A Survey of Different Encryption Techniques for Secure Cloud Storage
|
|
|
- Lisa Cross
- 10 years ago
- Views:
Transcription
1 Journal homepage: ISSN: Rutuja R. Sadul KJCOEMR,Pune, India. Asawari Rankhambe KJCOEMR,Pune, India. Neha Subhekar KJCOEMR,Pune, India. A Survey of Different Encryption Techniques for Secure Cloud Storage Shaheen Shaikh KJCOEMR,Pune, India Prof. M.K.Mokashi KJCOEMR,Pune, India Abstract Cloud generally relates with a set of hardware, storage of network, services, interfaces which are needed to combine and deliver the service for computing. The role of cloud is to provide the service for delivery of software, and storage of data on internet based on user demand. This paper includes the protocols which provide security with the help of cloud.it includes different properties of protocols along with their features to have a relevant study among different protocols. Keywords- FADE(Fine Grain Access Control And Deletion, DHT(Distributed hash table),ins(index Name Server),RBAC(Role Based Access Control),RBE(Role based Encryption),ABE(Attribute Based Encryption) 59 P a g e
2 1. INTRODUCTION Cloud computing [12]is basically computing done over a large communication networks such as internet. It performs the operation like distributed system where many computers can perform operation simultaneously. Cloud is also used as a business solution for storage. It provide a vast amount of storage in all sectors like Government, Enterprise etc. Apart from government and enterprise one can also achieve storage of their personal data on cloud. In future people will use cloud for storing their audio/video files as the storage capacity for smartphone is not more enough. The research area of survey is cloud, why cloud? Cloud is use for following purpose :- 1. It provides infinite storage space for client, to obtain data backup. 2. It reduce financial overhead of data management which is cost due to central repository.(costly than central repository) This paper is mainly focused on two issues related to cloud:- 1. Guarantee of access control: Guarantee of access control implies that only authorized person can access the data. 2. Assured deletion: Assured deletion is mainly focused on time based manner. A particular time is being assigned for the data to be viewed to the authorized user after that particular time the data cannot be accessed by the user. Secondly keeping the data permanently is of no use as data may be unexpectedly disclosed in the future or attack on data can take place or there may be careless management of cloud operators. While surveying we came to know about different approaches like Wang s approach, Jungle disk, cumulus, Perlman ephemerizer, Vanish etc. 2. Different Approaches for Encryption: Fig1. Application of Encryption techniques 1. Jungle disk 60 P a g e
3 Jungle disk [3] is used for data encryption with the help of AES-256 encryption algorithm. Jungle disk is an online backup tool that store data on cloud. Disadvantages: 1. Jungle disk does not meet most of market standard criteria s. 2. It does not offers feature like file sharing capabilities. 2. Perlman ephemerizer This approach [4]is also used for encrypting the file with the help of data key. Data key is further encrypted with the help of time based control key. The control key is deleted when the expiration time is being reached. The control key is managed by a separate key manager. Disadvantage of this approach are: 1. It target only time based assured deletion. 2. No fine grained control of different file access policies. 3. No implementation is done. 3. Wang s approach Wang s approach deals with the use of security issues in cloud. It provides data access procedure which is based on owner write user read scenario. in this approach end user sends a request to access the data to the data owner then the data owner sends a encryption key and access certificate to user, user sends the access certificate to storage provider and the storage provider sends the encrypted detail to the end user. Advantages of Wang s approach are:- 1. Low clients responsibilities 2. Low storage overhead 3. Block insertion, update, deletion and appending. Disadvantages of Wang s approach:- 1. Requires support from the cloud side 2. No multiple policies combination 4. Vanish Protocol The focus to implement this paper is on the use of multiple policies which is not being supported by Wang s approach so hence we are focusing on the new approach named as Fade Roxana Geambasu, Tadayoshi Kohno, Amit A levy, Henry M levy in their study they introduce a protocol named Vanish which is used for providing data privacy and selfdestructing data. Their study mainly focused on the data should be able to access for limited period of time. After that time access to the data should be revoked for everyone including 61 P a g e
4 the user who prepares the data as well as the known and unknown entries holding the copies of data. Vanish protocol application is applicable for sensitive data only. To achieve self-deleting, following activities takes place, Vanish encrypts the user s data locally with the help of encryption key which is no known to the user also, destroy the local copies of key and then sprinkles bits in the DHT randomly. The authors mainly concentrated on DHT because it supports three main properties which are as follows:- 1. DHT consists of many nodes which are distributed across many countries, these nodes are powerful. 2. It provides the facility of protected reliable storage that is the data is available for a desired interval of time. 3. DHT is constantly changing that means the information which is sprinkled will be deleted/disappear naturally after a certain time. They developed vanish protocol by considering two systems: 1. Bittorrent svuze Based System supports 8 hour timeouts and the open DHT based system can support timeouts up to one week. 2. On the top of vanish core, a Firefox for Gmail and other websites and a self destructing file management application are build. DHT s possess some unique properties which are suitable for achieving data destruction. Properties of DHT s are: 1) There is large scale geographical distribution of nodes across many countries and complete decentralization makes them powerful and legally influential adversaries. 2) They provide reliable distributed storage: This property is useful for ensuring that the sensitive data remain available for specified time only. 3) DHT s are constantly changing. Thus the information gets automatically vanish as the DHT s node internally clean themselves. To support this application, one notion is introduce called as vanishing data objects. A VOD encapsulate user s data and prevent it from persisting indefinitely and fall into wrong hands. Regardless of whether the VOD is copied, stored or transmitted on the internet it becomes unreadable after predefined period of time There are two prototype applications that uses vanish: 1) Fire vanish: It is a Firefox plug-in for Gmail services that allow to send and receive the self-destructing mails. This plug-in uses vanish daemon to transform an into VOD before sending it to Gmail and vice versa 62 P a g e
5 2) Vanishing files: it is another application that can be used directly or by other application as a self-destructing trash bins. User can stored all the files containing sensitive data into these self destructing VOD which expires after specified time Disadvantages: Major drawback of this system is it only provide the time based assured deletion of data. It allow the legitimate user to access to the data for specified time and after the expiration of that time the original and all the copies get automatically deleted from all storage sites but it does not provide any access control mechanism. This system is beneficial for preventing the unauthorized access to the data by third party. But because of its mechanism even the authorized user do not get access to the data as it deletes the sensitive data permanently. Switching from one cloud two another clouds. In this case a user working in a company stores data on cloud X and is associated with a policy P. if the user switches to new company then all the data is being deleted on cloud X by revoking the policy. 5.Cumulus Michael Vrable, Stefon Savage and Geoffrey M.Voelkar in their study of cumulus backup file system backup in cloud their introduced about the protocol cumulus [6] which is used for storing data backup in cloud. The concept of thin cloud is used because of the property of get and put of the complete file it doesn t require any special software at a server storing backup, only ability to store and retrieve entire file, making it well suited for sending backups to service. Disadvantage of cumulus: 1. Seeding data and full recovery. 2. Size limitations. 3. Discontinuation of service. 4. Nonexistent service level agreement. 5. Does not offer coordination between multiple backup client. Tin-Yu Wu, Jeng-ShyangPan,Chia-Fan Lin [9] in their study their focused on the storage related issues on cloud. As data on cloud is stored so different files are stored, in these case the workload increases and a lot of hardware resources is wasted. To overcome above drawbacks they proposed INS. the main use of INS is that it manage storage of different file the data which is duplicated, compression of file is done, the load on server, Internet Protocol information and all real time feedback is given. In INS al nodes are arranged in elicit optimal performance so that desired resources can be accessed by client. In these way the overcome of file storage and other related issues are solved to some extent by INS. Lan Zhou, Vijay Varadharanjan, MichaelHitchene[10] in their study they focused on how user can access the data in these paper according to the role of user the data can be accessed. To develop this type of access control they focused on a protocol RBAC which is based on RBE the introduced two type of cloud: 63 P a g e
6 1. Public Cloud:-A public cloud is available to all people. 2. Private Cloud:-A private cloud is a cloud available to only authorized person. While the private cloud is operated only by a single organization and single organization is responsible for building the cloud. According to the survey 43% people are using private cloud whereas 34 % people are going to use it in future. The studied of above researchers were to provide security of data and give access of data according to the role. To provide security of data the concept of cryptographic technique is used where data is encrypted and after verifying whether the user is authorized then and then only data can decrypt with the help of private key. This helps to avoid unauthorized access of data of users. VipulGoyal, OmkantPandey, AmitSahai Brent Waters[8] in their study the focused on providing fine grained access control.as we know that third party stores the sensitive data on the internet e.g. Gmail, Yahoo etc. storing data at different site will lead to different attacks and legal pressure faced by services. To solve above problem we can store data in encrypted form and decrypt the data with the help of private keys but the condition arises when more than one user need to access data than the owner has to give the entire user the private key. To avoid this problem we are using attribute based encryption. 3. FUTUREAND RESEARCH WORK The modern generations of the cloud storage infrastructures does not provide any security against untrusted cloud workers making them unfitting for storing sensitive information such as financial records, medical records or high impact business data. So storing sensitive information on cloud in secure manner is the research work in future on cloud storage. Designing a secure cloud storage system for storage of information which provides the protection for sensitive data is also a research work. 4. CONCLUSION In this paper we have surveyed and studied about various protocols which are used in cloud for providing secure access as well as deletion operation. Protocols were presented in this paper gives the current state of it along with the broad spectrum of characteristics, which include advantages as well as disadvantages. ACKNOWLEGEMENT We would like to thanks our guide Prof. M.K.Mokashi for the guidance and support. We will forever remain grateful for the constant support and guidance extended by guide, for the completion of paper. We also thank to editor and referees for their comments. REFERENCES [1] G.Gayatri,S.Soumya. FADE: A Secure Overlay Cloud Storage System. 64 P a g e
7 [2] R. Geambasu, T. Kohno, A. Levy, and H.M. Levy, Vanish:Increasing Data Privacy with Self-Destructing Data, Proc. 18 th Conf. USENIX Security Symp, Aug [3] JungleDisk, [4] S. Nair, M.T. Dashti, B. Crispo, and A.S. Tanenbaum, A Hybrid PKI-IBC Based Ephemerizer System, Int l Federation for Information Processing, vol. 232, pp , [5] R. Perlman, File System Design with Assured Delete, Proc. Network and Distributed System Security Symp. ISOC (NDSS), [6] Cumulus: Filesystem Backup to the Cloud Michael Vrable, Stefan Savage, and Geoffrey M. Voelker [7] File System Design with Assured Delete Radia Perlman. [8] Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data byvipulgoyal OmkantPandeyyAmitSahaizBrent Waters. [9] Improving Accessing Efficiency of Cloud Storage Using De-Duplication and Feedback Schemes [10] Tin-Yu Wu, Member, IEEE, Jeng-Shyang Pan, Member, IEEE, and Chia-Fan Lin. [11] Achieving Secure Role-Based Access Control on Encrypted Data in Cloud Storage Lan Zhou, Vijay Varadharajan, and Michael Hitchens. [12] Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems [13] AyadBarsoum and Anwar Hasan, Senior Member, IEEE. [14] A View of Cloud Computing by Michael Armbrust, Armando Fox, ReanGriffith,Anthony D. Joseph, Randy Katz, Andy Konwinski,Gunho Lee, Dav id Patterson, Ariel Rabkin, Ion Stoica,andMateiZaharia. 65 P a g e
International Journal of Research in Advent Technology Available Online at: http://www.ijrat.org
DYNAMIC ACCESS CONTROL AND FILE ASSURED DELETION FOR SECURED CLOUD STORAGE ABSTARCT: Mrs. Priyanka Nagtilak, Prof. Archana Lomte Department of Computer Engineering Bhivarabai Sawant Institute of Technology
Implementation of Role Based Access Control on Encrypted Data in Hybrid Cloud
Implementation of Role Based Access Control on Encrypted Data in Hybrid Cloud Gajanan Ganorkar, Prof. A.B. Deshmukh, Prof M.D.Tambhakhe Information Technology Email:[email protected] Contact: 8600200142
A SECURE CLOUD WITH ADDITIONAL LAYER OF PROTECTION AND USER AUTHENTICATION
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 2, Issue. 6, June 2013, pg.307
An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud
An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud T.Vijayalakshmi 1, Balika J Chelliah 2,S.Alagumani 3 and Dr.J.Jagadeesan 4 1 PG
A SELF-DESTRUCTION SYSTEM FOR DYNAMIC GROUP DATA SHARING IN CLOUD
A SELF-DESTRUCTION SYSTEM FOR DYNAMIC GROUP DATA SHARING IN CLOUD Ranjith.K 1, P.G.Kathiravan 2 1 PG Scholar, Department of Information Technology, V.S.B Engineering College, Tamilnadu, India 2 Assistant
Secure Role-Based Access Control on Encrypted Data in Cloud Storage using Raspberry PI
Volume: 2, Issue: 7, 20-27 July 2015 www.allsubjectjournal.com e-issn: 2349-4182 p-issn: 2349-5979 Impact Factor: 3.762 Miss Rohini Vidhate Savitribai Phule Pune University. Mr. V. D. Shinde Savitribai
Role Based Encryption with Efficient Access Control in Cloud Storage
Role Based Encryption with Efficient Access Control in Cloud Storage G. V. Bandewar 1, R. H. Borhade 2 1 Department of Information Technology, Sinhgad Technical Education Society s SKNCOE, Pune, India
Data Integrity for Secure Dynamic Cloud Storage System Using TPA
International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 7-12 International Research Publication House http://www.irphouse.com Data Integrity for Secure
Improving data integrity on cloud storage services
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services
Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption
Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer
ISSN 2319-8885 Vol.04,Issue.19, June-2015, Pages:3633-3638. www.ijsetr.com
ISSN 2319-8885 Vol.04,Issue.19, June-2015, Pages:3633-3638 www.ijsetr.com Refining Efficiency of Cloud Storage Services using De-Duplication SARA BEGUM 1, SHAISTA NOUSHEEN 2, KHADERBI SHAIK 3 1 PG Scholar,
Data Integrity Check using Hash Functions in Cloud environment
Data Integrity Check using Hash Functions in Cloud environment Selman Haxhijaha 1, Gazmend Bajrami 1, Fisnik Prekazi 1 1 Faculty of Computer Science and Engineering, University for Business and Tecnology
An Efficient Secure Multi Owner Data Sharing for Dynamic Groups in Cloud Computing
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 6, June 2014, pg.730
A Secure Cloud Backup System with Assured Deletion and Version Control
A Secure Cloud Backup System with Assured Deletion and Version Control Arthur Rahumed, Henry C. H. Chen, Yang Tang, Patrick P. C. Lee, and John C. S. Lui The Chinese University of Hong Kong, Hong Kong
IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD
IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD 1 Ms.Nita R. Mhaske, 2 Prof. S.M.Rokade 1 student, Master of Engineering, Dept. of Computer Engineering Sir Visvesvaraya
Privacy Preservation and Secure Data Sharing in Cloud Storage
OPEN ACCESS Int. Res. J. of Science & Engineering, 2015; Vol. 3 (6): 231-236 ISSN: 2322-0015 RESEARCH ARTICLE Privacy Preservation and Secure Data Sharing in Cloud Storage Chavhan Bhaurao* and Deshmukh
SECURE RE-ENCRYPTION IN UNRELIABLE CLOUD USINGSYNCHRONOUS CLOCK
International Journal of Advance Research In Science And Engineering IJARSE, Vol. No.4, Issue No.01, January 2015 http:// SECURE RE-ENCRYPTION IN UNRELIABLE CLOUD USINGSYNCHRONOUS CLOCK Arudra Gopala Rao
Data Security Using Reliable Re-Encryption in Unreliable Cloud
ISSN (Online): 2277-5420 www.ijcsn.org Data Security Using Reliable Re-Encryption in Unreliable Cloud 328 1 Ajinkya Adhau, 2 Payal Bobade, 3 Priyanka Zilpe, 4 Yashodhara Fulmali 1, 2, 3, 4 Student, Department
SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD
SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD S.REVATHI B.HASEENA M.NOORUL IZZATH PG Student PG Student PG Student II- ME CSE II- ME CSE II- ME CSE Al-Ameen Engineering
Development of enhanced Third party Auditing Scheme for Secure Cloud Storage
Development of enhanced Third party Auditing Scheme for Secure Cloud Storage Bhanu Prakash Chamakuri*1, D. Srikar*2, Dr. M.Suresh Babu*3 M.Tech Scholar, Dept of CSE, Grandhi Varalakshmi Institute Of Technology,
Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment
Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment Deepa Noorandevarmath 1, Rameshkumar H.K 2, C M Parameshwarappa 3 1 PG Student, Dept of CS&E, STJIT, Ranebennur. Karnataka, India
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud Arpitha.K 1,Aawini.T 2,Divya J. 3, Kalyani P 4, Prof. Sudhakar Avareddy 5 1,2,3,4 Department of CSE, BITM Bellary, Karnataka. 5 Department
DELEGATING LOG MANAGEMENT TO THE CLOUD USING SECURE LOGGING
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IJCSMC, Vol. 3, Issue.
AN ENHANCED ATTRIBUTE BASED ENCRYPTION WITH MULTI PARTIES ACCESS IN CLOUD AREA
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK REVIEW ON MOBILE APPLICATION IN A CLOUD COMPUTING SECURE AND SCALABLE USING CLOUD
Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.
Secure Privacy-Preserving Cloud Services. Abhaya Ghatkar, Reena Jadhav, Renju Georgekutty, Avriel William, Amita Jajoo DYPCOE, Akurdi, Pune [email protected], [email protected], [email protected],
Decentralized Access Control Secure Cloud Storage using Key Policy Attribute Based Encryption
Decentralized Access Control Secure Cloud Storage using Key Policy Attribute Based Encryption 1 Thota Naresh Kumar, 2 K.SRINIVAS, 3 Y.Raju 2 Associate Professor, 3 Associate Professor 1,2,3 Department
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department
Application Based Access Control on Cloud Networks for Data Security
Application Based Access Control on Cloud Networks for Data Security Ms. Smitha P M.Tech in DCN, Department of ECE GSSSIETW, Mysuru Karnataka, India Smitha.21sn @gmail.com Mrs. Manjula G Associate. Proffesor,
Efficient and Secure Dynamic Auditing Protocol for Integrity Verification In Cloud Storage
Efficient and Secure Dynamic Auditing Protocol for Integrity Verification In Cloud Storage Priyanga.R 1, Maheswari.B 2, Karthik.S 3 PG Scholar, Department of CSE, SNS College of technology, Coimbatore-35,
A Review of Load Balancing Algorithms for Cloud Computing
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Issue -9 September, 2014 Page No. 8297-8302 A Review of Load Balancing Algorithms for Cloud Computing Dr.G.N.K.Sureshbabu
SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE
International Journal of Computer Network and Security(IJCNS) Vol 7. No.1 2015 Pp. 1-8 gopalax Journals, Singapore available at : www.ijcns.com ISSN: 0975-8283 ----------------------------------------------------------------------------------------------------------------------------------------------------------
G.J. E.D.T.,Vol.3(1):43-47 (January-February, 2014) ISSN: 2319 7293 SUODY-Preserving Privacy in Sharing Data with Multi-Vendor for Dynamic Groups
SUODY-Preserving Privacy in Sharing Data with Multi-Vendor for Dynamic s T.Vijayalakshmi 1, Balika J Chelliah 2 & R. Jegadeesan 3 1 M.Tech Student, Department of Computer Science and Engineering, S.R.M.
Distributed Attribute Based Encryption for Patient Health Record Security under Clouds
Distributed Attribute Based Encryption for Patient Health Record Security under Clouds SHILPA ELSA ABRAHAM II ME (CSE) Nandha Engineering College Erode Abstract-Patient Health Records (PHR) is maintained
15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM
RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM Dhanashri Bamane Vinayak Pottigar Subhash Pingale Department of Computer Science and Engineering SKN
SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD
Volume 1, Issue 7, PP:, JAN JUL 2015. SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD B ANNAPURNA 1*, G RAVI 2*, 1. II-M.Tech Student, MRCET 2. Assoc. Prof, Dept.
A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA
A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA Mr.Mahesh S.Giri Department of Computer Science & Engineering Technocrats Institute of Technology Bhopal, India
SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTING SECURITY ENVIRONMENT
SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTING SECURITY ENVIRONMENT K.karthika 1, M. Daya kanimozhi Rani 2 1 K.karthika, Assistant professor, Department of IT, Adhiyamaan College of Engineering, Hosur
IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD ENVIRONMENT
IJRRECS/November 2014/Volume-2/Issue-11/3699-3703 ISSN 2321-5461 INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD
Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks
Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Prashil S. Waghmare PG student, Sinhgad College of Engineering, Vadgaon, Pune University, Maharashtra, India. [email protected]
IDENTIFYING AND OPTIMIZING DATA DUPLICATION BY EFFICIENT MEMORY ALLOCATION IN REPOSITORY BY SINGLE INSTANCE STORAGE
IDENTIFYING AND OPTIMIZING DATA DUPLICATION BY EFFICIENT MEMORY ALLOCATION IN REPOSITORY BY SINGLE INSTANCE STORAGE 1 M.PRADEEP RAJA, 2 R.C SANTHOSH KUMAR, 3 P.KIRUTHIGA, 4 V. LOGESHWARI 1,2,3 Student,
Secure Data Sharing in Cloud Computing using Hybrid cloud
International Journal of Electronics and Computer Science Engineering 144 Available Online at www.ijecse.org ISSN: 2277-1956 Secure Data Sharing in Cloud Computing using Hybrid cloud Er. Inderdeep Singh
SECURING CLOUD DATA COMMUNICATION USING AUTHENTICATION TECHNIQUE
SECURING CLOUD DATA COMMUNICATION USING AUTHENTICATION TECHNIQUE 1 PARISHA TYAGI, 2 VIRENDRA KUMAR 1Department of Information Technology, Suresh Gyan Vihar University, Rajasthan, India 2 Department of
Cumulus: filesystem backup to the Cloud
Michael Vrable, Stefan Savage, a n d G e o f f r e y M. V o e l k e r Cumulus: filesystem backup to the Cloud Michael Vrable is pursuing a Ph.D. in computer science at the University of California, San
Sync Security and Privacy Brief
Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical
ADVANCE SECURITY TO CLOUD DATA STORAGE
Journal homepage: www.mjret.in ADVANCE SECURITY TO CLOUD DATA STORAGE ISSN:2348-6953 Yogesh Bhapkar, Mitali Patil, Kishor Kale,Rakesh Gaikwad ISB&M, SOT, Pune, India Abstract: Cloud Computing is the next
Providing Access Permissions to Legitimate Users by Using Attribute Based Encryption Techniques In Cloud
Providing Access Permissions to Legitimate Users by Using Attribute Based Encryption Techniques In Cloud R.Udhayakumar 1, M. Jawahar 2, I.Ramasamy 3 PG Student, Dept. Of CSE,KSR Institute For Engineering
Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving,
Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Third Party
Data Integrity by Aes Algorithm ISSN 2319-9725
Data Integrity by Aes Algorithm ISSN 2319-9725 Alpha Vijayan Nidhiya Krishna Sreelakshmi T N Jyotsna Shukla Abstract: In the cloud computing, data is moved to a remotely located cloud server. Cloud will
Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage
Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage P. Selvigrija, Assistant Professor, Department of Computer Science & Engineering, Christ College
DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION
DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION Hasna.R 1, S.Sangeetha 2 1 PG Scholar, Dhanalakshmi Srinivasan College of Engineering, Coimbatore. 2 Assistant Professor, Dhanalakshmi Srinivasan
A Survey on Deduplication Strategies and Storage Systems
A Survey on Deduplication Strategies and Storage Systems Guljar Shaikh ((Information Technology,B.V.C.O.E.P/ B.V.C.O.E.P, INDIA) Abstract : Now a day there is raising demands for systems which provide
Signature Amortization Technique for Authenticating Delay Sensitive Stream
Signature Amortization Technique for Authenticating Delay Sensitive Stream M Bruntha 1, Dr J. Premalatha Ph.D. 2 1 M.E., 2 Professor, Department of Information Technology, Kongu Engineering College, Perundurai,
Optimized And Secure Data Backup Solution For Cloud Using Data Deduplication
RESEARCH ARTICLE OPEN ACCESS Optimized And Secure Data Backup Solution For Cloud Using Data Deduplication Siva Ramakrishnan S( M.Tech ) 1,Vinoth Kumar P (M.E) 2 1 ( Department Of Computer Science Engineering,
IMPLEMENTATION OF SOURCE DEDUPLICATION FOR CLOUD BACKUP SERVICES BY EXPLOITING APPLICATION AWARENESS
IMPLEMENTATION OF SOURCE DEDUPLICATION FOR CLOUD BACKUP SERVICES BY EXPLOITING APPLICATION AWARENESS Nehal Markandeya 1, Sandip Khillare 2, Rekha Bagate 3, Sayali Badave 4 Vaishali Barkade 5 12 3 4 5 (Department
A Survey on Privacy-Preserving Techniques for Secure Cloud Storage
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,
Secure Overlay Cloud Storage with Access Control and Assured Deletion
Secure Overlay Cloud Storage with Access Control and Assured Deletion Yang Tang, Patrick P. C. Lee, John C. S. Lui, Radia Perlman Abstract We can now outsource data backups off-site to third-party cloud
EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE
EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE Reshma Mary Abraham and P. Sriramya Computer Science Engineering, Saveetha University, Chennai, India E-Mail: [email protected]
Secure Data transfer in Cloud Storage Systems using Dynamic Tokens.
Secure Data transfer in Cloud Storage Systems using Dynamic Tokens. P.Srinivas *,K. Rajesh Kumar # M.Tech Student (CSE), Assoc. Professor *Department of Computer Science (CSE), Swarnandhra College of Engineering
DECENTRALIZED ACCESS CONTROL TO SECURE DATA STORAGE ON CLOUDS
DECENTRALIZED ACCESS CONTROL TO SECURE DATA STORAGE ON CLOUDS Ankita N.Madde 1, Minal J. Joshi 2, Suchita Gutte 3, Sonal Asawa 4, # Prashant Jawalkar 5 1,2,3,4 UG Student, 5 Project Guide, Computer Dept.,
A Secure Decentralized Access Control Scheme for Data stored in Clouds
A Secure Decentralized Access Control Scheme for Data stored in Clouds Priyanka Palekar 1, Abhijeet Bharate 2, Nisar Anjum 3 1 SKNSITS, University of Pune 2 SKNSITS, University of Pune 3 SKNSITS, University
MODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENT
MODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENT Soumya V L 1 and Anirban Basu 2 1 Dept of CSE, East Point College of Engineering & Technology, Bangalore, Karnataka, India
A Survey on Aware of Local-Global Cloud Backup Storage for Personal Purpose
A Survey on Aware of Local-Global Cloud Backup Storage for Personal Purpose Abhirupa Chatterjee 1, Divya. R. Krishnan 2, P. Kalamani 3 1,2 UG Scholar, Sri Sairam College Of Engineering, Bangalore. India
ISSN 2278-3091. Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability
Outsourcing and Discovering Storage Inconsistencies in Cloud Through TPA Sumathi Karanam 1, GL Varaprasad 2 Student, Department of CSE, QIS College of Engineering and Technology, Ongole, AndhraPradesh,India
Journal of Electronic Banking Systems
Journal of Electronic Banking Systems Vol. 2015 (2015), Article ID 614386, 44 minipages. DOI:10.5171/2015.614386 www.ibimapublishing.com Copyright 2015. Khaled Ahmed Nagaty. Distributed under Creative
ISSN: 2321-7782 (Online) Volume 2, Issue 1, January 2014 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 2, Issue 1, January 2014 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com New Challenges
TITLE: Secure Auditing and Deduplicating Data in Cloud(Survey Paper)
TITLE: Secure Auditing and Deduplicating Data in Cloud(Survey Paper) Pratik Raut 1, Pratik Kamble 2, Prafull Pansare 3, Dipti Salunkhe 4 1 UG Student, Dept. of Computer Engineering, JSCOE, Hadapsar, Pune,
A Survey on Secure Auditing and Deduplicating Data in Cloud
A Survey on Secure Auditing and Deduplicating Data in Cloud Tejaswini Jaybhaye 1 ; D. H. Kulkarni 2 PG Student, Dept. of Computer Engineering, SKNCOE, Pune, India 1 Assistant Professor, Dept. of Computer
Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud
Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud M.Jayanthi, Assistant Professor, Hod of MCA.E mail: [email protected] MahatmaGandhi University,Nalgonda, INDIA. B.Ranganatha
Berkeley Ninja Architecture
Berkeley Ninja Architecture ACID vs BASE 1.Strong Consistency 2. Availability not considered 3. Conservative 1. Weak consistency 2. Availability is a primary design element 3. Aggressive --> Traditional
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING &
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4, Issue 6, November - December (2013), pp. 62-69 IAEME: www.iaeme.com/ijcet.asp Journal
Keyword Ranked MetaData Indexed Object Clawler in Cloud Servers
Keyword Ranked MetaData Indexed Object Clawler in Cloud Servers R.Bakyalakshmi 1, Dr.R.Rameh 2 PG Student of computer science and engineering. Chennai institute of technology College, India 1. Associate.Professor,
Index Terms: Cloud Computing, Cloud Security, Mitigation Attack, Service Composition, Data Integrity. 1. Introduction
Real-Time Service Composition and Deployment for Secure Computing in Cloud Environment R. Ushadevi 1, V. Rajamani 2 1 Research Scholar, Department of Computer Applications, St. Peter s University, Chennai
Ranked Keyword Search Using RSE over Outsourced Cloud Data
Ranked Keyword Search Using RSE over Outsourced Cloud Data Payal Akriti 1, Ms. Preetha Mary Ann 2, D.Sarvanan 3 1 Final Year MCA, Sathyabama University, Tamilnadu, India 2&3 Assistant Professor, Sathyabama
Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage Abstract: Cloud computing is one of the emerge technologies. To protect the data and privacy of users the access
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK IMPLEMENTATION OF AN APPROACH TO ENHANCE QOS AND QOE BY MIGRATING SERVICES IN CLOUD
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction 1 Priyadharshni.A, 2 Geo Jenefer.G 1 Master of engineering in computer science, Ponjesly College of Engineering 2 Assistant Professor,
Secrecy Maintaining Public Inspecting For Secure Cloud Storage
Secrecy Maintaining Public Inspecting For Secure Cloud Storage K.Sangamithra 1, S.Tamilselvan 2 M.E, M.P.Nachimuthu.M.Jaganathan Engineering College, Tamilnadu, India 1 Asst. Professor, M.P.Nachimuthu.M.Jaganathan
Cloud Information Accountability Framework for Auditing the Data Usage in Cloud Environment
International Journal of Computational Engineering Research Vol, 03 Issue, 11 Cloud Information Accountability Framework for Auditing the Data Usage in Cloud Environment D.Dhivya 1, S.CHINNADURAI 2 1,M.E.(Cse),
Enable Public Audit ability for Secure Cloud Storage
Enable Public Audit ability for Secure Cloud Storage Leela Poornima 1, D.Hari Krishna 2 1 Student, Nova College of Engineering and Technology, Ibrahimpatnam,Krishna Dist., Andhra Pradesh, India 2 Assistant
How To Ensure Correctness Of Data In The Cloud
Ensuring Data Storage Security in Cloud Computing ABSTRACT Cloud computing has been envisioned as the next-generation architecture of IT enterprise. In contrast to traditional solutions, where the IT services
A Comparative Study of Applying Real- Time Encryption in Cloud Computing Environments
A Comparative Study of Applying Real- Time Encryption in Cloud Computing Environments Faraz Fatemi Moghaddam ([email protected]) Omidreza Karimi ([email protected]) Dr. Ma en T. Alrashdan ([email protected])
A Review of Cloud Environment and Recognition of Highly Secure Public Data Verification Architecture using Secure Public Verifier Auditor
I J C International Journal of lectrical, lectronics ISSN No. (Online): 2277-2626 and Computer ngineering 3(2): 144-148(2014) A Review of Cloud nvironment and Recognition of Highly Secure Public Data Verification
SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS
SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS Abstract: The Single sign-on (SSO) is a new authentication mechanism that enables a legal user with a single credential
