INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) PERCEIVING AND RECOVERING DEGRADED DATA ON SECURE CLOUD
|
|
|
- Lilian Cox
- 10 years ago
- Views:
Transcription
1 INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) International Journal of Computer Engineering and Technology (IJCET), ISSN ISSN (Print) ISSN (Online) Volume 4, Issue 2, March April (2013), pp IAEME: Journal Impact Factor (2013): (Calculated by GISI) IJCET I A E M E PERCEIVING AND RECOVERING DEGRADED DATA ON SECURE CLOUD V.Ramesh 1, P.Dhanalakshmi 2 1,2 Department of Computer Science, Kalasalingam Institute of Technology, Krishnankoil ABSTRACT Cloud computing is Internet-based computing, whereby shared resources, software and information, are provided to computers and devices on-demand.. Cloud Storage deals with file blocks, simplifying storage management and eliminating metadata concern. Data are continuously distributed through multiple servers in cloud. The token is computed dynamically. If data lost, then it must find out that which server gets corrupted. It can be done with byzantine fault tolerance system. The usual way of detecting corrupted data is by computing a signature for the token when it enters the cloud, and whenever it is transmitted across a cloud that is unreliable and hence capable of corrupting the data. The data is deemed to be corrupt if the newly generated signature doesn t match the original signature precomputed by the user. Third Party Auditor (TPA) is responsible for verifying the token they receive before displaying the data and its signature. The TPA verifies all the tokens distributed through multiple server. Distributed cloud server stores replicas of file blocks; it can heal corrupted blocks by retransmitting the corrupt replica block. The RS algorithm is used to guard against corruption due to data loss/node loss by supporting the retransmission. The main aim of this paper is making the file system tolerate node failure without suffering data loss. Keywords: Cloud Storage, Data Lost, Distributed System, Fault Node, File Blocks, Recovery, Retransmission, Secure Outsourcing, Tokens I. INTRODUCTION Cloud computing refers to the method by which files are transferred from a computer or Smartphone, or tablet to physical servers. Example Web-based is a form of cloud 229
2 computing. messages are saved on Cloud servers which is, can be checked from anywhere. Similarly, the file can be retrieved on nearly any Web-enabled device, when the files are saved or backed-up with a cloud service. The benefits of cloud computing include lowered costs, higher performance and availability. Businesses with a cloud-based IT infrastructure do not have to spend on any additional on-site hardware or personnel. The cloud symbol traditionally represents the Internet. Cloud computing refers to both the applications delivered as services over the Internet and the hardware and system software in the data centers that provide those services. Figure 1: Cloud Cloud storage system can be considered to be a network of distributed data centers which typically uses cloud computing technologies like virtualization, and offers some kind of interface for storing data. Cloud storage providers usually provide client software which assists users in setting up their synchronization or backup schemes on the local devices. The actual transmission of all data with the remote storage servers is also handled by the client software. Distributed File System is a file system designed for storing very large files with streaming data access patterns, running on clusters of service hardware. Cloud Storage System manages the storage across a network of machines. Cloud Storage deals with file blocks, simplifying storage management and eliminating metadata concern. II. TRUSTED EVALUATION In this paper, we focus on applications where the latency of the computation should be minimized, i.e., the time from submitting the query until receiving the outcome of the computation should be as small as possible. To achieve this, Fig.2, show how to combine a trusted hardware token with Secure Function Evaluation to compute arbitrary functions on secret data where the computation leaks no information and is verifiable. The file blocks are cracked into tokens. The delegation token is generated by the server with the signature. The tokens are distributed through multiple nodes and they are integrated at the user. It is finally verified by the TPA. If any token mismatch, it must be replicated. 230
3 The time to transfer a large file is made of multiple blocks. Because by making a block large enough, the time to transfer the data from the disk can be made to be significantly larger than the time to seek to the start of the block. III. TOLERANCE VALIDATION Figure 2: Token Evaluation The client opens the file it wishes to read by requesting it from the ser ver. During the transfer from server to client, if the user encounters an error while communicating with other nodes then it will try the next closest one for that block to retransmit. It will also remember all other nodes that have failed so that it doesn t needlessly retry them for later block transfer. TPA also verifies the checksum for the data transferred to it from the other nodes. 1. Send each file block from s0 to sk 2. When a process finishes transfer, it collects all blocks 3. TPA analyze the signature of the encoded source blocks 4. K+1 block provide k fault tolerance 5. If any encoded signature is missing, it shows faulty data attainment 6. When a Byzantine failure has occurred, the system may respond in unpredictable way 7. Locate the server failure, with the checksum stored with each block 8. Sends the integrated blocks to user IV. DATA RESTORATION Erasure coding concept is used to improve the throughput and to find the faulty system. The file is segmented into multiple blocks of fixed length. Multiple smaller blocks of encoded data are likely to easily experience the data loss. Each block is protected by the recovery reed Solomon algorithm. The encoded symbols are verified at the user. If any data loss, it can be recovered. Data Block Units can be recovered by retransmission of fault data block. Fermat Number Transform based algorithm operates as fast as XOR based implementations for small file blocks. 231
4 1. Let r be an file of order n-1 in the finite field 2. Use Discrete Fourier Transform(DFT) to take a vector a=(a0,,an-1) of size n as input in Finite Field 3. Use Fermat Number Transform in finite fields to process DFT 4. Generate n encoded data block units from a set of k source data block units 5. Let s=(s0,s1,,sk) be a source vector, where k is the number of data blocks 6. Let e=(e0,e1,ek) be the encoded vector of size n 7. Interpolating the data block with encoded signatures on the k data block positions 8. Apply decoding on the received data block units 9. k symbols have been received for a polynomial of degree k If some source symbols are missing i.e., some of the information in e could have been lost 11. Apply same decoding on the previously received k data block units 12. Apply same DFT on the server encoding side to recover the full encoded data block vector e Fig.3, Shows the general working functionality of the cloud to check the integrity violation Figure 3: Working Functionality V. FUNCTIONAL EXECUTION UPDATION Clients submit one update operation to their local server, wait for proof that the update has been ordered, and then submit their next update. 232
5 APPEND The append operation allows authorized user to modify an already written file by opening it and writing data from the final offset in the file. DELETION In delete operation, file blocks that are distributed among cloud storage servers are all deleted. Once file is deleted, we cannot perform any recovery of deleted files as there won t be any backup available in main cloud server. VI. PERFORMANCE EVALUATION Having many file blocks means the time taken to process each token is small compared to the time to process the whole input. If size of tokens is too small, then the overhead of managing the tokens begins to dominate the total job execution time. Hence the file must be cracked as a maximum of large size tokens to reduce the large overhead. Figure 4: Parity Generation Cost e determines how many parity vectors are required before outsourcing. Growth of e means large number of parity blocks required to be blinded. The files with variable file size blocks will increase the parity vector size according to the file token size. Hence, the parity generation cost will also be increased with increase in file size. In Fig. 4, the fixed file blocks have fixed parity vector size. Hence, the cost is limited according to the token precomputed by the owner. Data are continuously distributed through multiple servers in cloud. The token is computed dynamically. 233
6 Figure 5: Comparison of Throughput for faulty and non-faulty nodes The throughput results are different when some of the nodes are attacked. In Fig.5, The slope of the curve corresponding to Node under attack is less steep than when it is not under attack due to the delay added by the malicious attack. Figure 6.a: Encoding Speed for Various File Block Size 234
7 Figure 6.b: Decoding Speed for Various File Block Size Fig.6, provides the encoding and decoding speed for the FNT based reed Solomon algorithm. However, the encoding/decoding complexities of the file depend on the size of the data blocks. For cloud storage, the encoding/decoding methods are adapted more for smaller file block sizes. If the file is transferred as whole, then the encoding speed will be more. But if the file is cracked into multiple blocks, then the encoding speed will be low. This will improve the performance of the throughput. VII. CONCLUSION Cloud Computing requires security methods of preserving important data in order to prevent unrecoverable data loss. Secure outsourcing of computation to cloud service provider is becoming more and more important. This paper open the way for practical implementation of Byzantine Fault Tolerance and Reed Solomon for smaller multiple number of file blocks. The file generates a distinct signature on all file blocks and appends the signature to display the file. When the data blocks are aggregated on the user, the auditing mechanism can speed up the verification of signature at TPA. Indeed, FNT is a special case of reed Solomon algorithm could benefit from recovery of faults. This paper describes the efficient dynamic data verification method and efficient recovery of faulty data blocks. REFERENCES [1] A. Juels and J. Burton S. Kaliski, Pors: Proofs of retrievability for large files, in Proc. of CCS 07, Alexandria, VA, October 2007, pp [2] C. Wang, Q. Wang, K. Ren, and W. Lou, Privacy preserving public auditing for storage security in cloud computing, in Proc. of IEEE INFOCOM 10, San Diego CA, USA, March [3] C. Wang, K. Ren, W. Lou, and J. Li, Towards publicly auditable secure cloud data storage services, IEEE Network Magazine, vol. 24, no. 4, pp ,
8 [4] C. Wang, Q. Wang, K. Ren, and W. Lou, Towards Secure and Dependable Storage Services in Cloud Computing, in IEEE Transactions on Services Computing, vol.5, no.2, pp , 2012 [5]Alexandre Soro, Jerome Lacan, FNT based Reed Solomon Erasure Codes, ISAE/DMIA,Toulouse, France [6] C.Cahin, R.Guerraoui, L.Radrigies, Introduction to reliable and secure distributed programming, 2nd edition, Published by Springer, [7] T. White. Hadoop: The Definitive Guide. O Reilly, [8] C.Wang, Q.Wang, K.Ren and W.Lou, Ensuring data storage security in cloud computing, proc.17th Intl Workshop Quality of Service(IWQoS 09),pp.1-9,July [9] K. D. Bowers, A. Juels, and A. Oprea, Hail: A highavailability and integrity layer for cloud storage, in Proc. of CCS 09, 2009, pp [10] Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, Enabling public verifiability and data dynamics for storage security in cloud computing, in Proc. of ESORICS 09, volume 5789 of LNCS. Springer-Verlag, Sep. 2009, pp [11] Veronese.G.S, Correia.M, Bessani.A.N, and Lung.Spin one s wheels? Byzantine fault tolerance with a spinning primary. In Proceedings of the 28th IEEE Symposium on Reliable Distributed Systems, Sept [12] Mr. Hemantkumar Wani and Dr. N. Mahesh, Security Issues in Cloud Computing for MSMES International Journal of Advanced Research in Management (IJARM), Volume 3, Issue 2, 2012, pp ISSN Print: , ISSN Online: [13] Abhishek Pandey, R.M.Tugnayat and A.K.Tiwari, Data Security Framework for Cloud Computing Networks, International journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 1, 2013, pp , ISSN Print: , ISSN Online: [14] [15] [16] Installation [17] Mr. V.Ramesh, The author is an Assistant Professor in Computer Science and Engineering Department at Kalasalingam Institute of Technology. He received his BE from Syed Ammal Engineering College; affiliated to Anna University, and M.Tech., Degree from Kalasalingam University. His research interests are in the areas of network security, Data mining and cloud computing security. Ms. P.Dhanalakshmi, The author is currently a ME student in Computer Science and Engineering Department at Kalasalingam Institute of Technology. She had completed BE from PSR Engineering College; affiliated to Anna University. 236
Improving data integrity on cloud storage services
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services
Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing.
Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Privacy - Preserving
Secure Way of Storing Data in Cloud Using Third Party Auditor
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 4 (Jul. - Aug. 2013), PP 69-74 Secure Way of Storing Data in Cloud Using Third Party Auditor 1 Miss.
Erasure correcting to enhance data security in cloud data storage
Erasure correcting to enhance data security in cloud data storage K.Shrividhya Department of computer science- Vels University [email protected] A.Sajeevram Department of computer science Vels University
How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System
REVIEW ARTICAL A Novel Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage Dumala Harisha 1, V.Gouthami 2 1 Student, Computer Science & Engineering-Department, JNTU Hyderabad India
Secure Data transfer in Cloud Storage Systems using Dynamic Tokens.
Secure Data transfer in Cloud Storage Systems using Dynamic Tokens. P.Srinivas *,K. Rajesh Kumar # M.Tech Student (CSE), Assoc. Professor *Department of Computer Science (CSE), Swarnandhra College of Engineering
AN EXPOSURE TO RELIABLE STORAGE SERVICES IN CLOUD COMPUTING
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EXPOSURE TO RELIABLE STORAGE SERVICES IN CLOUD COMPUTING Ayesha Romana 1, Akheel Mohammed 2, Ayesha 3 1 M.Tech Student, Dept
Index Terms : cloud computing, Distributed Storage, error detection, data recovery, SHA, dynamic block operations
Revisiting Secure Cloud Storage by Replacing Token Generation With SHA Ms. Bhagyashree Alhat (1), Prof. Amar Buchade(2) Pune Institute of Computer Technology, University of Pune,PG Student(1), Assistant
Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System
Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System 1 K.Valli Madhavi A.P [email protected] Mobile: 9866034900 2 R.Tamilkodi A.P [email protected] Mobile:
Secure Distribution of File on Cloud
Secure Distribution of File on Cloud Niyamat I. Ujloomwale, Ranjana Badre Dept. of Computer, MIT Academy of Engineering, Alandi, Savitri Phule Pune University, Pune, India Dept. of Computer, MIT Academy
Data Storage Security in Cloud Computing
Data Storage Security in Cloud Computing Manoj Kokane 1, Premkumar Jain 2, Poonam Sarangdhar 3 1, 2, 3 Government College of Engineering and Research, Awasari, Pune, India Abstract: Cloud computing is
How To Ensure Correctness Of Data In The Cloud
A MECHANICS FOR ASSURING DATA STORAGE SECURITY IN CLOUD COMPUTING 1, 2 Pratibha Gangwar, 3 Mamta Gadoria 1 M. Tech. Scholar, Jayoti Vidyapeeth Women s University, Jaipur, [email protected] 2 M. Tech.
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department
February. ISSN: 2321-8134
IJFEAT INTERNATIONAL JOURNAL FOR ENGINEERING APPLICATIONS AND TECHNOLOGY TITLE: DATA PLACE & MANAGE SECURITY IN CLOUD COMPUTING FOR EFFECTIVE AND FLEXIBLE DISTRIBUTED SYSTEM 1 Mr. Pritam S. Bhoyar, 2 Mr.
ADVANCE SECURITY TO CLOUD DATA STORAGE
Journal homepage: www.mjret.in ADVANCE SECURITY TO CLOUD DATA STORAGE ISSN:2348-6953 Yogesh Bhapkar, Mitali Patil, Kishor Kale,Rakesh Gaikwad ISB&M, SOT, Pune, India Abstract: Cloud Computing is the next
A Survey on Secure Storage Services in Cloud Computing
Global Journal of Computer Science and Technology Cloud & Distributed Volume 12 Issue 12 Version 1.0 Year 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD
Volume 1, Issue 7, PP:, JAN JUL 2015. SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD B ANNAPURNA 1*, G RAVI 2*, 1. II-M.Tech Student, MRCET 2. Assoc. Prof, Dept.
Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication
Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication Sanjay Kumar Baghel Mtech Scholar, CSE, CSIT DURG [email protected] Bhupesh Kumar Dewangan Assistant Professor,CSE,
Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption
Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer
Near Sheltered and Loyal storage Space Navigating in Cloud
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 8 (August. 2013), V2 PP 01-05 Near Sheltered and Loyal storage Space Navigating in Cloud N.Venkata Krishna, M.Venkata
International Journal of Infinite Innovations in Engineering and Technology. ISSN (Online): 2349-2287, ISSN (Print): 2349-2279 2015
SECURED AUDITING SYSTEM FOR CLOUD DATA STORAGE WITH ERROR CORRECTION GUARANTEES 1 S.Sathya, 2 S.Sivakumar 1 Research Scholar, Department of Computer Science & Applications, PGP College of Arts & Science,
A Comprehensive Data Forwarding Technique under Cloud with Dynamic Notification
Research Journal of Applied Sciences, Engineering and Technology 7(14): 2946-2953, 2014 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2014 Submitted: July 7, 2013 Accepted: August
Secrecy Maintaining Public Inspecting For Secure Cloud Storage
Secrecy Maintaining Public Inspecting For Secure Cloud Storage K.Sangamithra 1, S.Tamilselvan 2 M.E, M.P.Nachimuthu.M.Jaganathan Engineering College, Tamilnadu, India 1 Asst. Professor, M.P.Nachimuthu.M.Jaganathan
Cloud Data Storage Services Considering Public Audit for Security
Global Journal of Computer Science and Technology Cloud and Distributed Volume 13 Issue 1 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
CONSIDERATION OF DYNAMIC STORAGE ATTRIBUTES IN CLOUD
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE CONSIDERATION OF DYNAMIC STORAGE ATTRIBUTES IN CLOUD Ravi Sativada 1, M.Prabhakar Rao 2 1 M.Tech Student, Dept of CSE, Chilkur Balaji
Data storage security in Cloud
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 6, Ver. III (Nov Dec. 2014), PP 50-56 Data storage security in Cloud Mrs. Niyamat Ujloomwale, Mrs.
Verification of Data Reliability and Secure Service for Dynamic Data in Cloud Storage
Verification of Data Reliability and Secure Service for Dynamic Data in Cloud Storage Nithiavathy.R 1, Suresh.J 2 Department of Computer Science &Engineering, Coimbatore Institute of Engineering and Technology
Data Integrity and Dynamic Storage Way in Cloud Computing
1 Data Integrity and Dynamic Storage Way in Cloud Computing Dinesh.C, P.G Scholar, Computer Science and Engineering, Mailam Engineering College, Mailam, Tamilnadu. Abstract It is not an easy task to securely
Performance Evaluation Panda for Data Storage and Sharing Services in Cloud Computing
Performance Evaluation Panda for Data Storage and Sharing Services in Cloud Computing Gunnala Ajay Kumar M.Tech Student Department of CSE Global Group Of Institutions Batasingaram, Ranga Reddy (Dist),
Enabling Public Auditing for Secured Data Storage in Cloud Computing
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 5 (May. 2013), V3 PP 01-05 Enabling Public Auditing for Secured Data Storage in Cloud Computing 1 Er.Amandeep Kaur,
Proof of Retrivability: A Third Party Auditor Using Cloud Computing
Proof of Retrivability: A Third Party Auditor Using Cloud Computing Vijayaraghavan U 1, Madonna Arieth R 2, Geethanjali K 3 1,2 Asst. Professor, Dept of CSE, RVS College of Engineering& Technology, Pondicherry
Secure Storage Services and Erasure Code Implementation in Cloud Servers
Secure Storage Services and Erasure Code Implementation in Cloud Servers G. Rahul Reddy 1, N. J. Subashini 2 1 Research Scholar, M.Tech, Cloud Computing, Dept of Information Technology, SRM University,
An Efficient Data Correctness Approach over Cloud Architectures
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 8, Issue 12 (October 2013), PP. 33-37 An Efficient Data Correctness Approach over
Index Terms: Data integrity, dependable distributed storage, Cloud Computing
Volume 5, Issue 5, May 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Cloud Data Protection
Enhance Data Security in Cloud Computing using Layered Interleaving Approach
Enhance Data Security in Cloud Computing using Layered Interleaving Approach Mr. Pradeep Semwal Assistant Professor Dept of Computer Application & IT SGRR-Institute of Technology & Sciences, Dehradun Mr.
Ensuring Data Storage Security in Cloud Computing
Ensuring Data Storage Security in Cloud Computing Cong Wang 1, Qian Wang 1, Kui Ren 1, and Wenjing Lou 2 1 ECE Department, Illinois Institute of Technology 2 ECE Department, Worcester Polytechnic Institute
Verifying Correctness of Trusted data in Clouds
Volume-3, Issue-6, December-2013, ISSN No.: 2250-0758 International Journal of Engineering and Management Research Available at: www.ijemr.net Page Number: 21-25 Verifying Correctness of Trusted data in
Ensuring Data Integrity in Cloud Computing
Journal of Computer Applications ISSN: 0974 1925, Volume-5, Issue EICA2012-4, February 10, 2012 Ensuring Data Integrity in Cloud Computing Venkatesa Kumar V Asst.Professor, Dept of Computer Science and
A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA
A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA Mr.Mahesh S.Giri Department of Computer Science & Engineering Technocrats Institute of Technology Bhopal, India
Distributing, Ensuring and Recovery of Data Stored in Cloud
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,
ISSN 2278-3091. Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability
Outsourcing and Discovering Storage Inconsistencies in Cloud Through TPA Sumathi Karanam 1, GL Varaprasad 2 Student, Department of CSE, QIS College of Engineering and Technology, Ongole, AndhraPradesh,India
IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD
IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD 1 Ms.Nita R. Mhaske, 2 Prof. S.M.Rokade 1 student, Master of Engineering, Dept. of Computer Engineering Sir Visvesvaraya
SHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING
SHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING Er. Kavin M 1, Mr.J.Jayavel 2 1 PG Scholar, 2 Teaching Assistant, Department of Information Technology, Anna University Regional
Secure Privacy Preserving Public Auditing for Cloud storage
Secure Privacy Preserving Public Auditing for Cloud storage Sathiskumar R 1, Dr.Jeberson Retnaraj 2 Department of Information Technology, Sathyabama University, Chennai, India 1 Department of Information
Surveying Cloud Storage Correctness using TPA with BLS
Surveying Cloud Storage Correctness using TPA with BLS Priyanka Dehariya 1, Prof. Shweta Shrivastava 2, Dr. Vineet Richaraya 3 1 M.Tech Scholar (CSE), LNCT, Bhopal 2 Asst.Professors, (CSE Department),
A Novel Re-Authentication Scheme on Cloud Based Storage Services T.G.V.V.Srinivas 1, P.Suresh Babu 2 1 Final M.Tech Student, 2 Associate professor
A Novel Re-Authentication Scheme on Cloud Based Storage Services T.G.V.V.Srinivas 1, P.Suresh Babu 2 1 Final M.Tech Student, 2 Associate professor 1,2 Dept of CSE, Kaushik College of engineering, JNTUK
A Secure and Dependable Cloud Storage Service in Cloud Computing
A Secure and Dependable Cloud Storage Service in Cloud Computing Yalla Ram Charan MTech Student Department of CSE Sri Venkateswra College of Engineering & Technology Abstract: Cloud storage is a model
Third Party Auditing For Secure Data Storage in Cloud through Trusted Third Party Auditor Using RC5
Third Party Auditing For Secure Data Storage in Cloud through Trusted Third Party Auditor Using RC5 Miss. Nupoor M. Yawale 1, Prof. V. B. Gadicha 2 1 Student, M.E. Second year CSE, P R Patil COET, Amravati.INDIA.
Efficient Remote Data Possession Checking In Critical Information Infrastructures Ensuring Data Storage Security In Cloud Computing
Efficient Remote Data Possession Checking In Critical Information Infrastructures Ensuring Data Storage Security In Cloud Computing Dr. T.Nalini 1, Dr.K.Manivannan 2,Vaishnavi Moorthy 3 1 Professor, Department
Data Security And Integrity Of Cloud Storage In Cloud Computing
Data Security And Integrity Of Cloud Storage In Cloud Computing Yogita Gunjal 1, Prof. J.Rethna Virjil Jeny 2 ME.student, Dept. Of Information technology, Amrutvahini College of Engineering,Sangamner,
Keywords: Cloud Computing, Data Dynamics, Data Integrity, Error Localization, Third Party Auditor.
www.semargroup.org, www.ijsetr.com ISSN 2319-8885 Vol.03,Issue.11 June-2014, Pages:2300-2307 Secure Cloud: Storage with Privacy Preserving Public Auditing and Data Dynamics Dept of CSE, Malabar College
PRIVACY PRESERVING AND BATCH AUDITING IN SECURE CLOUD DATA STORAGE USING AES
PRIVACY PRESERVING AND BATCH AUDITING IN SECURE CLOUD DATA STORAGE USING AES 1 SANTOSH P. JADHAV, 2 B. R. NANDWALKAR 1,2 Department of Computer Engineering, Late G.N.Sapkal collage of engineering, University
How To Design A Cloud Data Storage Service For A Cloud Computer System
Ensuring Security Services for Data Storing and Data Sharing in Cloud Computing D. Raman 1, Bojja Vamshikrishna 2 1 Associate Professor Department of Computer Science and Engineering, Vardhaman College
Practical Data Integrity Protection in Network-Coded Cloud Storage
Practical Data Integrity Protection in Network-Coded Cloud Storage Henry C. H. Chen Department of Computer Science and Engineering The Chinese University of Hong Kong Outline Introduction FMSR in NCCloud
Remote Data Integrity Checking in Cloud Computing
ISSN 2321 8169 Remote Data Integrity Checking in Cloud Computing Khaba M.V (Assistant Professor/CSE) RVS School of Engineering,dindigul [email protected] M.Santhanalakshmi(Assistant Professor/CSE) RVS
Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm
Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm Twinkle Graf.F 1, Mrs.Prema.P 2 1 (M.E- CSE, Dhanalakshmi College of Engineering, Chennai, India) 2 (Asst. Professor
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING T.Vidhya Sree M.Phil Research Scholar,CS, MGR College, Hosur (India) ABSTRACT Cloud Computing is the long dreamed vision
Cloud Server Storage Security Using TPA
Cloud Server Storage Security Using TPA I K.Meenakshi, II Victo Sudha George I Student (M.Tech), DR. MGR Educational and Research Institute, India II Assisstant Professo, DR. MGR Educational and Research
15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM
RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM Dhanashri Bamane Vinayak Pottigar Subhash Pingale Department of Computer Science and Engineering SKN
Analysis of Secure Cloud Data Sharing Within a Group
Analysis of Secure Cloud Data Sharing Within a Group Ms. uri Pande* Department of CSE, GHRAET Nagpur (M.S), India, Prof. Vikrant Chole Dept of Computer Science & Engg Nagpur (M.S.), India Abstract In this
Implementation of Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage
Implementation of Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage 1 A. MsVaishali Patil, 2 B. Prof. Archana Lomte Dept of Computer,BSIOTR, Pune ABSTRACT Cloud computing is speculated
Keywords: - Ring Signature, Homomorphic Authenticable Ring Signature (HARS), Privacy Preserving, Public Auditing, Cloud Computing.
Survey on Privacy Preserving Public Auditing Techniques for Shared Data in the Cloud Kedar Jayesh Rasal 1, Dr. S.V.Gumaste 2, Sandip A. Kahate 3 Computer Engineering, Pune University, SPCOE, Otur, Pune,
Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving,
Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Third Party
AN INVESTIGATION OF SECURITY THEME FOR CLOUD COMPUTING
AN INVESTIGATION OF SECURITY THEME FOR CLOUD COMPUTING Mrs. J. Pavithra 1 Mr. A. Naveen 2 1 (MRIT, Hyderabad, India, [email protected]) 2 (Asst. Professor, MRIT, Hyderabad, India, [email protected])
SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING
SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING Saranya.V 1, Suganthi.J 2, R.G. Suresh Kumar 3 1,2 Master of Technology, Department of Computer Science and Engineering, Rajiv Gandhi College of Engineering
EFFICIENT DISCOVERY OF INTEGRITY AUTOMATION IN HYBRID CLOUD COMPUTING
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE EFFICIENT DISCOVERY OF INTEGRITY AUTOMATION IN HYBRID CLOUD COMPUTING K.Saipriya 1, A.Ravi Kumar 2 1 M.Tech Student, Dept of
How To Encrypt Data With A Power Of N On A K Disk
Towards High Security and Fault Tolerant Dispersed Storage System with Optimized Information Dispersal Algorithm I Hrishikesh Lahkar, II Manjunath C R I,II Jain University, School of Engineering and Technology,
Swathi matha P.G,Student,Jyothi.S,Asst professor,neetha Natesh,Associate professor,dr.ait,bangalore. A) Examples Of model:
PRESERVING PRIVACY FOR SHARED DATA ON CLOUD STORAGE SYSTEM WITH SECURITY Swathi matha P.G,Student,Jyothi.S,Asst professor,neetha Natesh,Associate professor,dr.ait,bangalore Abstract- Cloud computing is
PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE
PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE Abstract: Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared
PRIVACY PRESERVING PUBLIC AUDITING FOR SECURED DATA STORAGE IN CLOUD USING BLOCK AUTHENTICATION CODE
PRIVACY PRESERVING PUBLIC AUDITING FOR SECURED DATA STORAGE IN CLOUD USING BLOCK AUTHENTICATION CODE R.REVATHI # PG Scholar #, Bharathiyar Institute Of Engineering for Women, Deviyakurichi, Salem(DT) India
Data Integrity for Secure Dynamic Cloud Storage System Using TPA
International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 7-12 International Research Publication House http://www.irphouse.com Data Integrity for Secure
Privacy preserving technique to secure cloud
Vitthal S. Gutte Pune University, MIT College of engineering, Kothrud, Pune 411038, India [email protected] Privacy preserving technique to secure cloud Prof. Priya Deshpande Pune University,
preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.
Privacy-Preserving Public Auditing For Secure Cloud Storage ABSTRACT: Using cloud storage, users can remotely store their data and enjoy the on-demand high-quality applications and services from a shared
SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD
SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD S.REVATHI B.HASEENA M.NOORUL IZZATH PG Student PG Student PG Student II- ME CSE II- ME CSE II- ME CSE Al-Ameen Engineering
Enhancing Data Integrity in Cloud Storage by Ensuring Maximum Availability
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X Enhancing Data Integrity in Cloud Storage by Ensuring Maximum Availability Sivasankaran.
International Journal of Advanced Research in Computer Science and Software Engineering
Volume 3, Issue 3, March 3 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Using Third Party
Survey Paper on Integrity Auditing of Storage
International Journal of Computational Engineering Research Vol, 04 Issue, 3 Survey Paper on Integrity Auditing of Storage Ugale Santosh A 1 1M.E. Computer AVCOE, Sangmner, India ABSTRACT: Cloud servers
Data Security in Cloud Using Elliptic Curve Crytography
Data Security in Cloud Using Elliptic Curve Crytography Puneetha C 1, Dr. M Dakshayini 2 PG Student, Dept. of Information Science & Engineering, B.M.S.C.E, Karnataka, Bangalore,India 1 Professor, Dept.
A Survey on Data Integrity of Cloud Storage in Cloud Computing
A Survey on Data Integrity of Cloud Storage in Cloud Computing A B S T R A C T Mr.Vitthal Raut, Prof. Suhasini Itkar Department Computer Engineering, PES Modern College of Engineering, Pune, India. [email protected],
Dependable and Secure Storage Services in Cloud Computing
Dependable and Secure Storage Services in Cloud Computing D.Veena Sanjitha #1, M.Himaswanthi #2, T.V.N.Sai Sindhura #3, K.V.V. Satyanarayana * # CSE Department, KL University Guntur, AndhraPradesh * K.V.V.
RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES
RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES 1 MD ISMAIL Z, 2 ASHFAQUE AHAMED K. 1 PG Scholar,Department of Computer Science, C.Abdul Hakeem College Of Arts and Science,Melvisharam.
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction 1 Priyadharshni.A, 2 Geo Jenefer.G 1 Master of engineering in computer science, Ponjesly College of Engineering 2 Assistant Professor,
International Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 12, December 2014 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
