Development of Effective Audit Service to Maintain Integrity of Migrated Data in Cloud
|
|
|
- Flora Fitzgerald
- 9 years ago
- Views:
Transcription
1 Development of Effective Audit Service to Maintain Integrity of Migrated Data in Cloud Shekhar S. Kausalye 1, Prof. P.N. Kalavadekar 2 1 PG Student, Dept. of Computer Engineering, SRES COE, Kopargaon, Pune University, MH, INDIA 2 Associate Professor, Dept. of Computer Engineering, SRES COE, Kopargaon, Pune University, MH, INDIA *** Abstract - Cloud based service for storage of outsource data reduces the burden of user for storage management & maintenance, this is achieved because cloud service provides low-cost, expandable & geographically location independent platform. But client has risk of missing or corrupted data as the local copy is not available at client side. To avoid this security risk audit service must ensure the integrity of data. PDP technique which is used for verifying the integrity of data can be used to understand the audit service. A PDP protocol can be constructed using the interactive zero knowledge system to prevent the fraud of prover as well as leakage of verified data. This can be proved that the protocol can persists these properties with the help of Diffie-Hellman assumption. The mechanism can be proposed to reduce cost of audit and to detect misbehaviour with the help of related queries & periodic verification. Key Words: security, interactive proof system, cloud storage, Audit Service, Provable Data Possession, etc 1. INTRODUCTION Cloud computing is growing service for current information technology. IT provides scalable environment for ever increasing amount of data & processes which work on various application & services by using ondemand self-services. The important advantage of cloud computing paradigm is that data cam be outsourced and centralized at different location called as clouds. This kind of outsourced data storage service is becoming profitable business because of flexible, low-cost, locationindependent platform to manage user data. The burden of storage management & maintenance is reduced by Cloud Storage Service (CSS). But if this important service is susceptible to failure of attacks then this will be causing the irretrievable loss of user data as this data is not available locally with user. This risk can be caused due to: cloud infrastructure is vulnerable to security threats from within and outside of cloud [2]; the Cloud Service Providers (CSP) can behave untruthfully for cloud users [3]; also, the different opinion may be there because of faithfulness of CSP. Accordingly, their behaviour is unknown for different clients even though this may result from user s incorrect actions [4]. Because of all these reasons its cloud service provider responsibility to issue an efficient audit service so that the integrity and data availability can be verified on cloud data [5]. There are various traditional cryptographic technologies are available for data integrity and availability which are based on hash function and signature schemes [6][7]. But these technology does not work on outsourced data as they must have the local copy of data to perform the audit. As well as this process is not feasible to perform the validation by downloading data because of expensive transaction if file size is large. Also to perform the audit in cloud environment is difficult and costly for the users [8]. Therefore, it is important to understand the public auditability for CSS, because of which users may use or take help of Third Party Auditor (TPA). This TPA is expert and has capabilities that user don t have to perform the audit on outsourced data. For this auditability the concept of Proof of Retrievability [9] commonly called as POR and Provable Data Possession [10] (POP) is given by researchers. Probabilistic proof techniques approach is used by them to show that user s data remain intact without downloading it, and this is called as Verification without Downloading. Anyone can use the verification protocol to prove the availability of data using PDP or POR scheme. Hence this fulfils the requirement of public auditability. These schemes are developed around and untrusted storage which offer to check the very large amount of data. Various existing scheme does not give the security proof against Cloud Service Provider s fraud and counterfeits as well as information leakage. These problems reduce the impact of cloud audit service. Because of this new model of framework must be proposed that enables the security of public verification protocol in audit service. The performance of audit service is depending on the three aspects which are: How to design an efficient architecture of audit system that reduce the storage and network overheads and also enhance the security of audit activities; 2016, IRJET Impact Factor value: 4.45 ISO 9001:2008 Certified Journal Page 722
2 How to provide an efficient audit scheduling to help provide a more cost-effective audit service; How to optimize parameters of audit systems to minimize the computation overheads of audit services. Quality of service can be improved by solving above problems and it also help to detect irregularities and requires less resources. 2. EASE OF USE Various researchers worked on the untrusted outsourced data. The simplest and easy way to implement the integrity control is to use cryptographic hash function. Yumerefendi [7] and Hsiao[6] proposed a solution for authenticated network storage, Merkle tree also called as hash tree as the fundamental data structure, but their update process is costly. Fu [11] implemented & described the method for securely accessing a read only file system which is distributed among the various providers. This is the solution for efficiently authenticating operation on outsourced data or file. The work done by Li[12], Ma[13], Xie[14], Yavuz[5] considered the problem of how to audit the integrity of outsourced data or database. From these Li & Xie used the concept of Markle tree to audit the completeness of query result, but in some cases the overhead is high that weaken the benefits of database outsourcing. Some researchers proposed two schemes called PDP & POR to check the integrity of stored data without downloading it. Ateniese proposed the Provable Data Possession model to ensure the possession of file on untrusted storage and also provides the RSA based scheme that achieves O(1) communication cost. Anyone other than owner can challenge the server for data possession using the publicly verifiable version. The dynamic PDP solution called scalable PDP [15] is developed by the Ateniese. This is achieved using the Lightweight PDP scheme which used cryptographic Hash function & symmetric key encryption, but server can victimize the user as lack of randomness in the challenge in previous response. The number of updates and challenges is fixed and limited. By studying this work Erway has proposed two dynamic PDP [16] scheme using Hash function tree to cognize O(log n) communication and computation cost of data (file) which contain n blocks. The drawback of SPDP is simple scheme called DPDP-I and in the block-less scheme which is generally called as DPDP- II the data block can be leaked by response given to challenge. But Juels presented the POR [9] scheme which greatly cognize of pre-processing steps of the client which are followed before sending the file or data to Cloud Service Provider. The main drawback of this scheme is that these operation restricts the updating of data. Shacham & Waters [17] presented and efficient version of this protocol which is called Compact POR, this protocol uses harmonic property to aggregate a proof into O(1) authenticator value and O(t) computation cost where t is challenge blocks, but the drawback of this is that its solution is static and there is leakage of data blocks in the verification process. 3. LITERATURE SURVEY Audit system architecture for outsourced data in cloud is shown in Fig. 1. This architecture work in audit service outsourcing mode. This architecture contains four entities: 1. Data Owner (DO): The user who want to store large amount of data to the cloud; 2. Cloud Service Provider (CSP): CSP provides data storage service and has storage space and computation resources; 3. Third Party Auditor (TAP): TPA has capabilities to manage of monitor outsources data under the deputation of data owner; Granted Application (GA): GA has rights to access & manipulate stored data. These application can be either inside the cloud or outside the cloud. This depends on the specific requirement. Fig-1. Audit System Architecture for Cloud Computing Audit service based on TPA works in the following way. This also help to describe our audit service as follows: 1. Client uses the secret key sk for preprocessing of the file, file contains collection of n blocks, then it generates public verification information which is stored in TPA, after this the file is transmitted with some verification tags to Cloud Service Provider, user can then delete the local copy of this data; 2. Afterword, using protocol called as proof of retrievability, TPA check the integrity and availability of the outsourced data. It is important to generate an alarm for suspicious activity or events. [1]. This is also known as audit service outsourcing because verification of data integrity can be implemented by TPA without taking help of data owner. Here data owner and granted clients dynamically interact with Cloud Service Provider to access or update their own data for various 2016, IRJET Impact Factor value: 4.45 ISO 9001:2008 Certified Journal Page 723
3 application purposes. However, we cannot trust CSP for security of stored data, neither can we assume that data owner is able to collect the evidences against CSP for CSPs fault when errors occur. Because of these reasons, TPA, which act as a Trust Third Party (TTP), is used to make sure the security of stored data. We can say that the TPA is reliable as well as independent, and hence it has no motivation to conspire with the CSP or clients at the time of auditing process: 1. TPA must regularly check the integrity and availability of data at appropriate intervals; 2. TPA must be able to take evidences for various disagreements about inconsistency of the data in terms of authentic records for all the data operations. [18]. Let be two multiplicative groups using elliptic curve convention with large prime order p. A function e can be bilinear map which can be computed as: e:. This has following properties: for any G, H ε & all a, b ε, we have the following 1. Bilinearity: e([a]g; [b]h) = e(g; H) ab1: 2. Non-degeneracy: e(g; H) 6 = 1 unless G or H = Computability: e(g; H) is efficiently computable [1] Definition Bilinear map group system: It is a tuple composed as the object as described above [1]. 4. IMPLEMENTATION In this proposed audit architecture, main idea is, to maintain security of Third Party Auditor so that we can guarantee the credibility of cloud storage. Because it is easy to ensure the security of Trust Third Party Auditor than maintaining the security of whole cloud. Hence, Third Party Auditor is the root or basis of trust in clouds. The protocol design must achieve following security and performance guarantees: Audit without downloading: Allow Third Party Auditor or clients with the help of Third Party Auditor to verify correctness of data whenever necessary without downloading the copy of data; Verification correctness: to ensure there is no cheating of CSP that can clear or grant the audit from Third Party Auditor without storing user s data intact; Privacy-preserving: to ensure that there is no alternate way for Third Party Auditor to derive user s data from information collected during the audit operation; and High-performance: to allow Third Party Auditor to perform auditing but with minimum overheads for storage, communication and computation [1] In this proposed audit architecture, main idea is, to maintain security. 4.1 Design A cryptographic interactive audit scheme is used to support the audit service. This scheme is also called as interactive PDP (IPDP). A standard model of interactive proof system is used to construct this scheme, because this ensures the confidentiality of secret data also called as zero-knowledge property & the undeceivability of invalid tags called as soundness property. Definition Collision Resistance Hash: A hash family H is (t, ε) collision resistance if no t-time advantage at least ε in breaking the collision resistance of H [1]. The system is setup using bilinear pairing proposed by Boneh & Franklin 4.2 Algorithm Interactive audit protocol is based on the interactive proof system as explained below: A cryptographic interactive audit scheme S is consisting of two algorithms & one proof system generally called as interactive proof system, i.e. S = (K, T, P). Algorithm 1: KeyGen (1 s ) Security parameter s is given as an input to this algorithm, and the algorithm return a public keypair (pk,sk) as: Step 1: Let be a bilinear map group system with randomly selected generators g, h, R,, where, T are two group of large prime order p, p = O(k). Step 2: Now we generate the collision-resistance hash function H k( ) and by choosing a random α, β, R,, p and compute H 1 = h α and H 2 = h β. Step 3: Thus the secret key is sk = (α, β) and the public key is pk = (g,h,h 1,H 2). Algorithm 2: TagGen (sk,f) This algorithm takes an secret key and a file F as input. This returns a triplet, where denotes the secret used to generate verification tag, is the set of public verification parameters u and index information i.e., denotes the set of verification tags; 1. Owners file i.e. F is splited in to n x s sectors F={m i,j}, 2. Choose s and random as the secret of the file. 3. Compute for i [1, s] and, where and F n is the file name. 4. Build index table. 5. Calculate its tag as: where and i [1,n]. Sends and outputs, to TPA, and to CSP. 2016, IRJET Impact Factor value: 4.45 ISO 9001:2008 Certified Journal Page 724
4 Proof (CSP,TPA): It is two-party proof protocol of retrievability between CSP (prover) and TPA (verifier) where CSP takes File as input, set of tags, a public key pk, and a set of public parameter are the common input between CSP and TP. At the end TPA return 1 or 0, where 1 shows the file is correct stored on the server. This protocol is the three move protocol between Cloud Service Provider and Third Party Auditor. Here the common input is (pk, ψ). This protocol is: Commitment (CSP TPA) CSP choose random for j [1,s], and sends its commitment to TPA, where and Challenge (CSP TPA) TPA choose a random challenge set I of t indexes along with t random coefficients. Let Q be the set of challenge index coefficient pairs. TPA sends Q to CSP. Response (CSP TPA) CSP calculates the response Θ, μ as Where,. P sends to V. Verification: TPA can check that the response was correctly formed by checking that The proposed audit scheme is explained above, which contains three algorithms namely key generation, tag generation and verification protocol. In key generation used is assigned a secret key sk this key is used to generate tags for files and public key pk is used to verify the integrity of stored files. In tag generation file F produces the verification parameter. The hash value can be considered as a signature of secret and is the encryption of this secret. Hash index table is designed according to the Fig. -2 Framework of interactive audit scheme application. The index table is important for ensuring the security of the file. Using and the hash value is generated for each block of file. But it must be checked that values of should be different for all processed files. The verification process consists of three move protocol structure which contains three steps i.e. commitment, challenge and response. This is shown in Figure 2. This protocol is similar to Schnorrs protocol. The zero knowledge property ensures that the verification process does not expose anything other than veracity of the statement in cloud. To avoid the leakage of data and tags in the verification process, the secret data {m,j} is protected by random.and the values and are protected by simple commitment process. 4.3 Mathematical Model It is P Class problem because: 1. Problem can be solved in polynomial time. 2. All important operations are hidden by KeyGen and TagGen algorithm. 3. The proof protocol works in polynomial time. Let S be the set of input function and output. So S = I, F, O where I is a set of Input F is a set of functions that are used to process the input provided and O be the set of output. I = I1, I2, I3 F = F1, F2, F3 O = O1, O2, O3 Input is mapped to output which is shown in following Venn diagram: Fig-3. Venn diagram As we have three input for the system, so we have three I as I1: File uploaded by user. I2: Security parameter s which is bilinear map group system. I3: Secret key I4: set of tags Three functions are used F1, F2, and F3 2016, IRJET Impact Factor value: 4.45 ISO 9001:2008 Certified Journal Page 725
5 F1: Key generation to generate the secret key. F2: Tag Generation for file uploaded by user. F3: Proof Technique to verify the files and perform the audit. Also the system has three outputs O1, O2, O3 O1: File Verification O2: File is available for download (Retrieve File after making changes by user) O3: Perform periodic audit 5. RESULT The implementation of system consists of implementation of KeyGen algorithm. The input given is user id and password. The bi-linear map group system is used with two groups of large prime order. The key is generated using the collision resistant hash function. While logging to the system user has to enter the key which is sent to the registered id of the user. This key is ed to the user when he attempt to log in using the user id and password. The tag is generated using TagGen algorithm which accepts two inputs secret key sk and file. The file is uploaded with this tag to ensure the integrity while we are performing the audit.audit system architecture for outsourced data in cloud. 6. CONCLUSIONS Cloud-based outsourced storage reduces the client s burden for storage management and maintenance by providing a low cost, scalable, location-independent platform. But, the clients may not have local copy of this data. To avoid the security risks, audit services must ensure the integrity and availability of outsourced data. This dissertation presents a construction of an efficient audit service for data integrity in clouds. It also proposed an interactive audit protocol to implement the audit service based on a third party auditor. In this audit service, the third party auditor, can issue a periodic verification to monitor the change of outsourced data by providing an optimized schedule. To realize the audit model, there is only need to maintain the security of the TPA. This technology can be easily adopted in a cloud computing environment to replace the traditional Hashbased solution. ACKNOWLEDGEMENT It is with the greatest pleasure and pride that I present this paper. At this moment, I cannot neglect all those who helped me in the successful completion of this paper. I am very thankful to my respected project guide Prof. P. N. Kalavadekar, Associate Professor, for his ideas and help proved to be valuable and helpful during the creation of this paper and guide me in the right path. I would also like to thank all the faculties who have cleared all the major concepts that were involved in the understanding of techniques behind this paper. Lastly, I am thankful to my friends who shared their knowledge in this field with me REFERENCES [1] Yan Zhu, Yan Zhu, Hongxin Huc, Gail-Joon Ahn, Stephen S. Yau. Efficient audit service outsourcing for data integrity in clouds. In: The Journal of Systems and software 85(2012) [2] Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R.H., Konwinski, A., Lee, G., Patterson, D.A., Rabkin, A., Stoica, I., Zaharia, M. A view of cloud computing. ACM 53 (4), 50-58, [3] Tchifilionova, V. Security and privacy implications of cloud computing clost in the cloud. In: Camenisch, J., Kisimov, V., Dubovitskaya, M. (Eds.), Open Research Problems in Network Security. Vol of Lecture Notesin Computer Science. Springer, Berlin/Heidelberg, pp , [4] Ko, R.K.L., Lee, B.S., Pearson, S. Towards achieving accountability, auditability and trust in cloud computing. In: Abraham, A., Mauri, J.L., Buford, J.F., Suzuki, J., Thampi, S.M. (Eds.), Advances in Computing and Communications. Vol. 193 of Communications in Computer and Information Science. Springer, Berlin/Heidelberg, pp , [5] Yavuz, A.A., Ning, P. Baf: An efficient publicly verifiable secure audit logging scheme for distributed systems. In: ACSAC, pp , [6] Hsiao, H.-C., Lin, Y.-H., Studer, A., Studer, C., Wang, K.- H., Kikuchi, Perrig, A., Sun, H.-M., Yang, B.-Y. A study of user-friendly hash comparison schemes. In: ACSAC, pp [7] Yumerefendi, A.R., Chase, J.S. Strong accountability for network storage. ACM Trans. Storage (TOS) 3 (3), [8] Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R.H., Konwinski, A., Lee, G., Patterson, D.A., Rabkin, A., Stoica, I., Zaharia, M., A view of cloud computing. Commun. ACM 53 (4), [9] Juels Jr., A., Kaliski, B.S. Pors: proofs of retrievability for large files. In: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, pp , [10] Ateniese, G., Burns, R.C., Curtmola, R., Herring, J., Kissner, L., Peterson, Z.N.J., Song, D.X. Provable data possession at untrusted stores. In: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, pp , 2007 [11] Fu, K., Kaashoek, M.F., Mazires, D. Fast and secure distributed readonly file system. ACM Trans. Comput. Syst. 20 (1), 124, , IRJET Impact Factor value: 4.45 ISO 9001:2008 Certified Journal Page 726
6 [12] Li, F., Hadjieleftheriou, M., Kollios, G., Reyzin, L. Dynamic authenticated index structures for outsourced databases. In: Chaudhuri, S., Hristidis, V., Polyzotis, N. (Eds.), SIGMOD Conference. ACM, pp , 2006 [13] Ma, D., Deng, R.H., Pang, H., Zhou, J. Authenticating query results in data publishing. In: Qing, S., Mao, W., Lopez, J., Wang, G. (Eds.), ICICS. Vol of Lecture Notes in Computer Science. Springer, pp , [14] Xie, M., Wang, H., Yin, J., Meng, X. Integrity auditing of outsourced data. In: Koch, C., Gehrke, J., Garofalakis, M.N., Srivastava, D., Aberer, K., Deshpande, A., Florescu, D., Chan, C.Y., Ganti, V., Kanne, C.-C., Klas, W., Neuhold, E.J. Eds.), VLDB. ACM, pp , [15] Ateniese, G., Pietro, R.D., Mancini, L.V., Tsudik, G. Scalable and efficient provable data possession. In: Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, SecureComm, pp. 110, [16] Erway, C.C., Kpc, A., Papamanthou, C., Tamassia, R. Dynamic provable data possession. In: Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS, pp , [17] Shacham, H., Waters, B. Compact proofs of retrievability. In: Advances in Cryptology ASIACRY, 14th International Conference on the Theory and Application of Cryptology and Information Security, pp , [18] Boneh, D., Franklin, M. Identity-based encryption from the weil pairing. In: Advances in Cryptology (CRYPTO2001). Vol of LNCS, pp , , IRJET Impact Factor value: 4.45 ISO 9001:2008 Certified Journal Page 727
Secrecy Maintaining Public Inspecting For Secure Cloud Storage
Secrecy Maintaining Public Inspecting For Secure Cloud Storage K.Sangamithra 1, S.Tamilselvan 2 M.E, M.P.Nachimuthu.M.Jaganathan Engineering College, Tamilnadu, India 1 Asst. Professor, M.P.Nachimuthu.M.Jaganathan
How To Ensure Data Integrity In Clouds
Proficient Audit Services Outsourced for Data Availability in Clouds N Praveen Kumar Reddy #1, Dr Subhash Chandra *2 N Praveen Kumar Reddy, pursuing M.Tech from Holy Mary Institute of Technology and Science,,
International Journal of Infinite Innovations in Engineering and Technology. ISSN (Online): 2349-2287, ISSN (Print): 2349-2279 2015
SECURED AUDITING SYSTEM FOR CLOUD DATA STORAGE WITH ERROR CORRECTION GUARANTEES 1 S.Sathya, 2 S.Sivakumar 1 Research Scholar, Department of Computer Science & Applications, PGP College of Arts & Science,
Data Security & Availability in Multi-Cloud Storage with Cooperative Provable Data Possession
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 2 February 2015, Page No. 10375-10379 Data Security & Availability in Multi-Cloud Storage with Cooperative
SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD
Volume 1, Issue 7, PP:, JAN JUL 2015. SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD B ANNAPURNA 1*, G RAVI 2*, 1. II-M.Tech Student, MRCET 2. Assoc. Prof, Dept.
RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES
RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES 1 MD ISMAIL Z, 2 ASHFAQUE AHAMED K. 1 PG Scholar,Department of Computer Science, C.Abdul Hakeem College Of Arts and Science,Melvisharam.
Development of enhanced Third party Auditing Scheme for Secure Cloud Storage
Development of enhanced Third party Auditing Scheme for Secure Cloud Storage Bhanu Prakash Chamakuri*1, D. Srikar*2, Dr. M.Suresh Babu*3 M.Tech Scholar, Dept of CSE, Grandhi Varalakshmi Institute Of Technology,
Data Integrity for Secure Dynamic Cloud Storage System Using TPA
International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 7-12 International Research Publication House http://www.irphouse.com Data Integrity for Secure
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department
SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD
SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD S.REVATHI B.HASEENA M.NOORUL IZZATH PG Student PG Student PG Student II- ME CSE II- ME CSE II- ME CSE Al-Ameen Engineering
AN EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA IN TEGRITY IN CLOUDS
AN EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA IN TEGRITY IN CLOUDS Mrs.K.Saranya, M.E.,(CSE), Jay Shriram Group of Institutions, Tirupur. [email protected] Dr.S.Rajalakshmi, Associate Professor/CSE,
A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA
A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA Mr.Mahesh S.Giri Department of Computer Science & Engineering Technocrats Institute of Technology Bhopal, India
TITLE: Secure Auditing and Deduplicating Data in Cloud(Survey Paper)
TITLE: Secure Auditing and Deduplicating Data in Cloud(Survey Paper) Pratik Raut 1, Pratik Kamble 2, Prafull Pansare 3, Dipti Salunkhe 4 1 UG Student, Dept. of Computer Engineering, JSCOE, Hadapsar, Pune,
SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE
International Journal of Computer Network and Security(IJCNS) Vol 7. No.1 2015 Pp. 1-8 gopalax Journals, Singapore available at : www.ijcns.com ISSN: 0975-8283 ----------------------------------------------------------------------------------------------------------------------------------------------------------
15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM
RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM Dhanashri Bamane Vinayak Pottigar Subhash Pingale Department of Computer Science and Engineering SKN
EFFICIENT DISCOVERY OF INTEGRITY AUTOMATION IN HYBRID CLOUD COMPUTING
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE EFFICIENT DISCOVERY OF INTEGRITY AUTOMATION IN HYBRID CLOUD COMPUTING K.Saipriya 1, A.Ravi Kumar 2 1 M.Tech Student, Dept of
IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD
IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD 1 Ms.Nita R. Mhaske, 2 Prof. S.M.Rokade 1 student, Master of Engineering, Dept. of Computer Engineering Sir Visvesvaraya
Survey Paper on Integrity Auditing of Storage
International Journal of Computational Engineering Research Vol, 04 Issue, 3 Survey Paper on Integrity Auditing of Storage Ugale Santosh A 1 1M.E. Computer AVCOE, Sangmner, India ABSTRACT: Cloud servers
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING T.Vidhya Sree M.Phil Research Scholar,CS, MGR College, Hosur (India) ABSTRACT Cloud Computing is the long dreamed vision
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction 1 Priyadharshni.A, 2 Geo Jenefer.G 1 Master of engineering in computer science, Ponjesly College of Engineering 2 Assistant Professor,
PRIVACY PRESERVING PUBLIC AUDITING FOR SECURED DATA STORAGE IN CLOUD USING BLOCK AUTHENTICATION CODE
PRIVACY PRESERVING PUBLIC AUDITING FOR SECURED DATA STORAGE IN CLOUD USING BLOCK AUTHENTICATION CODE R.REVATHI # PG Scholar #, Bharathiyar Institute Of Engineering for Women, Deviyakurichi, Salem(DT) India
Integrity Verification In Multiple Cloud Storage Using Cooperative PDP Method
Integrity Verification In Multiple Cloud Storage Using Cooperative PDP Method * Usha Sundari Dara 1 M. Swetha Chandra 2 1PG Student (M. Tech) Dept. of CSE, TRR College of Engineering, Hyderabad, AP, India
ISSN 2278-3091. Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability
Outsourcing and Discovering Storage Inconsistencies in Cloud Through TPA Sumathi Karanam 1, GL Varaprasad 2 Student, Department of CSE, QIS College of Engineering and Technology, Ongole, AndhraPradesh,India
Enable Public Audit ability for Secure Cloud Storage
Enable Public Audit ability for Secure Cloud Storage Leela Poornima 1, D.Hari Krishna 2 1 Student, Nova College of Engineering and Technology, Ibrahimpatnam,Krishna Dist., Andhra Pradesh, India 2 Assistant
Performance Evaluation Panda for Data Storage and Sharing Services in Cloud Computing
Performance Evaluation Panda for Data Storage and Sharing Services in Cloud Computing Gunnala Ajay Kumar M.Tech Student Department of CSE Global Group Of Institutions Batasingaram, Ranga Reddy (Dist),
E-mail- [email protected],[email protected] [email protected]
International Journal Of Scientific Research And Education Volume 2 Issue 10 Pages-2019-2026 October-2014 ISSN (e): 2321-7545 Website: http://ijsae.in Multi-Cloud Storage Data Possession Based Data Integrity
Improving data integrity on cloud storage services
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services
Privacy-Preserving Public Auditing & Data Intrgrity for Secure Cloud Storage
Privacy-Preserving Public Auditing & Data Intrgrity for Secure Cloud Storage Imran Ahmad Student, M.Tech Dept. Computer Science & Engineering Patel Institute of Technology Bhopal, India [email protected]
International Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 12, December 2014 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
Keywords: - Ring Signature, Homomorphic Authenticable Ring Signature (HARS), Privacy Preserving, Public Auditing, Cloud Computing.
Survey on Privacy Preserving Public Auditing Techniques for Shared Data in the Cloud Kedar Jayesh Rasal 1, Dr. S.V.Gumaste 2, Sandip A. Kahate 3 Computer Engineering, Pune University, SPCOE, Otur, Pune,
Surveying Cloud Storage Correctness using TPA with BLS
Surveying Cloud Storage Correctness using TPA with BLS Priyanka Dehariya 1, Prof. Shweta Shrivastava 2, Dr. Vineet Richaraya 3 1 M.Tech Scholar (CSE), LNCT, Bhopal 2 Asst.Professors, (CSE Department),
SHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING
SHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING Er. Kavin M 1, Mr.J.Jayavel 2 1 PG Scholar, 2 Teaching Assistant, Department of Information Technology, Anna University Regional
Trusted Public Auditing Process for Secure Cloud Storage
Trusted Public Auditing Process for Secure Cloud Storage K.Adhiyaman 1, A. Jesudoss 2, D.Saravanan 3 1 Final Year MCA, Faculty of Computing, Department of MCA Sathyabama University, Chennai,Tamil Nadu,
A Novel Re-Authentication Scheme on Cloud Based Storage Services T.G.V.V.Srinivas 1, P.Suresh Babu 2 1 Final M.Tech Student, 2 Associate professor
A Novel Re-Authentication Scheme on Cloud Based Storage Services T.G.V.V.Srinivas 1, P.Suresh Babu 2 1 Final M.Tech Student, 2 Associate professor 1,2 Dept of CSE, Kaushik College of engineering, JNTUK
M. Nathiya 2 B.Tech. (IT), M.E. (CSE), Assistant Professor, Shivani Engineering College, Trichy, Tamilnadu, India.
ISSN: 2321-7782 (Online) Volume 2, Issue 5, May 2014 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com Robust Data
Efficient Remote Data Possession Checking In Critical Information Infrastructures Ensuring Data Storage Security In Cloud Computing
Efficient Remote Data Possession Checking In Critical Information Infrastructures Ensuring Data Storage Security In Cloud Computing Dr. T.Nalini 1, Dr.K.Manivannan 2,Vaishnavi Moorthy 3 1 Professor, Department
Energy Efficiency in Secure and Dynamic Cloud Storage
Energy Efficiency in Secure and Dynamic Cloud Storage Adilet Kachkeev Ertem Esiner Alptekin Küpçü Öznur Özkasap Koç University Department of Computer Science and Engineering, İstanbul, Turkey {akachkeev,eesiner,akupcu,oozkasap}@ku.edu.tr
Authorized Auditing of Big Data Stored on Cloud with Auditability Aware Data Scheduling
Authorized Auditing of Big Data Stored on Cloud with Auditability Aware Data Scheduling Surapriya Swain 1, Prof. Saurabh Gupta 2 1 Department of Computer Engineering, GSMCOE, Balewadi, Savitribai Phule
preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.
Privacy-Preserving Public Auditing For Secure Cloud Storage ABSTRACT: Using cloud storage, users can remotely store their data and enjoy the on-demand high-quality applications and services from a shared
Review On Deduplicating Data and Secure Auditing in Cloud
Review On Deduplicating Data and Secure Auditing in Cloud Mr.Satish Shelar 1, Prof.S.Y.Raut 2 1 Student ME CSE,PREC,Loni,Maharashtra,India 2 Asst.Professor,PREC,Loni, Maharashtra,India ---------------------------------------------------------------------***---------------------------------------------------------------------
DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION
DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION Prof. M. Ben Swarup Professor, Department of CSE Vignan's Institute of Information Technology Visakhapatnam-49, India Chukkala
I. Introduction. A. Related Work
PUBLIC VERIFIABILITY AND DATA DYNAMICS IN CLOUD SERVER P.Saranya, Roever Engineering College; S.Vishnupriya, Roever Engineering College; E.Elangovan, PRIST University Abstract- Cloud computing stores the
Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.
Secure Privacy-Preserving Cloud Services. Abhaya Ghatkar, Reena Jadhav, Renju Georgekutty, Avriel William, Amita Jajoo DYPCOE, Akurdi, Pune [email protected], [email protected], [email protected],
Secure Public Auditing for Cloud Data Storage
Secure Public Auditing for Cloud Data Storage Madhumati B. Shinde 1, Dr. Sonkamble Sulochana B 2 1 P.G. Student, Computer Department, JSPM, NTC, RSSOER, Narhe, Savitribai Phule Pune University, Pune, India
Cloud Data Storage Services Considering Public Audit for Security
Global Journal of Computer Science and Technology Cloud and Distributed Volume 13 Issue 1 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
A Survey of Public Auditing for Secure Data Storage in Cloud Computing
International Journal of Network Security, Vol.18, No.1, PP.133-142, Jan. 2016 133 A Survey of Public Auditing for Secure Data Storage in Cloud Computing Wei-Fu Hsien 1, Chou-Chen Yang 1, and Min-Shiang
AN EFFICIENT STRATEGY OF THE DATA INTEGRATION BASED CLOUD
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF THE DATA INTEGRATION BASED CLOUD Koncha Anantha Laxmi Prasad 1, M.Yaseen Pasha 2, V.Hari Prasad 3 1
Third Party Auditing For Secure Data Storage in Cloud through Trusted Third Party Auditor Using RC5
Third Party Auditing For Secure Data Storage in Cloud through Trusted Third Party Auditor Using RC5 Miss. Nupoor M. Yawale 1, Prof. V. B. Gadicha 2 1 Student, M.E. Second year CSE, P R Patil COET, Amravati.INDIA.
A Survey on Secure Storage Services in Cloud Computing
Global Journal of Computer Science and Technology Cloud & Distributed Volume 12 Issue 12 Version 1.0 Year 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
Near Sheltered and Loyal storage Space Navigating in Cloud
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 8 (August. 2013), V2 PP 01-05 Near Sheltered and Loyal storage Space Navigating in Cloud N.Venkata Krishna, M.Venkata
Comments on "public integrity auditing for dynamic data sharing with multi-user modification"
University of Wollongong Research Online Faculty of Engineering and Information Sciences - Papers Faculty of Engineering and Information Sciences 2016 Comments on "public integrity auditing for dynamic
Replicated Data Integrity Verification in Cloud
Replicated Data Integrity Verification in Cloud Raghul Mukundan Department of Computer Science Missouri University of Science and Technology [email protected] Sanjay Madria Department of Computer Science Missouri
Public Auditing For Shared Data with Symposium on Security in the Cloud
DOI 10.4010/2015.463 ISSN2321 3361 2015 IJESC Research Article October 2015 Issue Public Auditing For Shared Data with Symposium on Security in the Cloud M. SUBHA, M.Sc, M.Phil, M.CA (Phd) 1, R.NIRMALA
Verifying Correctness of Trusted data in Clouds
Volume-3, Issue-6, December-2013, ISSN No.: 2250-0758 International Journal of Engineering and Management Research Available at: www.ijemr.net Page Number: 21-25 Verifying Correctness of Trusted data in
OVERVIEW OF SECURITY ISSUES IN CLOUD COMPUTING
OVERVIEW OF SECURITY ISSUES IN CLOUD COMPUTING K. Arumugam 1, P. Sumathi 2 1 Research Scholar/Department Of Computer Science, Government Arts College, Coimbatore (India) 2 Assistant Professor/Department
Index Terms : cloud computing, Distributed Storage, error detection, data recovery, SHA, dynamic block operations
Revisiting Secure Cloud Storage by Replacing Token Generation With SHA Ms. Bhagyashree Alhat (1), Prof. Amar Buchade(2) Pune Institute of Computer Technology, University of Pune,PG Student(1), Assistant
Data Storage Security in Cloud Computing
Data Storage Security in Cloud Computing Manoj Kokane 1, Premkumar Jain 2, Poonam Sarangdhar 3 1, 2, 3 Government College of Engineering and Research, Awasari, Pune, India Abstract: Cloud computing is
How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System
REVIEW ARTICAL A Novel Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage Dumala Harisha 1, V.Gouthami 2 1 Student, Computer Science & Engineering-Department, JNTU Hyderabad India
How To Ensure Data Integrity In Cloud Computing
A Novel Approach for public exploration Data with Effective user Denial in the cloud Mahankali Anitha PG Scholar Department of CSE J.Vijayasree Assistant professor Department of CSE Dr.M.V.Siva Prasad
A Survey on Privacy-Preserving Techniques for Secure Cloud Storage
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,
Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System
Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System 1 K.Valli Madhavi A.P [email protected] Mobile: 9866034900 2 R.Tamilkodi A.P [email protected] Mobile:
Energy Optimal Cloud Storage and Access Methods for Temporal Cloud Databases
Energy Optimal Cloud Storage and Access Methods for Temporal Cloud Databases MUTHURAJKUMAR SANNASY*, VIJAYALAKSHMI MUTHUSWAMY, KANNAN ARPUTHARAJ Department of Information Science and Technology College
An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud
An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud T.Vijayalakshmi 1, Balika J Chelliah 2,S.Alagumani 3 and Dr.J.Jagadeesan 4 1 PG
Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage
Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage Pranita Bakka 1, Dr. Jayashree Agarkhed 2 1 P.G.Student, Department of Computer Science & Engineering,
Identifying Data Integrity in the Cloud Storage
www.ijcsi.org 403 Identifying Data Integrity in the Cloud Storage Saranya Eswaran 1 and Dr.Sunitha Abburu 2 1 Adhiyamaan College of Engineering, Department of Computer Application, Hosur. 2 Professor and
CONSIDERATION OF DYNAMIC STORAGE ATTRIBUTES IN CLOUD
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE CONSIDERATION OF DYNAMIC STORAGE ATTRIBUTES IN CLOUD Ravi Sativada 1, M.Prabhakar Rao 2 1 M.Tech Student, Dept of CSE, Chilkur Balaji
Remote Data Integrity Checking in Cloud Computing
ISSN 2321 8169 Remote Data Integrity Checking in Cloud Computing Khaba M.V (Assistant Professor/CSE) RVS School of Engineering,dindigul [email protected] M.Santhanalakshmi(Assistant Professor/CSE) RVS
Review On Regenerating Code Based Secure Cloud Storage Using Public Auditing Mr.Satish Shelar 1, Prof.S.Y.Raut 2
Review On Regenerating Code Based Secure Cloud Storage Using Public Auditing Mr.Satish Shelar 1, Prof.S.Y.Raut 2 1 Student ME CSE,PREC,Loni,Maharashtra,India 2 Asst.Professor,PREC,Loni, Maharashtra,India
Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving,
Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Third Party
Analysis of Secure Cloud Data Sharing Within a Group
Analysis of Secure Cloud Data Sharing Within a Group Ms. uri Pande* Department of CSE, GHRAET Nagpur (M.S), India, Prof. Vikrant Chole Dept of Computer Science & Engg Nagpur (M.S.), India Abstract In this
On the security of auditing mechanisms for secure cloud storage
University of Wollongong Research Online Faculty of Engineering and Information Sciences - Papers Faculty of Engineering and Information Sciences 2014 On the security of auditing mechanisms for secure
Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing.
Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Privacy - Preserving
February. ISSN: 2321-8134
IJFEAT INTERNATIONAL JOURNAL FOR ENGINEERING APPLICATIONS AND TECHNOLOGY TITLE: DATA PLACE & MANAGE SECURITY IN CLOUD COMPUTING FOR EFFECTIVE AND FLEXIBLE DISTRIBUTED SYSTEM 1 Mr. Pritam S. Bhoyar, 2 Mr.
Public Auditability and Privacy preserving in Cloud Storage
Public Auditability and Privacy preserving in Cloud Storage Kishan Lathkar, Ambulgekar H. P SGGS IE&T Nanded, Maharashtra India [email protected], [email protected] Abstract: Cloud computing
Enhance Data Security in Cloud Computing using Layered Interleaving Approach
Enhance Data Security in Cloud Computing using Layered Interleaving Approach Mr. Pradeep Semwal Assistant Professor Dept of Computer Application & IT SGRR-Institute of Technology & Sciences, Dehradun Mr.
Towards a compliance audit of SLAs for data replication in Cloud storage
Towards a compliance audit of SLAs for data replication in Cloud storage J. Leneutre B. Djebaili, C. Kiennert, J. Leneutre, L. Chen, Data Integrity and Availability Verification Game in Untrusted Cloud
