Proof of Retrivability: A Third Party Auditor Using Cloud Computing
|
|
|
- Cornelius Wilfrid Craig
- 10 years ago
- Views:
Transcription
1 Proof of Retrivability: A Third Party Auditor Using Cloud Computing Vijayaraghavan U 1, Madonna Arieth R 2, Geethanjali K 3 1,2 Asst. Professor, Dept of CSE, RVS College of Engineering& Technology, Pondicherry University, India. 3 Asst.Professor, Dept of EEE, RVS College of Engineering& Technology, Pondicherry University, India. Abstract- Today, there are more and more development for higher security process and benefit when using cloud computing services. Reducing cost, maintaining scale, and high availability are essential for the business to continuation for any techniques or technology.the discusses of the security and privacy data loss concerns are main aspects. This paper mainly focuses on the survey of privacy techniques that has been proposed for the data integrity like POR (Proof of Retrivability), Dynamic third Part Auditor (D-TPA), Cloud Economics etc in the cloud environment for the security. Keywords- Cloud Computing, Privacy, POR (Proof of Retrivability), and Data Security. I. INTRODUCTION Ramya Devi et.al [2] Cloud Computing is concerned with the sharing and coordinated use of diverse resources in distributed organizations cloud which is consisted of different organizes and systems. Cloud computing provides a facility that enable large-scale controlled sharing and interoperation among resources that are dispersedly owned and managed.security is consequently a major element in any cloud computing infrastructure,because it is necessary to ensure that only authorized access is permitted and secure behavior is accepted. All members in the cloud computing environment should be trusted by each other, and the members that have communication should be trusted by each other. Trust is the major concern of the consumer and provider of services that participate in a cloud computing environment. A. Service Modules of Cloud Computing Depending on the services provided by the cloud, it is divided into main three categories. B. Infrastructure as a Service (IaaS) J.Ruiter, M.Warnier et.al [5][6] IaaS is a service which provides an access to the hardware resources such as storage or computing hardware services. C. Software as a Service (SaaS) J.Ruiter, M.Warnier et.al [5][6] Saas provides a software services to the end user. Web based and Google documents are best example of this service. End user gets access to this software service but he/she cannot modify this software utility.software is configured on cloud utility not installed on end user computer. D. Platform as a Service (PaaS) J.Ruiter et.al [5] This service provides a platform or an environment on which end user can develop his own application. User is transparent about the location of the platform whether it is hosted on cloud or (not).google App engine is an example of PaaS. SAAS PAAS IAAS HARDWARE Fig: 1 Cloud Architecture II. RELATED WORKS A. Proof Identify Process and Data Integrity A. Juels, J. Burton S et.al [7] The TPA first selects fewer bits of the entire file and preprocesses the data. This fewer bits constitute metadata. This meta data is encrypted and appended to the file and sent to the cloud. Then whenever the client needs to verify the data correctness and availability it challenges the cloud through TPA and the data it got is correct, then integrity is ensured. This scheme can be extended for data updation, deletion and insertion at the client side. This involves modification of fewer bits at the client side. There are two phases. One is Setup phase and the other is verification phase. Setup phase include generation of metadata and its encryption. Verification phase includes issuing a challenge to the third party auditor. 290
2 Deployment Models of Cloud Computing: Fig.2 Shows the types of cloud deployment models. There are describing in the following section. A. Public Cloud J.Ruiter, M.Warnier et.al [5] [6] In a public cloud the computing infrastructure is used by the organization or end user through clod service providers or venders. Public cloud are typically offered through virtualization and distributed among various physical machines.[5] [6] B. Private Clod In a private clod the computer infrastructure is dedicated to the particular organization and not shared with other organization. Private cloud are secure than public cloud. C. Hybrid Cloud J.Ruiter et.al [5] This is a Combination of the other two types of a cloud.in hybrid cloud organizations may host critical application on private clouds and applications which are having less security concerns hosted on public cloud.it is also known as cloud bursting.[5] D. Community Cloud It involves sharing of computing infrastructure in between organizations of the same community. As cloud is still at its ascent stage, privacy and security get more concern: Privacy is the fundamental right of the human being. Privacy of the user data and personal information can be provided by the cryptographic function and technology. As Cloud computing is the virtual environment in which the autonomous system are connected in a network and this will create the cloud.now this cloud will serve as a services basis, so user have to registered himself to the cloud server or to the third party which provide the cloud service. So the privacy of the data and security need to be considered. B. Cloud Economics Application Functional Transmission Fig: 3 Privacy- Peer layer Communication Virtual Scalable Efficient Flexible Fig: 2 Cloud Types III. PRIVACY A. Privacy Peer layer Communication Vijayaraghavan U et.al [1] Privacy and security are the burning issues of any technology, and environment is also not an exception. 291 i. Virtual: Fig: 4Cloud Economics Physical location and underlying infrastructure details transparent to user. ii. Scalable: Able to break complex workloads into pieces to be served across an incrementally expandable infrastructure. iii. Efficient: Services Oriented Architecture for dynamic provisioning of shared computer resources.
3 iv. Flexible: It can serve a variety of work load types both consumer and commercial. C. Cloud Economics & Management i. Reduced Cost: Fig: 5 Cloud Computing Reduced Cost Cloud Computing leverage virtualization, Standardization and automation to free up operational budget for new investment. ii. Optimized Business: 1. Cost Containment. 2. Cost Model is modified as a pay-as-you-go service. 3. Transfer of cost from capital to maintenance. 4. Reduction of operating costs. D. Flexibility: Faster set-up, easier transition, remote implementation, access to latest technology. E. Availability: I. Cloud designed from the bottom up for maximum network performance. II. Greater flexibility and availability of shared information enables collaboration from anywhere in the world on the internet. F. Resiliency: No single point of failure & failure one cloud node will have minimal or no impact. IV. EXPERIMENTAL MODEL PROCESS A. Benefits and Challenges There are many advantages of cloud like reduced cost, increase storage, flexibility, scalability, maintenance, reliability, mobile accessibility etc. Fig: 6 Cloud Computing- Optimized Business Cloud Computing allowing the optimized new investments for direct business benefits. D. Potential Benefits of applying Cloud Computing for IR Scalability: A. Unconstrained capacity allows for more agile enterprises that are scalable, flexible and responsive to charge. B. Agencies however need to be aware that when transitioning from legacy systems, data migration and change management can slow down the On demand adoption of cloud computing. C. Efficiency Reallocation of IT op activities offers opportunity to focus on R&D, new solution, prototyping, decouple application from IT. B. Challenges for Cloud Computing Security and privacy, lack of standards, continuously evolving, compliance concerns, data recovery and availability, management capabilities etc. Eg: Error Identify, Error Correction and Update File. C. Dynamic Third Party Auditor Process Public Cloud are owned and operated by the third parties: Superior Economies. Infrastructure Costs. Client an attractive low-cost. Security Protections. D. Service level Agreement SLA (Violations) Qos (Quality of Services) needed to be met for cloud computing environment.qos is determined in the form of SLA (Service Level Agreement), Which is determined either by minimum throughput or maximizes response time. This can differ from system to system for our studies, we consider SLA violation as shown in fig (7) 292
4 V. EXPERIMENTAL CHART Series 1 Series 2 Series 3 Fig: 7 Service Level Agreement-SLA (Violations) E. Third Party Auditor-TPA Cong Wang et.al [4] suggests in order saving the time, computation resources, and even the related online burden of users, we also provide the extension of the proposed main scheme to support third-party auditing, where users can safely delegate the integrity checking tasks to thirdparty auditors (TPA) and are worry-free to use the cloud storage services. Fig: 9 Service level Agreement Process Series 3 5 Series 2 0 Series 1 Fig: 10 Service level Agreement Propose Process SLA= (Error identify)- (Error Correction) Fig: 8 Error Recovery Cloud Computing Process. (Update File) 293
5 Acknowledgements I wish to express my warmest, sincerest thanks and deepest gratitude to my Research advisor, Prof.Dr.R.KANTHAVEL,M.E.,Ph.D., Department of Electronics and Communication Engineering, Velammal Engineering College, Chennai., for her impeccable guidance, numerous opportunities and valuable suggestion for my research work. I would like to thank Assit.Professor Dr.A.RAJARAM,M.E.,Ph.D., Department of Electronics and Communication Engineering, Karphagam College of Engineering, Coimbatore., for his valuable suggestions in my scientific endeavors. I would like to thank my Prof.Dr.V.Arumugham, M.Tech., Ph.D., Principal, RVS College of Engineering and Technology, Karaikal. VI. CONCLUSION AND FUTURE WORK Privacy and security are the burning issues of any technology. As cloud is mainly used for the storage of data, data integrity, error correction is the main issue of the client.after uploading data to the server; client will lost the control of the data. So at the time, data can be modified or updated or sometimes (Error File) deleted by the unauthorized access or server (Cloud).According that TPA techniques are very useful for the integrity checking.tpa supports fully dynamic operation so it is possible to verify data in case of modification or deletion.this techniques can be manipulated to reduce the security overhead of the client as well as to minimize the computational of the storage server. New techniques can be invented to minimize the size of the proof of data integrity as well as to reduce the network bandwidth consumption. REFERENCES [1] Vijayaraghavan U, Madonna Arieth, R and R.Anand Babu A Survey of the Research on Future an Error Identify and Error Correction International Journal of Advanced Information Science and Technology (IJAIST) Vol.12.No.12, ISSN: [2] Ramya Devi M,Balamurugan P.S and Thanushkodi K The Trusted Computing exemplary with Astonishing security for cloud computing :IJCSNS,Vol.11.No.1 January [3] Riddhi.K.Pandy and Kamal K,Sutaria An Analysis of privacy Techniques for Data integrity in the cloud computing Vloume - 4 Number,ppt, ,ISSN 0975,4202(IJCEE)2012. [4] Cong Wang,Qian Wang,Kui REn,Ning Caw and Wenjing Toward Security and Dependable storage service in cloud computing IEEE (2012). [5] J.Ruiter and M.Warnier,Privacy regulation for cloud computing,compliance and implementation in theory and Pratice,article. [6] P.Metri and G.Sarote Privacy Issues and Challenges in cloud computing,international Journal of Advanced Engineering Science and Technology,5,Issue No.1, [7] A. Juels and J. Burton S. Kaliski, PORs: Proofs of Retrievability for Large Files, Proc. of CCS 07, pp , AUTHOR S PROFILE Mr.U.Vijayaraghavan received the B.Tech degree in information &Technology from the Lord Venkateshwarra Engineering College, Kanchipuram (Anna University Chennai), Tamil nadu, South India. He earned M.E (Computer Science &Engineering) in Academic Campus Anna University, Coimbatore, India. He is a member of IAENG. He delivered his papers in three national conferences and in one international conference. He delivered his paper in IJAIST. He was worked as Lecturer in Dept of Information Technology, Lord Venkateshwaraa Engineering College Kanchipuram. Currently he is working as an Assistant Professor in the Department of Computer Science and Engineering, RVS College of Engineering & Technology, karaikal, Puducherry, India. His Research area of interest is Cloud Computing, Grid Computing and Optical Networks. Mrs.R.Madonna Arieth received the M.Sc degree in Information & Technology from Bhrathidasan University,.She earned M.Tech (Computer Science & Engineering) in Prist University, Thanjavur, India. She is working as Asst.Professor in RVS College of Engineering &Technology, Karaikal, Puducherry, India. Her area of research area of interest Cloud Computing and Computer networks. She delivered her papers in four national conferences. She delivered her paper in IJAIST. K. Geethanjali received M.Sc. Electronics Science from Bhrathidasan University. She Obtained M.Tech (Appiled Electronics) degree in Prist University, Thanjavur, India. She is working as a Asst.Professor in RVS College of Engineering &Technology, Karaikal, Puducherry, India.
Data Integrity by Aes Algorithm ISSN 2319-9725
Data Integrity by Aes Algorithm ISSN 2319-9725 Alpha Vijayan Nidhiya Krishna Sreelakshmi T N Jyotsna Shukla Abstract: In the cloud computing, data is moved to a remotely located cloud server. Cloud will
SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD
Volume 1, Issue 7, PP:, JAN JUL 2015. SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD B ANNAPURNA 1*, G RAVI 2*, 1. II-M.Tech Student, MRCET 2. Assoc. Prof, Dept.
N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT
N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 1 M.Tech Student, Department of Computer Science and Engineering, S.R.M. University Chennai 2 Asst.Professor,
ISSN 2278-3091. Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability
Outsourcing and Discovering Storage Inconsistencies in Cloud Through TPA Sumathi Karanam 1, GL Varaprasad 2 Student, Department of CSE, QIS College of Engineering and Technology, Ongole, AndhraPradesh,India
Secure Data transfer in Cloud Storage Systems using Dynamic Tokens.
Secure Data transfer in Cloud Storage Systems using Dynamic Tokens. P.Srinivas *,K. Rajesh Kumar # M.Tech Student (CSE), Assoc. Professor *Department of Computer Science (CSE), Swarnandhra College of Engineering
ADVANCE SECURITY TO CLOUD DATA STORAGE
Journal homepage: www.mjret.in ADVANCE SECURITY TO CLOUD DATA STORAGE ISSN:2348-6953 Yogesh Bhapkar, Mitali Patil, Kishor Kale,Rakesh Gaikwad ISB&M, SOT, Pune, India Abstract: Cloud Computing is the next
How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System
REVIEW ARTICAL A Novel Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage Dumala Harisha 1, V.Gouthami 2 1 Student, Computer Science & Engineering-Department, JNTU Hyderabad India
Improving data integrity on cloud storage services
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services
Verifying Correctness of Trusted data in Clouds
Volume-3, Issue-6, December-2013, ISSN No.: 2250-0758 International Journal of Engineering and Management Research Available at: www.ijemr.net Page Number: 21-25 Verifying Correctness of Trusted data in
A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA
A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA Mr.Mahesh S.Giri Department of Computer Science & Engineering Technocrats Institute of Technology Bhopal, India
Near Sheltered and Loyal storage Space Navigating in Cloud
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 8 (August. 2013), V2 PP 01-05 Near Sheltered and Loyal storage Space Navigating in Cloud N.Venkata Krishna, M.Venkata
IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD
IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD 1 Ms.Nita R. Mhaske, 2 Prof. S.M.Rokade 1 student, Master of Engineering, Dept. of Computer Engineering Sir Visvesvaraya
Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption
Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer
CONSIDERATION OF DYNAMIC STORAGE ATTRIBUTES IN CLOUD
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE CONSIDERATION OF DYNAMIC STORAGE ATTRIBUTES IN CLOUD Ravi Sativada 1, M.Prabhakar Rao 2 1 M.Tech Student, Dept of CSE, Chilkur Balaji
15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM
RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM Dhanashri Bamane Vinayak Pottigar Subhash Pingale Department of Computer Science and Engineering SKN
Cloud Data Storage Services Considering Public Audit for Security
Global Journal of Computer Science and Technology Cloud and Distributed Volume 13 Issue 1 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
Identifying Data Integrity in the Cloud Storage
www.ijcsi.org 403 Identifying Data Integrity in the Cloud Storage Saranya Eswaran 1 and Dr.Sunitha Abburu 2 1 Adhiyamaan College of Engineering, Department of Computer Application, Hosur. 2 Professor and
PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE
PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE Abstract: Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department
Secrecy Maintaining Public Inspecting For Secure Cloud Storage
Secrecy Maintaining Public Inspecting For Secure Cloud Storage K.Sangamithra 1, S.Tamilselvan 2 M.E, M.P.Nachimuthu.M.Jaganathan Engineering College, Tamilnadu, India 1 Asst. Professor, M.P.Nachimuthu.M.Jaganathan
An Efficient Data Correctness Approach over Cloud Architectures
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 8, Issue 12 (October 2013), PP. 33-37 An Efficient Data Correctness Approach over
Cryptographic Data Security over Cloud
Cryptographic Data Security over Cloud Er. Lalit Gehlod Asst.Professor, Dept.Of Computer Engineering, Institute Of Engineering & Technology, Devi Ahilya University, Indore, India. Govind Patidar Dept.
Secure Way of Storing Data in Cloud Using Third Party Auditor
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 4 (Jul. - Aug. 2013), PP 69-74 Secure Way of Storing Data in Cloud Using Third Party Auditor 1 Miss.
Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm
Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm Twinkle Graf.F 1, Mrs.Prema.P 2 1 (M.E- CSE, Dhanalakshmi College of Engineering, Chennai, India) 2 (Asst. Professor
Surveying Cloud Storage Correctness using TPA with BLS
Surveying Cloud Storage Correctness using TPA with BLS Priyanka Dehariya 1, Prof. Shweta Shrivastava 2, Dr. Vineet Richaraya 3 1 M.Tech Scholar (CSE), LNCT, Bhopal 2 Asst.Professors, (CSE Department),
SHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING
SHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING Er. Kavin M 1, Mr.J.Jayavel 2 1 PG Scholar, 2 Teaching Assistant, Department of Information Technology, Anna University Regional
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) PERCEIVING AND RECOVERING DEGRADED DATA ON SECURE CLOUD
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4,
A Survey on Data Integrity of Cloud Storage in Cloud Computing
A Survey on Data Integrity of Cloud Storage in Cloud Computing A B S T R A C T Mr.Vitthal Raut, Prof. Suhasini Itkar Department Computer Engineering, PES Modern College of Engineering, Pune, India. [email protected],
CHALLENGES AND ISSUES OF DEPLOYMENT ON CLOUD
CHALLENGES AND ISSUES OF DEPLOYMENT ON CLOUD S. Vimal Don Bosco 1, Dr. N Prabakaran 2 Research Scholar, Department of Computer Applications, St.Peter s University, Avadi, Chennai 600 054, India 1 Associate
Keywords: Cloud computing, Characteristics of Cloud computing, Models of Cloud computing, Distance learning, Higher education.
Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Analysis of Cloud
A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining
A Study of Infrastructure Clouds
A Study of Infrastructure Clouds Pothamsetty Nagaraju 1, K.R.R.M.Rao 2 1 Pursuing M.Tech(CSE), Nalanda Institute of Engineering & Technology,Siddharth Nagar, Sattenapalli, Guntur., Affiliated to JNTUK,
Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage
Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage P. Selvigrija, Assistant Professor, Department of Computer Science & Engineering, Christ College
Secure Privacy Preserving Public Auditing for Cloud storage
Secure Privacy Preserving Public Auditing for Cloud storage Sathiskumar R 1, Dr.Jeberson Retnaraj 2 Department of Information Technology, Sathyabama University, Chennai, India 1 Department of Information
International Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 12, December 2014 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
OVERVIEW OF SECURITY ISSUES IN CLOUD COMPUTING
OVERVIEW OF SECURITY ISSUES IN CLOUD COMPUTING K. Arumugam 1, P. Sumathi 2 1 Research Scholar/Department Of Computer Science, Government Arts College, Coimbatore (India) 2 Assistant Professor/Department
DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION
DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION Prof. M. Ben Swarup Professor, Department of CSE Vignan's Institute of Information Technology Visakhapatnam-49, India Chukkala
A Secure and Dependable Cloud Storage Service in Cloud Computing
A Secure and Dependable Cloud Storage Service in Cloud Computing Yalla Ram Charan MTech Student Department of CSE Sri Venkateswra College of Engineering & Technology Abstract: Cloud storage is a model
SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING
SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING Saranya.V 1, Suganthi.J 2, R.G. Suresh Kumar 3 1,2 Master of Technology, Department of Computer Science and Engineering, Rajiv Gandhi College of Engineering
Performance Gathering and Implementing Portability on Cloud Storage Data
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 17 (2014), pp. 1815-1823 International Research Publications House http://www. irphouse.com Performance Gathering
Cloud Computing Service Models, Types of Clouds and their Architectures, Challenges.
Cloud Computing Service Models, Types of Clouds and their Architectures, Challenges. B.Kezia Rani 1, Dr.B.Padmaja Rani 2, Dr.A.Vinaya Babu 3 1 Research Scholar,Dept of Computer Science, JNTU, Hyderabad,Telangana
Secure Distribution of File on Cloud
Secure Distribution of File on Cloud Niyamat I. Ujloomwale, Ranjana Badre Dept. of Computer, MIT Academy of Engineering, Alandi, Savitri Phule Pune University, Pune, India Dept. of Computer, MIT Academy
Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing.
Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Privacy - Preserving
Data Storage Security in Cloud Computing
Data Storage Security in Cloud Computing Manoj Kokane 1, Premkumar Jain 2, Poonam Sarangdhar 3 1, 2, 3 Government College of Engineering and Research, Awasari, Pune, India Abstract: Cloud computing is
Making Leaders Successful Every Day
Making Leaders Successful Every Day Why & How Enterprises Are Adopting the Cloud James Staten, VP, Principal Analyst The bottom line 1. Public cloud adoption is driven by the business, not IT Empowered
Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication
Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication Sanjay Kumar Baghel Mtech Scholar, CSE, CSIT DURG [email protected] Bhupesh Kumar Dewangan Assistant Professor,CSE,
Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System
Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System 1 K.Valli Madhavi A.P [email protected] Mobile: 9866034900 2 R.Tamilkodi A.P [email protected] Mobile:
Development of enhanced Third party Auditing Scheme for Secure Cloud Storage
Development of enhanced Third party Auditing Scheme for Secure Cloud Storage Bhanu Prakash Chamakuri*1, D. Srikar*2, Dr. M.Suresh Babu*3 M.Tech Scholar, Dept of CSE, Grandhi Varalakshmi Institute Of Technology,
PRIVACY ASSURED IMAGE STACK MANAGEMENT SERVICE IN CLOUD
PRIVACY ASSURED IMAGE STACK MANAGEMENT SERVICE IN CLOUD Ms. Shubhangi Edake 1, Prof. Sunil Rathod 2 1 PG Student, Computer Engineering, Dr.D.Y.Patil School of Engineering, Lohgaon,Pune,India 2 Assistant
CHAPTER 8 CLOUD COMPUTING
CHAPTER 8 CLOUD COMPUTING SE 458 SERVICE ORIENTED ARCHITECTURE Assist. Prof. Dr. Volkan TUNALI Faculty of Engineering and Natural Sciences / Maltepe University Topics 2 Cloud Computing Essential Characteristics
SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD
SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD S.REVATHI B.HASEENA M.NOORUL IZZATH PG Student PG Student PG Student II- ME CSE II- ME CSE II- ME CSE Al-Ameen Engineering
preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.
Privacy-Preserving Public Auditing For Secure Cloud Storage ABSTRACT: Using cloud storage, users can remotely store their data and enjoy the on-demand high-quality applications and services from a shared
A Survey and a Data Integrity Proofs In Cloud Storage
IJCSNS International Journal of Computer Science and Network Security, VOL.15 No.11, November 2015 39 A Survey and a Data Integrity Proofs In Cloud Storage V.Kiruthika B.R.Laxmi Sree School Of IT & Science
A Review of Cloud Environment and Recognition of Highly Secure Public Data Verification Architecture using Secure Public Verifier Auditor
I J C International Journal of lectrical, lectronics ISSN No. (Online): 2277-2626 and Computer ngineering 3(2): 144-148(2014) A Review of Cloud nvironment and Recognition of Highly Secure Public Data Verification
Cloud Server Storage Security Using TPA
Cloud Server Storage Security Using TPA I K.Meenakshi, II Victo Sudha George I Student (M.Tech), DR. MGR Educational and Research Institute, India II Assisstant Professo, DR. MGR Educational and Research
Data Integrity and Dynamic Storage Way in Cloud Computing
1 Data Integrity and Dynamic Storage Way in Cloud Computing Dinesh.C, P.G Scholar, Computer Science and Engineering, Mailam Engineering College, Mailam, Tamilnadu. Abstract It is not an easy task to securely
A Comprehensive Data Forwarding Technique under Cloud with Dynamic Notification
Research Journal of Applied Sciences, Engineering and Technology 7(14): 2946-2953, 2014 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2014 Submitted: July 7, 2013 Accepted: August
Cloud Database Storage Model by Using Key-as-a-Service (KaaS)
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 7 July 2015, Page No. 13284-13288 Cloud Database Storage Model by Using Key-as-a-Service (KaaS) J.Sivaiah
RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES
RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES 1 MD ISMAIL Z, 2 ASHFAQUE AHAMED K. 1 PG Scholar,Department of Computer Science, C.Abdul Hakeem College Of Arts and Science,Melvisharam.
IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD ENVIRONMENT
IJRRECS/November 2014/Volume-2/Issue-11/3699-3703 ISSN 2321-5461 INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD
Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud
Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud M.Jayanthi, Assistant Professor, Hod of MCA.E mail: [email protected] MahatmaGandhi University,Nalgonda, INDIA. B.Ranganatha
Analysis of Secure Cloud Data Sharing Within a Group
Analysis of Secure Cloud Data Sharing Within a Group Ms. uri Pande* Department of CSE, GHRAET Nagpur (M.S), India, Prof. Vikrant Chole Dept of Computer Science & Engg Nagpur (M.S.), India Abstract In this
Exploring Resource Provisioning Cost Models in Cloud Computing
Exploring Resource Provisioning Cost Models in Cloud Computing P.Aradhya #1, K.Shivaranjani *2 #1 M.Tech, CSE, SR Engineering College, Warangal, Andhra Pradesh, India # Assistant Professor, Department
Data Integrity for Secure Dynamic Cloud Storage System Using TPA
International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 7-12 International Research Publication House http://www.irphouse.com Data Integrity for Secure
INCREASING THE CLOUD PERFORMANCE WITH LOCAL AUTHENTICATION
INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 INCREASING THE CLOUD PERFORMANCE WITH LOCAL AUTHENTICATION Sanjay Razdan Department of Computer Science and Eng. Mewar
AN EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA IN TEGRITY IN CLOUDS
AN EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA IN TEGRITY IN CLOUDS Mrs.K.Saranya, M.E.,(CSE), Jay Shriram Group of Institutions, Tirupur. [email protected] Dr.S.Rajalakshmi, Associate Professor/CSE,
A Survey on Secure Storage Services in Cloud Computing
Global Journal of Computer Science and Technology Cloud & Distributed Volume 12 Issue 12 Version 1.0 Year 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment
Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment Deepa Noorandevarmath 1, Rameshkumar H.K 2, C M Parameshwarappa 3 1 PG Student, Dept of CS&E, STJIT, Ranebennur. Karnataka, India
Privacy preserving technique to secure cloud
Vitthal S. Gutte Pune University, MIT College of engineering, Kothrud, Pune 411038, India [email protected] Privacy preserving technique to secure cloud Prof. Priya Deshpande Pune University,
International Journal of Advanced Research in Computer Science and Software Engineering
Volume 3, Issue 2, February 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Review on
Remote Data Integrity Checking in Cloud Computing
ISSN 2321 8169 Remote Data Integrity Checking in Cloud Computing Khaba M.V (Assistant Professor/CSE) RVS School of Engineering,dindigul [email protected] M.Santhanalakshmi(Assistant Professor/CSE) RVS
Index Terms: Data integrity, dependable distributed storage, Cloud Computing
Volume 5, Issue 5, May 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Cloud Data Protection
Resource Allocation Based On Agreement with Data Security in Cloud Computing
International Journal of Emerging Science and Engineering (IJESE) Resource Allocation Based On Agreement with Data Security in Cloud Computing Aparna D. Deshmukh, Archana Nikose Abstract- Cloud computing
A Novel Re-Authentication Scheme on Cloud Based Storage Services T.G.V.V.Srinivas 1, P.Suresh Babu 2 1 Final M.Tech Student, 2 Associate professor
A Novel Re-Authentication Scheme on Cloud Based Storage Services T.G.V.V.Srinivas 1, P.Suresh Babu 2 1 Final M.Tech Student, 2 Associate professor 1,2 Dept of CSE, Kaushik College of engineering, JNTUK
A Quality Model for E-Learning as a Service in Cloud Computing Framework
A Quality Model for E-Learning as a Service in Cloud Computing Framework Dr Rajni Jindal Professor, Department of IT Indira Gandhi Institute of Technology, New Delhi, INDIA [email protected] Alka Singhal
VIRTUALIZATION IN CLOUD COMPUTING
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 5, May 2014, pg.540
February. ISSN: 2321-8134
IJFEAT INTERNATIONAL JOURNAL FOR ENGINEERING APPLICATIONS AND TECHNOLOGY TITLE: DATA PLACE & MANAGE SECURITY IN CLOUD COMPUTING FOR EFFECTIVE AND FLEXIBLE DISTRIBUTED SYSTEM 1 Mr. Pritam S. Bhoyar, 2 Mr.
How To Ensure Correctness Of Data In The Cloud
A MECHANICS FOR ASSURING DATA STORAGE SECURITY IN CLOUD COMPUTING 1, 2 Pratibha Gangwar, 3 Mamta Gadoria 1 M. Tech. Scholar, Jayoti Vidyapeeth Women s University, Jaipur, [email protected] 2 M. Tech.
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING T.Vidhya Sree M.Phil Research Scholar,CS, MGR College, Hosur (India) ABSTRACT Cloud Computing is the long dreamed vision
EFFICIENT DISCOVERY OF INTEGRITY AUTOMATION IN HYBRID CLOUD COMPUTING
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE EFFICIENT DISCOVERY OF INTEGRITY AUTOMATION IN HYBRID CLOUD COMPUTING K.Saipriya 1, A.Ravi Kumar 2 1 M.Tech Student, Dept of
A Survey on Cloud Computing
A Survey on Cloud Computing Poulami dalapati* Department of Computer Science Birla Institute of Technology, Mesra Ranchi, India [email protected] G. Sahoo Department of Information Technology Birla
How To Design A Cloud Data Storage Service For A Cloud Computer System
Ensuring Security Services for Data Storing and Data Sharing in Cloud Computing D. Raman 1, Bojja Vamshikrishna 2 1 Associate Professor Department of Computer Science and Engineering, Vardhaman College
International Journal of Advanced Research in Computer Science and Software Engineering
Volume 3, Issue 3, March 3 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Using Third Party
A Comparative Study of cloud and mcloud Computing
A Comparative Study of cloud and mcloud Computing Ms.S.Gowri* Ms.S.Latha* Ms.A.Nirmala Devi* * Department of Computer Science, K.S.Rangasamy College of Arts and Science, Tiruchengode. [email protected]
Authorized Auditing of Big Data Stored on Cloud with Auditability Aware Data Scheduling
Authorized Auditing of Big Data Stored on Cloud with Auditability Aware Data Scheduling Surapriya Swain 1, Prof. Saurabh Gupta 2 1 Department of Computer Engineering, GSMCOE, Balewadi, Savitribai Phule
DELEGATING LOG MANAGEMENT TO THE CLOUD USING SECURE LOGGING
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IJCSMC, Vol. 3, Issue.
Implementation of Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage
Implementation of Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage 1 A. MsVaishali Patil, 2 B. Prof. Archana Lomte Dept of Computer,BSIOTR, Pune ABSTRACT Cloud computing is speculated
A Review: Data Security Approach in Cloud computing by using RSA Algorithm
ISSN: 2321-7782 (Online) Volume 1, Issue 7, December 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com A Review:
Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication
Volume 4, Issue 6, June 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Three Layered
