Security Evaluation Using Shamir s Algorithm in Multi Cloud Data Storage
|
|
|
- Sydney Blankenship
- 10 years ago
- Views:
Transcription
1 Security Evaluation Using Shamir s Algorithm in Multi Cloud Data Storage 1 ASHA PRIYA DARSHINI. MANDA, 2 N. JAGAJEEVAN 1 Mtech, CHALAPATHI INSTITUE OF ENGINEERING AND TECHNOLOGY, CHALAPATHI NAGAR, LAM, GUNTUR, AP, INDIA. 2 Assistant Professor, CHALAPATHI INSTITUE OF ENGINEERING AND TECHNOLOGY, CHALAPATHI NAGAR, LAM, GUNTUR, AP, INDIA. Abstract: Guaranteeing the security of distributed computing is a main consideration in the distributed computing environment which has numerous profits as far as minimal effort and availability of information, as clients frequently store delicate data with distributed storage suppliers, uninformed that these suppliers may be traded off. Managing "single cloud" suppliers is anticipated to wind up less prominent with clients because of dangers of administration accessibility disappointment and the likelihood of noxious insiders in the single cloud. A development towards "multi-mists" or at the end of the day, "entomb mists "or" billow of-mists has risen as of late and a framework that utilizes Byzantine convention for mystery offering has been developed. We expect to prepare Depsky system to supply a protected cloud database that will certification to avert security dangers confronting the distributed computing group. In connection to information interruption and information trustworthiness, in the same way as depsky we convey the information and metadata into diverse cloud suppliers, and we apply the mystery offering calculation on the put away information in the cloud supplier. As opposed to utilizing plain mystery offering utilizing open key figures we utilize Shamir's mystery imparting 34 calculation. Henceforth, reproducing information into multi-mists by utilizing a multi-offer method may diminish the danger of information interruption and build information uprightness. This work intends to advertise the utilization of multi-mists because of its capability to diminish security hazards that influence the distributed computing client. Key Words: Cloud computing, single cloud, multiclouds, dep sky architecture, Shamir s secret sharing algorithm. I. INTRODUCTION Distributed computing will be figuring that incorporates an extensive number of machines related through a correspondence system, for example, the Internet, like utility processing [4]. In science, distributed computing is an equivalent word for disseminated processing over a system, and means the capacity to run a project or application on numerous joined workstations in the meantime. System based administrations, which have all the earmarks of being conveyed by true server fittings and are indeed served up by virtual equipment mimicked by programming running on one or all the more genuine machines, is regularly called distributed computing. Such recreated servers don't
2 physically exist and can thusly be migrated around and scaled up or down on the fly without exasperating the end client, to some degree like a cloud getting to be bigger or more diminutive without being a physical item [3]. In as something to be shared use, the expression "the cloud" is in a broad sense a representation for the Internet [5]. Advertisers have further made famous the expression "in the cloud" to allude to programming, stages and framework that are sold "as an administration", i.e. remotely through the Internet. Regularly, the dealer has genuine vitality devouring servers which have items and administrations from a remote area, so end-clients don't need to; they can essentially log on to the system without introducing anything. The real models of distributed computing administration are referred to as programming as an administration, stage as an administration, and foundation as a service[3]. Distributed computing depends on imparting of assets to attain lucidness and economies of scale, like an utility (like the power network) over a network[6]. At the establishment of distributed computing is the more extensive idea of joined base and imparted administrations. The cloud likewise concentrates on amplifying the adequacy of the imparted assets. Cloud assets are typically imparted by different clients as well as progressively reallocated for every interest. This can work for apportioning assets to clients. Security in distributed computing: As distributed computing is attaining expanded prominence, concerns are continuously voiced about the security issues presented through selection of this new model.[4][7] The adequacy and proficiency of customary assurance systems are, no doubt rethought as the attributes of this creative arrangement model can contrast generally from those of conventional architectures.[8] An option viewpoint on the subject of cloud security is that this is however an alternate, in spite of the fact that truly wide, instance of "connected security" and that comparable security standards that apply in imparted multi-client centralized computer security models apply with cloud security[9]. Distributed computing offers numerous profits, yet is helpless against dangers. As distributed computing utilization expand, it is likely that more crooks find better approaches to endeavor framework vulnerabilities. Numerous underlying difficulties and dangers in distributed computing expand the danger of information trade off. To moderate the risk, distributed computing stakeholders ought to put intensely in danger appraisal to guarantee that the framework encodes to ensure information, secures trusted establishment to secure the stage and foundation, and incorporates higher affirmation with inspecting to fortify consistence. Security concerns must be tended to keep up trust in distributed computing engineering. II. RELATED WORK H. Abu-Libdeh [11] stated that The increasing popularity of cloud storage is leading organizations to consider moving data out of their own data centers and into the cloud. As it became very expensive to switch storage providers a case for applying RAID-like techniques used by disks and file systems, but at the cloud storage level reduce the cost 35
3 of switching providers, and better tolerate provider outages or failures. So we introduce RACS, to overcome the drawbacks in the existing system. G. Ateniese[10] stated that introducing a model for provable data possession (PDP) that allows a client that has stored data at an untrusted server to verify that the server possesses the original data And there will be a drastic change in I/O costs So, they presented two provably-secure PDP schemes that are more efficient than previous solutions. H. Abu-Libdeh stated that by introducing HAIL a distributed cryptographic system that permits a set of servers to prove to a client that a stored file is intact and retrievable. So, author introduced a strong, formal adversarial model for HAIL, and rigorous analysis and parameter choices to overcome the drawbacks in the esisting system. C. Cachin in his paper stated that there is a problem of efficient distributed storage of information in a message-passing environment where both less than one third of the servers, So to overcome these problem author introduced first implementation of non-skipping timestamps which provides optimal resilience and withstands Byzantine clients; it is based on threshold cryptography. KuiRen Stated in his paper cloud storage enables users to remotely store their data and enjoy the on-demand high quality cloud applications without the burden of local hardware and software management. So to overcome the drawbacks author used a flexible distributed storage integrity auditing mechanism, utilizing the homomorphic token and distributed erasure-coded data. III. EXISTING SYSTEM Multi-Clouds: Preliminary The term multi-clouds is similar to the terms inter clouds or cloud-of-clouds. These terms suggest that cloud computing should not end with a single cloud. Using their illustration, a cloudy sky incorporates different colors and shapes of clouds which lead to different implementations and administrative domains. Recent research has focused on the multi-cloud environment which control several clouds and avoids dependency on any one individual cloud. Identify two layers in the multi-cloud environment: the bottom layer is the inner-cloud, while the second layer is the inter-cloud. In the inter cloud, the Byzantine fault tolerance finds its place. We will first summarize the previous Byzantine protocols over the last three decades. Byzantine Protocols In cloud computing, any faults in software or hardware are known as Byzantine faults that usually relate to inappropriate behavior and intrusion tolerance. In addition, it also includes arbitrary and crash faults. Much research has been dedicated to Byzantine fault tolerance (BFT) since its first introduction. Although BFT research has received a great deal of attention, it still suffers from the limitations of practical adoption and remains peripheral in distributed systems Multi-Clouds Model This will explain the recent work that has been done in the area of multi-clouds. Present a virtual storage cloud system called DepSky which consists of a combination of different clouds to build 36
4 a cloud-of-clouds. The DepSky system addresses the availability and the confidentiality of data in their storage system by using multi-cloud providers, combining Byzantine quorum system protocols, cryptographic secret sharing and erasure codes. DepSky Architecture The DepSky architecture consists of four clouds and each cloud uses its own particular interface. The DepSky algorithm exists in the clients machines as a software library to communicate with each cloud. These four clouds are storage clouds, so there are no codes to be executed. The DepSky library permits reading and writing operations with the storage clouds. DepSKy System model: The DepSky system model contains three parts: readers, writers, and four cloud storage providers, where readers and writers are the client s tasks. Explain the difference between readers and writers for cloud storage. Readers can fail arbitrarily (for example, they can fail by crashing, they can fail from time to time and then display any behavior) whereas, writers only fail by crashing. Cloud storage providers in the DepSky system model: The Byzantine protocols involve a set of storage clouds (n) where n = 3 f +1, and f is maximum number of clouds which could be faulty. In addition, any subset of (n f) storage cloud creates byzantine quorum protocols. IV. PROPOSED SYSTEM Shamir's Secret Sharing is an algorithm in cryptography created by Adi Shamir. It is a form of secret sharing, where a secret is divided into parts, giving each participant its own unique part, where some of the parts or all of them are needed in order to reconstruct the secret. Figure(1). DepSky Architecture DepSky Data model: As the DepSky system deals with different cloud providers, the DepSky library deals with different cloud interface providers and consequently, the data format is accepted by each cloud. The DepSky data model consists of three abstraction levels: the conceptual data unit, a generic data unit, and the data unit implementation Counting on all participants to combine together the secret might be impractical, and therefore sometimes the threshold scheme is used where any k of the parts are sufficient to reconstruct the original secret. Mathematical definition: The goal is to divide secret S (e.g., a safe combination) into n pieces of data D 1,,D n in such a way that: 1. Knowledge of any k or more D i pieces makes S easily computable.
5 2. Knowledge of any k-1 or fewer D i pieces leaves S completely undetermined (in the sense that all its possible values are equally likely). This scheme is called \left(k,n\right) threshold scheme. If k=n then all participants are required to reconstruct the secret. Shamir's secret-sharing scheme: The essential idea of Adi Shamir's threshold scheme is that 2 points are sufficient to define a line, 3 points are sufficient to define a parabola, 4 points to define a cubic curve and so forth. That is, it takes k\,\! points to define a polynomial of degree k-1. Suppose we want to use a (k,n) threshold scheme to share our secret Swithout loss of generality assumed to be an element in a finite field F of size P where 0 < k n < P; S<P and P is a prime number. Choose at random positive integers with, and let. Build the polynomial. Let us construct any points out of it, for instance set to retrieve. Every participant is given a point (an integer input to the polynomial, and the corresponding integer output). Given any subset of of these pairs, we can find the coefficients of the polynomial using interpolation. The secret is the constant term. One Time Password: One Time Password (OTP) authentication is a method to reduce the potential for compromised user credentials. The concept behind OTP is that every session initiated by a user generates a unique user credential that is only valid for that session or for a very short period of time. Even if an attacker is capable of obtaining this user credential, it may either no longer be valid or be prohibited from additional use[12]. Security of one-time-password protocols: The main security property that protocols employing one-time passwords should achieve is: strong mutual authentication based on knowledge of one-time passwords. Our work will address one-time passwords in the context of PAKE protocols, which provide an additional property: secure key exchange. The motivation for using one-time passwords is that the compromise of one password should not affect the security of sessions involving another password. The one-time password serves to mutually authenticate the client and the server; there are no other long-term values like public keys or certificates. Authentication is based on knowledge of the shared password. Informally, a protocol will provide secure mutual authentication if no honest party A^ accepts a session as being with party B^ unless B^ participated in the protocol, and vice versa. We want a one-time-password protocol to give secure mutual authentication for the current session even if other one-time passwords have been revealed [12]. In addition to mutually authenticating two parties to each other, we want a protocol that will also output a session key that can be used to encrypt 38
6 and protect the integrity of future communications between those two parties. This is a common feature required of many secure communication protocols. The traditional use of one-time passwords sending the password over an SSL connection is not compatible with our approach. Using SSL to establish an authentic channel requires that the user can obtain and properly use an authentic public key for the server. In other words, it requires a public key infrastructure, whereas one-time-pake only needs shared passwords. V. EXPERIMENTAL SETUP We describe above features of Shamir secret sharing schema for accessing services in individual modularity. In this achievement accessing services from other user present in network process environment data event generation. For doing this work efficiently in this paper we propose to develop an efficient application like software project management development in real time application using some specified technical languages present in the real time process management event generation. In this cross of cloud application, this is the event management process between each client present in the real time application of all the data sharing network process management applications. Due to this achievement in cloud computing information sharing is the main aspect in commercial event management reorganization in data event management applications. To address this achievement in each client in software application development process for real time application development every client must satisfy the following conditions in commercial event management. In that we are maintain three different aspects for sharing 39 data from one to client other client clients in network application environment. As discussed in the earlier version of semantic data representation. We have to develop Software Project management application for processing efficient services with different infrastructures. In this requirement specification we have to provide efficient service in real time application process between cloud storage system applications with other features present in the relative data assessment technique feature environment specification. These features are accessed relative data event management for accessing services in real time application development. VI. PERFORMANCE RESULTS As discussed in above section V, the overall information gives efficient achievement between developed cloud environment specifications in software development application processing. In this paper we develop a specialized requirement of the all the relative client request. Each client registered with his login credentials like username and password specification with relative data management specification from storage cloud and firm cloud with relative data management for accessing services from relative data management of each client present in the cloud environment specification. Storage cloud provide efficient services for registering with suitable credentials or not. If we register then achieve all the relative services in cloud environment, firm cloud give relative services to each client registered in cloud then take the assessment technique for accessing services in real time application development specifications. All the commercial
7 cooperation between each data event progression then we provide security to client if all the relative services. Then each client achieves the relative data process between each cloud with suitable credential in event management for accessing services in cloud computing. Data storage cloud operations are accessed services in real time application management for accessing client services from firm cloud and assessment cloud operations with semantic data event management progression in real time cloud application with secret sharing client details in relative data management between client operations using the services of all the services in cloud computing operations between each client. Figure 2: Performance calculation of each client in cloud data sharing. As discussed in the above section i.e, section V,VI, there is relative data management with cloud sharing operations between cloud data storage and other cloud data storage with firm cloud. In that we are maintaining one time password for each client data processor in cloud computing. Our experimental results show efficient data processing in storage cloud and firm cloud processing with required results. VII. CONCLUSION 40 We aim to provide a framework to supply a secure cloud database that will guarantee to prevent security risks facing the cloud computing community. This framework will apply multi-clouds and the secret sharing algorithm to reduce the risk of data intrusion and the loss of service availability in the cloud and ensure data integrity. In relation to data intrusion and data integrity, like depsky we distribute the data and metadata into different cloud providers, and we apply the secret sharing algorithm on the stored data in the cloud provider. Instead of using plain secret sharing using public key ciphers we employ Shamir s secret sharing algorithm. An intruder needs to retrieve at least three values to be able to find out the real value that we want to hide from the intruder. This depends on Shamir s secret sharing algorithm with a polynomial function technique which claims that even with full knowledge of (k 1) clouds, the service provider will not have any knowledge of vs (vs is the secret value). In other words, hackers need to retrieve all the information from the cloud providers to know the real value of the data in the cloud. Therefore, if the attacker hacked one cloud provider s password or even two cloud provider s passwords, they still need to hack the third cloud provider (in the case where k = 3) to know the secret which is the worst case scenario. Hence, replicating data into multi-clouds by using a multi-share technique may reduce the risk of data intrusion and increase data integrity. VIII. REFERENCES [1]. Cloud Computing Security: From Single to Multi-Clouds by Mohammed A. AlZain, Eric Pardede, Ben Soh, James A. Thom.
8 [2].Shamir s secret sharing from Wikipedia. [3]. Cloud computing from wimkipedia. [4]. Securing Virtual and Cloud Environments".By I. Ivanov et al.. [5]. Cloud Computing entry".by NetLingo. [6]. The NIST Definition of Cloud Computing".By National Institute of Standards and Technology. [7].Secure virtualization: benefits, risks and constraints, by M Carroll, P Kotzé, Alta van der Merwe (2011). [8] "Addressing cloud computing security issues". By Zissis, Dimitrios; Lekkas (2010). [9]. Securing the Cloud: Cloud Computer Security Techniques and Tactics by Waltham. [10]. "Provable datapossession at untrusted stores", by G. Ateniese, R. Burns, R. Curtmola, J. Herring, L.Kissner, Z. Peterson and D. Song. [11]. "RACS: a case for cloud storagediversity", byh. Abu-Libdeh, L. Princehouse and H.Weatherspoon. [12]. One Time Password Authentication for Open High Performance Computing Environments Stephen Chan, Stephen Lau slau, Adrian Wong. by 41
Secure Framework for Data Storage from Single to Multi clouds in Cloud Networking
Secure Framework for Data Storage from Single to Multi clouds in Cloud Networking B.Sujana 1, P.Tejaswini 2, G.Srinivasulu 3, Sk.Karimulla 4 1,2,3,4 QUBA COLLEGE OF ENGINEERING & TECH, NELLORE Abstract:
MIGRATION FROM SINGLE TO MULTI-CLOUDS TO SHRIVEL SECURITY RISKS IN CLOUD COMPUTING. K.Sireesha 1 and S. Suresh 2
IJCITP Volume.8* Number 2* December 2013, pp. 53-58 Serials Publications MIGRATION FROM SINGLE TO MULTI-CLOUDS TO SHRIVEL SECURITY RISKS IN CLOUD COMPUTING K.Sireesha 1 and S. Suresh 2 1 M.Tech. Student,
Improving data integrity on cloud storage services
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services
A Multi-Cloud based Approach to Enhance Data Security and Availability in Cloud Storage
A Multi-Cloud based Approach to Enhance Data Security and Availability in Cloud Storage Siva Rama Krishna T. a, * Dr. A. S. N. Chakravarthy a, Naveen Kumar G. b a Department of Computer Science and Engineering,
Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing.
Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Privacy - Preserving
A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA
A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA Mr.Mahesh S.Giri Department of Computer Science & Engineering Technocrats Institute of Technology Bhopal, India
Ensuring Data Storage Security in Cloud Crop
ISSN : 2347-8446 (Online) International Journal of Advanced Research in Ensuring Data Storage Security in Cloud Crop Rakesh Kumar ER Asst. Prof. & Head (CSE), SAMS College of Engineering and Technology,
DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION
DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION Prof. M. Ben Swarup Professor, Department of CSE Vignan's Institute of Information Technology Visakhapatnam-49, India Chukkala
Web Services & Database Services Availability through Multi-Cloud Environment
Web Services & Database Services Availability through Multi-Cloud Environment Veenesh Kumar Shrotriya 1, Ashutosh Kumar 2 1 M.Tech, 2 Assistant Professor, Department of Computer Science and Engineering,
How To Ensure Correctness Of Data In The Cloud
Ensuring Data Storage Security in Cloud Computing ABSTRACT Cloud computing has been envisioned as the next-generation architecture of IT enterprise. In contrast to traditional solutions, where the IT services
Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System
Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System 1 K.Valli Madhavi A.P [email protected] Mobile: 9866034900 2 R.Tamilkodi A.P [email protected] Mobile:
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department
Secrecy Maintaining Public Inspecting For Secure Cloud Storage
Secrecy Maintaining Public Inspecting For Secure Cloud Storage K.Sangamithra 1, S.Tamilselvan 2 M.E, M.P.Nachimuthu.M.Jaganathan Engineering College, Tamilnadu, India 1 Asst. Professor, M.P.Nachimuthu.M.Jaganathan
A survey on cost effective multi-cloud storage in cloud computing
A survey on cost effective multi-cloud storage in cloud computing Nitesh Shrivastava, Ganesh Kumar Abstract As novel storage model, cloud storage has gain attentions from both the academics and industrial
A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing
International Journal of Emerging Engineering Research and Technology Volume 3, Issue 5, May 2015, PP 1-7 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) A Survey on Security Issues and Security Schemes
SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD
SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD S.REVATHI B.HASEENA M.NOORUL IZZATH PG Student PG Student PG Student II- ME CSE II- ME CSE II- ME CSE Al-Ameen Engineering
A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining
An Approach Secret Sharing Algorithm in Cloud Computing Security over Single to Multi Clouds
International Journal of Scientific and Research Publications, Volume 3, Issue 4, April 2013 1 An Approach Secret Sharing Algorithm in Cloud Computing Security over Single to Multi Clouds Md Kausar Alam,
VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui
VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui School of Engineering and Computer Science Te Kura Mātai Pūkaha, Pūrorohiko PO Box 600 Wellington New Zealand Tel: +64 4 463
IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD ENVIRONMENT
IJRRECS/November 2014/Volume-2/Issue-11/3699-3703 ISSN 2321-5461 INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD
Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud
Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud M.Jayanthi, Assistant Professor, Hod of MCA.E mail: [email protected] MahatmaGandhi University,Nalgonda, INDIA. B.Ranganatha
Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage
Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage P. Selvigrija, Assistant Professor, Department of Computer Science & Engineering, Christ College
February. ISSN: 2321-8134
IJFEAT INTERNATIONAL JOURNAL FOR ENGINEERING APPLICATIONS AND TECHNOLOGY TITLE: DATA PLACE & MANAGE SECURITY IN CLOUD COMPUTING FOR EFFECTIVE AND FLEXIBLE DISTRIBUTED SYSTEM 1 Mr. Pritam S. Bhoyar, 2 Mr.
How To Ensure Data Integrity In Clouds
Proficient Audit Services Outsourced for Data Availability in Clouds N Praveen Kumar Reddy #1, Dr Subhash Chandra *2 N Praveen Kumar Reddy, pursuing M.Tech from Holy Mary Institute of Technology and Science,,
A Survey on Secure Storage Services in Cloud Computing
Global Journal of Computer Science and Technology Cloud & Distributed Volume 12 Issue 12 Version 1.0 Year 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
Cloud Computing Security: From Single to Multi-Clouds
2012 45th Hawaii International Conference on System Sciences Cloud Computing Security: From Single to Multi-Clouds Mohammed A. AlZain #, Eric Pardede #, Ben Soh #, James A. Thom* # Department of Computer
Secure Way of Storing Data in Cloud Using Third Party Auditor
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 4 (Jul. - Aug. 2013), PP 69-74 Secure Way of Storing Data in Cloud Using Third Party Auditor 1 Miss.
Scientific Journal Impact Factor (SJIF): 1.711
Scientific Journal Impact Factor (SJIF): 1.711 e-issn: 2349-9745 p-issn: 2393-8161 International Journal of Modern Trends in Engineering and Research www.ijmter.com OneTK: Key Distribution Center at Cloud
Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication
Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication Sanjay Kumar Baghel Mtech Scholar, CSE, CSIT DURG [email protected] Bhupesh Kumar Dewangan Assistant Professor,CSE,
Data Storage Security in Cloud Computing
Data Storage Security in Cloud Computing Manoj Kokane 1, Premkumar Jain 2, Poonam Sarangdhar 3 1, 2, 3 Government College of Engineering and Research, Awasari, Pune, India Abstract: Cloud computing is
Identifying Data Integrity in the Cloud Storage
www.ijcsi.org 403 Identifying Data Integrity in the Cloud Storage Saranya Eswaran 1 and Dr.Sunitha Abburu 2 1 Adhiyamaan College of Engineering, Department of Computer Application, Hosur. 2 Professor and
Near Sheltered and Loyal storage Space Navigating in Cloud
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 8 (August. 2013), V2 PP 01-05 Near Sheltered and Loyal storage Space Navigating in Cloud N.Venkata Krishna, M.Venkata
The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems
The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems Becky Cutler [email protected] Mentor: Professor Chris Gregg Abstract Modern day authentication systems
preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.
Privacy-Preserving Public Auditing For Secure Cloud Storage ABSTRACT: Using cloud storage, users can remotely store their data and enjoy the on-demand high-quality applications and services from a shared
Performance Evaluation Panda for Data Storage and Sharing Services in Cloud Computing
Performance Evaluation Panda for Data Storage and Sharing Services in Cloud Computing Gunnala Ajay Kumar M.Tech Student Department of CSE Global Group Of Institutions Batasingaram, Ranga Reddy (Dist),
DepSky Dependable and Secure Storage in a Cloud-of-Clouds Alysson Bessani, Miguel Correia, Bruno Quaresma, Fernando André, Paulo Sousa
epsky ependable and Secure Storage in a Cloud-of-Clouds Alysson Bessani, Miguel Correia, Bruno Quaresma, Fernando André, Paulo Sousa University of Lisbon, Faculty of Sciences 1 Moving to Clouds ata is
SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD
Volume 1, Issue 7, PP:, JAN JUL 2015. SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD B ANNAPURNA 1*, G RAVI 2*, 1. II-M.Tech Student, MRCET 2. Assoc. Prof, Dept.
Secure Data transfer in Cloud Storage Systems using Dynamic Tokens.
Secure Data transfer in Cloud Storage Systems using Dynamic Tokens. P.Srinivas *,K. Rajesh Kumar # M.Tech Student (CSE), Assoc. Professor *Department of Computer Science (CSE), Swarnandhra College of Engineering
OVERVIEW OF SECURITY ISSUES IN CLOUD COMPUTING
OVERVIEW OF SECURITY ISSUES IN CLOUD COMPUTING K. Arumugam 1, P. Sumathi 2 1 Research Scholar/Department Of Computer Science, Government Arts College, Coimbatore (India) 2 Assistant Professor/Department
Third Party Auditing For Secure Data Storage in Cloud through Trusted Third Party Auditor Using RC5
Third Party Auditing For Secure Data Storage in Cloud through Trusted Third Party Auditor Using RC5 Miss. Nupoor M. Yawale 1, Prof. V. B. Gadicha 2 1 Student, M.E. Second year CSE, P R Patil COET, Amravati.INDIA.
CRYPTOGRAPHY IN NETWORK SECURITY
ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can
Cloud Data Storage Services Considering Public Audit for Security
Global Journal of Computer Science and Technology Cloud and Distributed Volume 13 Issue 1 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
A SURVEY ON SECURE STORAGE TECHNIQUES IN CLOUD COMPUTING
A SURVEY ON SECURE STORAGE TECHNIQUES IN CLOUD COMPUTING T.lavanya Pg scholar, jayam college of engineering and technology, India Abstract: In this Review paper, it is intended to survey on several existing
Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication
Volume 4, Issue 6, June 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Three Layered
How To Ensure Correctness Of Data In The Cloud
A MECHANICS FOR ASSURING DATA STORAGE SECURITY IN CLOUD COMPUTING 1, 2 Pratibha Gangwar, 3 Mamta Gadoria 1 M. Tech. Scholar, Jayoti Vidyapeeth Women s University, Jaipur, [email protected] 2 M. Tech.
Comments on "public integrity auditing for dynamic data sharing with multi-user modification"
University of Wollongong Research Online Faculty of Engineering and Information Sciences - Papers Faculty of Engineering and Information Sciences 2016 Comments on "public integrity auditing for dynamic
Ensuring Data Storage Security in Cloud Computing
Ensuring Data Storage Security in Cloud Computing Cong Wang 1, Qian Wang 1, Kui Ren 1, and Wenjing Lou 2 1 ECE Department, Illinois Institute of Technology 2 ECE Department, Worcester Polytechnic Institute
Associate Prof. Dr. Victor Onomza Waziri
BIG DATA ANALYTICS AND DATA SECURITY IN THE CLOUD VIA FULLY HOMOMORPHIC ENCRYPTION Associate Prof. Dr. Victor Onomza Waziri Department of Cyber Security Science, School of ICT, Federal University of Technology,
EFFICIENT DISCOVERY OF INTEGRITY AUTOMATION IN HYBRID CLOUD COMPUTING
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE EFFICIENT DISCOVERY OF INTEGRITY AUTOMATION IN HYBRID CLOUD COMPUTING K.Saipriya 1, A.Ravi Kumar 2 1 M.Tech Student, Dept of
Data Integrity for Secure Dynamic Cloud Storage System Using TPA
International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 7-12 International Research Publication House http://www.irphouse.com Data Integrity for Secure
Evaluation of different Open Source Identity management Systems
Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems
15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM
RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM Dhanashri Bamane Vinayak Pottigar Subhash Pingale Department of Computer Science and Engineering SKN
A Comprehensive Data Forwarding Technique under Cloud with Dynamic Notification
Research Journal of Applied Sciences, Engineering and Technology 7(14): 2946-2953, 2014 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2014 Submitted: July 7, 2013 Accepted: August
Erasure correcting to enhance data security in cloud data storage
Erasure correcting to enhance data security in cloud data storage K.Shrividhya Department of computer science- Vels University [email protected] A.Sajeevram Department of computer science Vels University
Verifying Correctness of Trusted data in Clouds
Volume-3, Issue-6, December-2013, ISSN No.: 2250-0758 International Journal of Engineering and Management Research Available at: www.ijemr.net Page Number: 21-25 Verifying Correctness of Trusted data in
Data Grid Privacy and Secure Storage Service in Cloud Computing
Data Grid Privacy and Secure Storage Service in Cloud Computing L.Revathi 1, S.Karthikeyan 2 1 Research Scholar, Department of Computer Applications, Dr. M.G.R. Educational and Research Institute University,
SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING
SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING Saranya.V 1, Suganthi.J 2, R.G. Suresh Kumar 3 1,2 Master of Technology, Department of Computer Science and Engineering, Rajiv Gandhi College of Engineering
Chapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
Dynamic Query Updation for User Authentication in cloud Environment
Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,
Efficient Remote Data Possession Checking In Critical Information Infrastructures Ensuring Data Storage Security In Cloud Computing
Efficient Remote Data Possession Checking In Critical Information Infrastructures Ensuring Data Storage Security In Cloud Computing Dr. T.Nalini 1, Dr.K.Manivannan 2,Vaishnavi Moorthy 3 1 Professor, Department
Analysis of Secure Cloud Data Sharing Within a Group
Analysis of Secure Cloud Data Sharing Within a Group Ms. uri Pande* Department of CSE, GHRAET Nagpur (M.S), India, Prof. Vikrant Chole Dept of Computer Science & Engg Nagpur (M.S.), India Abstract In this
Authentication Types. Password-based Authentication. Off-Line Password Guessing
Authentication Types Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4:
Apache Milagro (incubating) An Introduction ApacheCon North America
Apache Milagro (incubating) An Introduction ApacheCon North America Apache Milagro will establish a new independent security framework for the Internet A Distributed Cryptosystem Secure the Future of the
Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving,
Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Third Party
AN EXPOSURE TO RELIABLE STORAGE SERVICES IN CLOUD COMPUTING
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EXPOSURE TO RELIABLE STORAGE SERVICES IN CLOUD COMPUTING Ayesha Romana 1, Akheel Mohammed 2, Ayesha 3 1 M.Tech Student, Dept
CRYPTOGRAPHY AS A SERVICE
CRYPTOGRAPHY AS A SERVICE Peter Robinson RSA, The Security Division of EMC Session ID: ADS R01 Session Classification: Advanced Introduction Deploying cryptographic keys to end points such as smart phones,
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING T.Vidhya Sree M.Phil Research Scholar,CS, MGR College, Hosur (India) ABSTRACT Cloud Computing is the long dreamed vision
User Authentication Guidance for IT Systems
Information Technology Security Guideline User Authentication Guidance for IT Systems ITSG-31 March 2009 March 2009 This page intentionally left blank March 2009 Foreword The User Authentication Guidance
IDRBT Working Paper No. 11 Authentication factors for Internet banking
IDRBT Working Paper No. 11 Authentication factors for Internet banking M V N K Prasad and S Ganesh Kumar ABSTRACT The all pervasive and continued growth being provided by technology coupled with the increased
A Survey on Data Integrity of Cloud Storage in Cloud Computing
A Survey on Data Integrity of Cloud Storage in Cloud Computing A B S T R A C T Mr.Vitthal Raut, Prof. Suhasini Itkar Department Computer Engineering, PES Modern College of Engineering, Pune, India. [email protected],
Keywords Cloud Computing, CRC, RC4, RSA, Windows Microsoft Azure
Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Cloud Computing
2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries
Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application
Development of enhanced Third party Auditing Scheme for Secure Cloud Storage
Development of enhanced Third party Auditing Scheme for Secure Cloud Storage Bhanu Prakash Chamakuri*1, D. Srikar*2, Dr. M.Suresh Babu*3 M.Tech Scholar, Dept of CSE, Grandhi Varalakshmi Institute Of Technology,
PRIVACY ASSURED IMAGE STACK MANAGEMENT SERVICE IN CLOUD
PRIVACY ASSURED IMAGE STACK MANAGEMENT SERVICE IN CLOUD Ms. Shubhangi Edake 1, Prof. Sunil Rathod 2 1 PG Student, Computer Engineering, Dr.D.Y.Patil School of Engineering, Lohgaon,Pune,India 2 Assistant
Security Saving Open Examining for Secure Cloud storage
ISSN (Online): 2349-7084 GLOBAL IMPACT FACTOR 0.238 INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING IN RESEARCH TRENDS VOLUME 1, ISSUE 3, SEPTEMBER 2014, PP 131-136 Security Saving Open Examining for Secure
Data Storage Security in Cloud Computing
Data Storage Security in Cloud Computing Prashant M. Patil Asst. Professor. ASM s, Institute of Management & Computer Studies (IMCOST), Thane (w), India E_mail: [email protected] ABSTRACT
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
Sync Security and Privacy Brief
Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical
Application of Automatic Variable Password Technique in Das s Remote System Authentication Scheme Using Smart Card
Application of Automatic Variable Password Technique in Das s Remote System Authentication Scheme Using Smart Card C. Koner, Member, IACSIT, C. T. Bhunia, Sr. Member, IEEE and U. Maulik, Sr. Member, IEEE
SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS
SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS Abstract: The Single sign-on (SSO) is a new authentication mechanism that enables a legal user with a single credential
Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption
Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer
M. Nathiya 2 B.Tech. (IT), M.E. (CSE), Assistant Professor, Shivani Engineering College, Trichy, Tamilnadu, India.
ISSN: 2321-7782 (Online) Volume 2, Issue 5, May 2014 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com Robust Data
A Novel Re-Authentication Scheme on Cloud Based Storage Services T.G.V.V.Srinivas 1, P.Suresh Babu 2 1 Final M.Tech Student, 2 Associate professor
A Novel Re-Authentication Scheme on Cloud Based Storage Services T.G.V.V.Srinivas 1, P.Suresh Babu 2 1 Final M.Tech Student, 2 Associate professor 1,2 Dept of CSE, Kaushik College of engineering, JNTUK
