Security Provision in Publicly Auditable Secure Cloud Data Storage Services Using SHA-1 Algorithm
|
|
|
- Justina McBride
- 9 years ago
- Views:
Transcription
1 Security Provision in Publicly Auditable Secure Cloud Data Storage Services Using SHA-1 Algorithm Akkala.Saibabu, T.Satyanarayana Murthy Department of Computer Science, Vignan University, Vadlamudi Abstract: Cloud computing is the delivery of computing as a service rather than a product, whereby shared resources, software, and information are provided to computers and other devices as a utility over a network. Cloud computing entrusts services with a user's data, software and computation on a published application programming interface over a network Where data owners can remotely store their data in the cloud to enjoy on-demand high-quality applications and services from a shared pool of configurable computing resources. While data outsourcing relieves the owners of the burden of local data storage and maintenance, it also eliminates their physical control of storage dependability and security. So correctness of data and security is a prime concern. This work studies the problem of ensuring the integrity and security of data storage in cloud computing. Security in cloud is achieved by signing the data block before sending to the cloud. Signing is performed using sha-1 algorithm which is more secure compared to other algorithms. To ensure the correctness of data, we consider the task of allowing a third party auditor (TPA), on behalf of the cloud user, to verify the integrity of the data stored in the cloud. By utilizing public key based homomorphic authenticator with random masking privacy preserving public auditing can be achieved. The technique of bilinear aggregate signature is used to achieve batch auditing. Batch auditing reduces the computation overhead. Key words Third party auditor, homomorphic authenticator, cloud server I. INTRODUCTION: Cloud computing, to put it simply, means internet computing. The internet is commonly visualized as clouds; hence the term cloud computing for computation done through the internet. With cloud computing users can access database resources via the internet from anywhere, for as long as they need, without worrying about any maintenance or management of actual resources. Besides, databases in cloud are very dynamic and scalable. Cloud Computing is unlike grid computing, utility computing, or autonomic computing. In fact, it is a very independent platform in terms of computing. The best example of cloud computing is Google apps where any application can be accessed using a browser and it can be deployed on thousands of computer through the internet. It also provides facilities for users to develop, deploy and manage their applications on the cloud, which entails virtualization of resources that maintains and manages itself. A. Service models These services are broadly divided into three categories: 1. Saas (software as a service) -Saas is a model of software deployment where an application is hosted as a service provided to customers across the internet. 2. Paas (platform as a service)-the cloud provides hardware resources, typically virtual machines, which can be loaded with the users, operating system and software. 3. Iaas (infrastructure as a service) the cloud provides an infrastructure including platforms, networking, etc. on which applications can be placed. II. PROBLEM STATEMENT: While cloud computing makes these advantages more appealing than ever, it also brings new and challenging security threats to the outsourced data. Since cloud service providers (Csp) are separate administrative entities, data outsourcing actually relinquishes the owner s ultimate control over the fate of their data. As a result, the correctness of the data in the cloud is put at risk due to the following reasons. First of all, although the infrastructures under the cloud are much more powerful and reliable than personal computing devices, they still face a broad range of both internal and external threats to data integrity. Outages and security breaches of noteworthy cloud services appear from time to time. Amazons s3 s recent downtime, Gmail s mass deletion incident, and apple mobile me s postlaunch downtime are all such examples. Second, for benefits of their own, there are various motivations for Csp s to behave unfaithfully toward cloud customers regarding the status of their outsourced data. In short, although outsourcing data into the cloud is economically attractive for the cost and complexity of long-term large scale data storage, it does not offer any guarantee on data integrity and availability. This problem, if not properly addressed, may impede successful deployment of the cloud architecture. As Data owners no longer physically possess the storage of their data, traditional cryptographic primitives for the purpose of data security protection cannot be directly adopted[6,7]. In particular, simply downloading the data for its integrity verification is not a practical solution due to the high cost of input/output (I/O) and transmission across the network. Besides, it is often insufficient to detect data corruption only when accessing the data, as it does not give correctness assurance for unaccessed data and might be too late to recover the data loss or damage. Considering the large size of the outsourced data and the owner s constrained resource capability, the tasks of auditing the data correctness in a cloud environment can be formidable and expensive for data owners [6-8]. Moreover, from the system usability point of view, data owners should be able to just use cloud storage as if it is local, without worrying about the need to verify its integrity. Hence, to fully ensure data security and save data owners computation resources, this work enables the publicly auditable cloud storage 4084
2 services, where data owners can resort to an external third party auditor (TPA) to verify the outsourced data when needed. Third party auditing provides a transparent yet cost-effective method for establishing trust between data owner and cloud server. in fact, based on the audit result from a TPA, the released audit report would not only help owners to evaluate the risk of their subscribed cloud data services, but also be beneficial for the cloud service provider to improve their cloud based service platform. In a word, enabling public risk auditing protocols will play an important role for this nascent cloud economy to become fully established. III. PROPOSED SYSTEM: Recently, great interest has been shown in ensuring remotely stored data integrity under different system and security models. Some of the work has already been promoting the development of public auditability for existing cloud data storage services. However, it is not feasible yet. on one hand, data owners are currently not sophisticated enough to demand risk assessment; on the other hand, current commercial cloud vendors do not provide such a third party auditing interface to support a public auditing service. This article is intended as a call for action, aiming to motivate further research on dependable cloud storage services and enable public auditing services to become a reality. We start by suggesting a set of systematically and cryptographically desirable properties that should apply to practical deployment for securing the cloud storage on behalf of data owners. We sketch a set of building blocks, including recently developed cryptographic primitives (e.g., homomorphic authenticator), to ensure these strong security properties, which could form the basis of a publicly auditable secure cloud data storage system. IV. SYSTEM DESIGN & IMPLEMENTATION The Cloud storage architecture consists of four different entities: owner, cloud server, user and TPA here the TPA is the trusted entity that has expertise and capabilities to assess cloud storage security on behalf of a data owner upon request. Under the cloud paradigm, the data owner may represent either the individual or the enterprise customer, who relies on the cloud server for remote data storage and maintenance, and thus is relieved of the burden of building and maintaining local storage infrastructure. in most cases cloud data storage services also provide benefits like availability, relative low cost and on demand sharing among a group of trusted users, such as partners in a collaboration team or employees in the enterprise organization. For simplicity, we assume a single writer/many readers scenario here.only the data owner can dynamically interact with the Csp to update her stored data, while users just have the privilege of file reading. With in the scope of this article, we focus on how to ensure publicly auditable secure cloud data storage services. As the data owner no longer possesses physical control of the data, it is of critical importance to allow the data owner to verify that his data is being correctly stored and maintained in the cloud. Considering the possibly large cost in terms of resources and expertise, the data owner may resort to a TPA for the data auditing task to ensure the storage security of her data, while hoping to keep the data private from the TPA. We assume the TPA, who is in the business of auditing, is reliable and independent, and thus has no incentive to collude with either the Cs or the owners during the auditing process. The TPA should be able to efficiently audit the cloud data storage without local copy of data and without any additional online burden for data owners. Besides, any possible leakage of an owner s outsourced data toward a TPA through the auditing protocol should be prohibited. The Cs is semi-trusted in the sense that most of the time it behaves properly and does not deviate from the prescribed protocol execution. Figure.1the Architecture of cloud data storage services Third party auditor The Third party auditor (TPA), who has expertise and capabilities that cloud users do not have and is trusted to assess the cloud storage service security on behalf of the user upon request. Users rely on the Cs for cloud data storage and maintenance. They may also dynamically interact with the Cs to access and update their stored data for various application purposes. The users may resort to TPA for ensuring the storage security of their outsourced data, while hoping to keep their data private from TPA. We consider the existence of semi-trusted Cs as does. Namely, in most of time it behaves properly and does not deviate from the prescribed protocol execution. However, during providing the cloud data storage based services, for their own benefits the Cs might neglect to keep or deliberately delete rarely accessed data files which belong to ordinary cloud users. Moreover, the Cs may decide to hide the data corruptions caused by server hacks or byzantine failures to maintain reputation. We assume the TPA, who is in the business of auditing, is reliable and independent, and thus has no incentive to collude with either the cs or the users during the auditing process. TPA should be able to efficiently audit the cloud data storage without local copy of data and without bringing in additional on-line burden to cloud users. 4085
3 Selection of cloud service provider A Good service provider is the key to good service. So, it is imperative to select the right service provider. One must make sure that the provider is reliable, well-reputed for their customer service and should have a proven track record in it- related ventures. As cloud computing has taken hold, there are six major benefits that have become clear, 2.1) Any Where/anytime access - it promises universal access to high-powered computing and storage resources for anyone with a network access device. 2.2) Collaboration among users -cloud represents an environment in which users can develop software based services and from which they can deliver them. 2.3) Cost Benefits - the cloud promises to deliver computing power and services at a lower cost. 2.4) Storage as a universal service - the cloud represents a remote but scalable storage resource for users anywhere and everywhere. V. SECURING THE CLOUD DATA AT CLOUD SERVER USING SHA-1 ALGORITHM The secure hash algorithm (Sha) [2] was developed by the national institute of standards and technology (nist) and published as a federal information processing standard (fips 180) in Sha-1 produces a hash value of 160 bits. in 2002, nist produced a revised version of the standard, fips 180-2, that defined three new versions of sha, with hash value lengths of 256, 384, and 512 bits, known as sha-256, sha-384, and sha-512 as shown in table 1 these new versions have the same underlying structure and use the same types of modular arithmetic and logical binary operations as sha-1. Shortly thereafter, a research team described an attack in which two separate messages could be found that deliver the same sha-1 hash using 2 69 operations, far fewer than the 2 80 sha-1 sha-256 sha-384 sha-512 message digest size message size <2 64 <2 64 <2 128 <2 128 block size word size number of steps security notes : 1.all sizes are measured in bits 2. security refers to the fact that a birthday attack on a message digest of size n produces a collision with a work factor of approximately 2 n/2 Table.1 Comparison of Sha Parameters 1. Sha-1 Logic Sha-1 is a part of the fips 180-2: secure hash standard. It is very widely used in public-key cryptography, especially in message authentication schemes. Sha-1 calculates a 160-bit h for a b-bit m. the algorithm consists of the following steps: Figure 2 Sha logic 1. Appending Padding Bits The b-bit m is padded in the following manner: a single 1- bit is added into the end of m, after which 0-bits are added until the length of the message is congruent to 448, modulo Appending Length A 64-Bit representation of b is appended to the result of the above step. Thus, the resulted message is a multiple of 512 bits. 3. Buffer Initialization A 512-bit buffer is used to hold intermediate and final results of the hash function. The buffer can be represented as eight 64-bit registers (a, b, c, d, e, f, g, h). These registers are initialized to the following 64-bit integers: a = 6a09e667f3bcc908 b = bb67ae8584caa73b c = 3c6ef372fe94f82b c = a54ff53a5f1d36f1 e = 510e527fade682d1 f = 9b05688c2b3e6c1f g = 1f83d9abfb41bd6b h = 5be0cdi9137e2179 These values are stored in big-endian format, which is the most significant byte of a word in the low-address (leftmost) byte position. These words were obtained by taking the first sixty-four bits of the fractional parts of the square roots of the first eight prime numbers 4: Process Message In 512-Bit (128-Word) Blocks. The Heart of the algorithm is a module that consists of 80 rounds; this module is labeled f in figure 2.contents of the buffer. At input to the first round, the buffer has the value of the intermediate hash value, hi-1. each round t makes use of a 64-bit value w t derived from the current 512-bit block being processed (mi) these values are derived using a message schedule described subsequently. Each round also makes use of an additive constant kt where 0 t 79 indicates one of the 80 rounds. These words represent the first sixty-four bits of the fractional parts of the cube roots of the first eighty prime numbers. The constants provide a "randomized" set of 64-bit patterns, which should eliminate any regularity in the input data. The output of the eightieth round is added to the input to the first round (h i-1 ) to produce hi. The addition is done independently for each of 4086
4 the eight words in the buffer with each of the corresponding words in h i-1 using addition modulo Output. After all n 512-bit blocks have been processed; the output from the nth stage is the 160-bit message digest h0 = IV hi = sum32(hi-1, abcdefghi) md = hn Where iv initial value of the abcdefgh buffer, defined in step 3 the output of the last round of processing of the i th abcdefgh i message block the number of blocks in the message (including n padding and length fields) addition modulo 2 32 performed separately on each sum32 word of the pair of inputs md final message digest value Round Function Let us look in more detail at the logic in each of the 80 steps of the processing. t 1 =h+ch (e, f, g) + ( e) +w t +k t t2= ( a) + maj (a, b, c) a=t 1 +t 2 b=a c=b d=c e=d+t 1 f=e g=f h=g Where t =step number; 0 t 79 Ch (e, f, g) = (e and f) (not e and g) The conditional function: if e then f else g Maj (a, b, c) = (a and b) (a and c) (b and c) the function is true only of the majority Rotr(x) = circular right shift (rotation) of the 64-bit argument x by n bits Wt = a 64-bit word derived from the current 512-bit input block kt = a 64-bit additive constant + = addition modulo 2 32 VI. USING HOMOMORPHIC AUTHENTICATOR To Significantly reduce the arbitrarily large communication overhead for public auditability without introducing any online burden on the data owner, we resort to the homomorphic authenticator technique [7, 10].homomorphic authenticators are unforgeable metadata generated from individual data blocks, which can be securely aggregated in such a way to assure a verifier that a linear combination of data blocks is correctly computed by verifying only the aggregated authenticator. Using this technique requires additional information encoded along with the data before outsourcing. Specifically, a data file is divided into n blocks mi (i =1 n), and each block mi has a corresponding homomorphic authenticator σi computed as its metadata to ensure the integrity. Every time it must be verified that the cloud server is honestly storing the data, the data owner or TPA can submit challenges Chal = {(i, vi)} for sampling a set of randomly selected blocks, where {vi} can be arbitrary weights. due to the nice property of the homomorphic authenticator, server only needs to response a linear combination of the sampled data blocks µ = ivi.mi, as well as an aggregated authenticator σ=πiσivi both computed from {mi,σi,νi}i chal. once the response of µ and σ is verified by tpa, then high probabilistic guarantee on large fraction of cloud data correctness can be obtained.1 because off-the-shelf errorcorrecting code technique can be adopted before data outsourcing [6, 10], large fraction of correct cloud data would be sufficient to recover the whole data. Note that for typical choices of block size mi and file block number n, where mi >> log (n), the response µ and σ are (essentially) about the same size as individual block mi and σi. This means almost constant communication overhead, independent of file size, for each auditing can be achieved. Moreover, since the TPA could regenerate the fresh random sampling challenges, unbounded auditing is achieved too, which means no additional on-line burden would be incurred towards data owner. However, despite the desirable properties, this approach only works well for encrypted data. When directly applied to unencrypted data, it still leaks bits information towards TPA, as discussed next. VII. CAPABLE OF HANDLING MULTIPLE CONCURRENT TASKS With the establishment of privacy-preserving public auditing in cloud computing, a tpa may concurrently handle auditing delegations on different owners requests. The individual auditing of these tasks in a sequential way can be tedious and very inefficient for a TPA. Given k auditing delegations on k distinct data files from k different owners, it is more advantageous for a TPA to batch these multiple tasks together and perform the auditing one time, saving computation overhead as well as auditing time cost. Keeping this natural demand in mind, we note that two previous works [10, 13] can be directly extended to provide batch auditing functionality by exploring the technique of bilinear aggregate signature [18]. Such a technique supports the aggregation of multiple signatures by distinct signers on distinct messages into a single signature and thus allows efficient verification for the authenticity of all messages. basically, with batch auditing the k verification equations 4087
5 (for k auditing tasks) corresponding to k responses {μ, σ} from a cloud server can now be aggregated into a single one such that a considerable amount of auditing time is expected to be saved. A very recent work [15] gives the first study of batch auditing and presents mathematical details as well as security reasonings. Note that the aggregated verification equation in batch auditing only holds when all the responses are valid, and fails with high probability when there is even one single invalid response in the batch auditing. To further sort out these invalid responses, a recursive divide-and-conquer approach (binary search) can be utilized. Specifically, if the batch auditing fails, we can divide the collection of responses into two halves, and recurse the batch auditing in halves. preliminary results in [15] shows that compared to individual auditing, batch auditing indeed helps reduce the Tap s computation cost, as more than 11 and 14 percent of per-task auditing time is saved when the sampling block set is set to be 460 and 300, respectively. Moreover, even if up to 18 percent of 256 different responses are invalid, batch auditing still performs faster than individual verification. VIII. FURTHER CHALLENGES In the above sections we have described some suggested requirements for public auditing services and the state of the art that fulfills them. However, this is still not enough for a publicly auditable secure cloud data storage system, and further challenging issues remain to be supported and resolved 1. Performance Performance is always an important concern for practical system deployment. although there is evidence that the overhead for auditing based on homomorphic authenticators will be manageable [13 15], we have yet to demonstrate that the cost of authenticator precomputation and transfer of a realistic personal device is acceptable. 2. Protect Data Privacy Data privacy protection has always been an important aspect of a service level agreement for cloud storage services. Thus, the implementation of a public auditing protocol should not violate the owner s data privacy. in other words a tpa should be able to efficiently audit the cloud data storage without demanding a local copy of data or even learning the data content. 3. Support Data Dynamics as a cloud storage service is not just a data warehouse; owners are subject to dynamically updating their data via various application purposes. The design of auditing protocol should incorporate this important feature of data dynamics in cloud computing. IX. CONCLUSION: Cloud computing today is the beginning of network based computing over internet in force. It is the technology of the decade and is the enabling element of two totally new computing models, the client-cloud computing and the terminal-cloud computing. The public auditability for cloud data storage security is of critical importance so that users can resort to an external audit party to check the integrity of outsourced data when needed. This work studies the problem of ensuring the integrity of data storage in cloud computing. In particular, we consider the task of allowing a third party auditor (TPA), on behalf of the cloud client, to verify the integrity of the dynamic data stored in the cloud. We utilize sha-1 algorithm for data security in cloud and uniquely combine the public key based homomorphic authenticator with random masking to achieve the privacypreserving public cloud data auditing system. we believe that the security in cloud computing, an area full of challenges and of paramount importance, is still in its infancy now but will attract enormous amounts of research effort for many years to come. REFERENCES [1] Cloud computing for the federal community by hannah wald [2] journal of theoretical and applied information technology jatit. all rights reserved cloud computing: an overview [3] cryptography and network security principles and practices, 4th ed - william stallings [4] amazon.com, amazon s3 availability event: july 20, 2008, july 2008; [5] m. krigsman, apple s mobileme experiences post-launch pain, july 2008; [6] a. juels, j. burton, and s. kaliski, pors: proofs of retrievability for large files, proc. acm ccs 07, oct. 2007, pp [7] g.ateniese et al., provable data possession at untrusted stores, proc. Acm ccs 07, oct. 2007, pp [8] m. a. shah et al., auditing to keep online storage services honest, proc. usenix hotos 07, may [9] g. ateniese et al., scalable and efficient provable data possession, proc. securecomm 08, sept [10] cloud security alliance, (2009) security guidance for critical areas of focus in cloud computing, 9, [online] available : [11] p. mell, t. grance, (2009) draft nist working definition of cloud computing, referenced on june. 3rd, 2009 online at groups/sns/cloud-computing/index.html. [12]j. dean and s. ghemawat. mapreduce: simplified data processing on large clusters. in osdi 04: proceedings of the 6th conference on symposium on opearting systems design & implementation, pages 10 10, berkeley, ca, usa, usenix association. [13] q. wang et al., enabling public verifiability and data dynamics for storage security in cloud computing, proc. esorics 09, sept. 2009, pp [14] c. erway et al., dynamic provable data possession, proc. acm ccs 09, nov. 2009, pp [15] c. wang et al., privacy-preserving public auditing for storage security in Cloudcomputing, proc.ieeeinfocom 10, mar
Cloud Data Storage Services Considering Public Audit for Security
Global Journal of Computer Science and Technology Cloud and Distributed Volume 13 Issue 1 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE
PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE Abstract: Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared
Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.
Secure Privacy-Preserving Cloud Services. Abhaya Ghatkar, Reena Jadhav, Renju Georgekutty, Avriel William, Amita Jajoo DYPCOE, Akurdi, Pune [email protected], [email protected], [email protected],
preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.
Privacy-Preserving Public Auditing For Secure Cloud Storage ABSTRACT: Using cloud storage, users can remotely store their data and enjoy the on-demand high-quality applications and services from a shared
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department
SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD
Volume 1, Issue 7, PP:, JAN JUL 2015. SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD B ANNAPURNA 1*, G RAVI 2*, 1. II-M.Tech Student, MRCET 2. Assoc. Prof, Dept.
PRIVACY PRESERVING PUBLIC AUDITING FOR SECURED DATA STORAGE IN CLOUD USING BLOCK AUTHENTICATION CODE
PRIVACY PRESERVING PUBLIC AUDITING FOR SECURED DATA STORAGE IN CLOUD USING BLOCK AUTHENTICATION CODE R.REVATHI # PG Scholar #, Bharathiyar Institute Of Engineering for Women, Deviyakurichi, Salem(DT) India
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING T.Vidhya Sree M.Phil Research Scholar,CS, MGR College, Hosur (India) ABSTRACT Cloud Computing is the long dreamed vision
Enabling Public Auditing for Secured Data Storage in Cloud Computing
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 5 (May. 2013), V3 PP 01-05 Enabling Public Auditing for Secured Data Storage in Cloud Computing 1 Er.Amandeep Kaur,
An Efficient Data Correctness Approach over Cloud Architectures
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 8, Issue 12 (October 2013), PP. 33-37 An Efficient Data Correctness Approach over
How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System
REVIEW ARTICAL A Novel Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage Dumala Harisha 1, V.Gouthami 2 1 Student, Computer Science & Engineering-Department, JNTU Hyderabad India
Enable Public Audit ability for Secure Cloud Storage
Enable Public Audit ability for Secure Cloud Storage Leela Poornima 1, D.Hari Krishna 2 1 Student, Nova College of Engineering and Technology, Ibrahimpatnam,Krishna Dist., Andhra Pradesh, India 2 Assistant
Improving data integrity on cloud storage services
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services
A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA
A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA Mr.Mahesh S.Giri Department of Computer Science & Engineering Technocrats Institute of Technology Bhopal, India
Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing.
Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Privacy - Preserving
Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System
Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System 1 K.Valli Madhavi A.P [email protected] Mobile: 9866034900 2 R.Tamilkodi A.P [email protected] Mobile:
Near Sheltered and Loyal storage Space Navigating in Cloud
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 8 (August. 2013), V2 PP 01-05 Near Sheltered and Loyal storage Space Navigating in Cloud N.Venkata Krishna, M.Venkata
Secure Privacy Preserving Public Auditing for Cloud storage
Secure Privacy Preserving Public Auditing for Cloud storage Sathiskumar R 1, Dr.Jeberson Retnaraj 2 Department of Information Technology, Sathyabama University, Chennai, India 1 Department of Information
Third Party Auditing For Secure Data Storage in Cloud through Trusted Third Party Auditor Using RC5
Third Party Auditing For Secure Data Storage in Cloud through Trusted Third Party Auditor Using RC5 Miss. Nupoor M. Yawale 1, Prof. V. B. Gadicha 2 1 Student, M.E. Second year CSE, P R Patil COET, Amravati.INDIA.
Trusted Public Auditing Process for Secure Cloud Storage
Trusted Public Auditing Process for Secure Cloud Storage K.Adhiyaman 1, A. Jesudoss 2, D.Saravanan 3 1 Final Year MCA, Faculty of Computing, Department of MCA Sathyabama University, Chennai,Tamil Nadu,
Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption
Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer
How To Design A Cloud Data Storage Service For A Cloud Computer System
Ensuring Security Services for Data Storing and Data Sharing in Cloud Computing D. Raman 1, Bojja Vamshikrishna 2 1 Associate Professor Department of Computer Science and Engineering, Vardhaman College
Data Grid Privacy and Secure Storage Service in Cloud Computing
Data Grid Privacy and Secure Storage Service in Cloud Computing L.Revathi 1, S.Karthikeyan 2 1 Research Scholar, Department of Computer Applications, Dr. M.G.R. Educational and Research Institute University,
Development of enhanced Third party Auditing Scheme for Secure Cloud Storage
Development of enhanced Third party Auditing Scheme for Secure Cloud Storage Bhanu Prakash Chamakuri*1, D. Srikar*2, Dr. M.Suresh Babu*3 M.Tech Scholar, Dept of CSE, Grandhi Varalakshmi Institute Of Technology,
Secrecy Maintaining Public Inspecting For Secure Cloud Storage
Secrecy Maintaining Public Inspecting For Secure Cloud Storage K.Sangamithra 1, S.Tamilselvan 2 M.E, M.P.Nachimuthu.M.Jaganathan Engineering College, Tamilnadu, India 1 Asst. Professor, M.P.Nachimuthu.M.Jaganathan
Preserving Data Integrity and Public Auditing for Data Storage in Cloud Computing
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Issue - 8 August, 2014 Page No. 7829-7833 Preserving Data Integrity and Public Auditing for Data Storage
Data Storage Security in Cloud Computing
Data Storage Security in Cloud Computing Manoj Kokane 1, Premkumar Jain 2, Poonam Sarangdhar 3 1, 2, 3 Government College of Engineering and Research, Awasari, Pune, India Abstract: Cloud computing is
Erasure correcting to enhance data security in cloud data storage
Erasure correcting to enhance data security in cloud data storage K.Shrividhya Department of computer science- Vels University [email protected] A.Sajeevram Department of computer science Vels University
Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving,
Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Third Party
How To Ensure Correctness Of Data In The Cloud
A MECHANICS FOR ASSURING DATA STORAGE SECURITY IN CLOUD COMPUTING 1, 2 Pratibha Gangwar, 3 Mamta Gadoria 1 M. Tech. Scholar, Jayoti Vidyapeeth Women s University, Jaipur, [email protected] 2 M. Tech.
Verifying Correctness of Trusted data in Clouds
Volume-3, Issue-6, December-2013, ISSN No.: 2250-0758 International Journal of Engineering and Management Research Available at: www.ijemr.net Page Number: 21-25 Verifying Correctness of Trusted data in
ADVANCE SECURITY TO CLOUD DATA STORAGE
Journal homepage: www.mjret.in ADVANCE SECURITY TO CLOUD DATA STORAGE ISSN:2348-6953 Yogesh Bhapkar, Mitali Patil, Kishor Kale,Rakesh Gaikwad ISB&M, SOT, Pune, India Abstract: Cloud Computing is the next
Remote Data Auditing Scheme in Secured Cloud Storage Environment
Remote Data Auditing Scheme in Secured Cloud Storage Environment Sangeetha.T 1,Saranya.M 2 PG Scholar 1, Assistant Professor 2 Nandha College of Technology, Erode, India [email protected] 1,[email protected]
Efficient Remote Data Possession Checking In Critical Information Infrastructures Ensuring Data Storage Security In Cloud Computing
Efficient Remote Data Possession Checking In Critical Information Infrastructures Ensuring Data Storage Security In Cloud Computing Dr. T.Nalini 1, Dr.K.Manivannan 2,Vaishnavi Moorthy 3 1 Professor, Department
ENABLING PUBLIC AUDITABILITY AND DATA DYNAMICS FOR STORAGE SECURITY IN CLOUD COMPUTING
ENABLING PUBLIC AUDITABILITY AND DATA DYNAMICS FOR STORAGE SECURITY IN CLOUD COMPUTING 1 P.ILAMATHY M.TECH-INFORMATION TECHNOLOGY AMS ENGINEERING COLLEGE NAMAKKAL, INDIA [email protected] 2 V.ANITHA,M.E.
Surveying Cloud Storage Correctness using TPA with BLS
Surveying Cloud Storage Correctness using TPA with BLS Priyanka Dehariya 1, Prof. Shweta Shrivastava 2, Dr. Vineet Richaraya 3 1 M.Tech Scholar (CSE), LNCT, Bhopal 2 Asst.Professors, (CSE Department),
Privacy-Preserving Public Auditing & Data Intrgrity for Secure Cloud Storage
Privacy-Preserving Public Auditing & Data Intrgrity for Secure Cloud Storage Imran Ahmad Student, M.Tech Dept. Computer Science & Engineering Patel Institute of Technology Bhopal, India [email protected]
Secure Way of Storing Data in Cloud Using Third Party Auditor
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 4 (Jul. - Aug. 2013), PP 69-74 Secure Way of Storing Data in Cloud Using Third Party Auditor 1 Miss.
Survey Paper on Integrity Auditing of Storage
International Journal of Computational Engineering Research Vol, 04 Issue, 3 Survey Paper on Integrity Auditing of Storage Ugale Santosh A 1 1M.E. Computer AVCOE, Sangmner, India ABSTRACT: Cloud servers
15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM
RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM Dhanashri Bamane Vinayak Pottigar Subhash Pingale Department of Computer Science and Engineering SKN
CONSIDERATION OF DYNAMIC STORAGE ATTRIBUTES IN CLOUD
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE CONSIDERATION OF DYNAMIC STORAGE ATTRIBUTES IN CLOUD Ravi Sativada 1, M.Prabhakar Rao 2 1 M.Tech Student, Dept of CSE, Chilkur Balaji
Monitoring Data Integrity while using TPA in Cloud Environment
Monitoring Data Integrity while using TPA in Cloud Environment Jaspreet Kaur, Jasmeet Singh Abstract Cloud Computing is the arising technology that delivers software, platform and infrastructure as a service
SHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING
SHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING Er. Kavin M 1, Mr.J.Jayavel 2 1 PG Scholar, 2 Teaching Assistant, Department of Information Technology, Anna University Regional
A Survey on Secure Storage Services in Cloud Computing
Global Journal of Computer Science and Technology Cloud & Distributed Volume 12 Issue 12 Version 1.0 Year 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
Data Integrity for Secure Dynamic Cloud Storage System Using TPA
International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 7-12 International Research Publication House http://www.irphouse.com Data Integrity for Secure
IJCSIET-ISSUE5-VOLUME1-SERIES1 Page 1
ENHANCED DATA SECURITY IN CLOUD COMPUTING TO PRESERVING DATA IN CLOUD STOREHOUSE USING THIRD PARTY AUDITOR Dr.M.V. BRAHMANANDA REDDY, PRINCIPAL, MEKAPATI RAJA REDDY INSTITUTE OF TECHNOLOGY & SCIENCE UDAYAGIRI,SPS
Cloud Server Storage Security Using TPA
Cloud Server Storage Security Using TPA I K.Meenakshi, II Victo Sudha George I Student (M.Tech), DR. MGR Educational and Research Institute, India II Assisstant Professo, DR. MGR Educational and Research
Ensuring Data Storage Security in Cloud Computing
Ensuring Data Storage Security in Cloud Computing Cong Wang 1, Qian Wang 1, Kui Ren 1, and Wenjing Lou 2 1 ECE Department, Illinois Institute of Technology 2 ECE Department, Worcester Polytechnic Institute
February. ISSN: 2321-8134
IJFEAT INTERNATIONAL JOURNAL FOR ENGINEERING APPLICATIONS AND TECHNOLOGY TITLE: DATA PLACE & MANAGE SECURITY IN CLOUD COMPUTING FOR EFFECTIVE AND FLEXIBLE DISTRIBUTED SYSTEM 1 Mr. Pritam S. Bhoyar, 2 Mr.
Keywords: Cloud Computing, Data Dynamics, Data Integrity, Error Localization, Third Party Auditor.
www.semargroup.org, www.ijsetr.com ISSN 2319-8885 Vol.03,Issue.11 June-2014, Pages:2300-2307 Secure Cloud: Storage with Privacy Preserving Public Auditing and Data Dynamics Dept of CSE, Malabar College
PRIVACY PRESERVING AND BATCH AUDITING IN SECURE CLOUD DATA STORAGE USING AES
PRIVACY PRESERVING AND BATCH AUDITING IN SECURE CLOUD DATA STORAGE USING AES 1 SANTOSH P. JADHAV, 2 B. R. NANDWALKAR 1,2 Department of Computer Engineering, Late G.N.Sapkal collage of engineering, University
How To Check If A Data File Is Safe In A Cloud Archive
Evaluate the Performance of Data Integrity Proofs in Cloud Storage 1 D. Hari Krishna, 2 R. Pushpa Latha, 3 J. Srinivasa Rao 1,2,3 Dept. of CSE, NOVA College of Engineering & Tech., Vijayawada, AP, India
Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication
Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication Sanjay Kumar Baghel Mtech Scholar, CSE, CSIT DURG [email protected] Bhupesh Kumar Dewangan Assistant Professor,CSE,
Secure Data transfer in Cloud Storage Systems using Dynamic Tokens.
Secure Data transfer in Cloud Storage Systems using Dynamic Tokens. P.Srinivas *,K. Rajesh Kumar # M.Tech Student (CSE), Assoc. Professor *Department of Computer Science (CSE), Swarnandhra College of Engineering
SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE
International Journal of Computer Network and Security(IJCNS) Vol 7. No.1 2015 Pp. 1-8 gopalax Journals, Singapore available at : www.ijcns.com ISSN: 0975-8283 ----------------------------------------------------------------------------------------------------------------------------------------------------------
Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage
Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage P. Selvigrija, Assistant Professor, Department of Computer Science & Engineering, Christ College
Dependable and Secure Storage Services in Cloud Computing
Dependable and Secure Storage Services in Cloud Computing D.Veena Sanjitha #1, M.Himaswanthi #2, T.V.N.Sai Sindhura #3, K.V.V. Satyanarayana * # CSE Department, KL University Guntur, AndhraPradesh * K.V.V.
How To Ensure Correctness Of Data In The Cloud
Ensuring Data Storage Security in Cloud Computing ABSTRACT Cloud computing has been envisioned as the next-generation architecture of IT enterprise. In contrast to traditional solutions, where the IT services
Public Auditability and Privacy preserving in Cloud Storage
Public Auditability and Privacy preserving in Cloud Storage Kishan Lathkar, Ambulgekar H. P SGGS IE&T Nanded, Maharashtra India [email protected], [email protected] Abstract: Cloud computing
Index Terms: Data integrity, dependable distributed storage, Cloud Computing
Volume 5, Issue 5, May 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Cloud Data Protection
IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD
IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD 1 Ms.Nita R. Mhaske, 2 Prof. S.M.Rokade 1 student, Master of Engineering, Dept. of Computer Engineering Sir Visvesvaraya
Keywords : audit, cloud, integrity, station to station protocol, SHA-2, third party auditor, XOR. GJCST-B Classification : C.2.4, H.2.
Global Journal of Computer Science and Technology Cloud and Distributed Volume 13 Issue 3 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
IJCSIET-ISSUE4-VOLUME2-SERIES1 Page 1
Hash Message Authentication for Public Auditing in Secure Cloud Storage MK Siva Krishna Kanth 1, Dr.N. Chandra Sekhar Reddy 2, A. Praveen 3 Professor 2, CSE Dept., Professor 3, IT Dept., Institute of Aeronautical
A Survey on Privacy-Preserving Techniques for Secure Cloud Storage
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,
Index Terms : cloud computing, Distributed Storage, error detection, data recovery, SHA, dynamic block operations
Revisiting Secure Cloud Storage by Replacing Token Generation With SHA Ms. Bhagyashree Alhat (1), Prof. Amar Buchade(2) Pune Institute of Computer Technology, University of Pune,PG Student(1), Assistant
Identifying Data Integrity in the Cloud Storage
www.ijcsi.org 403 Identifying Data Integrity in the Cloud Storage Saranya Eswaran 1 and Dr.Sunitha Abburu 2 1 Adhiyamaan College of Engineering, Department of Computer Application, Hosur. 2 Professor and
OVERVIEW OF SECURITY ISSUES IN CLOUD COMPUTING
OVERVIEW OF SECURITY ISSUES IN CLOUD COMPUTING K. Arumugam 1, P. Sumathi 2 1 Research Scholar/Department Of Computer Science, Government Arts College, Coimbatore (India) 2 Assistant Professor/Department
Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm
Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm Twinkle Graf.F 1, Mrs.Prema.P 2 1 (M.E- CSE, Dhanalakshmi College of Engineering, Chennai, India) 2 (Asst. Professor
Secure Storage Services and Erasure Code Implementation in Cloud Servers
Secure Storage Services and Erasure Code Implementation in Cloud Servers G. Rahul Reddy 1, N. J. Subashini 2 1 Research Scholar, M.Tech, Cloud Computing, Dept of Information Technology, SRM University,
Privacy-Preserving Public Auditing for Secure Cloud Storage
Privacy-Preserving Public Auditing for Secure Cloud Storage Prof. N.L. Chourasiya, Dayanand Lature, Arun Kumavat, Vipul Kalaskar, Sanket Thaware. [email protected] Contact no: 9970131164 Abstract The
Keywords Cloud Computing, Cloud computing Architecture, Intruder, Security Issues.
Secure Storage in Cloud Computing & Emergence of Intruder Detection K.RaviTeja, Srinivasa Narasanna Pilli, B.Sreenivasa Rao, M.JangaReddy Abstract Cloud computing make it possible to store large amounts
How To Ensure Data Integrity In Cloud Computing
A Novel Approach for public exploration Data with Effective user Denial in the cloud Mahankali Anitha PG Scholar Department of CSE J.Vijayasree Assistant professor Department of CSE Dr.M.V.Siva Prasad
International Journal of Infinite Innovations in Engineering and Technology. ISSN (Online): 2349-2287, ISSN (Print): 2349-2279 2015
SECURED AUDITING SYSTEM FOR CLOUD DATA STORAGE WITH ERROR CORRECTION GUARANTEES 1 S.Sathya, 2 S.Sivakumar 1 Research Scholar, Department of Computer Science & Applications, PGP College of Arts & Science,
Data Integrity Check using Hash Functions in Cloud environment
Data Integrity Check using Hash Functions in Cloud environment Selman Haxhijaha 1, Gazmend Bajrami 1, Fisnik Prekazi 1 1 Faculty of Computer Science and Engineering, University for Business and Tecnology
SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD
SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD S.REVATHI B.HASEENA M.NOORUL IZZATH PG Student PG Student PG Student II- ME CSE II- ME CSE II- ME CSE Al-Ameen Engineering
A Novel Re-Authentication Scheme on Cloud Based Storage Services T.G.V.V.Srinivas 1, P.Suresh Babu 2 1 Final M.Tech Student, 2 Associate professor
A Novel Re-Authentication Scheme on Cloud Based Storage Services T.G.V.V.Srinivas 1, P.Suresh Babu 2 1 Final M.Tech Student, 2 Associate professor 1,2 Dept of CSE, Kaushik College of engineering, JNTUK
RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES
RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES 1 MD ISMAIL Z, 2 ASHFAQUE AHAMED K. 1 PG Scholar,Department of Computer Science, C.Abdul Hakeem College Of Arts and Science,Melvisharam.
PRIVACY ASSURED IMAGE STACK MANAGEMENT SERVICE IN CLOUD
PRIVACY ASSURED IMAGE STACK MANAGEMENT SERVICE IN CLOUD Ms. Shubhangi Edake 1, Prof. Sunil Rathod 2 1 PG Student, Computer Engineering, Dr.D.Y.Patil School of Engineering, Lohgaon,Pune,India 2 Assistant
How To Ensure Data Storage Security In Cloud Computing
Incorporation of Third Party Auditor for Safe and Secure Data Storage in Cloud Computing Abstract: Sanjeeva Polepaka Associate Professor, Department of CSE, Malla Reddy Engineering College. Cloud Computing
ISSN 2278-3091. Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability
Outsourcing and Discovering Storage Inconsistencies in Cloud Through TPA Sumathi Karanam 1, GL Varaprasad 2 Student, Department of CSE, QIS College of Engineering and Technology, Ongole, AndhraPradesh,India
Performance Evaluation Panda for Data Storage and Sharing Services in Cloud Computing
Performance Evaluation Panda for Data Storage and Sharing Services in Cloud Computing Gunnala Ajay Kumar M.Tech Student Department of CSE Global Group Of Institutions Batasingaram, Ranga Reddy (Dist),
Towards a compliance audit of SLAs for data replication in Cloud storage
Towards a compliance audit of SLAs for data replication in Cloud storage J. Leneutre B. Djebaili, C. Kiennert, J. Leneutre, L. Chen, Data Integrity and Availability Verification Game in Untrusted Cloud
