How To Ensure Data Integrity In Clouds
|
|
|
- Jessie Paul
- 5 years ago
- Views:
Transcription
1 Proficient Audit Services Outsourced for Data Availability in Clouds N Praveen Kumar Reddy #1, Dr Subhash Chandra *2 N Praveen Kumar Reddy, pursuing M.Tech from Holy Mary Institute of Technology and Science,, Affiliated to JNTU Hyderabad, A.P., India Dr Subhash Chandra, working as Principal, at Holy Mary Institute of Technology and Science,, Affiliated to JNTU Hyderabad, A.P., India Abstract:- Cloud computing popularity increased from past several year in huge manner. Cloud computing is a type of computing that relies on sharing resources in compare to based on local servers or personal devices to handle applications. Presently implementation of cloud computing has increased rapidly in IT industry and in other organization also. Cloud is a collection of number of dedicated distributed database. Cloud computing having number of benefit over previous single database such as low cost and accessibility of data. If a data is store only at single place and unfortunately that data has been lost then there is no recovery of data. Cloud computing having one more benefit such that we can store more than one copy of data, in this manner if a data is going to be loss at one place that can be retrieved from other place. The problem of service unavailability has been solved by using cloud computing, which was a major concern in single cloud. In cloud computing auditing service for user also becoming a major issue. When a client is interacting with the cloud it having no physical association with cloud for a long time, in this case security issue took a major threat for cloud computing. For this we propose a novel technique that is Auditing service which ensure the integrity and availability of outsourced data in cloud computing. Here we are going to propose Provable Data Possession(PDP) which using cryptography technique for data possession in cloud computing. Here we will also show that cost for auditing data by using PDP is less than the previous one. This technique will best for untrusted server for realizing the security threat which effect the integrity of data into cloud. In this paper we will show auditing service using by Provable data procession technique. It also use some encryption technique. database which are linked together in a distributed environment. There is cloud owner or cloud manager which having control over all databases, these databases known as cloud. Cloud computing provide a huge benefit to user. Cloud computing provides facilities for user to develop and manage their own applications on the cloud,this enhance the concept of virtualization of resources. Through virtualization resources are managed by themselves. The implementation of cloud computer increased widely in organization. Cloud computing has started to obtain mass appeal in corporate data centers as it enables the data center to operate like the Internet through the process of enabling computing resources to be accessed and shared as virtual resources in a secure and scalable manner. For a small and medium size business, the benefits of cloud computing is currently driving adoption. In the small,medium sector there is often a lack of time and financial resources to purchase, deploy and maintain an infrastructure. In cloud computing, small businesses can access these resources and expand or shrink services as business needed change. The common pay-as-you-go subscription model is designed to let SMBs easily add or remove services and you typically will only pay for what you do use Keyword:-Cloud Computing, Security, Integrity, Availability. I-INTRODUCTION Cloud computing become a big invention of internet in today s world. Cloud computing having one use that a user can access his service any where any time. The flexibility of storing and retrieving data becoming so fast. In traditionally approach of storing data, user string his data at single place which is not accessible from all where,and once if that data is loss from that place its impossible to take that back. This issue known as service unavailability. Solution of this come as a cloud computing. A cloud is pool of number of distributed Fig 1-cloud computing ISSN: Page3365
2 In cloud computing cloud service is provided by the Cloud Service provider. Cloud having number of cloud which having communication with each other.csp make control over them. When a end user have to use the cloud service, he interact with the CSP and place his request to CSP. CSP will decide the place and cost for using service over cloud towards user. After approval of it end user can store his data over cloud. But in this situation there may be a chance of attacking on cloud. There can be some malware inside the data which can harm the cloud and also used it for misuse that data. Hence security also become a major concern for that. For this situation solution some technique has been come already which check the data before storing on cloud these services known as the auditing services. Previously the auditing technique was depend on Proof of retrivibility(por) and probable data procession(pdp).this technique is based on a probable proof technique that will ensure here that the end user data will remain in use without downloading from cloud computing. This technique is also known as verification without download. For making it easy to use some POR and POP technique is working on public verification way. By using this anyone can use this verification technique publicly for auditing of storage data. Hence we can say that this technique provide us an effective and efficient approach for accommodating the requirements from public audit. This POR/POP approach give us flexibility for evolving around on untrusted cloud and can check huge amount of data. The already existing approach do not have complete proof about deception and forgery of untrusted cloud. The possibility of data leakage at verification point also come across in several experiments. These drawbacks greatly effect the impact of auditing services over cloud. Hence a new technique is required for enabling the security on public verification protocol in cloud auditing service. Here in proposed system we also focus on how to improve the performance of auditing services. II -- SYSTEM ARCHITECTURE In this section we are showing system architecture for Auditing service in cloud computing. In cloud computing environment ultimately end user have to store the data in cloud. For this cloud service provider having control over it. Here we are going to explain the system architecture for Auditing service. The following figure will show the basic architecture of auditing service. Fig 2-Auditing Architecture In cloud computing Normally in cloud computing user of cloud give their data to cloud manager and also give the information that in how many cloud data should have to store. Cloud manager having communication with numerous of clouds, he store the information given by user to some of those clouds and also give the accessibility control to user. Whenever user want to retrieve his data he can retrieve from any of those cloud which increases the potential and availability of data. The information or data which are store inside clouds can contain sensitive information. The cloud provider all the time not trusted, they can be untrusted which make a security threat to user data. In this paper we are presenting a technique by using which we can assure sensitivity of data will not loose. The auditing service architecture consist of component that component devided into mainly four component. First we are going to discuss the functionality and responsibility of those components. 1-Data Owner 2-Cloud Service Provider(CSP) 3-Third Party Auditor(TPA) 4-Granted Application. A.Data Owner:-Data owner is an end user who want to store his data on the cloud. The simple functionality of any business application is that it consist of huge amount of data which can be related with the admin and also the user of the business. This data contain important and secret data also. The data should have to store for future reference. The previous technique was storing the data into a business dedicated database server. The issue with previous one was that if that server will stop working whole of the data will loose and ISSN: Page3366
3 making setup for this also economical not less otherwise it is so costly.cloud computing become a huge solution for this problem. In cloud computing number of distributed databse are connected together and having single control overthem. The cost for storing data of end user is comparatively too less than the previous existing system. Availability and efficiency of data storing and retrieving is also very high in cloud computing. So we can say that cloud computing is an best place to store the data for Data owner. B.Cloud Service Provider(CSP):-The second component of our architecture is cloud service provider. It is very well known that cloud computing is a collection of number of distributed database, these database is known as the cloud. In a Cloud computing environment some database are communicating and sharing each other resources, the controlling of all cloud having with one entity that entity is known as Cloud Service Provider. It also act as a bridge between Dataowner and clouds. An end User or Data owner place his requests for storing his data into clouds with CSP.The responsibility of CSP is that he must have to take data from user and also have to take information thatin how many clouds he want to store his information after getting those information,csp pass those data to that many number of cloud. After storing data CSP provide authenticity to Granted user and they only can retrieve data from cloud.so CSP is major component in our cloud computing architecture and for making authenticity and security he is responsible one. C.Third party Auditor(TPA):-Third component of our architecture is Third party Auditor. In cloud computing environment huge amount of data is stored on cloud, the security of data also become an vital issue from past some year. One of the security threat is that an end user can send malware with his data to the clouds which can effect performance and integrity of other data. For this issue only we proposed an efficient audit service functionality for security of data. In our architecture we made a component TPA which having communication between dataowner and cloud service provider both. TPA is a third party who having relation with dataowner and CSP. TPA also verify entity from both, means both of them having agreement and TPA can audit the data of user. In architecture when dataowner sending his data to clouds,first of all that data is going to varifiy by the Third party auditor for that purpose TPA using some technique. After that data is get verify in all parameter of TPA,then only it can reach to the CSP and CSP can save it into corresponding clouds. The benefit of implementing this component in cloud environment is that no one can make security threat from user end with the incoming data towards cloud. D.Grant Application:- The last and fourth component of our architecture is Grant Application.The Grant Application is one who having authentication from Data owner and from CSP for communicating with the data on cloud. In most of the case GA are end user of the Business whose owner is end user of Cloud. There are some other also in our architecture like Auditwithout-downloading which going to allow Third party auditor to verify the authenticity of cloud data on demand without getting a duplicate copy of complete data or making extra functionality on-line burden to the cloud users. One other issue like verification-correctness which is used to prove that there is no cheating with user. CSP that can pass the audit from Third party auditor without indeed storing user s data intact. privacy-preserving: to ensure that there exists no way for TPA to derive users data from the information collected during the auditing process and High-performance which allow third party auditor to perform auditing with minimum overheads in storage, computation and communication, and to support statistical audit sampling and optimized audit schedule with a long\ enough period of time. III- IMPLEMENTATION OF AUDIT SERVICE In this section we will discuss system implementation of interactive audit scheme, in which we using interative PDP technique to support our auditing architecture on cloud. The basic fundamental construction model for this system is based on interactive proof system. This basis having surety about confidentiality about secret data and also having the undeceivability of invalid tag, which is also known as Zeroknowledge propert and Soundness property. Definition of Interactive Audit Service A cryptographic interactive audit scheme (S) is a collection of collection of two algorithm and and an interactive proof system. S = (K, T, P): A.KeyGen(1 s ):-Key generation is first algorithm in which it going to take one security parameter (s),and after processing it going to return a public secret keypair which is (pk,sk). B.TagGen(sK,F):- This one is second algorithm will use in auditing service system. In this algorithm it going to take the secret key (sk) and a file F, and it going to return triple values set (γ, φ, σ) where γ denotes the secret used to generate verification tags, φ denotes the set of public verification parameter u and index information and σ denoted the set of verification tags. C.Proof(CSP,TPA):- This is an interactive proof system. It is a public two party proof protocol of retrievability between Cloud service provider who working as a prover and Third party authority who working as a verifier. Here Cloud service provider takes as input a file F and a set of tags σ,and a public key pk and s set of parameters φ are the common input between prover and verifier. At the ending of the protocol run, ISSN: Page3367
4 Third party auditor that is verifier return {0 1} where 1 means the file is correct stored on the server. This model is more efficient model compare to previous existing model for outsourced data. There is no limitation of steps of verification,including scale, sequence and the number of moves in protocol because of verification process is based on interactive protocol. So it has been proved that it have greater convenience for the construction of protocol. Fig 4- ratio of queried block V-CONCLUSION Fig 3-Framework for interactive audit scheme IV-PERFORMANCE EVALUATION The propsed audit service scheme achieves the ddection phenomenon of cloud service provider servers misbehanviour in term of allowing malware towards the cloud in a random experiment sample mode in order to minimize the workload on server. The detection probability is: p = 1 n e t = 1 (1 Pb)t. n Hence the number of queried block is: t log(1 p) /log (1 Pb) In this proposed paper we discussed the construction of an efficient audit service which will work on the data integrity aspect in clouds. Here we proposed an interactive audit protocol for implementing the audit service which having one basic component as Third party auditor, in compare to previous standerd interactive proof system.in this TPA which known as third party auditor going to work as an agent for Data Owner and and for CSP. Here TPA issued a periodic verification to monitor the change of outsourced data by providing an optimized schedule. In this manner we hope that the proposed audit service will work with efficiently and effectively for the data integrity on the clouds in cloud computing environment. REFFERENCES Ateniese, G., Burns, R.C., Curtmola, R., Herring, J., Kissner, L., Peterson, Z.N.J., Song, D.X., Provable data possession at untrusted stores. In: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Ateniese, G., Pietro, R.D., Mancini, L.V., Tsudik, G., Scalable and efficient provable data possession. In: Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, SecureComm, pp. ISSN: Page3368
5 Barreto, P.S.L.M., Galbraith, S.D., O Eigeartaigh, C., Scott, M., Efficient pairing computation on supersingular abelian varieties. Des. Codes Cryptogr. Beuchat, J.-L., Brisebarre, N., Detrey, J., Okamoto, E., Arithmetic operators for pairing-based cryptography. In: Cryptographic Hardware and Embedded Systems Boneh, D., Boyen, X., Shacham, H.,2004. Short group signatures. In: In Proceedings of CRYPTO 04, LNCS Series. Springer-Verlag, Boneh, D., Franklin, M., Identity-based encryption from the weil pairing. In: Advances in Cryptology (CRYPTO 2001). Bowers, K.D., Juels, A., Oprea, A., Hail: a highavailability and integrity layer for cloud storage. In: ACM Conference on Computer and Communications Security, Cramer, R., Damgård, I., MacKenzie, P.D., Efficient zero-knowledge proofs of knowledge without intractability assumptions. In: Public Key Cryptography, AUTHORS PROFILE N Praveen Kumar Reddy, pursuing M.Tech from Holy Mary Institute of Technology and Science, Hyderabad, Andhra Pradesh, India, Affiliated to JNTU Hyderabad. Dr SUBHASH CHANDRA, working as a Principal, at Holy Mary Institute of Technology and Science, Hyderabad, Andhra Pradesh, India, Affiliated to JNTU Hyderabad. ISSN: Page3369
A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA
A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA Mr.Mahesh S.Giri Department of Computer Science & Engineering Technocrats Institute of Technology Bhopal, India
SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD
Volume 1, Issue 7, PP:, JAN JUL 2015. SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD B ANNAPURNA 1*, G RAVI 2*, 1. II-M.Tech Student, MRCET 2. Assoc. Prof, Dept.
Improving data integrity on cloud storage services
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department
IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD ENVIRONMENT
IJRRECS/November 2014/Volume-2/Issue-11/3699-3703 ISSN 2321-5461 INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD
Secrecy Maintaining Public Inspecting For Secure Cloud Storage
Secrecy Maintaining Public Inspecting For Secure Cloud Storage K.Sangamithra 1, S.Tamilselvan 2 M.E, M.P.Nachimuthu.M.Jaganathan Engineering College, Tamilnadu, India 1 Asst. Professor, M.P.Nachimuthu.M.Jaganathan
Data Security & Availability in Multi-Cloud Storage with Cooperative Provable Data Possession
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 2 February 2015, Page No. 10375-10379 Data Security & Availability in Multi-Cloud Storage with Cooperative
Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System
Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System 1 K.Valli Madhavi A.P [email protected] Mobile: 9866034900 2 R.Tamilkodi A.P [email protected] Mobile:
AN EFFICIENT STRATEGY OF THE DATA INTEGRATION BASED CLOUD
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF THE DATA INTEGRATION BASED CLOUD Koncha Anantha Laxmi Prasad 1, M.Yaseen Pasha 2, V.Hari Prasad 3 1
DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION
DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION Prof. M. Ben Swarup Professor, Department of CSE Vignan's Institute of Information Technology Visakhapatnam-49, India Chukkala
EFFICIENT DISCOVERY OF INTEGRITY AUTOMATION IN HYBRID CLOUD COMPUTING
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE EFFICIENT DISCOVERY OF INTEGRITY AUTOMATION IN HYBRID CLOUD COMPUTING K.Saipriya 1, A.Ravi Kumar 2 1 M.Tech Student, Dept of
Surveying Cloud Storage Correctness using TPA with BLS
Surveying Cloud Storage Correctness using TPA with BLS Priyanka Dehariya 1, Prof. Shweta Shrivastava 2, Dr. Vineet Richaraya 3 1 M.Tech Scholar (CSE), LNCT, Bhopal 2 Asst.Professors, (CSE Department),
A Novel Re-Authentication Scheme on Cloud Based Storage Services T.G.V.V.Srinivas 1, P.Suresh Babu 2 1 Final M.Tech Student, 2 Associate professor
A Novel Re-Authentication Scheme on Cloud Based Storage Services T.G.V.V.Srinivas 1, P.Suresh Babu 2 1 Final M.Tech Student, 2 Associate professor 1,2 Dept of CSE, Kaushik College of engineering, JNTUK
Near Sheltered and Loyal storage Space Navigating in Cloud
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 8 (August. 2013), V2 PP 01-05 Near Sheltered and Loyal storage Space Navigating in Cloud N.Venkata Krishna, M.Venkata
Verifying Correctness of Trusted data in Clouds
Volume-3, Issue-6, December-2013, ISSN No.: 2250-0758 International Journal of Engineering and Management Research Available at: www.ijemr.net Page Number: 21-25 Verifying Correctness of Trusted data in
Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication
Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication Sanjay Kumar Baghel Mtech Scholar, CSE, CSIT DURG [email protected] Bhupesh Kumar Dewangan Assistant Professor,CSE,
Development of enhanced Third party Auditing Scheme for Secure Cloud Storage
Development of enhanced Third party Auditing Scheme for Secure Cloud Storage Bhanu Prakash Chamakuri*1, D. Srikar*2, Dr. M.Suresh Babu*3 M.Tech Scholar, Dept of CSE, Grandhi Varalakshmi Institute Of Technology,
SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD
SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD S.REVATHI B.HASEENA M.NOORUL IZZATH PG Student PG Student PG Student II- ME CSE II- ME CSE II- ME CSE Al-Ameen Engineering
AN EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA IN TEGRITY IN CLOUDS
AN EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA IN TEGRITY IN CLOUDS Mrs.K.Saranya, M.E.,(CSE), Jay Shriram Group of Institutions, Tirupur. [email protected] Dr.S.Rajalakshmi, Associate Professor/CSE,
February. ISSN: 2321-8134
IJFEAT INTERNATIONAL JOURNAL FOR ENGINEERING APPLICATIONS AND TECHNOLOGY TITLE: DATA PLACE & MANAGE SECURITY IN CLOUD COMPUTING FOR EFFECTIVE AND FLEXIBLE DISTRIBUTED SYSTEM 1 Mr. Pritam S. Bhoyar, 2 Mr.
CONSIDERATION OF DYNAMIC STORAGE ATTRIBUTES IN CLOUD
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE CONSIDERATION OF DYNAMIC STORAGE ATTRIBUTES IN CLOUD Ravi Sativada 1, M.Prabhakar Rao 2 1 M.Tech Student, Dept of CSE, Chilkur Balaji
RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES
RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES 1 MD ISMAIL Z, 2 ASHFAQUE AHAMED K. 1 PG Scholar,Department of Computer Science, C.Abdul Hakeem College Of Arts and Science,Melvisharam.
15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM
RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM Dhanashri Bamane Vinayak Pottigar Subhash Pingale Department of Computer Science and Engineering SKN
ADVANCE SECURITY TO CLOUD DATA STORAGE
Journal homepage: www.mjret.in ADVANCE SECURITY TO CLOUD DATA STORAGE ISSN:2348-6953 Yogesh Bhapkar, Mitali Patil, Kishor Kale,Rakesh Gaikwad ISB&M, SOT, Pune, India Abstract: Cloud Computing is the next
Development of Effective Audit Service to Maintain Integrity of Migrated Data in Cloud
Development of Effective Audit Service to Maintain Integrity of Migrated Data in Cloud Shekhar S. Kausalye 1, Prof. P.N. Kalavadekar 2 1 PG Student, Dept. of Computer Engineering, SRES COE, Kopargaon,
How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System
REVIEW ARTICAL A Novel Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage Dumala Harisha 1, V.Gouthami 2 1 Student, Computer Science & Engineering-Department, JNTU Hyderabad India
Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing.
Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Privacy - Preserving
ISSN 2278-3091. Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability
Outsourcing and Discovering Storage Inconsistencies in Cloud Through TPA Sumathi Karanam 1, GL Varaprasad 2 Student, Department of CSE, QIS College of Engineering and Technology, Ongole, AndhraPradesh,India
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction 1 Priyadharshni.A, 2 Geo Jenefer.G 1 Master of engineering in computer science, Ponjesly College of Engineering 2 Assistant Professor,
Data Integrity for Secure Dynamic Cloud Storage System Using TPA
International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 7-12 International Research Publication House http://www.irphouse.com Data Integrity for Secure
Trusted Public Auditing Process for Secure Cloud Storage
Trusted Public Auditing Process for Secure Cloud Storage K.Adhiyaman 1, A. Jesudoss 2, D.Saravanan 3 1 Final Year MCA, Faculty of Computing, Department of MCA Sathyabama University, Chennai,Tamil Nadu,
OVERVIEW OF SECURITY ISSUES IN CLOUD COMPUTING
OVERVIEW OF SECURITY ISSUES IN CLOUD COMPUTING K. Arumugam 1, P. Sumathi 2 1 Research Scholar/Department Of Computer Science, Government Arts College, Coimbatore (India) 2 Assistant Professor/Department
Identifying Data Integrity in the Cloud Storage
www.ijcsi.org 403 Identifying Data Integrity in the Cloud Storage Saranya Eswaran 1 and Dr.Sunitha Abburu 2 1 Adhiyamaan College of Engineering, Department of Computer Application, Hosur. 2 Professor and
SHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING
SHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING Er. Kavin M 1, Mr.J.Jayavel 2 1 PG Scholar, 2 Teaching Assistant, Department of Information Technology, Anna University Regional
Enable Public Audit ability for Secure Cloud Storage
Enable Public Audit ability for Secure Cloud Storage Leela Poornima 1, D.Hari Krishna 2 1 Student, Nova College of Engineering and Technology, Ibrahimpatnam,Krishna Dist., Andhra Pradesh, India 2 Assistant
Index Terms : cloud computing, Distributed Storage, error detection, data recovery, SHA, dynamic block operations
Revisiting Secure Cloud Storage by Replacing Token Generation With SHA Ms. Bhagyashree Alhat (1), Prof. Amar Buchade(2) Pune Institute of Computer Technology, University of Pune,PG Student(1), Assistant
SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE
International Journal of Computer Network and Security(IJCNS) Vol 7. No.1 2015 Pp. 1-8 gopalax Journals, Singapore available at : www.ijcns.com ISSN: 0975-8283 ----------------------------------------------------------------------------------------------------------------------------------------------------------
Analysis of Secure Cloud Data Sharing Within a Group
Analysis of Secure Cloud Data Sharing Within a Group Ms. uri Pande* Department of CSE, GHRAET Nagpur (M.S), India, Prof. Vikrant Chole Dept of Computer Science & Engg Nagpur (M.S.), India Abstract In this
preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.
Privacy-Preserving Public Auditing For Secure Cloud Storage ABSTRACT: Using cloud storage, users can remotely store their data and enjoy the on-demand high-quality applications and services from a shared
International Journal of Infinite Innovations in Engineering and Technology. ISSN (Online): 2349-2287, ISSN (Print): 2349-2279 2015
SECURED AUDITING SYSTEM FOR CLOUD DATA STORAGE WITH ERROR CORRECTION GUARANTEES 1 S.Sathya, 2 S.Sivakumar 1 Research Scholar, Department of Computer Science & Applications, PGP College of Arts & Science,
PRIVACY PRESERVING PUBLIC AUDITING FOR SECURED DATA STORAGE IN CLOUD USING BLOCK AUTHENTICATION CODE
PRIVACY PRESERVING PUBLIC AUDITING FOR SECURED DATA STORAGE IN CLOUD USING BLOCK AUTHENTICATION CODE R.REVATHI # PG Scholar #, Bharathiyar Institute Of Engineering for Women, Deviyakurichi, Salem(DT) India
Keywords: Cloud Computing, Data Dynamics, Data Integrity, Error Localization, Third Party Auditor.
www.semargroup.org, www.ijsetr.com ISSN 2319-8885 Vol.03,Issue.11 June-2014, Pages:2300-2307 Secure Cloud: Storage with Privacy Preserving Public Auditing and Data Dynamics Dept of CSE, Malabar College
Secure Way of Storing Data in Cloud Using Third Party Auditor
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 4 (Jul. - Aug. 2013), PP 69-74 Secure Way of Storing Data in Cloud Using Third Party Auditor 1 Miss.
E-mail- [email protected],[email protected] [email protected]
International Journal Of Scientific Research And Education Volume 2 Issue 10 Pages-2019-2026 October-2014 ISSN (e): 2321-7545 Website: http://ijsae.in Multi-Cloud Storage Data Possession Based Data Integrity
Integrity Verification In Multiple Cloud Storage Using Cooperative PDP Method
Integrity Verification In Multiple Cloud Storage Using Cooperative PDP Method * Usha Sundari Dara 1 M. Swetha Chandra 2 1PG Student (M. Tech) Dept. of CSE, TRR College of Engineering, Hyderabad, AP, India
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING T.Vidhya Sree M.Phil Research Scholar,CS, MGR College, Hosur (India) ABSTRACT Cloud Computing is the long dreamed vision
Energy Efficiency in Secure and Dynamic Cloud Storage
Energy Efficiency in Secure and Dynamic Cloud Storage Adilet Kachkeev Ertem Esiner Alptekin Küpçü Öznur Özkasap Koç University Department of Computer Science and Engineering, İstanbul, Turkey {akachkeev,eesiner,akupcu,oozkasap}@ku.edu.tr
M. Nathiya 2 B.Tech. (IT), M.E. (CSE), Assistant Professor, Shivani Engineering College, Trichy, Tamilnadu, India.
ISSN: 2321-7782 (Online) Volume 2, Issue 5, May 2014 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com Robust Data
Secure Distribution of File on Cloud
Secure Distribution of File on Cloud Niyamat I. Ujloomwale, Ranjana Badre Dept. of Computer, MIT Academy of Engineering, Alandi, Savitri Phule Pune University, Pune, India Dept. of Computer, MIT Academy
Enhance Data Security in Cloud Computing using Layered Interleaving Approach
Enhance Data Security in Cloud Computing using Layered Interleaving Approach Mr. Pradeep Semwal Assistant Professor Dept of Computer Application & IT SGRR-Institute of Technology & Sciences, Dehradun Mr.
I. Introduction. A. Related Work
PUBLIC VERIFIABILITY AND DATA DYNAMICS IN CLOUD SERVER P.Saranya, Roever Engineering College; S.Vishnupriya, Roever Engineering College; E.Elangovan, PRIST University Abstract- Cloud computing stores the
A Survey on Secure Storage Services in Cloud Computing
Global Journal of Computer Science and Technology Cloud & Distributed Volume 12 Issue 12 Version 1.0 Year 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
Performance Evaluation Panda for Data Storage and Sharing Services in Cloud Computing
Performance Evaluation Panda for Data Storage and Sharing Services in Cloud Computing Gunnala Ajay Kumar M.Tech Student Department of CSE Global Group Of Institutions Batasingaram, Ranga Reddy (Dist),
TITLE: Secure Auditing and Deduplicating Data in Cloud(Survey Paper)
TITLE: Secure Auditing and Deduplicating Data in Cloud(Survey Paper) Pratik Raut 1, Pratik Kamble 2, Prafull Pansare 3, Dipti Salunkhe 4 1 UG Student, Dept. of Computer Engineering, JSCOE, Hadapsar, Pune,
IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD
IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD 1 Ms.Nita R. Mhaske, 2 Prof. S.M.Rokade 1 student, Master of Engineering, Dept. of Computer Engineering Sir Visvesvaraya
Cloud Data Service for Issues in Scalable Data Integration Using Multi Authority Attribute Based Encryption
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,
Data storage security in Cloud
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 6, Ver. III (Nov Dec. 2014), PP 50-56 Data storage security in Cloud Mrs. Niyamat Ujloomwale, Mrs.
Privacy-Preserving Public Auditing & Data Intrgrity for Secure Cloud Storage
Privacy-Preserving Public Auditing & Data Intrgrity for Secure Cloud Storage Imran Ahmad Student, M.Tech Dept. Computer Science & Engineering Patel Institute of Technology Bhopal, India [email protected]
Remote Data Integrity Checking in Cloud Computing
ISSN 2321 8169 Remote Data Integrity Checking in Cloud Computing Khaba M.V (Assistant Professor/CSE) RVS School of Engineering,dindigul [email protected] M.Santhanalakshmi(Assistant Professor/CSE) RVS
A Secure and Dependable Cloud Storage Service in Cloud Computing
A Secure and Dependable Cloud Storage Service in Cloud Computing Yalla Ram Charan MTech Student Department of CSE Sri Venkateswra College of Engineering & Technology Abstract: Cloud storage is a model
Data Grid Privacy and Secure Storage Service in Cloud Computing
Data Grid Privacy and Secure Storage Service in Cloud Computing L.Revathi 1, S.Karthikeyan 2 1 Research Scholar, Department of Computer Applications, Dr. M.G.R. Educational and Research Institute University,
Efficient Remote Data Possession Checking In Critical Information Infrastructures Ensuring Data Storage Security In Cloud Computing
Efficient Remote Data Possession Checking In Critical Information Infrastructures Ensuring Data Storage Security In Cloud Computing Dr. T.Nalini 1, Dr.K.Manivannan 2,Vaishnavi Moorthy 3 1 Professor, Department
A Proxy-Based Data Security Solution in Mobile Cloud
, pp. 77-84 http://dx.doi.org/10.14257/ijsia.2015.9.5.08 A Proxy-Based Data Security Solution in Mobile Cloud Xiaojun Yu 1,2 and Qiaoyan Wen 1 1 State Key Laboratory of Networking and Switching Technology,
Cloud Data Storage Services Considering Public Audit for Security
Global Journal of Computer Science and Technology Cloud and Distributed Volume 13 Issue 1 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
Data Storage Security in Cloud Computing
Data Storage Security in Cloud Computing Manoj Kokane 1, Premkumar Jain 2, Poonam Sarangdhar 3 1, 2, 3 Government College of Engineering and Research, Awasari, Pune, India Abstract: Cloud computing is
How To Ensure Data Integrity In Cloud Computing
A Novel Approach for public exploration Data with Effective user Denial in the cloud Mahankali Anitha PG Scholar Department of CSE J.Vijayasree Assistant professor Department of CSE Dr.M.V.Siva Prasad
Keywords: Cloud Computing, Third Party Auditor, Integrity.
Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Implementation of
SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING
SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING Saranya.V 1, Suganthi.J 2, R.G. Suresh Kumar 3 1,2 Master of Technology, Department of Computer Science and Engineering, Rajiv Gandhi College of Engineering
Survey Paper on Integrity Auditing of Storage
International Journal of Computational Engineering Research Vol, 04 Issue, 3 Survey Paper on Integrity Auditing of Storage Ugale Santosh A 1 1M.E. Computer AVCOE, Sangmner, India ABSTRACT: Cloud servers
ENABLING AUDITABILITY FOR SECURE CLOUD STORAGE USING TPA
ENABLING AUDITABILITY FOR SECURE CLOUD STORAGE USING TPA 1 Chennuri. Kranthi kumar, 2 Vishakha Lokhande 1 M.Tech Student, Department of CSE, KG reddy College Of Engineering and Technology, Chilkur village,
Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving,
Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Third Party
Authorized Auditing of Big Data Stored on Cloud with Auditability Aware Data Scheduling
Authorized Auditing of Big Data Stored on Cloud with Auditability Aware Data Scheduling Surapriya Swain 1, Prof. Saurabh Gupta 2 1 Department of Computer Engineering, GSMCOE, Balewadi, Savitribai Phule
A Survey on Data Integrity of Cloud Storage in Cloud Computing
A Survey on Data Integrity of Cloud Storage in Cloud Computing A B S T R A C T Mr.Vitthal Raut, Prof. Suhasini Itkar Department Computer Engineering, PES Modern College of Engineering, Pune, India. [email protected],
International Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 12, December 2014 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud
Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud M.Jayanthi, Assistant Professor, Hod of MCA.E mail: [email protected] MahatmaGandhi University,Nalgonda, INDIA. B.Ranganatha
IJCSIET-ISSUE4-VOLUME2-SERIES1 Page 1
Hash Message Authentication for Public Auditing in Secure Cloud Storage MK Siva Krishna Kanth 1, Dr.N. Chandra Sekhar Reddy 2, A. Praveen 3 Professor 2, CSE Dept., Professor 3, IT Dept., Institute of Aeronautical
Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption
Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer
How To Secure Cloud Data Storage
Enabling Data Storage Security in Cloud Computing for Banking Enterprise S.BIRUNTHA V.VENKATESA KUMAR, S.PALANISWAMI, II ME CSE Lect/CSE, Registrar Anna University Coimbatore, Anna University Coimbatore,
