condition i.e where 16 clients issuing write command.the large share of the cryptographic is due to the client side cryptographic operations and in text editor in text editor the latency is more due to the RSA signatures. It requires 10ms to compute a single signature. Figure 3: Loaded key-value store[13] Figure 4: Loaded text editor [13] 17
4 In the Secure DBaas technique, TPC-C benchmark[24] is used to compare the level of performance. The whole experiment in is implemented on the Emulab.in the figure 5, the comparison is shown between following three services:- 1.Original TPC-C: the standard TPC-C benchmark; 2.Plain-SecureDBaaS: SecureDBaaS that use all SecureDBaaS functions and data structures with no encryption. 3.SecureDBaaS: SecureDBaaS referring to the highest confidentiality level. The network latency tend to mask the cryptographic overhead for any number of clients.there is decrease in network latency from 20%(40 concurrent clients with 40ms latecy) to 13%(40 concurrent clients with 80ms latency). Figure 5: TPC-C performance (latency equal to 80 ms) [19] IV CONCLUSION To focus on the concept of Key management and Key sharing,we propose a scheme in which encryption will be applied to the data on the virtual machine and the keys will be stored and managed on the third party.two algorithms will be applied in this scheme,diffiehellman algorithm is applied to encrypt and decrypt the database by generating one time keys( Everytime the connection will be established,everytime new keys will be generated).hmac algorithm is applied to ensure integrity by generating ticket to prevent man in middle attack in between user and virtual machine. REFERENCES [1] [May 2011] Qian Wang,Kui Ren,Wenjing lou and Jin li. Enabling Public Auditability and Data Dynamics for Storage Security include Computing,IEEE transactions on Parallel and Distributed Systems Vol. 22, No.5 [2] [July 2013] Sanjoli Singla,Jasmeet Singh. Cloud Data Security using Authentication and Encryption Technique IJARCET Vol 2 Issue 7. [3] [Feb 2013] Bhavna Makhija,Vinit Kumar Gupta,Indrajit Rajput Enhanced Data Security in Cloud Computing with Third Party Auditor IJARCSSE,Vol. 3,Issue. 2 [4] [November 1993] Matt Blaze A cryptographic file system for Unix,ACM conference on Communications and computing Security, pages 9-16 [5] [February 2003] Eu-Jin Goh, Hovav Shacham, Nagendra Modadugu, and Dan Boneh. SiRiUS: Securing Remote Untrusted Storage. In Proceedings Symposium,Internet Society (ISOC),Pages [6] [April 2003],M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu.Plutus: Scalable secure file sharing on untrusted storage. In 2 nd USENIX conference on File and Storage Technologies San Francisco, CA of the Tenth Network and Distributed System Security (NDSS) (FAST 03) [7] [June 2003],Charles P. Wright, Michael Martino, and Erez Zadok. NCryptfs: Asecure and convenient cryptographic file system. In Proceedings of the Annual USENIX Technical Conference, pages [8] [March 2010] Cong Wang,Qian Wang and Wenjing Lou, privacy-preserving Public Auditing for Data Storage Security in Cloud Computing IEEE Infocom,SAN Diego,CA. [9] [2007] A Juels and B.Kaliski Jr., Proof of retrievability for Large Files,ACM Conference. Computer and Comm.Security [10] [2008], H.Shacham and B Waters, Compact Proofs of retrievability,asiacrypt. [11] [Oct 2004],J Li,M.Krohn,D.Mazieres and D.Shasha, Secure Untrusted Data Repository, USENIX Association OSDI 04: 6th Symposium on Operating Systems Design and Implementation [12] Russel Sandberg, David Goldberg, Steve Kleiman, Dan Walsh, and Bob Lyon. Design and implementation of the Sun network filesystem. In Proceedings of the Summer 1985 USENIX Portland, OR, USENIX. pages [13] Ariel J.Feldman,William P.Zeller,Michael J.Freedman and Edward W.Felton Princetone University SPORC,Group Collaboration using Untrusted Cloud Resources 18
5 [14] [1989],C. Ellis and S. Gibbs. Concurrency control in groupware systems. ACM SIGMOD Record, 18(2): [15] Prince Mahajan,Srinath Setty,Sangmin Lee,Allen Clement,Lorenzo Alvisi,Mike Dahlin, and Michael Walfish, DEPOT:Storage with Minimal Trust,The University of Texas at Austin [16] [October 1997] M. Handley and J. Crowcroft. Network text editor (NTE) A scalable shared text editor for MBone. In Proc. SIGCOMM [17] [2010],Google. Google Docs. [18] [2010],Google. EtherPad. [19] [February 2014] Luca Ferretti, Michele Colajanni, and Mirco Marchetti, Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases,IEEE Transactions on Parallel and Distributed Systems,Vol.25,No.2 [20] [2005] US Secret Service Report on insider attacks html. [21] [2012] Huaglory Tianfield,School of Engineering and Built Environmet, Security Issues in Clud Computing, IEEE International Conference on Systems,Man and Cybernetics. [22] [February 1999.] Miguel Castro and Barbara Liskov. Practical byzantine fault tolerance.in Proceedings of the 3rd Symposium on Operating Systems Design and Implementation, pages , New Orleans, LA, [23] [October 1991],M. Rosenblum and J. Ousterhout. The design and implementation of a log-structured file system. In Proceedings of the 13th ACM Symposium on Operating Systems Principles Pacific Grove, CA, ACM,, pages 1 15, [24] [Apr. 2013] Transaction Processing Performance Council, TPC-C, [25] [April 2007],J. Li and D. Mazi`eres. Beyond onethird faulty replicas in Byzantine fault tolerant systems. In Proc. NSDI [26] [2010], Mozilla Project. Network security services for Java (JSS). https: //developer.mozilla.org/en/jss [27] [July 2002],David Mazi`eres and Dennis Shasha. Building secure file systems out of Byzantine storage. In Proceedings of the 21st Annual ACM SIGACT- SIGOPS Symposium on Principles of Distributed Computing,pages [28] Ralph C. Merkle. A digital signature based on a conventional encryption function. In Carl Pomerance, editor, Advances in Cryptology CRYPTO 87, pages [29] Springer-Verlag., volume 293 [May 1983], D. Stott Parker, Jr., Gerald J. Popek, Gerard Rudisin, Allen Stoughton, Bruce J. Walker, Evelyn Walton, Johanna M. Chow, David Edwards, Stephen Kiser, and Charles Kline. Detection of mutual inconsistency in distributed systems. IEEE Transactions on Software Engineering, SE-9(3):
Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption
Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer
SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD
Volume 1, Issue 7, PP:, JAN JUL 2015. SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD B ANNAPURNA 1*, G RAVI 2*, 1. II-M.Tech Student, MRCET 2. Assoc. Prof, Dept.
IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD
IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD 1 Ms.Nita R. Mhaske, 2 Prof. S.M.Rokade 1 student, Master of Engineering, Dept. of Computer Engineering Sir Visvesvaraya
Secure Data transfer in Cloud Storage Systems using Dynamic Tokens.
Secure Data transfer in Cloud Storage Systems using Dynamic Tokens. P.Srinivas *,K. Rajesh Kumar # M.Tech Student (CSE), Assoc. Professor *Department of Computer Science (CSE), Swarnandhra College of Engineering
How To Ensure Correctness Of Data In The Cloud
A MECHANICS FOR ASSURING DATA STORAGE SECURITY IN CLOUD COMPUTING 1, 2 Pratibha Gangwar, 3 Mamta Gadoria 1 M. Tech. Scholar, Jayoti Vidyapeeth Women s University, Jaipur, [email protected] 2 M. Tech.
Cryptographic Data Security over Cloud
Cryptographic Data Security over Cloud Er. Lalit Gehlod Asst.Professor, Dept.Of Computer Engineering, Institute Of Engineering & Technology, Devi Ahilya University, Indore, India. Govind Patidar Dept.
Improving data integrity on cloud storage services
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services
ISSN 2278-3091. Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability
Outsourcing and Discovering Storage Inconsistencies in Cloud Through TPA Sumathi Karanam 1, GL Varaprasad 2 Student, Department of CSE, QIS College of Engineering and Technology, Ongole, AndhraPradesh,India
N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT
N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 1 M.Tech Student, Department of Computer Science and Engineering, S.R.M. University Chennai 2 Asst.Professor,
Protocols for Secure Cloud Computing
IBM Research Zurich Christian Cachin 28 September 2010 Protocols for Secure Cloud Computing 2009 IBM Corporation Where is my data? 1985 2010 Who runs my computation? 1985 2010 IBM Research - Zurich Overview
Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System
Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System 1 K.Valli Madhavi A.P [email protected] Mobile: 9866034900 2 R.Tamilkodi A.P [email protected] Mobile:
ADVANCE SECURITY TO CLOUD DATA STORAGE
Journal homepage: www.mjret.in ADVANCE SECURITY TO CLOUD DATA STORAGE ISSN:2348-6953 Yogesh Bhapkar, Mitali Patil, Kishor Kale,Rakesh Gaikwad ISB&M, SOT, Pune, India Abstract: Cloud Computing is the next
Secure Way of Storing Data in Cloud Using Third Party Auditor
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 4 (Jul. - Aug. 2013), PP 69-74 Secure Way of Storing Data in Cloud Using Third Party Auditor 1 Miss.
How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System
REVIEW ARTICAL A Novel Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage Dumala Harisha 1, V.Gouthami 2 1 Student, Computer Science & Engineering-Department, JNTU Hyderabad India
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department
Enabling Public Auditing for Secured Data Storage in Cloud Computing
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 5 (May. 2013), V3 PP 01-05 Enabling Public Auditing for Secured Data Storage in Cloud Computing 1 Er.Amandeep Kaur,
PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE
PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE Abstract: Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared
A Review of Cloud Environment and Recognition of Highly Secure Public Data Verification Architecture using Secure Public Verifier Auditor
I J C International Journal of lectrical, lectronics ISSN No. (Online): 2277-2626 and Computer ngineering 3(2): 144-148(2014) A Review of Cloud nvironment and Recognition of Highly Secure Public Data Verification
Cloud Server Storage Security Using TPA
Cloud Server Storage Security Using TPA I K.Meenakshi, II Victo Sudha George I Student (M.Tech), DR. MGR Educational and Research Institute, India II Assisstant Professo, DR. MGR Educational and Research
SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING
SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING Saranya.V 1, Suganthi.J 2, R.G. Suresh Kumar 3 1,2 Master of Technology, Department of Computer Science and Engineering, Rajiv Gandhi College of Engineering
An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud
An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud T.Vijayalakshmi 1, Balika J Chelliah 2,S.Alagumani 3 and Dr.J.Jagadeesan 4 1 PG
Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.
Secure Privacy-Preserving Cloud Services. Abhaya Ghatkar, Reena Jadhav, Renju Georgekutty, Avriel William, Amita Jajoo DYPCOE, Akurdi, Pune [email protected], [email protected], [email protected],
SHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING
SHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING Er. Kavin M 1, Mr.J.Jayavel 2 1 PG Scholar, 2 Teaching Assistant, Department of Information Technology, Anna University Regional
Analysis of Secure Cloud Data Sharing Within a Group
Analysis of Secure Cloud Data Sharing Within a Group Ms. uri Pande* Department of CSE, GHRAET Nagpur (M.S), India, Prof. Vikrant Chole Dept of Computer Science & Engg Nagpur (M.S.), India Abstract In this
Development of enhanced Third party Auditing Scheme for Secure Cloud Storage
Development of enhanced Third party Auditing Scheme for Secure Cloud Storage Bhanu Prakash Chamakuri*1, D. Srikar*2, Dr. M.Suresh Babu*3 M.Tech Scholar, Dept of CSE, Grandhi Varalakshmi Institute Of Technology,
On Consistency of Encrypted Files
On Consistency of Encrypted Files Alina Oprea Michael K. Reiter March 2005 CMU-CS-06-113 School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213 Computer Science Department, Carnegie
Verifying Correctness of Trusted data in Clouds
Volume-3, Issue-6, December-2013, ISSN No.: 2250-0758 International Journal of Engineering and Management Research Available at: www.ijemr.net Page Number: 21-25 Verifying Correctness of Trusted data in
Cloud Data Storage Services Considering Public Audit for Security
Global Journal of Computer Science and Technology Cloud and Distributed Volume 13 Issue 1 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
Data Integrity Check using Hash Functions in Cloud environment
Data Integrity Check using Hash Functions in Cloud environment Selman Haxhijaha 1, Gazmend Bajrami 1, Fisnik Prekazi 1 1 Faculty of Computer Science and Engineering, University for Business and Tecnology
Secrecy Maintaining Public Inspecting For Secure Cloud Storage
Secrecy Maintaining Public Inspecting For Secure Cloud Storage K.Sangamithra 1, S.Tamilselvan 2 M.E, M.P.Nachimuthu.M.Jaganathan Engineering College, Tamilnadu, India 1 Asst. Professor, M.P.Nachimuthu.M.Jaganathan
Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment
Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment Deepa Noorandevarmath 1, Rameshkumar H.K 2, C M Parameshwarappa 3 1 PG Student, Dept of CS&E, STJIT, Ranebennur. Karnataka, India
Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm
Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm Twinkle Graf.F 1, Mrs.Prema.P 2 1 (M.E- CSE, Dhanalakshmi College of Engineering, Chennai, India) 2 (Asst. Professor
International Journal of Advanced Research in Computer Science and Software Engineering
Volume 3, Issue 3, March 3 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Using Third Party
preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.
Privacy-Preserving Public Auditing For Secure Cloud Storage ABSTRACT: Using cloud storage, users can remotely store their data and enjoy the on-demand high-quality applications and services from a shared
A Survey on Secure Storage Services in Cloud Computing
Global Journal of Computer Science and Technology Cloud & Distributed Volume 12 Issue 12 Version 1.0 Year 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
Third Party Auditing For Secure Data Storage in Cloud through Trusted Third Party Auditor Using RC5
Third Party Auditing For Secure Data Storage in Cloud through Trusted Third Party Auditor Using RC5 Miss. Nupoor M. Yawale 1, Prof. V. B. Gadicha 2 1 Student, M.E. Second year CSE, P R Patil COET, Amravati.INDIA.
Privacy preserving technique to secure cloud
Vitthal S. Gutte Pune University, MIT College of engineering, Kothrud, Pune 411038, India [email protected] Privacy preserving technique to secure cloud Prof. Priya Deshpande Pune University,
15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM
RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM Dhanashri Bamane Vinayak Pottigar Subhash Pingale Department of Computer Science and Engineering SKN
An Efficient Secure Multi Owner Data Sharing for Dynamic Groups in Cloud Computing
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 6, June 2014, pg.730
Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication
Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication Sanjay Kumar Baghel Mtech Scholar, CSE, CSIT DURG [email protected] Bhupesh Kumar Dewangan Assistant Professor,CSE,
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction 1 Priyadharshni.A, 2 Geo Jenefer.G 1 Master of engineering in computer science, Ponjesly College of Engineering 2 Assistant Professor,
February. ISSN: 2321-8134
IJFEAT INTERNATIONAL JOURNAL FOR ENGINEERING APPLICATIONS AND TECHNOLOGY TITLE: DATA PLACE & MANAGE SECURITY IN CLOUD COMPUTING FOR EFFECTIVE AND FLEXIBLE DISTRIBUTED SYSTEM 1 Mr. Pritam S. Bhoyar, 2 Mr.
SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD
SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD S.REVATHI B.HASEENA M.NOORUL IZZATH PG Student PG Student PG Student II- ME CSE II- ME CSE II- ME CSE Al-Ameen Engineering
Data Storage Security in Cloud Computing
Data Storage Security in Cloud Computing Manoj Kokane 1, Premkumar Jain 2, Poonam Sarangdhar 3 1, 2, 3 Government College of Engineering and Research, Awasari, Pune, India Abstract: Cloud computing is
Surveying Cloud Storage Correctness using TPA with BLS
Surveying Cloud Storage Correctness using TPA with BLS Priyanka Dehariya 1, Prof. Shweta Shrivastava 2, Dr. Vineet Richaraya 3 1 M.Tech Scholar (CSE), LNCT, Bhopal 2 Asst.Professors, (CSE Department),
Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage
Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage Pranita Bakka 1, Dr. Jayashree Agarkhed 2 1 P.G.Student, Department of Computer Science & Engineering,
Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving,
Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Third Party
Data Security in Cloud Using Elliptic Curve Crytography
Data Security in Cloud Using Elliptic Curve Crytography Puneetha C 1, Dr. M Dakshayini 2 PG Student, Dept. of Information Science & Engineering, B.M.S.C.E, Karnataka, Bangalore,India 1 Professor, Dept.
Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing.
Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Privacy - Preserving
SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE
International Journal of Computer Network and Security(IJCNS) Vol 7. No.1 2015 Pp. 1-8 gopalax Journals, Singapore available at : www.ijcns.com ISSN: 0975-8283 ----------------------------------------------------------------------------------------------------------------------------------------------------------
Near Sheltered and Loyal storage Space Navigating in Cloud
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 8 (August. 2013), V2 PP 01-05 Near Sheltered and Loyal storage Space Navigating in Cloud N.Venkata Krishna, M.Venkata
Index Terms: Data integrity, dependable distributed storage, Cloud Computing
Volume 5, Issue 5, May 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Cloud Data Protection
Keywords: - Ring Signature, Homomorphic Authenticable Ring Signature (HARS), Privacy Preserving, Public Auditing, Cloud Computing.
Survey on Privacy Preserving Public Auditing Techniques for Shared Data in the Cloud Kedar Jayesh Rasal 1, Dr. S.V.Gumaste 2, Sandip A. Kahate 3 Computer Engineering, Pune University, SPCOE, Otur, Pune,
International Journal of Advanced Research in Computer Science and Software Engineering
Volume 3, Issue 2, February 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Review on
An Efficient Data Correctness Approach over Cloud Architectures
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 8, Issue 12 (October 2013), PP. 33-37 An Efficient Data Correctness Approach over
PRIVACY PRESERVING PUBLIC AUDITING FOR SECURED DATA STORAGE IN CLOUD USING BLOCK AUTHENTICATION CODE
PRIVACY PRESERVING PUBLIC AUDITING FOR SECURED DATA STORAGE IN CLOUD USING BLOCK AUTHENTICATION CODE R.REVATHI # PG Scholar #, Bharathiyar Institute Of Engineering for Women, Deviyakurichi, Salem(DT) India
SiRiUS: Securing Remote Untrusted Storage
SiRiUS: Securing Remote Untrusted Storage NDSS 2003 Eu-Jin Goh, Hovav Shacham, Nagendra Modadugu, and Dan Boneh Stanford University Introduction Secure network file systems not widespread. Why? 1. Hard
Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud
Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud M.Jayanthi, Assistant Professor, Hod of MCA.E mail: [email protected] MahatmaGandhi University,Nalgonda, INDIA. B.Ranganatha
International Journal of Infinite Innovations in Engineering and Technology. ISSN (Online): 2349-2287, ISSN (Print): 2349-2279 2015
SECURED AUDITING SYSTEM FOR CLOUD DATA STORAGE WITH ERROR CORRECTION GUARANTEES 1 S.Sathya, 2 S.Sivakumar 1 Research Scholar, Department of Computer Science & Applications, PGP College of Arts & Science,
A Secure and Dependable Cloud Storage Service in Cloud Computing
A Secure and Dependable Cloud Storage Service in Cloud Computing Yalla Ram Charan MTech Student Department of CSE Sri Venkateswra College of Engineering & Technology Abstract: Cloud storage is a model
How To Design A Cloud Data Storage Service For A Cloud Computer System
Ensuring Security Services for Data Storing and Data Sharing in Cloud Computing D. Raman 1, Bojja Vamshikrishna 2 1 Associate Professor Department of Computer Science and Engineering, Vardhaman College
Erasure correcting to enhance data security in cloud data storage
Erasure correcting to enhance data security in cloud data storage K.Shrividhya Department of computer science- Vels University [email protected] A.Sajeevram Department of computer science Vels University
A survey on cost effective multi-cloud storage in cloud computing
A survey on cost effective multi-cloud storage in cloud computing Nitesh Shrivastava, Ganesh Kumar Abstract As novel storage model, cloud storage has gain attentions from both the academics and industrial
M. Nathiya 2 B.Tech. (IT), M.E. (CSE), Assistant Professor, Shivani Engineering College, Trichy, Tamilnadu, India.
ISSN: 2321-7782 (Online) Volume 2, Issue 5, May 2014 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com Robust Data
International Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 12, December 2014 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
Secure Data Sharing in Cloud Computing using Hybrid cloud
International Journal of Electronics and Computer Science Engineering 144 Available Online at www.ijecse.org ISSN: 2277-1956 Secure Data Sharing in Cloud Computing using Hybrid cloud Er. Inderdeep Singh
CONSIDERATION OF DYNAMIC STORAGE ATTRIBUTES IN CLOUD
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE CONSIDERATION OF DYNAMIC STORAGE ATTRIBUTES IN CLOUD Ravi Sativada 1, M.Prabhakar Rao 2 1 M.Tech Student, Dept of CSE, Chilkur Balaji
Index Terms: Cloud Computing, Cloud Security, Mitigation Attack, Service Composition, Data Integrity. 1. Introduction
Real-Time Service Composition and Deployment for Secure Computing in Cloud Environment R. Ushadevi 1, V. Rajamani 2 1 Research Scholar, Department of Computer Applications, St. Peter s University, Chennai
Verification of Data Reliability and Secure Service for Dynamic Data in Cloud Storage
Verification of Data Reliability and Secure Service for Dynamic Data in Cloud Storage Nithiavathy.R 1, Suresh.J 2 Department of Computer Science &Engineering, Coimbatore Institute of Engineering and Technology
Cloud Data Service for Issues in Scalable Data Integration Using Multi Authority Attribute Based Encryption
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,
Data Integrity for Secure Dynamic Cloud Storage System Using TPA
International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 7-12 International Research Publication House http://www.irphouse.com Data Integrity for Secure
Ensuring Data Storage Security in Cloud Computing
Ensuring Data Storage Security in Cloud Computing Cong Wang 1, Qian Wang 1, Kui Ren 1, and Wenjing Lou 2 1 ECE Department, Illinois Institute of Technology 2 ECE Department, Worcester Polytechnic Institute
G.J. E.D.T.,Vol.3(1):43-47 (January-February, 2014) ISSN: 2319 7293 SUODY-Preserving Privacy in Sharing Data with Multi-Vendor for Dynamic Groups
SUODY-Preserving Privacy in Sharing Data with Multi-Vendor for Dynamic s T.Vijayalakshmi 1, Balika J Chelliah 2 & R. Jegadeesan 3 1 M.Tech Student, Department of Computer Science and Engineering, S.R.M.
Trusted Public Auditing Process for Secure Cloud Storage
Trusted Public Auditing Process for Secure Cloud Storage K.Adhiyaman 1, A. Jesudoss 2, D.Saravanan 3 1 Final Year MCA, Faculty of Computing, Department of MCA Sathyabama University, Chennai,Tamil Nadu,
PRIVACY ASSURED IMAGE STACK MANAGEMENT SERVICE IN CLOUD
PRIVACY ASSURED IMAGE STACK MANAGEMENT SERVICE IN CLOUD Ms. Shubhangi Edake 1, Prof. Sunil Rathod 2 1 PG Student, Computer Engineering, Dr.D.Y.Patil School of Engineering, Lohgaon,Pune,India 2 Assistant
Secure Privacy Preserving Public Auditing for Cloud storage
Secure Privacy Preserving Public Auditing for Cloud storage Sathiskumar R 1, Dr.Jeberson Retnaraj 2 Department of Information Technology, Sathyabama University, Chennai, India 1 Department of Information
PRIVACY PRESERVING AND BATCH AUDITING IN SECURE CLOUD DATA STORAGE USING AES
PRIVACY PRESERVING AND BATCH AUDITING IN SECURE CLOUD DATA STORAGE USING AES 1 SANTOSH P. JADHAV, 2 B. R. NANDWALKAR 1,2 Department of Computer Engineering, Late G.N.Sapkal collage of engineering, University
Secure Framework for Data Storage from Single to Multi clouds in Cloud Networking
Secure Framework for Data Storage from Single to Multi clouds in Cloud Networking B.Sujana 1, P.Tejaswini 2, G.Srinivasulu 3, Sk.Karimulla 4 1,2,3,4 QUBA COLLEGE OF ENGINEERING & TECH, NELLORE Abstract:
A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA
A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA Mr.Mahesh S.Giri Department of Computer Science & Engineering Technocrats Institute of Technology Bhopal, India
Authorized Auditing of Big Data Stored on Cloud with Auditability Aware Data Scheduling
Authorized Auditing of Big Data Stored on Cloud with Auditability Aware Data Scheduling Surapriya Swain 1, Prof. Saurabh Gupta 2 1 Department of Computer Engineering, GSMCOE, Balewadi, Savitribai Phule
Index Terms : cloud computing, Distributed Storage, error detection, data recovery, SHA, dynamic block operations
Revisiting Secure Cloud Storage by Replacing Token Generation With SHA Ms. Bhagyashree Alhat (1), Prof. Amar Buchade(2) Pune Institute of Computer Technology, University of Pune,PG Student(1), Assistant
Monitoring Data Integrity while using TPA in Cloud Environment
Monitoring Data Integrity while using TPA in Cloud Environment Jaspreet Kaur, Jasmeet Singh Abstract Cloud Computing is the arising technology that delivers software, platform and infrastructure as a service
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING T.Vidhya Sree M.Phil Research Scholar,CS, MGR College, Hosur (India) ABSTRACT Cloud Computing is the long dreamed vision
A Survey on Privacy-Preserving Techniques for Secure Cloud Storage
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,
Public Auditability and Privacy preserving in Cloud Storage
Public Auditability and Privacy preserving in Cloud Storage Kishan Lathkar, Ambulgekar H. P SGGS IE&T Nanded, Maharashtra India [email protected], [email protected] Abstract: Cloud computing
Third Party Auditor: An Integrity Checking Technique for Client Data Security in Cloud Computing
Third Party Auditor: An Integrity Checking Technique for Client Data Security in Cloud Computing Renuka Goyal, Navjot Sidhu Centre for Computer Science and Technology, Central University of Punjab Bathinda,
