SURVEY ON PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE

Size: px
Start display at page:

Download "SURVEY ON PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE"

Transcription

1 RESEARCH PAPER PAPER ID: 2015/MH/IJCITE/V2-E3-01 PAGE NO: ISSN (Online): SURVEY ON PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE *Rahul Mahajan, M.Tech Scholar, Department of Computer Science & Engineering Patel Institute of Engineering and Science Bhopal, India **Dipak Rathore Assistant Professor Department of Computer Science & Engineering Patel Institute of Engineering and Science Bhopal, India Abstract: Cloud storage can be useful for users to store their data remotely and access the on-demand applications and services from shared pool of configurable computational resources, therefore no need of local data storage and maintenance. However there is situation in this that the user does not have the physical possession of the outsourced data therefore the data integrity protection and data consistency protection is very important task, especially for the users who possess limited number of computing resources. Moreover the cloud users must be able to use the cloud storage just like the local storage, without worrying about to the need to verify the data integrity and data consistency. To achieve this public auditability for cloud storage can be useful. Users can rely on the third party auditor (TPA) on the behalf of cloud user so that the cloud user is worry free. By introducing TPA the care should be taken so that new vulnerabilities towards data privacy should not be added and also no additional online communication burden to cloud user. In this paper we proposed a privacy preserving third party auditing for securing users data on cloud storage. We further enhance our system to enable the TPA to perform multiple auditing tasks simultaneously and effectively. Index Terms Homomorphic Linear Authenticator; Public Auditing; Data Dynamics; Cloud Computing; Clustered TPA I. INTRODUCTION Cloud computing has been critical importance in the new era of information technology. It enables the users to store their data on the remote cloud storage space which is available on the cloud server. By storing data on the cloud server user has no need to maintain the local copy of such data thus saving the resources of user also user is free to access its data anytime anywhere on-demand. When data stored on the cloud storage it is critical importance for cloud service provider (CSP) to provide user the environment like the users data stored on the local storage. Though user s data stored on the cloud storage it must appear as it is local to user. User must able to do all the operations on the data which can be performed on it when it is local without affecting the users experience for accessing, updating and retrieving the data. To ensure user for integrity, consistency and privacy of user s remote data there must be some provision to verify data integrity, data consistency and correctness. The traditional approach to achieve this is to retrieve complete data from cloud storage to the local storage and verify it. This method is tedious and inefficient and it has to use higher communication and computational overhead on network. In case of dynamic data this method is of highly impractical. One solution for this is to perform auditing task by third party auditor (TPA). TPA can perform the auditing on behalf of user and provide audit report to the user. This technique is also useful for cloud service provider (CSP) to maintain its reputation by getting higher reliability, consistency and data integrity ratings or certificates from TPA, So as to improve their business on commercial point of view. But this approach does not consider the data privacy protection of the user s data on the cloud storage. TPA can leak user s data intentionally for achieving profit from selling the users private data. II. LITERATURE SURVEY The public auditability, i.e. provable data possession (PDP) is a model that ensures possession of data files on un-trusted cloud storages. The scheme utilizes the RSA based homomorphic non-linear authenticators for auditing outsourced cloud data and it will randomly samples some 11

2 blocks of the file. However, in this public auditing process linear combination of sampled file blocks are exposed to third party auditor. That s why, this protocol is not privacy preserving, and can leak users data to third party auditor. Ateniese et al. [4] describes a proof of retrievability (PoR) based model, in which spot-checking mechanism and error-correcting codes are used to make sure that both possession and retrievability of cloud data files on remote cloud server. But in this approach the number of audit challenges which the TPA can made are fixed priori and their main scheme does not support public auditing. They also described the Merkle-tree construction approach for public PoRs, but it cannot work with simple non encrypted data. Jachak et al. [7] designed a scheme with an improved PoR with full proofs of security as in the security model defined which is described in [11]. Cong Wang et al. [16] studied on different types of PoR with private auditability. Same as the construction described in [8], they use homomorphic non-linear authenticators that are constructed from provably secured BLS signature. Based on BLS signatures, a portable and public auditing scheme is developed. Also, this approach would not support privacy preserving public auditing for the same reason as in the [8]. This scheme first encrypt the user s data file and then sends number of pre-defined symmetric key hashes for the encrypted data to auditor. The auditor verifies consistency and integrity of the cloud data files and matches with the server s previously computed decryption keys. The above can scheme only works for encrypted files and it has a disadvantage that the auditors state fullness as well as bounded usage, which may bring unnecessary online impasse to users when that hash keys are used up. The dynamic version of the prior PDP scheme is with the use of symmetric key cryptography but by using limited number of audits. Wang et al. [2] proposed to combine the BLS based homomorphic linear authenticator with Merkle Hash Tree for supporting both public auditability and to support full data dynamics. However, the verification used for these two protocols needs the linear combination of sampling blocks just like in [8], [13], and therefore cannot provide privacy preserving auditability, Another approach for this is a privacypreserving public audit scheme [16] for cloud data security in cloud computing. By using this approach homomorphic linear authenticator with random masking technique is used to make sure that the TPA [1] would not get any knowledge about the data stored on the cloud server during the cloud data auditing process. It reduces the users dilemma about expensive auditing process and outsourced data leakage. All the above schemes provide methods are able to provide efficient auditing and assure the correctness of remotely stored cloud users data stored on cloud, no scheme will meet all the necessities for privacy preserving public auditing for cloud based system. An important point for consideration is that, no scheme focuses on batch auditing, which can to a great extent decrease the computational cost on the TPA when deal with a large number of audit. A. MAC Based Solution It is used for authenticating user s data. This scheme can be used with message authentication code (MAC). User has to upload all the data blocks and its associated MAC s to cloud server and provides the secret key SK to TPA. Then TPA has to regain data blocks and its allied MAC arbitrarily and uses SK for validating exactness of stored information on the cloud. Problems with this system are listed below as it introduces additional online burden to users due to limited use (i.e. Bounded usage) and stateful verification. Communication & computation complexity TPA requires knowledge of data blocks for verification Limitation on data files to be audited as secret keys are fixed After usages of all possible secret keys, the user has to download all the data to recomputed MAC & republish it on CS. TPA should maintain & update states for TPA which is very difficult. It supports only for static data not for dynamic data. B. HLA Based Solution It is the Homomorphic linear authenticator (HLA). It supports efficient public auditing without need of retrieving data block. It can be aggregated and required constant bandwidth. It is possible to compute an aggregate HLA which is used to authenticate the linear arrangement of the single information block. HLAs are used extensively for authenticating number of data blocks at a time in this approach each and every block has its own secret key which can be used for checking the correctness of individual data blocks as well as the aggregated keys can be used for checking overall data. 12

3 Using Virtual Machine Figure 1: Cloud Server Architecture Abhishek Mohta proposed Virtual machines which uses RSA algorithm, for client data/file encryption and decryptions [5]. It also uses SHA 512 algorithm which makes message digest and check the data integrity. The Digital signature is used as an identity measure for client or data owner. It solves the problem of integrity, unauthorized access, privacy and consistency C. Non Linear Authentication Shrinivas suggested Homomorphic non linear authenticator with random masking techniques to achieve cloud security [7]. K. Gonvinda proposed digital signature method to protect the privacy and integrity of data [8]. It uses RSA algorithm for encryption and decryption which follows the process of digital signatures for message authentication. D. Using EAP S.Marium proposed the scheme in which the Extensible authentication protocol (EAP) with three ways hand shakings with RSA algorithm. They use APCC [9] protocol for authentication. APCC protocol is simple, efficient and trivial as compared to secure socket layer (SSL) authentication protocol. In this scheme they used, Challenge handshake authentication protocol (CHAP) to authenticate. The steps are as follows When Client request for any service to cloud service provider, SPA send a CHAP request / challenge to the client. The Client sends CHAP response/ challenges which is calculated by using a hash function to SPA SPA checks the challenge value with its own calculated value. If they are matched then SPA sends CHAP success message to the client. Implementation of this EAP-CHAP in cloud computing provides authentication of the client. Using this approach the extensible authentication protocol provides simple and efficient approach as in the APCC protocol It provides security against spoofing identity theft, data tempering threat and DoS attack. The data is being transferred between client and cloud providers. To provide security, asymmetric key encryption (RSA) algorithm is used. B. Dhiyanesh proposed the scheme based on MAC and signature for recognize data auditability and during audit user has to provide a secret key to cloud server and ask for a MAC key for verification [11]. E.Using Automated Protocol Blocker Figure 2:Automatic Protocol Blocker Balkrishna proposed another approach for error correction in this data storage correctness is checked [09]. Kiran Kumar proposed automated protocol blocker method. [08]. If the unauthorized user tries to access cloud users data, a small software application executes and verifies users inputs, It checks if the users input matches or not, if it matched then user is allowed for accessing data else user is blocked automatically. Protocol Verifier is used by CS. It contains three phases as Setup, Audit and PBlock. F. Random Masking Technique Jachak K. B. proposed privacy preserving Third party auditing without data encryption. In this a linear combination of sampled block for server s reply is masked by randomly generated with the help of a pseudo random function (PRF) [07]. 13

4 Homomorphic Authenticator Figure 4: The architecture of Cloud data service Figure 3: Homomorphic Authenticator Researchers of [05] use the concept of virtual machines, The RSA algorithm is used to encode and decode the data and SHA 512 algorithm is used for message digest which check the integrity of information Dr. P.K. Deshmukh uses the new password at each instance which will be transferred to the mail server for each request to obtain data security and data integrity of cloud computing [06]. This protocol is secure against an untrusted server as well as third party auditor. Client as well as trusted third party verifier should be able to detect the changes done by the third party auditor. The client data should be kept private against third party verifier. This protocol does not leak any information to the third party verifier to obtain data security. This proposed protocol is secure against the untrusted server and private against third party verifier and support data dynamics. In this system, the password is generated and that will be transferred to address of the client. Every time a key is used to perform various operations such as insert, update delete on cloud data. It uses time based UUID algorithm for key generation based on pseudo random numbers. If an intruder tries to access the users data on a cloud, that IP address will be caught and transferred to the user. III. PROBLEM DEFINITION A. System and Threat Model Consider a cloud data storage system which has three entities, as illustrated in Fig. the cloud user (U), who stores large quantity of data files online to the cloud server; the cloud server which is maintained by CSP and is liable to provide different services to cloud users such as storage space on cloud and various computational resources, the third party auditor (TPA), are the expert and are able to verify the reliability and integrity of users cloud data on behalf of the user whenever requested. Users can also able to interact to CS dynamically for accessing and updating their stored cloud data. For reducing the online data usage cloud users may rely on the TPA for verification of integrity and correctness of their data, while assuming its data to be private from TPA. The data integrity threats may be internal or external, which may be: hardware problems, network problems, hackers, malicious or accidental errors, etc. Also there are chances that, CS for maintaining reputation in business world can hide data loss or damage incidents from users. Considering that TPA is reliable and trustworthy. But the system fails if TPA learns the users data after the audit. Note that in our project, beyond users reluctance to leak data to TPA; it is also assumed that cloud servers have no incentives to reveal their hosted data to external parties. On the one hand, there are regulations, e.g., HIPAA [2], requesting CS to maintain users data privacy. On the other hand, as users data belong to their business asset [3], there also exist financial incentives for CS to protect it from any external parties. Therefore neither CS nor TPA has motivations to collide with each other during the auditing process. IV. DESIGN GOALS To make use of privacy-preserving open auditing for cloud data storage under the abovementioned model,our protocol should have the following reliability, security and performance guarantee. Public auditability: Allowing TPA to audit cloud data whenever demanded but without accessing a cloud data copy. Should not introduce additional burden of online access to cloud users. Storage correctness: Design should ensure that cloud server should not bypass TPA s audit process and should maintain users data integrated. 14

5 Privacy-preserving: It has to ensure that from the information collected during audit, TPA should not be able to derive users data content. Lightweight: While audit process by TPA, the cost of communication and computation should be less. A. Definitions and Framework Our auditing design consist of four algorithms namely (KeyGen, SigGen, GenProof, VerifyProof). KeyGen is an algorithm which is run by cloud user for scheme setup. To generate verification metadata the siggen algorithm is used. Cloud server runs the GenProof for generating a verification of data storage exactness, and finally TPA runs the Verify Proof for auditing the proof from the cloud server. Public audit system consists of two phases, which are Setup and Audit: 1) Setup: By using KeyGen the initialization of the public and secret parameters is done by user of the system, and also data file F is preprocessed using SigGen for generating the verification metadata. After this user has to store the data file F and metadata for verification on cloud, and local copy has to be deleted. Pre-processing may include the altering F by expansion or any other operation such as storing of additional metadata on server. 2) Audit: To challenge the cloud server provider for correctness of users data TPA has to make challenge for verification of data file by audit. The CSP then gives response message by execution of GenProof on data file F and its associated verification metadata. By using the VerifyProof protocol the TPA verifies the reply or response from CSP. We consider that the TPA is stateless, i.e., it should not maintain different states between auditing process, which is a crucial property for public audit system [13]. B. Privacy Preserving Public Auditing Scheme Overview: To achieve privacy-preserving scheme for public auditing, we are using the approach of integrating the homomorphic linear authenticator and random masking. In this scheme, the sampled blocks are masked randomly by the server. Because of random masking the TPA does not have the necessary information for getting the linear equations. And hence TPA is unable to derive users private data. We use the HLA based on the short signature based method derived by Boneh, Lynn and Shacham (BLS signature) [17]. Scheme Details: Let s consider that G1, G2 and GT are the multiplicative cyclic groups having p as the prime order, such that e : G1 G 2 GT be a bilinear map. Let g be a generator of G2 and there is secure map-to-point hash function H( ): {0, 1}* G1, this function maps the strings in uniform way to G1. There is one more hash function h( ) : GT Zp for mapping group elements GT in uniform way to Zp. The detailed scheme is as follows: a) Setup phase: KeyGen has to be run by the user for generating public and secret parameters. User has to choose an arbitrary signing key pair (SPK, SSK), an arbitrary x from Zp as (x Zp), an arbitrary element u from G1 as (u G1), and the v is computed as v gx. The secret parameter sk can be calculated as sk = (x, ssk) and the public parameters pk can be calculated like pk = (spk, v, g, u, e(u, v)). Consider that users data file F consist of number of elements as (m 1,..., m n ), the user computes the authenticator for every block mi: αi (H(Wi. umi)xєg1) for i. Here Wi can be defined as name i. Here the user has to choose name uniformly at random from values of Zp, and it serves as the identifier for users file F. A scheme has to define the set of authenticators by Φ = { αi }1 i n. Finally for ensuring of integrity of unique file identifier name we have to calculate t = name SSigssk(name) as the tag for F, Here SSigssk(name) is used as signature for name of file computed with the use of private key ssk. b) Audit phase: The TPA has to retrieve tag t. By following method described in the Setup phase, then TPA has to verify the signature SSigssk(name) by using key spk, and if the reply is False TPA has to quit, else, the TPA get name of file. In final phase of auditing process TPA generates the Challenge for the auditing of users file chal, then it selects an arbitrary value c which is subset of I = {s1... sc} of set [1, n]. For every element i Є I, and also selects an arbitrary value vi. The message chal describes the positions of the blocks which are required to be verification. The TPA sends chal = {(i, vi)}iєi to cloud server. When challenge chal = {(i, _i)}iєi received by the server, the server runs GenProof for generating the response of data storage exactness. Then server has to choose a arbitrary element r Zp, and computes the value of R = e(u, v)r ЄGT. Let μ has been used for linear combination of sampled blocks which are specified in chal such that μ = i Iv imi. To blind μ with r, the server calculates: μ = r+γμ mod p, where γ= h(r) Є Zp. Server also calculates the aggregated authenticator α=πi I αviєg1. It then sends {μ, α, R} as the response to TPA as proof of storage exactness. When TPA receives response it runs VerifyProof for validating it by first calculating γ= h(r) and then checking following verification equation. 15

6 ( ) (( ( ) ) ) ( ) Properties of the Protocol Our protocol achieves the public auditability. We don t need to use secret key or any states in between audits for TPA and our protocol does not put online burden on cloud users. Our approach guarantees the privacy of data of user in auditing process by enforcing a random masking r to hide μ. The point should be noted that the value R in our protocol that is used to achieve the privacy preserving guarantee, will not have an effect on the correctness of the equation, because of the circular relationship between R and in γ = h(r).units V. CONCLUSION We have proposed privacy preserving public audit scheme for security of cloud users data in cloud Computing. The homomorphic linear authenticator and random masking make sure that it is not possible for TPA to learn any understandings about the users data content stored on the cloud server while auditing process, which removes the dilemma of cloud user from the tiresome and possibly complicated auditing task and also removes the users fear of their private data leakage. VI. FUTURE WORK In this system there is more focus on auditing task for improving reliability by adding more complexity in auditing process. We are proposing different approach in which instead of adding more complexity in auditing we focus on adding clustered TPAs and reducing complexity of existing protocol as well as reducing the execution time. REFERENCES [1] G. EasonKrebs, Payment Processor Breach May Be Largest Ever, Online at, pa ymentprocessorbreachmayb.html, Jan [2] Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, Enabling public verifiability and data dynamics for storage security in cloud computing, in Proc. Of ESORICS 09, volume 5789 of LNCS Springer-Verlag, Sep. 2009, pp [3] H. Shacham and B. Waters, Compact proofs of retrievability, in Proc. of Asiacrypt 2008, vol. 5350, Dec 2008, pp [4] G. Ateniese, R. C. Burns, R. Curtmola, J. Herring, L. Kissner, Z. N. J. Peterson, and D. X. Song. Provable data possession at untrusted stores. In Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, pages ,2007 [5] Cloud Security Alliance, Security guidance for critical areas of focus in cloud computing, 2009, cloudsecurityalliance.org. [6] Dr. P. K. Deshmukh, Mrs. V. R. Desale, Prof. R. A. Deshmukh, Investigation of TPA (Third Party Auditor Role) foe Cloud Data Security, International Journal of Scientific and Engineering Research, vo. 4,no. 2,ISSn , Feb [7] Jachak K. B., Korde S. K., Ghorpade P. P. and Gagare G. J., Homomorphic Authentication with Random Masking Technique Ensuring Privacy & Security in Cloud Computing, Bioinfo Security Informatics, vol. 2, no. 2, pp , ISSN , 12 April 2012 [8] K. Kiran Kumar, K. Padmaja, P. Radha Krishna, Automatic Protocol Blocker for Privacy- PreservingPublic Auditing in Cloud Computing, International Journal of Computer science and Technology, vol. 3 pp,issn (Online), pp , ISSN: (Print), March 2012 [9] Balkrishnan. S, Saranya. G, Shobana. S and Karthikeyan. S, Introducing Effective Third Party Auditing (TPA) for Data Storage Security in Cloud,International Journal of computer science and Technology, vol. 2, no. 2, ISSN (Print) ISSN: (Online), June 2012 [10] Dhiyanesh A Novel Third Party Auditability and Dynamic Based Security in Cloud Computing, International Journal of Advanced Research in Technology, vol. 1,no. 1, pp , ISSN: ,2011 [11] S. Marium, Q. Nazir, A. Ahmed, S. Ahthasham and Aamir M. Mirza, Implementation of EAP with RSA for Enhancing The Security of Cloud Computig,International Journal of Basic and Applied Science, vol 1, no. 3, pp , 2012 [12] K Govinda, V. Gurunathprasad and H. sathishkumar, Third Party Auditing for Secure Data Storage in CloudThrough Digital Signature Using RSA, International Journal of Advanced science and Technical Research, vol 4,no. 2, ISSN: ,4 August 2012 [13] Shrinivas, Privacy-Preserving Public Auditing in Cloud Storage security, International Journal of computer science nad Information Technologies, vol 2, no. 6, pp , ISSN: , 2011 [14] XU Chun-xiang, HE Xiao-hu, Daniel Abraha, Cryptanalysis of Auditing protocol proposed by Wang et al. for data storage security in cloud computing, and cryptologyeprintarchieve: Listing for 2012 [15] Abhishek Mohta, Lalit Kumar Awasti, Cloud Data Security while using Third Party Auditor, International Journal of Scientific & Engineering Research, Volume 3, Issue 6, ISSN June [16] Cong Wang,Sherman S.M. Chow,Qian Wang,Kui Ren and Wenjing Lou, Privacy Preserving Public Auditing for,ieee Transactions on Computers, Vol 62, No 2, February , pp , doi: /scis

Privacy-Preserving Public Auditing using TPA for Secure Cloud Storage

Privacy-Preserving Public Auditing using TPA for Secure Cloud Storage Privacy-Preserving Public Auditing using TPA for Secure Cloud Storage Jyoti R Bolannavar 1 1 P G Student, Department of Computer Science, Gogte Institute of Technology, Belgaum-590008, Karnataka, India

More information

How To Ensure Data Integrity In Cloud Computing

How To Ensure Data Integrity In Cloud Computing A Novel Approach for public exploration Data with Effective user Denial in the cloud Mahankali Anitha PG Scholar Department of CSE J.Vijayasree Assistant professor Department of CSE Dr.M.V.Siva Prasad

More information

Cloud Data Storage Security and Public Auditing

Cloud Data Storage Security and Public Auditing A Meticulous Description of Applying Watermarking Technique for Secure Cloud Storage 1 M. Guresh, 2 R. Suresh 1 M.Tech 2 nd Year, Department of CSE, CREC Tirupati, AP, India 2 Professor & HOD, Department

More information

PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING

PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING T.Vidhya Sree M.Phil Research Scholar,CS, MGR College, Hosur (India) ABSTRACT Cloud Computing is the long dreamed vision

More information

Improving data integrity on cloud storage services

Improving data integrity on cloud storage services International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services

More information

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department

More information

Privacy Preserving Public Auditing for Data in Cloud Storage

Privacy Preserving Public Auditing for Data in Cloud Storage Privacy Preserving Public Auditing for Data in Cloud Storage M.Priya 1, E. Anitha 2, V.Murugalakshmi 3 M.E, Department of CSE, Karpagam University, Coimbatore, Tamilnadu, India 1, 3 M.E, Department of

More information

A Secure and Dependable Cloud Storage Service in Cloud Computing

A Secure and Dependable Cloud Storage Service in Cloud Computing A Secure and Dependable Cloud Storage Service in Cloud Computing Yalla Ram Charan MTech Student Department of CSE Sri Venkateswra College of Engineering & Technology Abstract: Cloud storage is a model

More information

PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE

PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE Abstract: Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared

More information

SHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING

SHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING SHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING Er. Kavin M 1, Mr.J.Jayavel 2 1 PG Scholar, 2 Teaching Assistant, Department of Information Technology, Anna University Regional

More information

Secure Cloud StorageForPrivacy-Preserving Public Audit

Secure Cloud StorageForPrivacy-Preserving Public Audit RESEARCH ARTICLE OPEN ACCESS Secure Cloud StorageForPrivacy-Preserving Public Audit ShekhAhamadhusen D., Prof. Rahul Deshmukh Abstract- In Cloud Environment, using cloud storage service, users can remotely

More information

Enabling Public Auditing for Secured Data Storage in Cloud Computing

Enabling Public Auditing for Secured Data Storage in Cloud Computing IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 5 (May. 2013), V3 PP 01-05 Enabling Public Auditing for Secured Data Storage in Cloud Computing 1 Er.Amandeep Kaur,

More information

preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.

preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design. Privacy-Preserving Public Auditing For Secure Cloud Storage ABSTRACT: Using cloud storage, users can remotely store their data and enjoy the on-demand high-quality applications and services from a shared

More information

Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing.

Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing. Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Privacy - Preserving

More information

Security in Cloud Audit Using the Key Based Homomorphic Linear Authenticator

Security in Cloud Audit Using the Key Based Homomorphic Linear Authenticator Security in Cloud Audit Using the Key Based Homomorphic Linear Authenticator S.Muralitharan 1, M.Vijayaraj 2 Assistant Professor, Department of Information Technology, Mohamed Sathak Engineering College,

More information

Enabling Data Security in Cloud Computing Using Third Party Auditing and Encryption Services

Enabling Data Security in Cloud Computing Using Third Party Auditing and Encryption Services Enabling Data Security in Cloud Computing Using Third Party Auditing and Encryption Services Amal Jose, M.Sambath, S.Ravi PG Scholar, Department of Computer Science & Engineering, Hindustan University,

More information

Surveying Cloud Storage Correctness using TPA with BLS

Surveying Cloud Storage Correctness using TPA with BLS Surveying Cloud Storage Correctness using TPA with BLS Priyanka Dehariya 1, Prof. Shweta Shrivastava 2, Dr. Vineet Richaraya 3 1 M.Tech Scholar (CSE), LNCT, Bhopal 2 Asst.Professors, (CSE Department),

More information

PRIVACY PRESERVING PUBLIC AUDITING FOR SECURED DATA STORAGE IN CLOUD USING BLOCK AUTHENTICATION CODE

PRIVACY PRESERVING PUBLIC AUDITING FOR SECURED DATA STORAGE IN CLOUD USING BLOCK AUTHENTICATION CODE PRIVACY PRESERVING PUBLIC AUDITING FOR SECURED DATA STORAGE IN CLOUD USING BLOCK AUTHENTICATION CODE R.REVATHI # PG Scholar #, Bharathiyar Institute Of Engineering for Women, Deviyakurichi, Salem(DT) India

More information

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD Volume 1, Issue 7, PP:, JAN JUL 2015. SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD B ANNAPURNA 1*, G RAVI 2*, 1. II-M.Tech Student, MRCET 2. Assoc. Prof, Dept.

More information

Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.

Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption. Secure Privacy-Preserving Cloud Services. Abhaya Ghatkar, Reena Jadhav, Renju Georgekutty, Avriel William, Amita Jajoo DYPCOE, Akurdi, Pune ghatkar.abhaya@gmail.com, jadhavreena70@yahoo.com, renjug03@gmail.com,

More information

SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE

SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE International Journal of Computer Network and Security(IJCNS) Vol 7. No.1 2015 Pp. 1-8 gopalax Journals, Singapore available at : www.ijcns.com ISSN: 0975-8283 ----------------------------------------------------------------------------------------------------------------------------------------------------------

More information

15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM

15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM Dhanashri Bamane Vinayak Pottigar Subhash Pingale Department of Computer Science and Engineering SKN

More information

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD S.REVATHI B.HASEENA M.NOORUL IZZATH PG Student PG Student PG Student II- ME CSE II- ME CSE II- ME CSE Al-Ameen Engineering

More information

ADVANCE SECURITY TO CLOUD DATA STORAGE

ADVANCE SECURITY TO CLOUD DATA STORAGE Journal homepage: www.mjret.in ADVANCE SECURITY TO CLOUD DATA STORAGE ISSN:2348-6953 Yogesh Bhapkar, Mitali Patil, Kishor Kale,Rakesh Gaikwad ISB&M, SOT, Pune, India Abstract: Cloud Computing is the next

More information

A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA

A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA Mr.Mahesh S.Giri Department of Computer Science & Engineering Technocrats Institute of Technology Bhopal, India

More information

Cloud Data Storage Services Considering Public Audit for Security

Cloud Data Storage Services Considering Public Audit for Security Global Journal of Computer Science and Technology Cloud and Distributed Volume 13 Issue 1 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

ENABLING AUDITABILITY FOR SECURE CLOUD STORAGE USING TPA

ENABLING AUDITABILITY FOR SECURE CLOUD STORAGE USING TPA ENABLING AUDITABILITY FOR SECURE CLOUD STORAGE USING TPA 1 Chennuri. Kranthi kumar, 2 Vishakha Lokhande 1 M.Tech Student, Department of CSE, KG reddy College Of Engineering and Technology, Chilkur village,

More information

PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE

PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE ManoRanjanh 1, N. Sukhendar Reddy 2, Maraty Meena 3 1 M.Tech student, CSE Dept, Vishnu sree Institute Of Science and Technology,Telangana, India.

More information

Enable Public Audit ability for Secure Cloud Storage

Enable Public Audit ability for Secure Cloud Storage Enable Public Audit ability for Secure Cloud Storage Leela Poornima 1, D.Hari Krishna 2 1 Student, Nova College of Engineering and Technology, Ibrahimpatnam,Krishna Dist., Andhra Pradesh, India 2 Assistant

More information

How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System

How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System REVIEW ARTICAL A Novel Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage Dumala Harisha 1, V.Gouthami 2 1 Student, Computer Science & Engineering-Department, JNTU Hyderabad India

More information

Trusted Public Auditing Process for Secure Cloud Storage

Trusted Public Auditing Process for Secure Cloud Storage Trusted Public Auditing Process for Secure Cloud Storage K.Adhiyaman 1, A. Jesudoss 2, D.Saravanan 3 1 Final Year MCA, Faculty of Computing, Department of MCA Sathyabama University, Chennai,Tamil Nadu,

More information

Verifying Correctness of Trusted data in Clouds

Verifying Correctness of Trusted data in Clouds Volume-3, Issue-6, December-2013, ISSN No.: 2250-0758 International Journal of Engineering and Management Research Available at: www.ijemr.net Page Number: 21-25 Verifying Correctness of Trusted data in

More information

ISSN 2278-3091. Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability

ISSN 2278-3091. Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability Outsourcing and Discovering Storage Inconsistencies in Cloud Through TPA Sumathi Karanam 1, GL Varaprasad 2 Student, Department of CSE, QIS College of Engineering and Technology, Ongole, AndhraPradesh,India

More information

Data Integrity for Secure Dynamic Cloud Storage System Using TPA

Data Integrity for Secure Dynamic Cloud Storage System Using TPA International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 7-12 International Research Publication House http://www.irphouse.com Data Integrity for Secure

More information

N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT

N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 1 M.Tech Student, Department of Computer Science and Engineering, S.R.M. University Chennai 2 Asst.Professor,

More information

Cloud Server Storage Security Using TPA

Cloud Server Storage Security Using TPA Cloud Server Storage Security Using TPA I K.Meenakshi, II Victo Sudha George I Student (M.Tech), DR. MGR Educational and Research Institute, India II Assisstant Professo, DR. MGR Educational and Research

More information

ENABLING PUBLIC AUDITABILITY AND DATA DYNAMICS FOR STORAGE SECURITY IN CLOUD COMPUTING

ENABLING PUBLIC AUDITABILITY AND DATA DYNAMICS FOR STORAGE SECURITY IN CLOUD COMPUTING ENABLING PUBLIC AUDITABILITY AND DATA DYNAMICS FOR STORAGE SECURITY IN CLOUD COMPUTING 1 P.ILAMATHY M.TECH-INFORMATION TECHNOLOGY AMS ENGINEERING COLLEGE NAMAKKAL, INDIA ilamathyponnuvel@gmail.com 2 V.ANITHA,M.E.

More information

Near Sheltered and Loyal storage Space Navigating in Cloud

Near Sheltered and Loyal storage Space Navigating in Cloud IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 8 (August. 2013), V2 PP 01-05 Near Sheltered and Loyal storage Space Navigating in Cloud N.Venkata Krishna, M.Venkata

More information

Authorized Auditing of Big Data Stored on Cloud with Auditability Aware Data Scheduling

Authorized Auditing of Big Data Stored on Cloud with Auditability Aware Data Scheduling Authorized Auditing of Big Data Stored on Cloud with Auditability Aware Data Scheduling Surapriya Swain 1, Prof. Saurabh Gupta 2 1 Department of Computer Engineering, GSMCOE, Balewadi, Savitribai Phule

More information

International Journal of Advance Research in Computer Science and Management Studies

International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 12, December 2014 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online

More information

Keywords: - Ring Signature, Homomorphic Authenticable Ring Signature (HARS), Privacy Preserving, Public Auditing, Cloud Computing.

Keywords: - Ring Signature, Homomorphic Authenticable Ring Signature (HARS), Privacy Preserving, Public Auditing, Cloud Computing. Survey on Privacy Preserving Public Auditing Techniques for Shared Data in the Cloud Kedar Jayesh Rasal 1, Dr. S.V.Gumaste 2, Sandip A. Kahate 3 Computer Engineering, Pune University, SPCOE, Otur, Pune,

More information

A SURVEY ON USER REVOCATION IN THE PUBLIC CLOUD FOR SHARED DATA

A SURVEY ON USER REVOCATION IN THE PUBLIC CLOUD FOR SHARED DATA Journal homepage: www.mjret.in A SURVEY ON USER REVOCATION IN THE PUBLIC CLOUD FOR SHARED DATA Suryakant Kadam, Prof. Pankaj Agarkar Department of Computer Engineering, Savitribai Phule Pune University

More information

IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD

IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD 1 Ms.Nita R. Mhaske, 2 Prof. S.M.Rokade 1 student, Master of Engineering, Dept. of Computer Engineering Sir Visvesvaraya

More information

CONSIDERATION OF DYNAMIC STORAGE ATTRIBUTES IN CLOUD

CONSIDERATION OF DYNAMIC STORAGE ATTRIBUTES IN CLOUD INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE CONSIDERATION OF DYNAMIC STORAGE ATTRIBUTES IN CLOUD Ravi Sativada 1, M.Prabhakar Rao 2 1 M.Tech Student, Dept of CSE, Chilkur Balaji

More information

A Survey on Secure Auditing and Deduplicating Data in Cloud

A Survey on Secure Auditing and Deduplicating Data in Cloud A Survey on Secure Auditing and Deduplicating Data in Cloud Tejaswini Jaybhaye 1 ; D. H. Kulkarni 2 PG Student, Dept. of Computer Engineering, SKNCOE, Pune, India 1 Assistant Professor, Dept. of Computer

More information

PRIVACY PRESERVING AND BATCH AUDITING IN SECURE CLOUD DATA STORAGE USING AES

PRIVACY PRESERVING AND BATCH AUDITING IN SECURE CLOUD DATA STORAGE USING AES PRIVACY PRESERVING AND BATCH AUDITING IN SECURE CLOUD DATA STORAGE USING AES 1 SANTOSH P. JADHAV, 2 B. R. NANDWALKAR 1,2 Department of Computer Engineering, Late G.N.Sapkal collage of engineering, University

More information

Privacy-Preserving Public Auditing For Secure Cloud Storage

Privacy-Preserving Public Auditing For Secure Cloud Storage IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 4, Ver. III (Jul Aug. 2014), PP 33-38 Privacy-Preserving Public Auditing For Secure Cloud Storage Salve

More information

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer

More information

Development of enhanced Third party Auditing Scheme for Secure Cloud Storage

Development of enhanced Third party Auditing Scheme for Secure Cloud Storage Development of enhanced Third party Auditing Scheme for Secure Cloud Storage Bhanu Prakash Chamakuri*1, D. Srikar*2, Dr. M.Suresh Babu*3 M.Tech Scholar, Dept of CSE, Grandhi Varalakshmi Institute Of Technology,

More information

Performance Evaluation Panda for Data Storage and Sharing Services in Cloud Computing

Performance Evaluation Panda for Data Storage and Sharing Services in Cloud Computing Performance Evaluation Panda for Data Storage and Sharing Services in Cloud Computing Gunnala Ajay Kumar M.Tech Student Department of CSE Global Group Of Institutions Batasingaram, Ranga Reddy (Dist),

More information

Third Party Auditing For Secure Data Storage in Cloud through Trusted Third Party Auditor Using RC5

Third Party Auditing For Secure Data Storage in Cloud through Trusted Third Party Auditor Using RC5 Third Party Auditing For Secure Data Storage in Cloud through Trusted Third Party Auditor Using RC5 Miss. Nupoor M. Yawale 1, Prof. V. B. Gadicha 2 1 Student, M.E. Second year CSE, P R Patil COET, Amravati.INDIA.

More information

Data Storage Security in Cloud Computing

Data Storage Security in Cloud Computing Data Storage Security in Cloud Computing Manoj Kokane 1, Premkumar Jain 2, Poonam Sarangdhar 3 1, 2, 3 Government College of Engineering and Research, Awasari, Pune, India Abstract: Cloud computing is

More information

Data Dynamics for Storage Security and Public Auditability in Cloud Computing

Data Dynamics for Storage Security and Public Auditability in Cloud Computing Journal of Computer Applications ISSN: 0974 1925, Volume-5, Issue EICA2012-1, February 10, 2012 Data Dynamics for Storage Security and Public Auditability in Cloud Computing Kayalvizhi S M.E - Software

More information

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction Enhancing Data Security in Cloud Storage Auditing With Key Abstraction 1 Priyadharshni.A, 2 Geo Jenefer.G 1 Master of engineering in computer science, Ponjesly College of Engineering 2 Assistant Professor,

More information

An Empirical Model of Data Monitoring Service over cloud

An Empirical Model of Data Monitoring Service over cloud An Empirical Model of Data Monitoring Service over cloud 1 N.Sowjanya, 2 Ch. Swapna Priya 1 Final M.Tech Student, 2 Assistant Professor 1,2 Dept of Computer Science and Engineering 1,2 Pydah College of

More information

Security in Cloud Network

Security in Cloud Network Security in Cloud Network Vimula Shwetha, (M.Tech) CSE Dept, KCEA, Nizamabad, ABSTRACT: Cloud computing, large number of computers that are connected through a real-time communication network. The users

More information

An Integrated Approach of Data storage and Security in Cloud Computing

An Integrated Approach of Data storage and Security in Cloud Computing An Integrated Approach of Data storage and Security in Cloud Computing K.SHIRISHA REDDY 1, Dr.M.BALARAJU 2 1 Associate Professor, CSE, VIGNAN BHARATHI INSTITUTE OF TECHNOLOGY, Hyderabad, Andhra Pradesh,

More information

Secure Way of Storing Data in Cloud Using Third Party Auditor

Secure Way of Storing Data in Cloud Using Third Party Auditor IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 4 (Jul. - Aug. 2013), PP 69-74 Secure Way of Storing Data in Cloud Using Third Party Auditor 1 Miss.

More information

Efficient Remote Data Possession Checking In Critical Information Infrastructures Ensuring Data Storage Security In Cloud Computing

Efficient Remote Data Possession Checking In Critical Information Infrastructures Ensuring Data Storage Security In Cloud Computing Efficient Remote Data Possession Checking In Critical Information Infrastructures Ensuring Data Storage Security In Cloud Computing Dr. T.Nalini 1, Dr.K.Manivannan 2,Vaishnavi Moorthy 3 1 Professor, Department

More information

Third Party Auditor: An Integrity Checking Technique for Client Data Security in Cloud Computing

Third Party Auditor: An Integrity Checking Technique for Client Data Security in Cloud Computing Third Party Auditor: An Integrity Checking Technique for Client Data Security in Cloud Computing Renuka Goyal, Navjot Sidhu Centre for Computer Science and Technology, Central University of Punjab Bathinda,

More information

A Review on Privateness-Retaining Public Auditing for Secure Cloud Storage

A Review on Privateness-Retaining Public Auditing for Secure Cloud Storage Volume 3 Issue 1 March 2015 ISSN: 2320-9984 (Online) International Journal of Modern Engineering & Management Research Website: www.ijmemr.org A Review on Privateness-Retaining Public Auditing for Secure

More information

Public Auditability and Privacy preserving in Cloud Storage

Public Auditability and Privacy preserving in Cloud Storage Public Auditability and Privacy preserving in Cloud Storage Kishan Lathkar, Ambulgekar H. P SGGS IE&T Nanded, Maharashtra India lathkarkishan@sggs.ac.in, ambulgekar@sggs.ac.in Abstract: Cloud computing

More information

M. Nathiya 2 B.Tech. (IT), M.E. (CSE), Assistant Professor, Shivani Engineering College, Trichy, Tamilnadu, India.

M. Nathiya 2 B.Tech. (IT), M.E. (CSE), Assistant Professor, Shivani Engineering College, Trichy, Tamilnadu, India. ISSN: 2321-7782 (Online) Volume 2, Issue 5, May 2014 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com Robust Data

More information

CLOUD Computing has been envisioned as the

CLOUD Computing has been envisioned as the 1 Privacy-Preserving Public Auditing for Secure Cloud Storage Cong Wang, Student Member, IEEE, Sherman S.-M. Chow, Qian Wang, Student Member, IEEE, Kui Ren, Member, IEEE, and Wenjing Lou, Member, IEEE

More information

AN APPROACH TOWARDS FUNCTIONING OF PUBLIC AUDITABILITY FOR CLOUD ENRICHMENT

AN APPROACH TOWARDS FUNCTIONING OF PUBLIC AUDITABILITY FOR CLOUD ENRICHMENT INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN APPROACH TOWARDS FUNCTIONING OF PUBLIC AUDITABILITY FOR CLOUD ENRICHMENT Mohd Abdul Shoaib 1, Akheel Mohammed 2, Ayesha 3

More information

A Survey on Privacy-Preserving Techniques for Secure Cloud Storage

A Survey on Privacy-Preserving Techniques for Secure Cloud Storage Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,

More information

Survey Paper on Integrity Auditing of Storage

Survey Paper on Integrity Auditing of Storage International Journal of Computational Engineering Research Vol, 04 Issue, 3 Survey Paper on Integrity Auditing of Storage Ugale Santosh A 1 1M.E. Computer AVCOE, Sangmner, India ABSTRACT: Cloud servers

More information

Security Saving Open Examining for Secure Cloud storage

Security Saving Open Examining for Secure Cloud storage ISSN (Online): 2349-7084 GLOBAL IMPACT FACTOR 0.238 INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING IN RESEARCH TRENDS VOLUME 1, ISSUE 3, SEPTEMBER 2014, PP 131-136 Security Saving Open Examining for Secure

More information

Identifying Data Integrity in the Cloud Storage

Identifying Data Integrity in the Cloud Storage www.ijcsi.org 403 Identifying Data Integrity in the Cloud Storage Saranya Eswaran 1 and Dr.Sunitha Abburu 2 1 Adhiyamaan College of Engineering, Department of Computer Application, Hosur. 2 Professor and

More information

Privacy-Preserving Public Auditing & Data Intrgrity for Secure Cloud Storage

Privacy-Preserving Public Auditing & Data Intrgrity for Secure Cloud Storage Privacy-Preserving Public Auditing & Data Intrgrity for Secure Cloud Storage Imran Ahmad Student, M.Tech Dept. Computer Science & Engineering Patel Institute of Technology Bhopal, India imimran86@gmail.com

More information

SECURED DATA STORAGE IN CLOUD

SECURED DATA STORAGE IN CLOUD International Journal of Information Technology & Management Information System (IJITMIS) Volume 6, Issue 2, July-December-2015, pp. 44-48, Article ID: IJITMIS_06_02_007 Available online at http://http://www.iaeme.com/issue.asp?jtype=ijitmis&vtype=6&itype=2

More information

Efficient Integrity Checking Technique for Securing Client Data in Cloud Computing

Efficient Integrity Checking Technique for Securing Client Data in Cloud Computing International Journal of Electrical & Computer Sciences IJECS-IJENS Vol: 11 No: 05 41 Efficient Integrity Checking Technique for Securing Client Data in Cloud Computing Abstract-- It has been widely observed

More information

Secure Privacy Preserving Public Auditing for Cloud storage

Secure Privacy Preserving Public Auditing for Cloud storage Secure Privacy Preserving Public Auditing for Cloud storage Sathiskumar R 1, Dr.Jeberson Retnaraj 2 Department of Information Technology, Sathyabama University, Chennai, India 1 Department of Information

More information

To Provide Security & Integrity for Storage Services in Cloud Computing

To Provide Security & Integrity for Storage Services in Cloud Computing To Provide Security & Integrity for Storage Services in Cloud Computing 1 vinothlakshmi.s Assistant Professor, Dept of IT, Bharath Unversity, Chennai, TamilNadu, India ABSTRACT: we propose in this paper

More information

How To Ensure Data Integrity In Clouds

How To Ensure Data Integrity In Clouds Proficient Audit Services Outsourced for Data Availability in Clouds N Praveen Kumar Reddy #1, Dr Subhash Chandra *2 N Praveen Kumar Reddy, pursuing M.Tech from Holy Mary Institute of Technology and Science,,

More information

Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage

Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage P. Selvigrija, Assistant Professor, Department of Computer Science & Engineering, Christ College

More information

Efficient Cloud Computing with Secure Data Storage using AES

Efficient Cloud Computing with Secure Data Storage using AES Efficient Cloud Computing with Secure Data Storage using AES Mr. Santosh P. Jadhav 1, Prof. B. R. Nandwalkar 2 Department of Computer Engineering, Late G.N.Sapkal Collage of Engineering, University of

More information

A Novel Re-Authentication Scheme on Cloud Based Storage Services T.G.V.V.Srinivas 1, P.Suresh Babu 2 1 Final M.Tech Student, 2 Associate professor

A Novel Re-Authentication Scheme on Cloud Based Storage Services T.G.V.V.Srinivas 1, P.Suresh Babu 2 1 Final M.Tech Student, 2 Associate professor A Novel Re-Authentication Scheme on Cloud Based Storage Services T.G.V.V.Srinivas 1, P.Suresh Babu 2 1 Final M.Tech Student, 2 Associate professor 1,2 Dept of CSE, Kaushik College of engineering, JNTUK

More information

CLOUD Computing has been envisioned as the nextgeneration

CLOUD Computing has been envisioned as the nextgeneration 1 Privacy-Preserving Public Auditing for Secure Cloud Storage Cong Wang, Student Member, IEEE, Sherman S.M. Chow, Qian Wang, Student Member, IEEE, Kui Ren, Member, IEEE, and Wenjing Lou, Member, IEEE Abstract

More information

Selective dependable storage services for providing security in cloud computing

Selective dependable storage services for providing security in cloud computing Selective dependable storage services for providing security in cloud computing Gade Lakshmi Thirupatamma*1, M.Jayaram*2, R.Pitchaiah*3 M.Tech Scholar, Dept of CSE, UCET, Medikondur, Dist: Guntur, AP,

More information

I. Introduction. A. Related Work

I. Introduction. A. Related Work PUBLIC VERIFIABILITY AND DATA DYNAMICS IN CLOUD SERVER P.Saranya, Roever Engineering College; S.Vishnupriya, Roever Engineering College; E.Elangovan, PRIST University Abstract- Cloud computing stores the

More information

Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm

Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm Twinkle Graf.F 1, Mrs.Prema.P 2 1 (M.E- CSE, Dhanalakshmi College of Engineering, Chennai, India) 2 (Asst. Professor

More information

A Survey on Data Integrity of Cloud Storage in Cloud Computing

A Survey on Data Integrity of Cloud Storage in Cloud Computing A Survey on Data Integrity of Cloud Storage in Cloud Computing A B S T R A C T Mr.Vitthal Raut, Prof. Suhasini Itkar Department Computer Engineering, PES Modern College of Engineering, Pune, India. raut.vitthal@gmail.com,

More information

A Survey of Public Auditing for Secure Data Storage in Cloud Computing

A Survey of Public Auditing for Secure Data Storage in Cloud Computing International Journal of Network Security, Vol.18, No.1, PP.133-142, Jan. 2016 133 A Survey of Public Auditing for Secure Data Storage in Cloud Computing Wei-Fu Hsien 1, Chou-Chen Yang 1, and Min-Shiang

More information

A Survey on Secure Storage Services in Cloud Computing

A Survey on Secure Storage Services in Cloud Computing Global Journal of Computer Science and Technology Cloud & Distributed Volume 12 Issue 12 Version 1.0 Year 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION

DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION Prof. M. Ben Swarup Professor, Department of CSE Vignan's Institute of Information Technology Visakhapatnam-49, India Chukkala

More information

Data Grid Privacy and Secure Storage Service in Cloud Computing

Data Grid Privacy and Secure Storage Service in Cloud Computing Data Grid Privacy and Secure Storage Service in Cloud Computing L.Revathi 1, S.Karthikeyan 2 1 Research Scholar, Department of Computer Applications, Dr. M.G.R. Educational and Research Institute University,

More information

Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System

Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System 1 K.Valli Madhavi A.P vallimb@yahoo.com Mobile: 9866034900 2 R.Tamilkodi A.P tamil_kodiin@yahoo.co.in Mobile:

More information

PRIVACY PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE

PRIVACY PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE PRIVACY PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE 1 V.L.Pavani, 2 A. Mallareddy, 3. Dr.I.Satyanarayana 1.Ms. V.Pavani, M.Tech Student & Sri Indu Institute of Engineering & Technology,Hyderabad,

More information

Secrecy Maintaining Public Inspecting For Secure Cloud Storage

Secrecy Maintaining Public Inspecting For Secure Cloud Storage Secrecy Maintaining Public Inspecting For Secure Cloud Storage K.Sangamithra 1, S.Tamilselvan 2 M.E, M.P.Nachimuthu.M.Jaganathan Engineering College, Tamilnadu, India 1 Asst. Professor, M.P.Nachimuthu.M.Jaganathan

More information

Privacy Preservation and Integrity Auditing In Cloud Storage or Web Servers

Privacy Preservation and Integrity Auditing In Cloud Storage or Web Servers Privacy Preservation and Integrity Auditing In Cloud Storage or Web Servers Ugale Santosh A 1, Vaidya Milindkumar B 2 1,2 M.E Computer & Sangamner, India Abstract Cloud is growing technology for enabling

More information

Implementing Remote Data Integrity Checking Protocol for Secured Storage Services with Data Dynamics and Public Verifiability In Cloud Computing

Implementing Remote Data Integrity Checking Protocol for Secured Storage Services with Data Dynamics and Public Verifiability In Cloud Computing Implementing Remote Data Integrity Checking Protocol for Secured Storage Services with Data Dynamics and Public Verifiability In Cloud Computing Ms. Vaishnavi Moorthy 1, Dr. S. Sivasubramaniam 2 1 (M.Tech-Final

More information

Hey! Cross Check on Computation in Cloud

Hey! Cross Check on Computation in Cloud Hey! Cross Check on Computation in Cloud Ajeet Singh Rajput Computer Science and Engineering Department S.D.B.C.T, Mhow Road,Indore,(M.P), India ajeetsinghrajput@gmail.com M.E.(CSE), S.D.B.C.T, Indore

More information

SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING

SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING Saranya.V 1, Suganthi.J 2, R.G. Suresh Kumar 3 1,2 Master of Technology, Department of Computer Science and Engineering, Rajiv Gandhi College of Engineering

More information

Secure Data transfer in Cloud Storage Systems using Dynamic Tokens.

Secure Data transfer in Cloud Storage Systems using Dynamic Tokens. Secure Data transfer in Cloud Storage Systems using Dynamic Tokens. P.Srinivas *,K. Rajesh Kumar # M.Tech Student (CSE), Assoc. Professor *Department of Computer Science (CSE), Swarnandhra College of Engineering

More information

Remote Data Integrity Checking in Cloud Computing

Remote Data Integrity Checking in Cloud Computing ISSN 2321 8169 Remote Data Integrity Checking in Cloud Computing Khaba M.V (Assistant Professor/CSE) RVS School of Engineering,dindigul khabarose@gmail.com M.Santhanalakshmi(Assistant Professor/CSE) RVS

More information

Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage

Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage Pranita Bakka 1, Dr. Jayashree Agarkhed 2 1 P.G.Student, Department of Computer Science & Engineering,

More information

Keywords: Cloud Storage, Shared Data, Privacy Preserving, Secret Sharing, Authentication, Third Party Auditor(TPA).

Keywords: Cloud Storage, Shared Data, Privacy Preserving, Secret Sharing, Authentication, Third Party Auditor(TPA). Volume 5, Issue 4, April 215 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Data Security in

More information

Preserving Data Integrity and Public Auditing for Data Storage in Cloud Computing

Preserving Data Integrity and Public Auditing for Data Storage in Cloud Computing www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Issue - 8 August, 2014 Page No. 7829-7833 Preserving Data Integrity and Public Auditing for Data Storage

More information

Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving,

Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving, Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Third Party

More information