Comments on "public integrity auditing for dynamic data sharing with multi-user modification"
|
|
|
- Betty Bridges
- 9 years ago
- Views:
Transcription
1 University of Wollongong Research Online Faculty of Engineering and Information Sciences - Papers Faculty of Engineering and Information Sciences 2016 Comments on "public integrity auditing for dynamic data sharing with multi-user modification" Yong Yu University of Electronic Science and Technology of China, yyong@uoweduau Yannan Li University of Electronic Science and Technology of China Jianbing Ni University of Electronic Science and Technology of China Guomin Yang University of Wollongong, gyang@uoweduau Yi Mu University of Wollongong, ymu@uoweduau See next page for additional authors Publication Details Yu, Y, Li, Y, Ni, J, Yang, G, Mu, Y & Susilo, W (2016) Comments on "public integrity auditing for dynamic data sharing with multiuser modification" IEEE Transactions on Information Forensics and Security, 11 (3), Research Online is the open access institutional repository for the University of Wollongong For further information contact the UOW Library: research-pubs@uoweduau
2 Comments on "public integrity auditing for dynamic data sharing with multi-user modification" Abstract Recently, a practical public integrity auditing scheme supporting multiuser data modification (IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, DOI / TIFS ) was proposed Although the protocol was claimed secure, in this paper, we show that the proposal fails to achieve soundness, the most essential property that an auditing scheme should provide Specifically, we show that a cloud server can collude with a revoked user to deceive a third-party auditor (TPA) that a stored file keeps virgin even when the entire file has been deleted Disciplines Engineering Science and Technology Studies Publication Details Yu, Y, Li, Y, Ni, J, Yang, G, Mu, Y & Susilo, W (2016) Comments on "public integrity auditing for dynamic data sharing with multiuser modification" IEEE Transactions on Information Forensics and Security, 11 (3), Authors Yong Yu, Yannan Li, Jianbing Ni, Guomin Yang, Yi Mu, and Willy Susilo This journal article is available at Research Online:
3 1 Comments on Public Integrity Auditing for Dynamic Data Sharing with Multi-user Modification Yong Yu, Yannan Li, Jianbing Ni, Guomin Yang, Yi Mu and Willy Susilo Abstract Recently, a practical public integrity auditing scheme supporting multi-user data modification (IEEE Trans on Information Forensics and Security, DOI /TIFS ) was proposed Although the protocol was claimed secure, in this paper, we show that the proposal fails to achieve soundness, the most essential property that an auditing scheme should provide Specifically, we show that a cloud server can collude with a revoked user to deceive a third-party auditor (TPA) that a stored file keeps virgin even when the entire file has been deleted Keywords: Cloud storage, data integrity, soundness I INTRODUCTION Cloud storage enables cloud users to focus more on their core competencies by alleviating data owners burden of local data storage and maintenance However, data integrity becomes the biggest concern of cloud users because they lose physical control over their outsourced files Ateniese et al proposed the notion of provable data possession [1], or data auditing, to address this challenging problem Considering many practical scenarios where all users sharing cloud data need to read and modify the data, very recently, Yuan and Yu [2] proposed a novel and efficient integrity auditing scheme supporting multi-user modification, public auditing, high error detection probability and efficient user revocation Contributions We show the schemes in [2] fail to achieve the basic property of a secure auditing scheme soundness We demonstrate that in the scheme with basic user revocation, if a malicious cloud server colludes with a revoked user, the server is able to generate a valid proof of a challenge even if the entire file has been deleted The same attack can also be applied to the multi-file auditing protocol and the protocol with advanced user revocation in [2] II REVIEW Some notations of the system are as follows H() denotes a one-way hash function and λ represents a security parameter G, G 1 denote two multiplicative cyclic groups and e : G G G 1 is a bilinear map q is the order of G and g, u are random generators of G f α (x) denotes a polynomial with coefficients α = {α 0,, α s 1 }, where α j Z q Yong Yu, Yannan Li and Jianbing Ni are with Big Data Research Center, School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, , China yuyong@uestceducn Yong Yu is with State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, , China Yong Yu, Guomin Yang, Yi Mu and Willy Susilo are with the Center for Computer and Information Security Research, School of Computing and Information Technology, University of Wollongong, Wollongong, NSW 2522, Australia {gyang, ymu, wsusilo}@uoweduau Corresponding Author: Willy Susilo Suppose there are K users {u k } 0 k K 1 in a group The data owner, u 0, is the master user who can revoke any other group users when necessary We briefly review the following algorithms in [2] to support our analysis Key Generation u 0 chooses K random numbers {ɛ k Z q } 0 k K 1 and a random α Z q, computes ν = g αɛ0, κ 0 = g ɛ0, {κ k = g ɛ k, g ɛ 0 } 1 k K 1, {g αj } 0 j s+1 The public key of u 0 is P K = (g, u, q, ν, {g αj } 0 j s+1, κ 0, {κ k, g ɛ 0 } 1 k K 1 ) and the master key of u 0 is MK = (ɛ 0, α) The secret key of user u k is ɛ k, where 1 k K 1 File Processing u 0 first splits the file F into n blocks, and each block into s sectors: {m ij } 1 i n,0 j s 1, and computes authentication tag {σ i } 1 i n for each block as: σ i = (u Bi s 1 j=0 gmij α j+2 ) ɛ0 = (u Bi g f β i (α) ) ɛ 0 where β i = {0, 0, β i,0, β i,1,, β i,s 1 } and β ij = m ij, B i = H(fname i t i k), in which fname is the filename, i is the index of data block m i, t i is the time stamp and k is the index of the user in the group Finally, u 0 uploads data blocks and tags to the cloud Challenge The TPA randomly chooses d data blocks as a set D Suppose the chosen d blocks are modified by a set of users, denoted by C The TPA generates two random numbers R and µ, and produces a set X = {(g ɛ 0 ) R } k C If D contains blocks lastly modified by any revoked user, the TPA adds (g ɛ 0 ) R to the set X Then, the TPA sends the challenge CM = (D, X, g R, µ) to the cloud Prove Upon receiving the challenge CM = (D, X, g R, µ), the cloud server generates a proof P rf = (π, ψ, y) and forwards it to the TPA for verification We omit the details of generating a proof due to space limit Verify Upon receiving the proof, the TPA verifies the integrity of F by first computing η = u ω, where w = i D B ip i Then it checks if the following equation holds: e(η, κ 0 R ) e(ψ R, ν κ 0 µ )? = π e(κ 0 y, g R ) If it holds, it outputs Accept; otherwise outputs Reject User Revocation The following steps are executed to revoke a user, say u k (k 0): 1) u 0 randomly chooses ρ Z q, computes χ = ɛ0+ρ ɛ k mod q and sends it to the cloud u 0 also computes g ɛ 0 and forwards it to the valid group users and the TPA as a part of the PK 2) Upon receiving χ, the cloud updates the authentication tags of blocks that are lastly modified by u k as: σ i = σ χ i = (u Bi g f (α) β i ) ɛ 0+ρ 3) The TPA and the valid group users discard the public information g ɛ 0 III REMARKS ON THE PROTOCOL Firstly, we revisit the system model of public integrity auditing for dynamic data sharing with multi-user modification [2] As illustrated in Fig 1, the system is composed of three major entities, namely the cloud server, the TPA and group users Some users are valid users who can access and modify
4 2 the cloud data while some other users have been revoked due to a variety of reasons For example, the secret key of the user has been exposed or the user becomes dishonest Consequently, it is fair to assume that valid users in the group are honest but the revoked users have incentive to become an adversary of the system, ie, they might collude with a malicious cloud server to deceive a verifier Fig 1 Revoked users Valid users Cloud Users TPA Shared Data Flow Cloud Server System model of public auditing with multi-user modification A Soundness of the protocol with basic user revocation In the following, we describe a feasable attack on the protocols in [2] where a malicious cloud server can collude with a revoked user to generate a valid response even if the entire file stored on cloud has been deleted During the execution of the protocol, the Key Generation, File Processing and Update algorithm are the same as those in [2] Given a challenge CM = {D, X, E = g R, µ}, assume the set D contains blocks lastly modified by a revoked user, say u k (1 k K 1) with secret key ɛ k According to the protocol, (g ɛ 0 ) R is added to set X and χ = ɛ0+ρ ɛ k (mod q) is sent to the cloud server With such information and the system public parameters, the cloud server and the revoked user can collude to generate a response for challenge CM without using the challenged data file as follows Generate {p i = µ i (mod q)}, i D and B i = H({fname i t i k}) Compute w = i D B ip i and η = u ω Retrieving (g ɛ 0 ) R from X, with the value ɛ k from the revoked user and χ from the cloud server, they compute A = ((g ɛ 0 ) R ) χɛ k = g ɛ0r = κ R 0 Pick a random t Z q, compute ψ = g t and B = E t Pick a random y Z q Compute π = e(η,a) e(b,ν κ µ e(κ y 0,E) The forgery P rf = {π, ψ, y } is a valid proof for the challenge CM because it can pass the Verify algorithm e(η, κ R e((ψ ) R, ν κ µ = e(η, A) e((gt ) R, ν κ µ = e(η, A) e(e t, ν κ µ = e(η, A) e(b, ν κ µ = π e(κ y 0, E) = π e(κ y 0, g R ) Therefore, the forged proof P rf is valid The cloud server can deceive T P A that the file keeps intact even the entire file has been polluted or deleted Note that the same attack can be applied to the protocol for efficient multi-file auditing, where the TPA can handle integrity auditing of multiple files simultaneously at the cost comparable to the single file scenario, and we don t repeat the attack here B Soundness of the protocol with advanced user revocation An advanced user revocation protocol was also proposed in [2] to prevent the revoked users from generating valid authentication tags by compromising a single cloud server node In this enhanced scheme, the master user u 0 runs a (U, N)-Shamir secret sharing protocol to generate N points (i, f(i)) of a U 1 degree polynomial f(x) = χ + a 1 x + a 2 x a U 1 x U 1 Those N points will be sent to N nodes of a cloud server Unfortunately, this technique cannot make the protocol sound because it is the cloud server who acts as the adversary when considering soundness and any U out of N cloud nodes are able to recover χ using Lagrange interpolation over a finite field Specifically, given any U pairs (i, f(i)), χ can be recovered as χ = 1 i U f(i) 1 i U,j i j i j With the recovered χ, the malicious cloud server can collude with a revoked user to break the soundness of the improved protocol in [2] Real-world dangers If the protocols in [2] are adopted in reality, after corrupting a revoked user, the malicious cloud service providers can deceive the data owners by making use of the aforementioned attacks Consequently, the cloud servers can charge the data owners for storage without hesitation but do not store their data As a result, the date owners cannot retrieve the outsourced data when needed, which might incur a significant loss to data owners since the lost data might be important and unique ACKNOWLEDGEMENTS This work is supported by the NSFC of China under Grant Number , REFERENCES [1] G Ateniese, R C Burns, R Curtmola, J Herring, L Kissner, Z N J Peterson, and D X Song, Provable data possession at untrusted stores, in Proc of ACM Conference on Computer and Communications Security 2007: , 2007 [2] J Yuan, and S Yu, Public integrity auditing for dynamic data sharing with multi-user modification, IEEE Trans on Information Forensics and Security, DOI: /TIFS
5 3 Yong Yu received his PhD degree in cryptography from Xidian University in 2008 He is currently an associate professor of University of Electronic Science and Technology of China His research focuses on cryptography and its applications, especially public encryption, digital signature and secure cloud storage He has published more than 40 research papers in reputable conferences and journals Yannan Li received her bachelor degree from University of Electronic Science and Technology of China in 2014 She is currently a master student in School of Computer Science and Engineering at University of Electronic Science and Technology of China Her research interest is secure cloud data storage Jianbing Ni received his master degree from University of Electronic Science and Technology of China in 2014 His research interests are applied cryptography and information security, with current focus on digital signature and secure data storage in cloud computing Guomin Yang received his PhD degree from the Computer Science Department at City University of Hong Kong in 2009 He is currently a senior lecturer in University of Wollongong, Australia His research interests are cryptography and network security Yi Mu received his PhD from the Australian National University in 1994 He is currently a professor and the co-director of Centre for Computer and Information Security Research at the University of Wollongong, Australia His current research interests include network security, computer security, and cryptography He is the editor-in-chief of International Journal of Applied Cryptography and serves as associate editor for nine other international journals He is a senior member of the IEEE and a member of the IACR Willy Susilo received the PhD degree in computer science from the University of Wollongong, Australia He is a Professor and the Head of School of Computing and Information Technology at the University of Wollongong in Australia He is also the Director of Centre for Computer and Information Security Research, University of Wollongong He has been awarded the prestigious ARC Future Fellow by the Australian Research Council His main research interests include cloud security, cryptography and information security He has served as a program committee member in major international conferences He is a senior member of IEEE and a member of the IACR
A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA
A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA Mr.Mahesh S.Giri Department of Computer Science & Engineering Technocrats Institute of Technology Bhopal, India
SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD
Volume 1, Issue 7, PP:, JAN JUL 2015. SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD B ANNAPURNA 1*, G RAVI 2*, 1. II-M.Tech Student, MRCET 2. Assoc. Prof, Dept.
Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing.
Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Privacy - Preserving
SHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING
SHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING Er. Kavin M 1, Mr.J.Jayavel 2 1 PG Scholar, 2 Teaching Assistant, Department of Information Technology, Anna University Regional
SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD
SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD S.REVATHI B.HASEENA M.NOORUL IZZATH PG Student PG Student PG Student II- ME CSE II- ME CSE II- ME CSE Al-Ameen Engineering
Performance Evaluation Panda for Data Storage and Sharing Services in Cloud Computing
Performance Evaluation Panda for Data Storage and Sharing Services in Cloud Computing Gunnala Ajay Kumar M.Tech Student Department of CSE Global Group Of Institutions Batasingaram, Ranga Reddy (Dist),
15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM
RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM Dhanashri Bamane Vinayak Pottigar Subhash Pingale Department of Computer Science and Engineering SKN
Identifying Data Integrity in the Cloud Storage
www.ijcsi.org 403 Identifying Data Integrity in the Cloud Storage Saranya Eswaran 1 and Dr.Sunitha Abburu 2 1 Adhiyamaan College of Engineering, Department of Computer Application, Hosur. 2 Professor and
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department
Improving data integrity on cloud storage services
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services
Data Privacy in Remote Data Integrity Checking for Secure Cloud Storage
Data Privacy in Remote Data Integrity Checking for Secure Cloud Storage Yong Yu Centre for Computer and Information Security University of Wollongong Australia 1 Yong Yu, Man Ho Au, Yi Mu, Willy Susilo
Trusted Public Auditing Process for Secure Cloud Storage
Trusted Public Auditing Process for Secure Cloud Storage K.Adhiyaman 1, A. Jesudoss 2, D.Saravanan 3 1 Final Year MCA, Faculty of Computing, Department of MCA Sathyabama University, Chennai,Tamil Nadu,
SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE
International Journal of Computer Network and Security(IJCNS) Vol 7. No.1 2015 Pp. 1-8 gopalax Journals, Singapore available at : www.ijcns.com ISSN: 0975-8283 ----------------------------------------------------------------------------------------------------------------------------------------------------------
ADVANCE SECURITY TO CLOUD DATA STORAGE
Journal homepage: www.mjret.in ADVANCE SECURITY TO CLOUD DATA STORAGE ISSN:2348-6953 Yogesh Bhapkar, Mitali Patil, Kishor Kale,Rakesh Gaikwad ISB&M, SOT, Pune, India Abstract: Cloud Computing is the next
Secrecy Maintaining Public Inspecting For Secure Cloud Storage
Secrecy Maintaining Public Inspecting For Secure Cloud Storage K.Sangamithra 1, S.Tamilselvan 2 M.E, M.P.Nachimuthu.M.Jaganathan Engineering College, Tamilnadu, India 1 Asst. Professor, M.P.Nachimuthu.M.Jaganathan
On the security of auditing mechanisms for secure cloud storage
University of Wollongong Research Online Faculty of Engineering and Information Sciences - Papers Faculty of Engineering and Information Sciences 2014 On the security of auditing mechanisms for secure
Enable Public Audit ability for Secure Cloud Storage
Enable Public Audit ability for Secure Cloud Storage Leela Poornima 1, D.Hari Krishna 2 1 Student, Nova College of Engineering and Technology, Ibrahimpatnam,Krishna Dist., Andhra Pradesh, India 2 Assistant
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction 1 Priyadharshni.A, 2 Geo Jenefer.G 1 Master of engineering in computer science, Ponjesly College of Engineering 2 Assistant Professor,
Efficient Remote Data Possession Checking In Critical Information Infrastructures Ensuring Data Storage Security In Cloud Computing
Efficient Remote Data Possession Checking In Critical Information Infrastructures Ensuring Data Storage Security In Cloud Computing Dr. T.Nalini 1, Dr.K.Manivannan 2,Vaishnavi Moorthy 3 1 Professor, Department
Recent advances in security and privacy in big data
University of Wollongong Research Online Faculty of Engineering and Information Sciences - Papers Faculty of Engineering and Information Sciences 2015 Recent advances in security and privacy in big data
IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD
IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD 1 Ms.Nita R. Mhaske, 2 Prof. S.M.Rokade 1 student, Master of Engineering, Dept. of Computer Engineering Sir Visvesvaraya
Data Storage Security in Cloud Computing
Data Storage Security in Cloud Computing Manoj Kokane 1, Premkumar Jain 2, Poonam Sarangdhar 3 1, 2, 3 Government College of Engineering and Research, Awasari, Pune, India Abstract: Cloud computing is
TITLE: Secure Auditing and Deduplicating Data in Cloud(Survey Paper)
TITLE: Secure Auditing and Deduplicating Data in Cloud(Survey Paper) Pratik Raut 1, Pratik Kamble 2, Prafull Pansare 3, Dipti Salunkhe 4 1 UG Student, Dept. of Computer Engineering, JSCOE, Hadapsar, Pune,
Towards a compliance audit of SLAs for data replication in Cloud storage
Towards a compliance audit of SLAs for data replication in Cloud storage J. Leneutre B. Djebaili, C. Kiennert, J. Leneutre, L. Chen, Data Integrity and Availability Verification Game in Untrusted Cloud
A Proxy-Based Data Security Solution in Mobile Cloud
, pp. 77-84 http://dx.doi.org/10.14257/ijsia.2015.9.5.08 A Proxy-Based Data Security Solution in Mobile Cloud Xiaojun Yu 1,2 and Qiaoyan Wen 1 1 State Key Laboratory of Networking and Switching Technology,
OVERVIEW OF SECURITY ISSUES IN CLOUD COMPUTING
OVERVIEW OF SECURITY ISSUES IN CLOUD COMPUTING K. Arumugam 1, P. Sumathi 2 1 Research Scholar/Department Of Computer Science, Government Arts College, Coimbatore (India) 2 Assistant Professor/Department
I. Introduction. A. Related Work
PUBLIC VERIFIABILITY AND DATA DYNAMICS IN CLOUD SERVER P.Saranya, Roever Engineering College; S.Vishnupriya, Roever Engineering College; E.Elangovan, PRIST University Abstract- Cloud computing stores the
Secure Data transfer in Cloud Storage Systems using Dynamic Tokens.
Secure Data transfer in Cloud Storage Systems using Dynamic Tokens. P.Srinivas *,K. Rajesh Kumar # M.Tech Student (CSE), Assoc. Professor *Department of Computer Science (CSE), Swarnandhra College of Engineering
preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.
Privacy-Preserving Public Auditing For Secure Cloud Storage ABSTRACT: Using cloud storage, users can remotely store their data and enjoy the on-demand high-quality applications and services from a shared
How To Ensure Data Integrity In Clouds
Proficient Audit Services Outsourced for Data Availability in Clouds N Praveen Kumar Reddy #1, Dr Subhash Chandra *2 N Praveen Kumar Reddy, pursuing M.Tech from Holy Mary Institute of Technology and Science,,
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING T.Vidhya Sree M.Phil Research Scholar,CS, MGR College, Hosur (India) ABSTRACT Cloud Computing is the long dreamed vision
ISSN 2278-3091. Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability
Outsourcing and Discovering Storage Inconsistencies in Cloud Through TPA Sumathi Karanam 1, GL Varaprasad 2 Student, Department of CSE, QIS College of Engineering and Technology, Ongole, AndhraPradesh,India
Secure Way of Storing Data in Cloud Using Third Party Auditor
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 4 (Jul. - Aug. 2013), PP 69-74 Secure Way of Storing Data in Cloud Using Third Party Auditor 1 Miss.
Near Sheltered and Loyal storage Space Navigating in Cloud
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 8 (August. 2013), V2 PP 01-05 Near Sheltered and Loyal storage Space Navigating in Cloud N.Venkata Krishna, M.Venkata
M. Nathiya 2 B.Tech. (IT), M.E. (CSE), Assistant Professor, Shivani Engineering College, Trichy, Tamilnadu, India.
ISSN: 2321-7782 (Online) Volume 2, Issue 5, May 2014 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com Robust Data
Data Integrity and Dynamic Storage Way in Cloud Computing
1 Data Integrity and Dynamic Storage Way in Cloud Computing Dinesh.C, P.G Scholar, Computer Science and Engineering, Mailam Engineering College, Mailam, Tamilnadu. Abstract It is not an easy task to securely
Replicated Data Integrity Verification in Cloud
Replicated Data Integrity Verification in Cloud Raghul Mukundan Department of Computer Science Missouri University of Science and Technology [email protected] Sanjay Madria Department of Computer Science Missouri
Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System
Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System 1 K.Valli Madhavi A.P [email protected] Mobile: 9866034900 2 R.Tamilkodi A.P [email protected] Mobile:
How To Ensure Data Integrity In Cloud Computing
A Novel Approach for public exploration Data with Effective user Denial in the cloud Mahankali Anitha PG Scholar Department of CSE J.Vijayasree Assistant professor Department of CSE Dr.M.V.Siva Prasad
Data Grid Privacy and Secure Storage Service in Cloud Computing
Data Grid Privacy and Secure Storage Service in Cloud Computing L.Revathi 1, S.Karthikeyan 2 1 Research Scholar, Department of Computer Applications, Dr. M.G.R. Educational and Research Institute University,
Public Auditing For Shared Data with Symposium on Security in the Cloud
DOI 10.4010/2015.463 ISSN2321 3361 2015 IJESC Research Article October 2015 Issue Public Auditing For Shared Data with Symposium on Security in the Cloud M. SUBHA, M.Sc, M.Phil, M.CA (Phd) 1, R.NIRMALA
Remote Data Integrity Checking in Cloud Computing
ISSN 2321 8169 Remote Data Integrity Checking in Cloud Computing Khaba M.V (Assistant Professor/CSE) RVS School of Engineering,dindigul [email protected] M.Santhanalakshmi(Assistant Professor/CSE) RVS
Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud
Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud M.Jayanthi, Assistant Professor, Hod of MCA.E mail: [email protected] MahatmaGandhi University,Nalgonda, INDIA. B.Ranganatha
Verifying Correctness of Trusted data in Clouds
Volume-3, Issue-6, December-2013, ISSN No.: 2250-0758 International Journal of Engineering and Management Research Available at: www.ijemr.net Page Number: 21-25 Verifying Correctness of Trusted data in
Efficient and Secure Dynamic Auditing Protocol for Integrity Verification In Cloud Storage
Efficient and Secure Dynamic Auditing Protocol for Integrity Verification In Cloud Storage Priyanga.R 1, Maheswari.B 2, Karthik.S 3 PG Scholar, Department of CSE, SNS College of technology, Coimbatore-35,
PRIVACY PRESERVING PUBLIC AUDITING FOR SECURED DATA STORAGE IN CLOUD USING BLOCK AUTHENTICATION CODE
PRIVACY PRESERVING PUBLIC AUDITING FOR SECURED DATA STORAGE IN CLOUD USING BLOCK AUTHENTICATION CODE R.REVATHI # PG Scholar #, Bharathiyar Institute Of Engineering for Women, Deviyakurichi, Salem(DT) India
Development of enhanced Third party Auditing Scheme for Secure Cloud Storage
Development of enhanced Third party Auditing Scheme for Secure Cloud Storage Bhanu Prakash Chamakuri*1, D. Srikar*2, Dr. M.Suresh Babu*3 M.Tech Scholar, Dept of CSE, Grandhi Varalakshmi Institute Of Technology,
Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.
Secure Privacy-Preserving Cloud Services. Abhaya Ghatkar, Reena Jadhav, Renju Georgekutty, Avriel William, Amita Jajoo DYPCOE, Akurdi, Pune [email protected], [email protected], [email protected],
Cloud Data Service for Issues in Scalable Data Integration Using Multi Authority Attribute Based Encryption
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,
AN EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA IN TEGRITY IN CLOUDS
AN EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA IN TEGRITY IN CLOUDS Mrs.K.Saranya, M.E.,(CSE), Jay Shriram Group of Institutions, Tirupur. [email protected] Dr.S.Rajalakshmi, Associate Professor/CSE,
Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication
Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication Sanjay Kumar Baghel Mtech Scholar, CSE, CSIT DURG [email protected] Bhupesh Kumar Dewangan Assistant Professor,CSE,
A Secure and Dependable Cloud Storage Service in Cloud Computing
A Secure and Dependable Cloud Storage Service in Cloud Computing Yalla Ram Charan MTech Student Department of CSE Sri Venkateswra College of Engineering & Technology Abstract: Cloud storage is a model
Data Integrity for Secure Dynamic Cloud Storage System Using TPA
International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 7-12 International Research Publication House http://www.irphouse.com Data Integrity for Secure
Erasure correcting to enhance data security in cloud data storage
Erasure correcting to enhance data security in cloud data storage K.Shrividhya Department of computer science- Vels University [email protected] A.Sajeevram Department of computer science Vels University
Data storage security in Cloud
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 6, Ver. III (Nov Dec. 2014), PP 50-56 Data storage security in Cloud Mrs. Niyamat Ujloomwale, Mrs.
Enabling Public Auditing for Secured Data Storage in Cloud Computing
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 5 (May. 2013), V3 PP 01-05 Enabling Public Auditing for Secured Data Storage in Cloud Computing 1 Er.Amandeep Kaur,
RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES
RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES 1 MD ISMAIL Z, 2 ASHFAQUE AHAMED K. 1 PG Scholar,Department of Computer Science, C.Abdul Hakeem College Of Arts and Science,Melvisharam.
A Survey on Secure Storage Services in Cloud Computing
Global Journal of Computer Science and Technology Cloud & Distributed Volume 12 Issue 12 Version 1.0 Year 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD ENVIRONMENT
IJRRECS/November 2014/Volume-2/Issue-11/3699-3703 ISSN 2321-5461 INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD
International Journal of Infinite Innovations in Engineering and Technology. ISSN (Online): 2349-2287, ISSN (Print): 2349-2279 2015
SECURED AUDITING SYSTEM FOR CLOUD DATA STORAGE WITH ERROR CORRECTION GUARANTEES 1 S.Sathya, 2 S.Sivakumar 1 Research Scholar, Department of Computer Science & Applications, PGP College of Arts & Science,
Keywords: Cloud Computing, Data Dynamics, Data Integrity, Error Localization, Third Party Auditor.
www.semargroup.org, www.ijsetr.com ISSN 2319-8885 Vol.03,Issue.11 June-2014, Pages:2300-2307 Secure Cloud: Storage with Privacy Preserving Public Auditing and Data Dynamics Dept of CSE, Malabar College
Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving,
Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Third Party
Survey Paper on Integrity Auditing of Storage
International Journal of Computational Engineering Research Vol, 04 Issue, 3 Survey Paper on Integrity Auditing of Storage Ugale Santosh A 1 1M.E. Computer AVCOE, Sangmner, India ABSTRACT: Cloud servers
ENABLING AUDITABILITY FOR SECURE CLOUD STORAGE USING TPA
ENABLING AUDITABILITY FOR SECURE CLOUD STORAGE USING TPA 1 Chennuri. Kranthi kumar, 2 Vishakha Lokhande 1 M.Tech Student, Department of CSE, KG reddy College Of Engineering and Technology, Chilkur village,
International Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 12, December 2014 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
Cloud Data Storage Services Considering Public Audit for Security
Global Journal of Computer Science and Technology Cloud and Distributed Volume 13 Issue 1 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
Surveying Cloud Storage Correctness using TPA with BLS
Surveying Cloud Storage Correctness using TPA with BLS Priyanka Dehariya 1, Prof. Shweta Shrivastava 2, Dr. Vineet Richaraya 3 1 M.Tech Scholar (CSE), LNCT, Bhopal 2 Asst.Professors, (CSE Department),
Analysis of Secure Cloud Data Sharing Within a Group
Analysis of Secure Cloud Data Sharing Within a Group Ms. uri Pande* Department of CSE, GHRAET Nagpur (M.S), India, Prof. Vikrant Chole Dept of Computer Science & Engg Nagpur (M.S.), India Abstract In this
Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption
Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer
EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE
EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE Reshma Mary Abraham and P. Sriramya Computer Science Engineering, Saveetha University, Chennai, India E-Mail: [email protected]
A Novel Re-Authentication Scheme on Cloud Based Storage Services T.G.V.V.Srinivas 1, P.Suresh Babu 2 1 Final M.Tech Student, 2 Associate professor
A Novel Re-Authentication Scheme on Cloud Based Storage Services T.G.V.V.Srinivas 1, P.Suresh Babu 2 1 Final M.Tech Student, 2 Associate professor 1,2 Dept of CSE, Kaushik College of engineering, JNTUK
An Efficient Data Correctness Approach over Cloud Architectures
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 8, Issue 12 (October 2013), PP. 33-37 An Efficient Data Correctness Approach over
Official Arbitration with Secure Cloud Storage Application
Official Arbitration with Secure Cloud Storage Application Alptekin Küpçü Koç University, İstanbul, Turkey [email protected] February 11, 2013 Abstract Static and dynamic proof of storage schemes have been
EFFICIENT DISCOVERY OF INTEGRITY AUTOMATION IN HYBRID CLOUD COMPUTING
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE EFFICIENT DISCOVERY OF INTEGRITY AUTOMATION IN HYBRID CLOUD COMPUTING K.Saipriya 1, A.Ravi Kumar 2 1 M.Tech Student, Dept of
