A Novel Re-Authentication Scheme on Cloud Based Storage Services T.G.V.V.Srinivas 1, P.Suresh Babu 2 1 Final M.Tech Student, 2 Associate professor
|
|
- William Skinner
- 8 years ago
- Views:
Transcription
1 A Novel Re-Authentication Scheme on Cloud Based Storage Services T.G.V.V.Srinivas 1, P.Suresh Babu 2 1 Final M.Tech Student, 2 Associate professor 1,2 Dept of CSE, Kaushik College of engineering, JNTUK University Abstract: Cloud service providers provide storage service for outsourced data to store. Users store their sensitive information in cloud service, security and authentication is mainly raising issue. Therefore in this paper we proposed a new framework consists of three features authentication, secure storage, and verification. In our process we used block cipher technique to encrypt the data such as RC4 and for authentication we used password authentication. For manipulation of the data should be done by data owner only after the verification of the data owner authentication. It provides mutual trust between data owner and cloud service provider. We limit the privileges of access of the data in the cloud service. I. INTRODUCTION Verifying the authenticity of data has emerged as a critical issue in storing data on untrusted servers. This issue arisesin peer-to-peer storage systems and the network file systems long-term archives and the web-service object stores, and database systems. Such types of systems areprevent storage servers from misrepresenting or modifying data by providing authenticity checks when accessing data. However, archival storage requires guarantees about the authenticity of data on storage and namely that storage servers possess data and it is insufficient to detect that data have been modified or deleted when accessing the data and this is because it may be too late to recover lost or damaged data. Archival storage servers retain tremendous amounts of data which are accessed and hold data for long periods of time during which there may be exposure to data loss from administration errors as the physical implementation of storage evolves, e.g., backup and restore the data migration to new systems and the changing memberships in peer-topeer systems.[2,4] Archival network storage presents unique performance demands. Take the file data are large and are stored at remote sites and the accessing an entire file is expensive in I/O costs to the storage server and in transmitting the file across a network. Reading an entire archive that even periodically and it greatly limits the scalability of network stores and the growth in storage capacity has far outstripped the growth in storage access times and bandwidth. Furthermore, I/O incurred to establish data possession interferes with on-demand bandwidth to store and retrieve data. We justify that clients need to be able to verify that a server has retained file data without retrieving the data from the server and without having the server access the entire file. Previous solutions do not meet these requirements for proving data possession. Some schemes provide a weaker guarantee by enforcing storage complexity:[6] The server has to store an amount of data at least as large as the client s data and not necessarily the same exact data. All previous techniques require the server to access the entire file and which is not feasible when dealing with large amounts of data.several trends are opening up the era of Cloud Computing is an Internetbased development and use of computer technology. The ever cheaper and more powerful processors and together with the software as a service (SaaS) computing architecture and are transforming data centers into pools of computing service on a huge scale. The increasing network bandwidth and reliable yet flexible network connections make it even possible that clients can now subscribe high quality services from data and software that reside solely on remote data centers. The envisioned as a promising service platform for the Internet, this new data storage paradigm in Cloud brings about many challenging design issues which have profound influence on the security and performance of the overall system. The most biggest concerns with cloud data storage is that of data integrity verification at untrusted servers. [7] For example, the storage service provider that which experiences Byzantine failures occasionally and it may decide to hide the data errors from the clients for the benefit of their own. Question is what is more serious is ISSN: Page 327
2 that for saving money and storage space the service provider might neglect to keep or deliberately delete rarely accessed data files which belong to an ordinary client. Say the large size of the outsourced electronic data and the client s constrained resource capability and core of the problem can be generalized as how can the client find an efficient way to perform periodical integrity verifications without the local copy of data files. In order to solve this problem and many of the schemes are proposed under different systems and security models. In all these works the great efforts are made to design solutions that meet various requirements: high scheme efficiency and the stateless verification, unbounded use of queries and retrievability of data and so on. The role of the verifier in the model and all the schemes presented before fall into two categories: private verifiability and public verifiability. However the schemes with private verifiability can achieve higher scheme efficiency, public verifiability allows anyone and not just the client such as data owner, to challenge the cloud server for correctness of data storage while keeping no private information. Then the clients are able to delegate the evaluation of the service performance to an independent third party auditor (TPA), without devotion of their computation resources. In cloud service the clients themselves are unreliable or cannot afford the overhead of performing frequent integrity checks. So for the practical use, it seems more rational to equip the verification protocol with public verifiability and which is expected to play a more important role in achieving economies of scale for Cloud Computing. Moreover, for efficiency consideration and the outsourced data themselves should not be required by the verifier for the verification purpose. [4] Data outsourcing brings with it many advantages. But associated with it are the risks involved. Though client cannot physically access the data from the cloud server directly, without client s are either not used by client from a long time. Hence, there is a requirement of checking the data periodically for correction purpose, known as data integrity. Here we provide a survey on the different techniques of data integrity. The traditional schemes for data integrity in cloud are Provable Data Possession (PDP) knowledge, cloud provider can modify or delete data which and Proof of Retrievability (PoR). These two schemes are the most active area of research in the cloud data integrity field. Traditional access control techniques assume the existence of the data owner and the storage servers in the same trust domain. This assumption is no longer holds when the data is outsourced to a remote CSP which takes the full charge of the outsourced data management and resides outside the trust domain of the data owner. A feasible achievement solution can be presented to enable the owner to enforce access control of the data stored on a remote untrusted CSP. Through this data is encrypted under a certain key which is shared only with the authorized users. The unauthorized users are including the CSP and are unable to access the data since they do not have the decryption key. This simple solution has been widely incorporated into existing schemes, which aim at providing data storage security on untrusted remote servers. Some other class of solutions utilizes attributebased encryption to achieve fine-grained access control. II. RELATED WORK Data Storage Commitment Schemes: A storage-enforcing commitment scheme (SEC) is a three party protocol executed between the parameters message source S, a prover P, and a verifier V. The message source communicates the message M to the prover and the commitment C to the verifier. The verifier V may verify whether the prover is storing the secret by invoking a probabilistic interactive algorithm. This algorithm may be executed an unlimited number of times. Once the message is revealed then the verifier may check the commitment by running the algorithm Verify. This scheme has three properties called binding, concealing, and storageenforcing.[3] Privacy-Preserving PDP Schemes: The data owner first encrypts the file, Sends both the encrypted file along with the encryption key to the remote server. And also the data owner sends the encrypted file along with a key-commitment that fixes a value for the keywithout revealing the key to the TPA. The main purpose of this scheme is to ensure that the remote server correctly possesses the client s data along with the encryption key and prevent any information leakage to the TPA which is responsible for the auditing task. Therefore the clients especially with constrained computing resources and capabilities can resort to external audit party to check the integrity of outsourced data and third party auditing process should bring in no new vulnerabilities towards the privacy of client s data. And also to the auditing task the TPA and it has anotherprimary task which is extraction of digital contents.[2] The PDP schemes discussed above focus on static or warehoused data which is essential in numerous ISSN: Page 328
3 different applications such as libraries, archives, and astronomical /medical /scientific /legal repositories. On the other side, Dynamic Provable Data Possession (DPDP) schemes investigate the dynamic file operations such as update or delete or append and insert operations. There are some DPDP constructions in the literature satisfying different system requirements.[1] Scalable DPDP: This process is based entirely on symmetric-key cryptography. 1. Before outsourcing, data owner pre-computes a certainnumber of short possession verification tokens and eachof tokencovering some set of data blocks. The actual data is thenhanded over to server. 2. Subsequently, when data owner wants to obtain a proof of data possession and it challenges server with a set ofrandom-looking block indices. 3. In turn, server must compute a short integrity checkover the specified blocks (corresponding to the indices) andreturn it to data owner. Cloud computing, the trend toward loosely coupled networking of computing resources which is unmooring data from local storage platforms. Users today regularly access files without knowing or needing to know on what machines or in what geographical locations their files reside. They may even store files on platforms with unknown owners and operators and more particularly in peer-to-peer computing environments. While cloud computing encompasses the full spectrum of computing resources, in this paper we focus on archival or backup data, large files subject to infrequent updates. While users may access such files only sporadically and the demonstrable level of availability may be required contractually or by regulation. [10] Financial records for a while have to be retained for several years to comply with recently enacted regulations. Recently proposed a notion for archived files that they call a proof of retrievability (POR). A POR is a protocol in which a server/archive proves to a client that a target file F is intact it is in the sense that the client can retrieve all of F from the server with high probability. In a naıve POR, a client might simply download F itself and check an accompanying digital signature and related constructions adopt a challenge-response format that achieves much lower (nearly constant) communication complexity as little as tens of bytes per round in practice. A formal definition of a POR and describe a set of different POR designs in which a client stores just a single symmetric key and a counter. Their most practical constructions and support only a limited number of POR challenges. An alternative construction based on the idea of storing homomorphic block integrity values that can be aggregated to reduce the communication complexity of a proof. Its main advantage is that, due to the underlying block integrity structure, clients can initiate and verify an unlimited number of challenges. III.PROPOSED WORK In our work we introduced a novel method to limit the access control. This is because of private and sensitive data stored in third party servers. Data which is store by a person called data owner and data base which is allow to store is referred as cloud service provider. The data stored in cloud is verified by a trusted person called as trusted authority. In our work the features are as follows: 1) Prevents unauthorized access of the content in cloud service provider. 2) For accessing the content every member have to prove them, for this we implemented password based access control method. 3) It gives privilege to provide trust between data owner and cloud providing service. 4) It provides secure encryption technique of the content to prevent intruder attacks. ISSN: Page 329
4 6. Verify signatures Data Owner 4. Send signature and Meta data Trusted Authority 3. Store encrypte d Data blocks and set password 1. Reg iste r 2. Sen d res po nse 5. Request for signature Cloud 5. Send signature 7. update/delete stored data blocks After proving of him self Architecture of proposed system The algorithm is divided into three parts. Those are Initialization and authentication, Encryption and Storage, Proof and Verification. The below explained all the phases. A) Initialization and authentication Initially Data owner send request to cloud service to store information. Then cloud service sends response and provides unique Id and secure master key. And for registration cloud provide verification method to user cloud service provider. B) Encryption and Storage After authentication data owner encrypts his file using RC4 algorithmas follows: These are the steps for RC4 encryption algorithm is as follows: 1- Get the data to be encrypted and the selected key. 2- Create two string arrays. 3- Initiate one array with numbers from 0 to Fill the other array with the selected key. 5- Randomize the first array depending on the array of the key. 6- Randomize the first array within itself to generate the final key stream. 7- XOR operation of the final key stream with the data to be encrypted to give cipher text. Algorithm: Find the length of the file L. Divide that file into equal length of blocks such as 32/64/128/256/516/1028. Generally we prefer 128, and it is compatible to RC4 encryption. For every block below RC4 algorithm encrypts and gives Cipher text. Input: input data Output: Cipher Text and Signature 1. j = 0; 2. for i = 0 to 255: 3. S[i] = i; 4. for i = 0 to 255: 5. j = (j + S[i] + K[i]) mod 256; 6. swap S[i] and S[j]; It is important to notice that here the swapping of the locations of the numbers 0 to 255 (each of which occurs only once) in the state table. The values that are present in the state table are provided. Once the initialization process is completed and the operation process may be summarized as shown by the pseudo code below; 7. i = j = 0; 8. for (k = 0 to N-1) { 9. i = (i + 1) mod 256; 10. j = (j + S[i]) mod 256; 11. swap S[i] and S[j]; 12. pr = S[ (S[i] + S[j]) mod 256] 13. output M[k] XOR pr} Where M[0..N-1] is the input message consisting of N bits. Generate message digest using secure hash algorithm. Cloud service generates password and security code for particular file and sends to data owner using simple mail ISSN: Page 330
5 transfer protocol for security issue. Then store that blocks in Data base. C) Proof and Verification For update of the file blocks in cloud service, data owner have to prove himself to cloud. Cloud checks Data owner using password verification. Then Data have to prove himself and then he allows manipulating the file content such as blocks. In verification process auditor verifies the file blocks using signature sent by data owner. Auditor requests the signature from the cloud. Then auditor compares the signature of the cloud and the data owner. If two signatures are equal the file is secure otherwise not secure and the verification result is sent to data owner using simple mail transfer protocol. IV. CONCLUSION In our paper we introduced novel prototype to secure storage of the data and secure authentication of the content in cloud service provider. Cloud storage service scheme provides storing of dynamic data where the owner is able to change and accessing the data stored by the cloud service provider and also updating data on the cloud storage. The data owner enforces to blocks ciphering and confidentiality of the data using the authentication schemes which is used in this process. REFERENCES [1] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, Provable data possession at untrusted stores, in Proceedings of the 14th ACM Conference on Computer and Communications Security, ser. CCS 07, 2007, pp [2] F. Seb e, J. Domingo-Ferrer, A. Martinez-Balleste, Y. Deswarte, and J.-J.Quisquater, Efficient remote data possession checking in critical information infrastructures, IEEE Trans. on Knowl.And Data Eng., vol. 20, no. 8, [3] G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, Scalable and efficient provable data possession, in Proceedings of the 4th International Conference on Security and Privacy in Communication Netowrks, 2008, pp [4] C. Erway, A. K upc u, C. Papamanthou, and R. Tamassia, Dynamic provable data possession, in Proceedings of the 16th ACM Conference on Computer and Communications Security, 2009, pp [5] Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, Enabling public verifiability and data dynamics for storage security in cloud computing, in Proceedings of the 14th European Conference on Research in Computer Security, 2009, pp [6] A. F. Barsoum and M. A. Hasan, Provable possession and replication of data over cloud servers, Centre For Applied Cryptographic Research, Report 2010/32, 2010, uwaterloo.ca/techreports/2010/cacr pdf. [7] R. Curtmola, O. Khan, R. Burns, and G. Ateniese, MR-PDP: multiple-replica provable data possession, in 28th IEEE ICDCS, 2008, pp [8] A. F. Barsoum and M. A. Hasan, On verifying dynamic multiple data copies over cloud servers, Cryptology eprint Archive, Report 2011/447, 2011, 2011, [9] K. D. Bowers, A. Juels, and A. Oprea, HAIL: a high-availability and integrity layer for cloud storage, in CCS 09: Proceedings of the 16th ACM conference on Computer and communications security. New York, NY, USA: ACM, 2009, pp [10] Y. Dodis, S. Vadhan, and D. Wichs, Proofs of retrievability via hardness amplification, in Proceedings of the 6th Theory of Cryptography Conference on Theory of Cryptography, [11] A. Juels and B. S. Kaliski, PORs: Proofs of Retrievability for large files, in CCS 07: Proceedings of the 14th ACM conference on Computer and communications security. ACM, 2007, pp [12] H. Shacham and B. Waters, Compact proofs of retrievability, in ASIACRYPT 08, 2008, pp BIOGRAPHIES T.G.V.V.Srinivas completed his B- TECH in computer science and engineering in He is pursuing M.Tech in Computer Science and Engineering from Kaushik College of Engineering. His areas of interest include Operating system; cloud computing, Data Mining and Warehousing and Computer Networks. P.SureshBabu completed his B.Tech and M.E. in Computer Science and Engineering. He is currently working as Associate professor of Department of computer science and engineering at Kaushik College of engineering, JNTUK University. He is having industrial experience of 4 years and teaching experience of 15 years. His areas of interest include Artificial intelligence, Neural Networks, Cryptography & Network security, Compiler Design and Advanced Data Structures. ISSN: Page 331
SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD
Volume 1, Issue 7, PP:, JAN JUL 2015. SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD B ANNAPURNA 1*, G RAVI 2*, 1. II-M.Tech Student, MRCET 2. Assoc. Prof, Dept.
More informationData Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System
Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System 1 K.Valli Madhavi A.P vallimb@yahoo.com Mobile: 9866034900 2 R.Tamilkodi A.P tamil_kodiin@yahoo.co.in Mobile:
More informationImproving data integrity on cloud storage services
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services
More informationSHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING
SHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING Er. Kavin M 1, Mr.J.Jayavel 2 1 PG Scholar, 2 Teaching Assistant, Department of Information Technology, Anna University Regional
More informationSelective dependable storage services for providing security in cloud computing
Selective dependable storage services for providing security in cloud computing Gade Lakshmi Thirupatamma*1, M.Jayaram*2, R.Pitchaiah*3 M.Tech Scholar, Dept of CSE, UCET, Medikondur, Dist: Guntur, AP,
More informationSecrecy Maintaining Public Inspecting For Secure Cloud Storage
Secrecy Maintaining Public Inspecting For Secure Cloud Storage K.Sangamithra 1, S.Tamilselvan 2 M.E, M.P.Nachimuthu.M.Jaganathan Engineering College, Tamilnadu, India 1 Asst. Professor, M.P.Nachimuthu.M.Jaganathan
More informationEFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department
More informationEnsuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication
Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication Sanjay Kumar Baghel Mtech Scholar, CSE, CSIT DURG Sanju5878@gmail.com Bhupesh Kumar Dewangan Assistant Professor,CSE,
More informationFebruary. ISSN: 2321-8134
IJFEAT INTERNATIONAL JOURNAL FOR ENGINEERING APPLICATIONS AND TECHNOLOGY TITLE: DATA PLACE & MANAGE SECURITY IN CLOUD COMPUTING FOR EFFECTIVE AND FLEXIBLE DISTRIBUTED SYSTEM 1 Mr. Pritam S. Bhoyar, 2 Mr.
More information15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM
RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM Dhanashri Bamane Vinayak Pottigar Subhash Pingale Department of Computer Science and Engineering SKN
More informationEFFICIENT DISCOVERY OF INTEGRITY AUTOMATION IN HYBRID CLOUD COMPUTING
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE EFFICIENT DISCOVERY OF INTEGRITY AUTOMATION IN HYBRID CLOUD COMPUTING K.Saipriya 1, A.Ravi Kumar 2 1 M.Tech Student, Dept of
More informationISSN 2278-3091. Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability
Outsourcing and Discovering Storage Inconsistencies in Cloud Through TPA Sumathi Karanam 1, GL Varaprasad 2 Student, Department of CSE, QIS College of Engineering and Technology, Ongole, AndhraPradesh,India
More informationSECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD
SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD S.REVATHI B.HASEENA M.NOORUL IZZATH PG Student PG Student PG Student II- ME CSE II- ME CSE II- ME CSE Al-Ameen Engineering
More informationA Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA
A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA Mr.Mahesh S.Giri Department of Computer Science & Engineering Technocrats Institute of Technology Bhopal, India
More informationIndex Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing.
Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Privacy - Preserving
More informationData Storage Security in Cloud Computing
Data Storage Security in Cloud Computing Manoj Kokane 1, Premkumar Jain 2, Poonam Sarangdhar 3 1, 2, 3 Government College of Engineering and Research, Awasari, Pune, India Abstract: Cloud computing is
More informationIndex Terms : cloud computing, Distributed Storage, error detection, data recovery, SHA, dynamic block operations
Revisiting Secure Cloud Storage by Replacing Token Generation With SHA Ms. Bhagyashree Alhat (1), Prof. Amar Buchade(2) Pune Institute of Computer Technology, University of Pune,PG Student(1), Assistant
More informationVerifying Correctness of Trusted data in Clouds
Volume-3, Issue-6, December-2013, ISSN No.: 2250-0758 International Journal of Engineering and Management Research Available at: www.ijemr.net Page Number: 21-25 Verifying Correctness of Trusted data in
More informationTITLE: Secure Auditing and Deduplicating Data in Cloud(Survey Paper)
TITLE: Secure Auditing and Deduplicating Data in Cloud(Survey Paper) Pratik Raut 1, Pratik Kamble 2, Prafull Pansare 3, Dipti Salunkhe 4 1 UG Student, Dept. of Computer Engineering, JSCOE, Hadapsar, Pune,
More informationPRIVACY PRESERVING PUBLIC AUDITING FOR SECURED DATA STORAGE IN CLOUD USING BLOCK AUTHENTICATION CODE
PRIVACY PRESERVING PUBLIC AUDITING FOR SECURED DATA STORAGE IN CLOUD USING BLOCK AUTHENTICATION CODE R.REVATHI # PG Scholar #, Bharathiyar Institute Of Engineering for Women, Deviyakurichi, Salem(DT) India
More informationCloud Data Service for Issues in Scalable Data Integration Using Multi Authority Attribute Based Encryption
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,
More informationAn Efficient Data Correctness Approach over Cloud Architectures
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 8, Issue 12 (October 2013), PP. 33-37 An Efficient Data Correctness Approach over
More informationReplicated Data Integrity Verification in Cloud
Replicated Data Integrity Verification in Cloud Raghul Mukundan Department of Computer Science Missouri University of Science and Technology rmgq8@mst.edu Sanjay Madria Department of Computer Science Missouri
More informationSurveying Cloud Storage Correctness using TPA with BLS
Surveying Cloud Storage Correctness using TPA with BLS Priyanka Dehariya 1, Prof. Shweta Shrivastava 2, Dr. Vineet Richaraya 3 1 M.Tech Scholar (CSE), LNCT, Bhopal 2 Asst.Professors, (CSE Department),
More informationSecure Way of Storing Data in Cloud Using Third Party Auditor
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 4 (Jul. - Aug. 2013), PP 69-74 Secure Way of Storing Data in Cloud Using Third Party Auditor 1 Miss.
More informationEnhancing Data Security in Cloud Storage Auditing With Key Abstraction
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction 1 Priyadharshni.A, 2 Geo Jenefer.G 1 Master of engineering in computer science, Ponjesly College of Engineering 2 Assistant Professor,
More informationEnhance Data Security in Cloud Computing using Layered Interleaving Approach
Enhance Data Security in Cloud Computing using Layered Interleaving Approach Mr. Pradeep Semwal Assistant Professor Dept of Computer Application & IT SGRR-Institute of Technology & Sciences, Dehradun Mr.
More informationEnergy Efficiency in Secure and Dynamic Cloud Storage
Energy Efficiency in Secure and Dynamic Cloud Storage Adilet Kachkeev Ertem Esiner Alptekin Küpçü Öznur Özkasap Koç University Department of Computer Science and Engineering, İstanbul, Turkey {akachkeev,eesiner,akupcu,oozkasap}@ku.edu.tr
More informationIMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD
IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD 1 Ms.Nita R. Mhaske, 2 Prof. S.M.Rokade 1 student, Master of Engineering, Dept. of Computer Engineering Sir Visvesvaraya
More informationCLOUD BASED STORAGE SERVICES FOR SECURITY FOLLOWED BY THE DATA AUTHENTICATION
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE CLOUD BASED STORAGE SERVICES FOR SECURITY FOLLOWED BY THE DATA AUTHENTICATION Akheel Mohammed 1, Dr.Vasumathi 2, Mir Ahmed Ali
More informationSecuring Cloud Data Storage
IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661 Volume 1, Issue 6 (July-Aug. 2012), PP 43-49 Securing Cloud Data Storage S. P. Jaikar 1, M. V. Nimbalkar 2 1,2 (Department of Information
More informationHow To Ensure Data Integrity In Clouds
Proficient Audit Services Outsourced for Data Availability in Clouds N Praveen Kumar Reddy #1, Dr Subhash Chandra *2 N Praveen Kumar Reddy, pursuing M.Tech from Holy Mary Institute of Technology and Science,,
More informationRemote Data Integrity Checking in Cloud Computing
ISSN 2321 8169 Remote Data Integrity Checking in Cloud Computing Khaba M.V (Assistant Professor/CSE) RVS School of Engineering,dindigul khabarose@gmail.com M.Santhanalakshmi(Assistant Professor/CSE) RVS
More informationIdentifying Data Integrity in the Cloud Storage
www.ijcsi.org 403 Identifying Data Integrity in the Cloud Storage Saranya Eswaran 1 and Dr.Sunitha Abburu 2 1 Adhiyamaan College of Engineering, Department of Computer Application, Hosur. 2 Professor and
More informationOVERVIEW OF SECURITY ISSUES IN CLOUD COMPUTING
OVERVIEW OF SECURITY ISSUES IN CLOUD COMPUTING K. Arumugam 1, P. Sumathi 2 1 Research Scholar/Department Of Computer Science, Government Arts College, Coimbatore (India) 2 Assistant Professor/Department
More informationData Dynamics for Storage Security and Public Auditability in Cloud Computing
Journal of Computer Applications ISSN: 0974 1925, Volume-5, Issue EICA2012-1, February 10, 2012 Data Dynamics for Storage Security and Public Auditability in Cloud Computing Kayalvizhi S M.E - Software
More informationNear Sheltered and Loyal storage Space Navigating in Cloud
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 8 (August. 2013), V2 PP 01-05 Near Sheltered and Loyal storage Space Navigating in Cloud N.Venkata Krishna, M.Venkata
More informationCONSIDERATION OF DYNAMIC STORAGE ATTRIBUTES IN CLOUD
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE CONSIDERATION OF DYNAMIC STORAGE ATTRIBUTES IN CLOUD Ravi Sativada 1, M.Prabhakar Rao 2 1 M.Tech Student, Dept of CSE, Chilkur Balaji
More informationDevelopment of enhanced Third party Auditing Scheme for Secure Cloud Storage
Development of enhanced Third party Auditing Scheme for Secure Cloud Storage Bhanu Prakash Chamakuri*1, D. Srikar*2, Dr. M.Suresh Babu*3 M.Tech Scholar, Dept of CSE, Grandhi Varalakshmi Institute Of Technology,
More informationRSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES
RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES 1 MD ISMAIL Z, 2 ASHFAQUE AHAMED K. 1 PG Scholar,Department of Computer Science, C.Abdul Hakeem College Of Arts and Science,Melvisharam.
More informationTo Provide Security & Integrity for Storage Services in Cloud Computing
To Provide Security & Integrity for Storage Services in Cloud Computing 1 vinothlakshmi.s Assistant Professor, Dept of IT, Bharath Unversity, Chennai, TamilNadu, India ABSTRACT: we propose in this paper
More informationErasure correcting to enhance data security in cloud data storage
Erasure correcting to enhance data security in cloud data storage K.Shrividhya Department of computer science- Vels University shrividhya224@gmail.com A.Sajeevram Department of computer science Vels University
More informationSecure Cloud StorageForPrivacy-Preserving Public Audit
RESEARCH ARTICLE OPEN ACCESS Secure Cloud StorageForPrivacy-Preserving Public Audit ShekhAhamadhusen D., Prof. Rahul Deshmukh Abstract- In Cloud Environment, using cloud storage service, users can remotely
More informationSECURED DATA STORAGE IN CLOUD
International Journal of Information Technology & Management Information System (IJITMIS) Volume 6, Issue 2, July-December-2015, pp. 44-48, Article ID: IJITMIS_06_02_007 Available online at http://http://www.iaeme.com/issue.asp?jtype=ijitmis&vtype=6&itype=2
More informationAnalysis of Secure Cloud Data Sharing Within a Group
Analysis of Secure Cloud Data Sharing Within a Group Ms. uri Pande* Department of CSE, GHRAET Nagpur (M.S), India, Prof. Vikrant Chole Dept of Computer Science & Engg Nagpur (M.S.), India Abstract In this
More informationI. Introduction. A. Related Work
PUBLIC VERIFIABILITY AND DATA DYNAMICS IN CLOUD SERVER P.Saranya, Roever Engineering College; S.Vishnupriya, Roever Engineering College; E.Elangovan, PRIST University Abstract- Cloud computing stores the
More informationM. Nathiya 2 B.Tech. (IT), M.E. (CSE), Assistant Professor, Shivani Engineering College, Trichy, Tamilnadu, India.
ISSN: 2321-7782 (Online) Volume 2, Issue 5, May 2014 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com Robust Data
More informationPerformance Evaluation Panda for Data Storage and Sharing Services in Cloud Computing
Performance Evaluation Panda for Data Storage and Sharing Services in Cloud Computing Gunnala Ajay Kumar M.Tech Student Department of CSE Global Group Of Institutions Batasingaram, Ranga Reddy (Dist),
More informationDESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION
DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION Prof. M. Ben Swarup Professor, Department of CSE Vignan's Institute of Information Technology Visakhapatnam-49, India Chukkala
More informationpreliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.
Privacy-Preserving Public Auditing For Secure Cloud Storage ABSTRACT: Using cloud storage, users can remotely store their data and enjoy the on-demand high-quality applications and services from a shared
More informationThird Party Auditing For Secure Data Storage in Cloud through Trusted Third Party Auditor Using RC5
Third Party Auditing For Secure Data Storage in Cloud through Trusted Third Party Auditor Using RC5 Miss. Nupoor M. Yawale 1, Prof. V. B. Gadicha 2 1 Student, M.E. Second year CSE, P R Patil COET, Amravati.INDIA.
More informationPRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING T.Vidhya Sree M.Phil Research Scholar,CS, MGR College, Hosur (India) ABSTRACT Cloud Computing is the long dreamed vision
More informationKeywords: Cloud Computing, Third Party Auditor, Integrity.
Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Implementation of
More informationHow To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System
REVIEW ARTICAL A Novel Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage Dumala Harisha 1, V.Gouthami 2 1 Student, Computer Science & Engineering-Department, JNTU Hyderabad India
More informationSecure Distribution of File on Cloud
Secure Distribution of File on Cloud Niyamat I. Ujloomwale, Ranjana Badre Dept. of Computer, MIT Academy of Engineering, Alandi, Savitri Phule Pune University, Pune, India Dept. of Computer, MIT Academy
More informationIMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD ENVIRONMENT
IJRRECS/November 2014/Volume-2/Issue-11/3699-3703 ISSN 2321-5461 INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD
More informationKeywords: Cloud Computing, Data Dynamics, Data Integrity, Error Localization, Third Party Auditor.
www.semargroup.org, www.ijsetr.com ISSN 2319-8885 Vol.03,Issue.11 June-2014, Pages:2300-2307 Secure Cloud: Storage with Privacy Preserving Public Auditing and Data Dynamics Dept of CSE, Malabar College
More informationInternational Journal of Infinite Innovations in Engineering and Technology. ISSN (Online): 2349-2287, ISSN (Print): 2349-2279 2015
SECURED AUDITING SYSTEM FOR CLOUD DATA STORAGE WITH ERROR CORRECTION GUARANTEES 1 S.Sathya, 2 S.Sivakumar 1 Research Scholar, Department of Computer Science & Applications, PGP College of Arts & Science,
More informationPrivacy-Preserving Public Auditing & Data Intrgrity for Secure Cloud Storage
Privacy-Preserving Public Auditing & Data Intrgrity for Secure Cloud Storage Imran Ahmad Student, M.Tech Dept. Computer Science & Engineering Patel Institute of Technology Bhopal, India imimran86@gmail.com
More informationTrusted Public Auditing Process for Secure Cloud Storage
Trusted Public Auditing Process for Secure Cloud Storage K.Adhiyaman 1, A. Jesudoss 2, D.Saravanan 3 1 Final Year MCA, Faculty of Computing, Department of MCA Sathyabama University, Chennai,Tamil Nadu,
More informationAustralian Journal of Basic and Applied Sciences. Secure and Efficient Dynamic Data Operations in Cloud Computing
AENSI Journals Australian Journal of Basic and Applied Sciences ISSN:1991-8178 Journal home page: www.ajbasweb.com Secure and Efficient Dynamic Data Operations in Cloud Computing 1 S.K. Mouleeswaran, 2
More informationCloud Data Storage Security and Public Auditing
A Meticulous Description of Applying Watermarking Technique for Secure Cloud Storage 1 M. Guresh, 2 R. Suresh 1 M.Tech 2 nd Year, Department of CSE, CREC Tirupati, AP, India 2 Professor & HOD, Department
More informationTo Assure Factual Information Storage Security in Cloud Computing
To Assure Factual Information Storage Security in Cloud Computing Archana M, Shirisha K, Bhavani V Abstract Abstract-Cloud computing has evolved from virtualization, utility computing and client-server
More informationAN APPROACH TOWARDS FUNCTIONING OF PUBLIC AUDITABILITY FOR CLOUD ENRICHMENT
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN APPROACH TOWARDS FUNCTIONING OF PUBLIC AUDITABILITY FOR CLOUD ENRICHMENT Mohd Abdul Shoaib 1, Akheel Mohammed 2, Ayesha 3
More informationData Grid Privacy and Secure Storage Service in Cloud Computing
Data Grid Privacy and Secure Storage Service in Cloud Computing L.Revathi 1, S.Karthikeyan 2 1 Research Scholar, Department of Computer Applications, Dr. M.G.R. Educational and Research Institute University,
More informationData storage security in Cloud
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 6, Ver. III (Nov Dec. 2014), PP 50-56 Data storage security in Cloud Mrs. Niyamat Ujloomwale, Mrs.
More informationSECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING
SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING Saranya.V 1, Suganthi.J 2, R.G. Suresh Kumar 3 1,2 Master of Technology, Department of Computer Science and Engineering, Rajiv Gandhi College of Engineering
More informationIntegrity Verification In Multiple Cloud Storage Using Cooperative PDP Method
Integrity Verification In Multiple Cloud Storage Using Cooperative PDP Method * Usha Sundari Dara 1 M. Swetha Chandra 2 1PG Student (M. Tech) Dept. of CSE, TRR College of Engineering, Hyderabad, AP, India
More informationCloud Data Storage Services Considering Public Audit for Security
Global Journal of Computer Science and Technology Cloud and Distributed Volume 13 Issue 1 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
More informationEfficient Remote Data Possession Checking In Critical Information Infrastructures Ensuring Data Storage Security In Cloud Computing
Efficient Remote Data Possession Checking In Critical Information Infrastructures Ensuring Data Storage Security In Cloud Computing Dr. T.Nalini 1, Dr.K.Manivannan 2,Vaishnavi Moorthy 3 1 Professor, Department
More informationAn Integrated Approach of Data storage and Security in Cloud Computing
An Integrated Approach of Data storage and Security in Cloud Computing K.SHIRISHA REDDY 1, Dr.M.BALARAJU 2 1 Associate Professor, CSE, VIGNAN BHARATHI INSTITUTE OF TECHNOLOGY, Hyderabad, Andhra Pradesh,
More informationPRIVACY PRESERVING AND BATCH AUDITING IN SECURE CLOUD DATA STORAGE USING AES
PRIVACY PRESERVING AND BATCH AUDITING IN SECURE CLOUD DATA STORAGE USING AES 1 SANTOSH P. JADHAV, 2 B. R. NANDWALKAR 1,2 Department of Computer Engineering, Late G.N.Sapkal collage of engineering, University
More informationInternational Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 12, December 2014 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
More informationA Survey on Secure Storage Services in Cloud Computing
Global Journal of Computer Science and Technology Cloud & Distributed Volume 12 Issue 12 Version 1.0 Year 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
More informationEnabling Public Auditing for Secured Data Storage in Cloud Computing
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 5 (May. 2013), V3 PP 01-05 Enabling Public Auditing for Secured Data Storage in Cloud Computing 1 Er.Amandeep Kaur,
More informationIJCSIET-ISSUE4-VOLUME2-SERIES1 Page 1
Hash Message Authentication for Public Auditing in Secure Cloud Storage MK Siva Krishna Kanth 1, Dr.N. Chandra Sekhar Reddy 2, A. Praveen 3 Professor 2, CSE Dept., Professor 3, IT Dept., Institute of Aeronautical
More informationHow To Secure Cloud Data Storage
Enabling Data Storage Security in Cloud Computing for Banking Enterprise S.BIRUNTHA V.VENKATESA KUMAR, S.PALANISWAMI, II ME CSE Lect/CSE, Registrar Anna University Coimbatore, Anna University Coimbatore,
More informationA Survey on Data Integrity of Cloud Storage in Cloud Computing
A Survey on Data Integrity of Cloud Storage in Cloud Computing A B S T R A C T Mr.Vitthal Raut, Prof. Suhasini Itkar Department Computer Engineering, PES Modern College of Engineering, Pune, India. raut.vitthal@gmail.com,
More informationTowards a compliance audit of SLAs for data replication in Cloud storage
Towards a compliance audit of SLAs for data replication in Cloud storage J. Leneutre B. Djebaili, C. Kiennert, J. Leneutre, L. Chen, Data Integrity and Availability Verification Game in Untrusted Cloud
More informationA Comprehensive Data Forwarding Technique under Cloud with Dynamic Notification
Research Journal of Applied Sciences, Engineering and Technology 7(14): 2946-2953, 2014 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2014 Submitted: July 7, 2013 Accepted: August
More informationHey! Cross Check on Computation in Cloud
Hey! Cross Check on Computation in Cloud Ajeet Singh Rajput Computer Science and Engineering Department S.D.B.C.T, Mhow Road,Indore,(M.P), India ajeetsinghrajput@gmail.com M.E.(CSE), S.D.B.C.T, Indore
More informationPRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE
PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE Abstract: Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared
More informationKeywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption
Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer
More informationAuthorized Auditing of Big Data Stored on Cloud with Auditability Aware Data Scheduling
Authorized Auditing of Big Data Stored on Cloud with Auditability Aware Data Scheduling Surapriya Swain 1, Prof. Saurabh Gupta 2 1 Department of Computer Engineering, GSMCOE, Balewadi, Savitribai Phule
More informationDynamic Data Storage for Trustworthy Cloud
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 11 November, 2014 Page No. 9350-9354 Dynamic Data Storage for Trustworthy Cloud Prof. M.M.More, Mahesh
More informationSecurity in Cloud Audit Using the Key Based Homomorphic Linear Authenticator
Security in Cloud Audit Using the Key Based Homomorphic Linear Authenticator S.Muralitharan 1, M.Vijayaraj 2 Assistant Professor, Department of Information Technology, Mohamed Sathak Engineering College,
More informationData Security & Availability in Multi-Cloud Storage with Cooperative Provable Data Possession
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 2 February 2015, Page No. 10375-10379 Data Security & Availability in Multi-Cloud Storage with Cooperative
More informationE-mail- ashwinikumari.e@gmail.com,naguchinni@gmail.com umashankari.917@gmail.com
International Journal Of Scientific Research And Education Volume 2 Issue 10 Pages-2019-2026 October-2014 ISSN (e): 2321-7545 Website: http://ijsae.in Multi-Cloud Storage Data Possession Based Data Integrity
More informationEnabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage
Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage Pranita Bakka 1, Dr. Jayashree Agarkhed 2 1 P.G.Student, Department of Computer Science & Engineering,
More informationSecure Privacy Preserving Public Auditing for Cloud storage
Secure Privacy Preserving Public Auditing for Cloud storage Sathiskumar R 1, Dr.Jeberson Retnaraj 2 Department of Information Technology, Sathyabama University, Chennai, India 1 Department of Information
More informationSECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE
International Journal of Computer Network and Security(IJCNS) Vol 7. No.1 2015 Pp. 1-8 gopalax Journals, Singapore available at : www.ijcns.com ISSN: 0975-8283 ----------------------------------------------------------------------------------------------------------------------------------------------------------
More informationData Integrity for Secure Dynamic Cloud Storage System Using TPA
International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 7-12 International Research Publication House http://www.irphouse.com Data Integrity for Secure
More informationAN EXPOSURE TO RELIABLE STORAGE SERVICES IN CLOUD COMPUTING
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EXPOSURE TO RELIABLE STORAGE SERVICES IN CLOUD COMPUTING Ayesha Romana 1, Akheel Mohammed 2, Ayesha 3 1 M.Tech Student, Dept
More informationHow To Ensure Correctness Of Data In The Cloud
A MECHANICS FOR ASSURING DATA STORAGE SECURITY IN CLOUD COMPUTING 1, 2 Pratibha Gangwar, 3 Mamta Gadoria 1 M. Tech. Scholar, Jayoti Vidyapeeth Women s University, Jaipur, priya25mehta@gmail.com 2 M. Tech.
More informationHow To Ensure Data Integrity In Cloud Computing
A Novel Approach for public exploration Data with Effective user Denial in the cloud Mahankali Anitha PG Scholar Department of CSE J.Vijayasree Assistant professor Department of CSE Dr.M.V.Siva Prasad
More informationKeywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving,
Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Third Party
More informationRemote Data Integrity Checking for Public Clouds
IBM Student Workshop for Frontiers of Cloud Computing 01 Remote Data Integrity Checking for Public Clouds Bo (Irvine) Chen Department of Computer Science New Jersey Institute of Technology joint work with
More informationHow To Check If A Data File Is Safe In A Cloud Archive
Evaluate the Performance of Data Integrity Proofs in Cloud Storage 1 D. Hari Krishna, 2 R. Pushpa Latha, 3 J. Srinivasa Rao 1,2,3 Dept. of CSE, NOVA College of Engineering & Tech., Vijayawada, AP, India
More informationPrivacy-Preserving Public Auditing For Secure Cloud Storage
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 4, Ver. III (Jul Aug. 2014), PP 33-38 Privacy-Preserving Public Auditing For Secure Cloud Storage Salve
More informationEnsuring Data Integrity of Cloud Storage Services In Cloud Computing
Ensuring Data Integrity of Cloud Storage Services In Cloud Computing Gunjal Yogita S. 1 P.G. Student, Department of IT, Amrutvahini College of Engineering, Sangamner, Maharashtra, India 1. ABSTRACT: Cloud
More information