Secure Store of User Authentication Tokens in Multi-cloud Storage System

Size: px
Start display at page:

Download "Secure Store of User Authentication Tokens in Multi-cloud Storage System"

Transcription

1 Journal of Computational Information Systems 11: 3 (015) Available at Secure Store of User Authentication Tokens in Multi-cloud Storage System Jinjin SUN 1,, Ming XU 1, Shifang FENG 1, Zhongwei LI, Gang WANG 1, Xiaoguang LIU 1 1 Nankai-Baidu Joint Lab, College of Computer and Control Engineering, Nankai University, Tianjin , China College of Software, Nankai University, Tianjin , China Abstract To solve the security problems in single-cloud storage, multi-cloud storage system has been put forward in some literatures. However, when using multi-cloud, a user needs to be authenticated by different cloud storage services, which is a time-consuming and tedious process. To avoid this, we propose a framework to store the authentication tokens of multiple cloud services securely. When the first time a user uses the multi-cloud storage system and finishes authorization to all cloud storage services involved, the encrypted tokens are entrusted to the framework. When the user using the multi-cloud storage system again, the tokens are retrieved and decrypted and then used to complete authentication to the cloud storage services. By this way, user experience is enhanced without loss of security. We design and implement a local secure token management scheme and a server-based scheme, and verify the two schemes in a multi-cloud storage system. Keywords: Cloud Storage Security; User Authentication; Kerberos Protocol; Token Management 1 Introduction Although cloud storage is very popular, none of the today s cloud storage services can guarantee satisfactory security, which hinders the development of cloud storage. When users put their data on one server, it will face the risks of data leaks, data tamper, and returning inconsistent data to different users. For example, data corruption happened on Amazon s popular Simple Storage Service (S3) [1] and data security violation happened on Google Docs []. Because of the shortcomings of Single-cloud storage system, secure cloud storage systems become more eagerly needed. So the multi-cloud storage comes into being. Project supported by NSF of China ( , ), Program for New Century Excellent Talents in University (NCET130301) and the Fundamental Research Funds for the Central Universities ( ). Corresponding author. address: sunjj@nbjl.nankai.edu.cn (Jinjin SUN) / Copyright 015 Binary Information Press DOI: /jcis13166 February 1, 015

2 1014 J. Sun et al. /Journal of Computational Information Systems 11: 3 (015) However, the new problem that users have to be authenticated by different cloud storage services arises. To avoid this process, we design a secure token store framework. A user must complete authentication to all cloud storage services when he uses the system first time. The tokens issued by the cloud services are stored locally or on a server securely. The user can just send the tokens to the cloud storage services to gain access to his data when he gets data from the multi-cloud storage system at any time. This framework simplifies the authentication process without loss security so that enhances user experience. The existing authentication technologies are not satisfactory when directly used in our framework. So we design a new authentication mechanism to store and access tokens securely. We design and implement the token management framework base on this mechanism in a multi-cloud storage system. The experimental results show that the framework achieves the goal of securely storing the user authentication tokens in the multi-cloud storage system and introduces a little overhead. Related Work.1 Threat model of cloud storage When talking about the security properties of cloud storage, we take account of the security factors that integrity, confidentiality, service availability and vendor lock-in. When transmitted to the cloud storage servers, data may be corrupted or tempered, which leads to bad data on the server at the beginning. In addition, the misoperations by administrator ([3] is an example) and the attacks committed on servers may also lead to data corruption (like in [, 4, 5]). We define the data integrity as each read returns the content put on the cloud by the legitimate users. Confidentiality means that the data on the cloud cannot be leaked to others and read by the cloud. However, once data is put on the cloud, the user has to trust the cloud storage providers [6]. Moreover, apart from the threat from the provider, hackers could attack the servers and leak the privacy data [7]. Due to the unexpected downtime of server, service shutdown, natural disaster and so on, the service may be unavailable. Service availability holds that, no matter what happens, the service can continue and the user can get the data anytime. Vendor lock-in means users cannot change the server provider recklessly. Abu-Libdeh et al. have suggested there is risk (mainly means vendor lock-in) when enjoying the service provided by the single-cloud storage [].. Multi-cloud storage systems To achieve the goal of improving the security of cloud, many multi-cloud storage systems have been put forward, such as DepSky [8], RACS [9], ICStore [10], HAIL [11], and so on. Of course, they are not on the same security level due to the different designs and protocols in the system. AlZain et al. address three security factors and they consider only DepSky system addresses all of those [1]. The security analysis and the details of DepSky architecture can be found in [8, 1].

3 J. Sun et al. /Journal of Computational Information Systems 11: 3 (015) And it summarizes the security of these multi-cloud storage systems that arose recently years. However, in these multi-cloud storage systems, token storage has never been mentioned. Multiple authorizations will bring bad experience to the users. This is the contribution of our framework, which achieves the goal of securely storing the user authentication tokens in the multi-cloud storage system and introduces small overhead..3 Existing authentication technology We put forward to design a new user authentication mechanism to manage the tokens, based on the kerberos protocol and Challenge/Response mechanism. By using this mechanism, the multi-cloud client can complete authentication using the tokens. In July 005, the Massachusetts Institute of Technology put forwards the new standard of kerberos protocol [14], which is the improvement of the version of kerberos V4 [15]. There are three parts in kerberos, Key Distribution Center (KDC) which includes Authentication Service (AS) and Ticket Granting Server (TGS), Client and Server. But there must be some operations in the Server to conduct the protocol, which limits its application on the multi-cloud storage because we cannot control the cloud providers. Challenge/Response is a dynamic identity authentication scheme based on the DES encryption algorithm. In the whole process of authentication, the user information is never been transmitted. The Server makes a random and sends it to the user, and then the user responses according to his key. By this way, it can guarantee the security of the secret information, which can be for reference. 3 Design and Implementation The design of the mechanism consists of two parts: user authentication and token management. The user can choose to store the tokens on the local computer or the server we provide. Based on the choice, we have two schemes for each part. Fig. 1 shows the process of the tokens storage on the server in CloudS [19, 0] (the CloudS can use not only three services shown in Fig. 1). First, the user authorizes all cloud storage services; second, the client gets tokens from the services; finally, the tokens are stored on the server. If the user chooses another scheme, the Step 3 is needless. The tokens are just stored on the local computer. Fig. shows the process that the user gets tokens from the token server, and uses them to access the data on the cloud services (If he or she chooses the local, Step 1 and Step are needless. The client can get the tokens from the local). If the user passes the authentication of the server, the client can get the tokens. Then, it sends the tokens to the cloud storage services. If the tokens are legal, the services will return the data to the client. 3.1 User authentication te that, the encryption algorithm that we used in the implementation is AES [16], and the hashing function is MD5 [17, 18].

4 1016 J. Sun et al. /Journal of Computational Information Systems 11: 3 (015) CloudS Vdisk Skydrive Dropbox CloudS Vdisk Skydrive Dropbox Fig. 1: The process of token storage Fig. : The process of token read Scheme 1: The user chooses to store tokens on the local computer. For the choice, the process of user authentication is none of the business of the network transmission. When the user uses the system at the first time, we will create a XML file to store the Account, the hash of Password and the token encrypted with the Password. We build a mapping relation between them and the Account is the main key. If passing the verification next time, he will get the encrypted tokens. By decrypting them with his password and sending each of them to the corresponding cloud, he can get the access to the clouds, which is executed on the Client. The goal of the scheme is to avoid illegal users to crack the password by means of speculation and others. Scheme : The user chooses to store token on the server provided. The scheme learns from the kerberos protocol and the Challenge/Response mechanism. Take the validator technique of the former and no transmitting secret key during the communication of the latter for reference. The authentication process as follows: Step 1: The user logins in the system and the client sends the Account to the server. If there doesn t exist the Account, the server returns Error. Otherwise, it generates a random R and encrypts it with Hash (password) (namely Secret). Finally, the server sends the encrypted message to the client. Step : If the client receives Error, it will be asked to login again. Otherwise, it decrypts the message and gets R. Then, it generates a random R1, and encrypts it with R. Finally, the client sends the encrypted R1 and R1 to the server. Step 3: The server decrypts the received message with the R and compares it with R1. If they completely match, the user passes the verification and gets the encrypted token; else, it gets the Error return. Step 4: If the client receives the Error return, the user can choose to login again or quit; else, it sends OK to the server.

5 J. Sun et al. /Journal of Computational Information Systems 11: 3 (015) The scheme avoids the transmission of the secret information, except the encrypted token which is inevitable. Moreover, the changing random number and the timeliness of information prevent the attack effectively. 3. Token management mechanism Similarly, there are two schemes in the design of the token management mechanism. Scheme1: The token is stored on the local computer. The specific process is shown in Fig. 3. When the user registers, the authentication information would be stored on the local computer. Start Login First use? Account exists and Password matches? Registration successful? Token exists? Decryption successful? Authorization to cloud storage providers successful? Cloud storage services Encrypt the new Token and store it in the local computer Fig. 3: Token management based on the local computer Because we appoint the Account as the main key mapping to the encrypted password and tokens, the duplicate Account is forbidden. If the Account is legal, the user should authenticate to the chosen cloud storage providers, and then store the encrypted token. When the user logs to the system and he passes the authentication, the system will return the tokens. If the tokens do not exist or cannot been used after being decrypted, the user has to reauthenticate to all the cloud services he has chosen and the new encrypted token will be stored locally. Scheme: The token is stored on the server. There is a little difference, compared to the local token management. When registering on the server, the user needs to fill in the information according to the website, and then the information and the tokens will be stored on the server after being encrypted. 3.3 Implementation While implementing our schemes in CloudS [19, 0], a multi-cloud storage system, there are two important things should be addressed, data structure and timer.

6 1018 J. Sun et al. /Journal of Computational Information Systems 11: 3 (015) Data structure is used to mark the messages during the user authentication. Each message has a header which means the type of message. This mark together with the timer is against the attacks from hackers. 4 Experimental Results 4.1 Experimental environment The experimental environment is shown in Table 1. Table 1: The experimental environment configuration CPU Intel Core i3-390m (dual-core system) Memory GB Hard Disk WDC WD5000BEVT-4A0RT0 Network 10Mbps Operating System Windows 7 professional SP1 3bit 4. The security and correctness of the framework We do a series of experiments to verify the security and correctness of the framework. Table shows the results. After the user authorizes all cloud storage services, the token will be uploaded on the server or stored on the local computer. When logging in the system again, he can get the stored token successfully. After one cycle time, the token will be updated. But when the token is expired, the user has to reauthorize. Table : The result of function experiment Goal Function Scenarios Result correctness Token Upload After authorization Successful Token Update After one cycle Successful Token Download Log in the system Successful Reauthorization Token expired Successful security Authentication False Password Get token failed Token protect Server Attack the Server Get encrypted token Local Maliciously stolen Ditto If the illegal user logs in the system, he cannot pass the authentication and cannot get the token successfully.

7 Time(ms) J. Sun et al. /Journal of Computational Information Systems 11: 3 (015) When the illegal user attacks the server or maliciously steal token from the local computer, he can get the encrypted token. However, he or she cannot pass the authentication of the clouds without the password. The functional experiment is related to the comprehensiveness of the token management. Through the experiment, we find that all cases are to be carried out as expected. 4.3 Performance results The performance experiment is about the time that uploading the token to the server or downloading from server takes. It is conducted in CloudS. There are eight cloud storage services on CloudS, including Kuaipan, Dropbox, DBank, Kanbox, Vdisk, SkyDrive, Box, GoogleDrive; and in the experiment, we add services by the order. Along with the increase number of services, the total size of tokens increases gradually. According to the results shown in Fig. 4, we can make summaries: Upload time Download time B 736B 1KB 1.3KB 1.46KB.84KB 3.10KB 3.38KB Token Size Fig. 4: The time of uploading the token to the server and downloading from the server (1) The upload time and down time are very short, which makes no bad effects on the user experience because this overhead only happens once when logging in; () The time is no more than one second; (3) The time is depended on the network condition. 5 Conclusion In this paper, we mainly concern the security of the user authentication and the comprehensiveness of the token management. It s a tradeoff between security, ease of use and performance. We design a framework to securely store the tokens, which is based on a newly designed user authentication mechanism and a token management mechanism. The framework is implemented on a multicloud storage system, and its effectiveness and performance is tested. Through the experimental results, we can see the performance and the functions both conform to the expected results.

8 100 J. Sun et al. /Journal of Computational Information Systems 11: 3 (015) In the future work, we will design a generalized token interface with new parameters which are used to add the security. Learning more about the key management technology, such as PGP, we will improve our framework to achieve better security. All in all, we will do more efforts to design the secure cloud storage system and to design more secure user authentication. References [1] Oracle, s3 silent data corruption. [] C. Cachin, I. Keidar and A. Shraer, Trusting the cloud, ACM SIGACT News, 40 (), 009, pp [3] R. A. Popa, J. R. Lorch, D. Molnar, et al. Enabling security in cloud storage SLAs with CloudProof [C]. Proceedings of 011 USENIX Annual Technical Conference, Portland, OR [4] RedHat, [5] Sun, /gbrunett/entry/ amazon s3 silent data corruption. [6] GroβS, Schill A. Towards user centric data governance and control in the cloud [J]. Open Problems in Network Security, 01, pp [7] Dancho Danchev. How many people fall victim to phishing attacks? ecurity/how-many-people-fall-victim-to-phishing-attacks/ [8] A. Bessani, M. Correia, B. Quaresma, F. André and P. Sousa, DepSky: dependable and secure storage in a cloud-of-clouds, EuroSys 11: Proc. 6th Conf. on Computer systems, 011, pp [9] H. Abu-Libdeh, L. Princehouse and H. Weatherspoon, RACS: a case for cloud storage diversity, SoCC 10: Proc. 1st ACM symposium on Cloud computing, 010, pp [10] C. Cachin, R. Haas and M. Vukolic, Dependable storage in the Intercloud, Research Report RZ, 3783, 010. [11] K. D. Bowers, A. Juels and A. Oprea, HAIL: A high-availability and integrity layer for cloud storage, CCS 09: Proc. 16th ACM Conf. on Computer and communications security, 009, pp [1] M. A. AlZain, E. Pardede, B. Soh, J. A. Thom, Clouding Computing Security: From Single to Multi-Clouds, 45th Hawaii International Conference on System Sciences, 01. [13] L. Lamport, R. Shostak and M. Pease, The Byzantine generals problem, ACM Transactions on Programming Languages and Systems, 4 (3), 198, pp [14] C. Neuman, T. Yu, S. Hartman, K. Raeburn, The Kerberos network authentication service (V5), Internet RFC 410, July 005. [15] C. Neuman, The Kerberos network authentication service (V4), Internet RFC 1510, September [16] FIPS PUB 197, Advanced encryption standard (AES), National Institute of Standards and Technology, U.S. Department of Commerce, 001. [17] R. Rivest, The MD5 message-digest algorithm, RFC 131, Internet Engineering Task Force, 199. [18] Xiaoyun Wang, Hongbo Yu, How to Break MD5 and Other Hash Functions, Lecture tes in Computer Science 3494, 005, pp [19] Ming Xu, Reliable cloud storage technology escaping vendor lock-in [Undergraduate Thesis], Tianjin: Nankai University, 013. [0] Bin Zhang, Multi-cloud storage based on non-systematic code [Master Thesis], Tianjin: Nankai University, 013.

IMPLEMENTING DATA SECURITY IN MULTI CLOUD

IMPLEMENTING DATA SECURITY IN MULTI CLOUD IMPLEMENTING DATA SECURITY IN MULTI CLOUD Ms. Renu Nagendra Shinde Information Technology SKNCOE Pune 41,India renunikhilp@gmail.com Prof. Mrs. Varsha Khandekar Information Technology SKNCOE Pune 41, India

More information

Security Threat Solution over Single Cloud To Multi-Cloud Using DepSky Model

Security Threat Solution over Single Cloud To Multi-Cloud Using DepSky Model IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 14, Issue 1 (Sep. - Oct. 2013), PP 71-76 Security Threat Solution over Single Cloud To Multi-Cloud Using DepSky

More information

MIGRATION FROM SINGLE TO MULTI-CLOUDS TO SHRIVEL SECURITY RISKS IN CLOUD COMPUTING. K.Sireesha 1 and S. Suresh 2

MIGRATION FROM SINGLE TO MULTI-CLOUDS TO SHRIVEL SECURITY RISKS IN CLOUD COMPUTING. K.Sireesha 1 and S. Suresh 2 IJCITP Volume.8* Number 2* December 2013, pp. 53-58 Serials Publications MIGRATION FROM SINGLE TO MULTI-CLOUDS TO SHRIVEL SECURITY RISKS IN CLOUD COMPUTING K.Sireesha 1 and S. Suresh 2 1 M.Tech. Student,

More information

Secure Framework for Data Storage from Single to Multi clouds in Cloud Networking

Secure Framework for Data Storage from Single to Multi clouds in Cloud Networking Secure Framework for Data Storage from Single to Multi clouds in Cloud Networking B.Sujana 1, P.Tejaswini 2, G.Srinivasulu 3, Sk.Karimulla 4 1,2,3,4 QUBA COLLEGE OF ENGINEERING & TECH, NELLORE Abstract:

More information

A Multi-Cloud based Approach to Enhance Data Security and Availability in Cloud Storage

A Multi-Cloud based Approach to Enhance Data Security and Availability in Cloud Storage A Multi-Cloud based Approach to Enhance Data Security and Availability in Cloud Storage Siva Rama Krishna T. a, * Dr. A. S. N. Chakravarthy a, Naveen Kumar G. b a Department of Computer Science and Engineering,

More information

Cloud Computing Security: From Single to Multi-Clouds

Cloud Computing Security: From Single to Multi-Clouds 2012 45th Hawaii International Conference on System Sciences Cloud Computing Security: From Single to Multi-Clouds Mohammed A. AlZain #, Eric Pardede #, Ben Soh #, James A. Thom* # Department of Computer

More information

Improving data integrity on cloud storage services

Improving data integrity on cloud storage services International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services

More information

An Approach Secret Sharing Algorithm in Cloud Computing Security over Single to Multi Clouds

An Approach Secret Sharing Algorithm in Cloud Computing Security over Single to Multi Clouds International Journal of Scientific and Research Publications, Volume 3, Issue 4, April 2013 1 An Approach Secret Sharing Algorithm in Cloud Computing Security over Single to Multi Clouds Md Kausar Alam,

More information

Secure Cloud Storage with Multi Cloud Architecture

Secure Cloud Storage with Multi Cloud Architecture International Journal of Innovative Technology and Exploring Engineering (IJITEE) Secure Cloud Storage with Multi Cloud Architecture Kavitha G M, Vinay Kumar A N, Balasubrhamanya Abstract The use of cloud

More information

A survey on cost effective multi-cloud storage in cloud computing

A survey on cost effective multi-cloud storage in cloud computing A survey on cost effective multi-cloud storage in cloud computing Nitesh Shrivastava, Ganesh Kumar Abstract As novel storage model, cloud storage has gain attentions from both the academics and industrial

More information

DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION

DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION Prof. M. Ben Swarup Professor, Department of CSE Vignan's Institute of Information Technology Visakhapatnam-49, India Chukkala

More information

Scientific Journal Impact Factor (SJIF): 1.711

Scientific Journal Impact Factor (SJIF): 1.711 Scientific Journal Impact Factor (SJIF): 1.711 e-issn: 2349-9745 p-issn: 2393-8161 International Journal of Modern Trends in Engineering and Research www.ijmter.com OneTK: Key Distribution Center at Cloud

More information

Secure Way of Storing Data in Cloud Using Third Party Auditor

Secure Way of Storing Data in Cloud Using Third Party Auditor IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 4 (Jul. - Aug. 2013), PP 69-74 Secure Way of Storing Data in Cloud Using Third Party Auditor 1 Miss.

More information

Multi Cloud Architecture for Improved User Experience

Multi Cloud Architecture for Improved User Experience Multi Cloud Architecture for Improved User Experience S. B. Shivakumar, Ramesh B. E., Kavitha G. M., Mala M. Abstract Use of cloud computing has increased rapidly in many organizations. There are many

More information

AN APPROACH TOWARDS REDUCING SECURITY CONCERNS IN CLOUD ENVIRONMENT

AN APPROACH TOWARDS REDUCING SECURITY CONCERNS IN CLOUD ENVIRONMENT INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN APPROACH TOWARDS REDUCING SECURITY CONCERNS IN CLOUD ENVIRONMENT Farhan Mohiuddin 1, Akheel Mohammed 2, Ayesha 3 1 M.Tech

More information

A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments

A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining

More information

Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication

Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication Sanjay Kumar Baghel Mtech Scholar, CSE, CSIT DURG Sanju5878@gmail.com Bhupesh Kumar Dewangan Assistant Professor,CSE,

More information

Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System

Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System 1 K.Valli Madhavi A.P vallimb@yahoo.com Mobile: 9866034900 2 R.Tamilkodi A.P tamil_kodiin@yahoo.co.in Mobile:

More information

DepSky Dependable and Secure Storage in a Cloud-of-Clouds Alysson Bessani, Miguel Correia, Bruno Quaresma, Fernando André, Paulo Sousa

DepSky Dependable and Secure Storage in a Cloud-of-Clouds Alysson Bessani, Miguel Correia, Bruno Quaresma, Fernando André, Paulo Sousa epsky ependable and Secure Storage in a Cloud-of-Clouds Alysson Bessani, Miguel Correia, Bruno Quaresma, Fernando André, Paulo Sousa University of Lisbon, Faculty of Sciences 1 Moving to Clouds ata is

More information

Kerberos. Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530 520 BC. From Italy (?).

Kerberos. Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530 520 BC. From Italy (?). Kerberos Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530 520 BC. From Italy (?). 1 Kerberos Kerberos is an authentication protocol and a software suite implementing this

More information

Multi-Cloud Data Hosting System

Multi-Cloud Data Hosting System Multi-Cloud Data Hosting System Jocelin Asha J #1, Kalpana B #2, Kavina Priya S #3, Lavanya G #4, Venkatasubramanian.S 5 B.E. Student, Dept. of Computer Science, Saranathan College of Engineering, Venkateshwara

More information

Sharing Files Using Cloud Storage Services

Sharing Files Using Cloud Storage Services Sharing Files Using Cloud Storage Services Tiago Oliveira, Ricardo Mendes, and Alysson Bessani {toliveira,rmendes}@lasige.di.fc.ul.pt, bessani@di.fc.ul.pt Universidade de Lisboa, Faculdade de Ciências,

More information

Dynamic Resource Allocation and Data Security for Cloud

Dynamic Resource Allocation and Data Security for Cloud Dynamic Resource Allocation and Data Security for Cloud Rajesh M. Devakate Annasaheb Dange College of Engg. & Technology, Ashta, Maharashtra, India. Amol B. Rajmane Ashokrao Mane Group of Institutions,

More information

Enhancing Data Securing In Cloud Using Scalable Transactions

Enhancing Data Securing In Cloud Using Scalable Transactions Enhancing Data Securing In Cloud Using Scalable Transactions Mrudul S Rajhans Department of Computer Science, PICT, University of Pune, MH, India ABSTRACT: Cloud computing is becoming one of the most used

More information

Healthcare Compliance Solutions

Healthcare Compliance Solutions Healthcare Compliance Solutions Let Protected Trust be your Safe Harbor In the Health Information Technology for Economic and Clinical Health Act of 2009 (HITECH), the U.S. Department of Health and Human

More information

Secrecy Maintaining Public Inspecting For Secure Cloud Storage

Secrecy Maintaining Public Inspecting For Secure Cloud Storage Secrecy Maintaining Public Inspecting For Secure Cloud Storage K.Sangamithra 1, S.Tamilselvan 2 M.E, M.P.Nachimuthu.M.Jaganathan Engineering College, Tamilnadu, India 1 Asst. Professor, M.P.Nachimuthu.M.Jaganathan

More information

Public Auditing for Shared Data in the Cloud by Using AES

Public Auditing for Shared Data in the Cloud by Using AES Public Auditing for Shared Data in the Cloud by Using AES 1 Syagamreddy Subbareddy, 2 P.Tejaswi, 3 D.Krishna 1 M.Tech(CSE) Pursuing, 2 Associate Professor, 3 Associate Professor,HOD, 1,2,3 Dept. of Computer

More information

Chapter 1: Introduction

Chapter 1: Introduction Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure

More information

CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY

CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY Varun Gandhi 1 Department of Computer Science and Engineering, Dronacharya College of Engineering, Khentawas,

More information

A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing

A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing International Journal of Emerging Engineering Research and Technology Volume 3, Issue 5, May 2015, PP 1-7 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) A Survey on Security Issues and Security Schemes

More information

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure) Cryptelo Drive Cryptelo Drive is a virtual drive, where your most sensitive data can be stored. Protect documents, contracts, business know-how, or photographs - in short, anything that must be kept safe.

More information

How to Store Data to the Cloud without giving the Cloud anything Jason Resch Cleversafe

How to Store Data to the Cloud without giving the Cloud anything Jason Resch Cleversafe How to Store Data to the Cloud without giving the Cloud anything Jason Resch Cleversafe Topics Barriers to cloud storage adoption Reliability concerns Security concerns Conventional Solutions Replication,

More information

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) PERCEIVING AND RECOVERING DEGRADED DATA ON SECURE CLOUD

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) PERCEIVING AND RECOVERING DEGRADED DATA ON SECURE CLOUD INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4,

More information

Cryptographic Data Security over Cloud

Cryptographic Data Security over Cloud Cryptographic Data Security over Cloud Er. Lalit Gehlod Asst.Professor, Dept.Of Computer Engineering, Institute Of Engineering & Technology, Devi Ahilya University, Indore, India. Govind Patidar Dept.

More information

A Proxy-Based Data Security Solution in Mobile Cloud

A Proxy-Based Data Security Solution in Mobile Cloud , pp. 77-84 http://dx.doi.org/10.14257/ijsia.2015.9.5.08 A Proxy-Based Data Security Solution in Mobile Cloud Xiaojun Yu 1,2 and Qiaoyan Wen 1 1 State Key Laboratory of Networking and Switching Technology,

More information

Healthcare Compliance Solutions

Healthcare Compliance Solutions Privacy Compliance Healthcare Compliance Solutions Trust and privacy are essential for building meaningful human relationships. Let Protected Trust be your Safe Harbor The U.S. Department of Health and

More information

Research Article. Research of network payment system based on multi-factor authentication

Research Article. Research of network payment system based on multi-factor authentication Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(7):437-441 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Research of network payment system based on multi-factor

More information

A Secure Authenticate Framework for Cloud Computing Environment

A Secure Authenticate Framework for Cloud Computing Environment A Secure Authenticate Framework for Cloud Computing Environment Nitin Nagar 1, Pradeep k. Jatav 2 Abstract Cloud computing has an important aspect for the companies to build and deploy their infrastructure

More information

Oracle Database Security and Audit

Oracle Database Security and Audit Copyright 2014, Oracle Database Security and Audit Beyond Checklists Learning objectives Understand Oracle architecture Database Listener Oracle connection handshake Client/server architecture Authentication

More information

Secure Data transfer in Cloud Storage Systems using Dynamic Tokens.

Secure Data transfer in Cloud Storage Systems using Dynamic Tokens. Secure Data transfer in Cloud Storage Systems using Dynamic Tokens. P.Srinivas *,K. Rajesh Kumar # M.Tech Student (CSE), Assoc. Professor *Department of Computer Science (CSE), Swarnandhra College of Engineering

More information

DRAFT Standard Statement Encryption

DRAFT Standard Statement Encryption DRAFT Standard Statement Encryption Title: Encryption Standard Document Number: SS-70-006 Effective Date: x/x/2010 Published by: Department of Information Systems 1. Purpose Sensitive information held

More information

Data Integrity and Dynamic Storage Way in Cloud Computing

Data Integrity and Dynamic Storage Way in Cloud Computing 1 Data Integrity and Dynamic Storage Way in Cloud Computing Dinesh.C, P.G Scholar, Computer Science and Engineering, Mailam Engineering College, Mailam, Tamilnadu. Abstract It is not an easy task to securely

More information

Secure & Encrypted Accessing and Sharing of Data in Distributed Virtual Cloud

Secure & Encrypted Accessing and Sharing of Data in Distributed Virtual Cloud Secure & Encrypted Accessing and Sharing of Data in Distributed Virtual Cloud Ashish G. Ahuja 1, Prof. Komal B. Bijwe 2 1. M.E. Scholar, Dept Of CSE 2. Asst. Prof. Dept. Of CSE at P.R.P.C.E& M, Amravati

More information

Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving,

Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving, Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Third Party

More information

Web Services & Database Services Availability through Multi-Cloud Environment

Web Services & Database Services Availability through Multi-Cloud Environment Web Services & Database Services Availability through Multi-Cloud Environment Veenesh Kumar Shrotriya 1, Ashutosh Kumar 2 1 M.Tech, 2 Assistant Professor, Department of Computer Science and Engineering,

More information

PERFORMANCE OF BALANCED STORAGE SERVICES IN CLOUD SYSTEM

PERFORMANCE OF BALANCED STORAGE SERVICES IN CLOUD SYSTEM INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE PERFORMANCE OF BALANCED STORAGE SERVICES IN CLOUD SYSTEM Byagari Kumar 1, K.Pradeep Kumar 2 1 M.Tech Student, Dept of CSE, RRS College

More information

Secure and Dependable Cloud Storage Services for CRM

Secure and Dependable Cloud Storage Services for CRM Secure and Dependable Cloud Storage Services for CRM U. Rama Govinda Reddy PG Student, Bonam Venkata Chalamayya Engineering College, Odalarevu, Andhra Pradesh, India Abstract: Cloud storage allows users

More information

VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui

VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui School of Engineering and Computer Science Te Kura Mātai Pūkaha, Pūrorohiko PO Box 600 Wellington New Zealand Tel: +64 4 463

More information

Journal of Electronic Banking Systems

Journal of Electronic Banking Systems Journal of Electronic Banking Systems Vol. 2015 (2015), Article ID 614386, 44 minipages. DOI:10.5171/2015.614386 www.ibimapublishing.com Copyright 2015. Khaled Ahmed Nagaty. Distributed under Creative

More information

CS 356 Lecture 28 Internet Authentication. Spring 2013

CS 356 Lecture 28 Internet Authentication. Spring 2013 CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists

More information

A Secure Decentralized Access Control Scheme for Data stored in Clouds

A Secure Decentralized Access Control Scheme for Data stored in Clouds A Secure Decentralized Access Control Scheme for Data stored in Clouds Priyanka Palekar 1, Abhijeet Bharate 2, Nisar Anjum 3 1 SKNSITS, University of Pune 2 SKNSITS, University of Pune 3 SKNSITS, University

More information

SECURITY STORAGE MODEL OF DATA IN CLOUD Sonia Arora 1 Pawan Luthra 2 1,2 Department of Computer Science & Engineering, SBSSTC

SECURITY STORAGE MODEL OF DATA IN CLOUD Sonia Arora 1 Pawan Luthra 2 1,2 Department of Computer Science & Engineering, SBSSTC SECURITY STORAGE MODEL OF DATA IN CLOUD Sonia Arora 1 Pawan Luthra 2 1,2 Department of Computer Science & Engineering, SBSSTC Ferozepur, Punjab, India Email: 1 soniaarora141@gmail.com, 2 pawanluthra81@gmail.com

More information

ADVANCE SECURITY TO CLOUD DATA STORAGE

ADVANCE SECURITY TO CLOUD DATA STORAGE Journal homepage: www.mjret.in ADVANCE SECURITY TO CLOUD DATA STORAGE ISSN:2348-6953 Yogesh Bhapkar, Mitali Patil, Kishor Kale,Rakesh Gaikwad ISB&M, SOT, Pune, India Abstract: Cloud Computing is the next

More information

How To Use Kerberos

How To Use Kerberos KERBEROS 1 Kerberos Authentication Service Developed at MIT under Project Athena in mid 1980s Versions 1-3 were for internal use; versions 4 and 5 are being used externally Version 4 has a larger installed

More information

Secure cloud access system using JAR ABSTRACT:

Secure cloud access system using JAR ABSTRACT: Secure cloud access system using JAR ABSTRACT: Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that

More information

Ensuring Data Storage Security in Cloud Crop

Ensuring Data Storage Security in Cloud Crop ISSN : 2347-8446 (Online) International Journal of Advanced Research in Ensuring Data Storage Security in Cloud Crop Rakesh Kumar ER Asst. Prof. & Head (CSE), SAMS College of Engineering and Technology,

More information

The Byzantine Empire in the Intercloud

The Byzantine Empire in the Intercloud The Byzantine Empire in the Intercloud Marko Vukolić IBM Research - Zurich CH-8803 Rüschlikon, Switzerland mvu@zurich.ibm.com Abstract The relevance of Byzantine fault tolerance in the context of cloud

More information

International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING &

International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4, Issue 6, November - December (2013), pp. 62-69 IAEME: www.iaeme.com/ijcet.asp Journal

More information

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

Module 8. Network Security. Version 2 CSE IIT, Kharagpur Module 8 Network Security Lesson 2 Secured Communication Specific Instructional Objectives On completion of this lesson, the student will be able to: State various services needed for secured communication

More information

SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE

SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE International Journal of Computer Network and Security(IJCNS) Vol 7. No.1 2015 Pp. 1-8 gopalax Journals, Singapore available at : www.ijcns.com ISSN: 0975-8283 ----------------------------------------------------------------------------------------------------------------------------------------------------------

More information

Secure Distribution of File on Cloud

Secure Distribution of File on Cloud Secure Distribution of File on Cloud Niyamat I. Ujloomwale, Ranjana Badre Dept. of Computer, MIT Academy of Engineering, Alandi, Savitri Phule Pune University, Pune, India Dept. of Computer, MIT Academy

More information

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department

More information

BANKING SECURITY and COMPLIANCE

BANKING SECURITY and COMPLIANCE BANKING SECURITY and COMPLIANCE Cashing In On Banking Security and Compliance With awareness of data breaches at an all-time high, banking institutions are working hard to implement policies and solutions

More information

A Comprehensive Data Forwarding Technique under Cloud with Dynamic Notification

A Comprehensive Data Forwarding Technique under Cloud with Dynamic Notification Research Journal of Applied Sciences, Engineering and Technology 7(14): 2946-2953, 2014 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2014 Submitted: July 7, 2013 Accepted: August

More information

How To Ensure Correctness Of Data In The Cloud

How To Ensure Correctness Of Data In The Cloud A MECHANICS FOR ASSURING DATA STORAGE SECURITY IN CLOUD COMPUTING 1, 2 Pratibha Gangwar, 3 Mamta Gadoria 1 M. Tech. Scholar, Jayoti Vidyapeeth Women s University, Jaipur, priya25mehta@gmail.com 2 M. Tech.

More information

Cross-Cloud Testing Strategies Over Cloud Computing

Cross-Cloud Testing Strategies Over Cloud Computing RESEARCH ARTICLE OPEN ACCESS Cross-Cloud Testing Strategies Over Cloud Computing Mr. Nageswararao, Dr. M B Khetmalas. Department of Bioinformatics and Computer Science, Dr. D.Y. Patil Biotechnology & Bioinformatics

More information

Verifying Correctness of Trusted data in Clouds

Verifying Correctness of Trusted data in Clouds Volume-3, Issue-6, December-2013, ISSN No.: 2250-0758 International Journal of Engineering and Management Research Available at: www.ijemr.net Page Number: 21-25 Verifying Correctness of Trusted data in

More information

DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION

DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION Hasna.R 1, S.Sangeetha 2 1 PG Scholar, Dhanalakshmi Srinivasan College of Engineering, Coimbatore. 2 Assistant Professor, Dhanalakshmi Srinivasan

More information

Hey! Cross Check on Computation in Cloud

Hey! Cross Check on Computation in Cloud Hey! Cross Check on Computation in Cloud Ajeet Singh Rajput Computer Science and Engineering Department S.D.B.C.T, Mhow Road,Indore,(M.P), India ajeetsinghrajput@gmail.com M.E.(CSE), S.D.B.C.T, Indore

More information

How To Ensure Correctness Of Data In The Cloud

How To Ensure Correctness Of Data In The Cloud Ensuring Data Storage Security in Cloud Computing ABSTRACT Cloud computing has been envisioned as the next-generation architecture of IT enterprise. In contrast to traditional solutions, where the IT services

More information

Providing Data Protection as a Service in Cloud Computing

Providing Data Protection as a Service in Cloud Computing International Journal of Scientific and Research Publications, Volume 3, Issue 6, June 2013 1 Providing Data Protection as a Service in Cloud Computing Sunumol Cherian *, Kavitha Murukezhan ** * Department

More information

Optimized And Secure Data Backup Solution For Cloud Using Data Deduplication

Optimized And Secure Data Backup Solution For Cloud Using Data Deduplication RESEARCH ARTICLE OPEN ACCESS Optimized And Secure Data Backup Solution For Cloud Using Data Deduplication Siva Ramakrishnan S( M.Tech ) 1,Vinoth Kumar P (M.E) 2 1 ( Department Of Computer Science Engineering,

More information

Identifying Data Integrity in the Cloud Storage

Identifying Data Integrity in the Cloud Storage www.ijcsi.org 403 Identifying Data Integrity in the Cloud Storage Saranya Eswaran 1 and Dr.Sunitha Abburu 2 1 Adhiyamaan College of Engineering, Department of Computer Application, Hosur. 2 Professor and

More information

N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT

N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 1 M.Tech Student, Department of Computer Science and Engineering, S.R.M. University Chennai 2 Asst.Professor,

More information

TOPIC HIERARCHY. Distributed Environment. Security. Kerberos

TOPIC HIERARCHY. Distributed Environment. Security. Kerberos KERBEROS TOPIC HIERARCHY Distributed Environment Security Privacy Authentication Authorization Non Repudiation Kerberos ORIGIN MIT developed Kerberos to protect network services. Developed under the Project

More information

An in-building multi-server cloud system based on shortest Path algorithm depending on the distance and measured Signal strength

An in-building multi-server cloud system based on shortest Path algorithm depending on the distance and measured Signal strength IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 1, Ver. I (Jan Feb. 2015), PP 38-42 www.iosrjournals.org An in-building multi-server cloud system based

More information

An Intelligent Approach for Data Fortification in Cloud Computing

An Intelligent Approach for Data Fortification in Cloud Computing An Intelligent Approach for Data Fortification in Cloud Computing Supriya Mandhare 1, Prof. A. K. Sen 2, Asso. Prof. Rajkumar Shende 3 1,3 Department of Computer Engineering, St. Francis Institute of Technology,

More information

Novel Approach to Ensure Data Security in Cloud Computing

Novel Approach to Ensure Data Security in Cloud Computing Volume-8, Number-2 Jan-Jun 2015 pp. 99-114 Novel Approach to Ensure Data Security in Cloud Computing Sonia Bassi 1, Anjali Chaudhary 2 1 M.Tech Student, Department Of Computer Science, KITM, Kurukshetra

More information

Privacy Preservation and Secure Data Sharing in Cloud Storage

Privacy Preservation and Secure Data Sharing in Cloud Storage OPEN ACCESS Int. Res. J. of Science & Engineering, 2015; Vol. 3 (6): 231-236 ISSN: 2322-0015 RESEARCH ARTICLE Privacy Preservation and Secure Data Sharing in Cloud Storage Chavhan Bhaurao* and Deshmukh

More information

Single Sign-On Secure Authentication Password Mechanism

Single Sign-On Secure Authentication Password Mechanism Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,

More information

SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS

SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS Abstract: The Single sign-on (SSO) is a new authentication mechanism that enables a legal user with a single credential

More information

Performance Analysis of Client Side Encryption Tools

Performance Analysis of Client Side Encryption Tools Performance Analysis of Client Side Encryption Tools Subrata Kumar Das 1, Md. Alam Hossain 2, Md. Arifuzzaman Sardar 3, Ramen Kumar Biswas 4, Prolath Dev Nath 5 Abstract Client side encryption tools are

More information

Ensuring HIPAA Compliance with eztechdirect Online Backup and Archiving Services

Ensuring HIPAA Compliance with eztechdirect Online Backup and Archiving Services Ensuring HIPAA Compliance with eztechdirect Online Backup and Archiving Services Introduction Patient privacy continues to be a chief topic of concern as technology continues to evolve. Now that the majority

More information

An Efficient Windows Cardspace identity Management Technique in Cloud Computing

An Efficient Windows Cardspace identity Management Technique in Cloud Computing IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 3, Ver. VII (May-Jun. 2014), PP 61-66 An Efficient Windows Cardspace identity Management Technique

More information

Data Integrity for Secure Dynamic Cloud Storage System Using TPA

Data Integrity for Secure Dynamic Cloud Storage System Using TPA International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 7-12 International Research Publication House http://www.irphouse.com Data Integrity for Secure

More information

A New Secure Strategy for Small-Scale IEEE 802.11 Wireless Local Area Networ

A New Secure Strategy for Small-Scale IEEE 802.11 Wireless Local Area Networ I.J. Wireless and Microwave Technologies 2012, 4, 21-27 Published Online August 2012 in MECS (http://www.mecs-press.net) DOI: 10.5815/ijwmt.2012. 04.04 Available online at http://www.mecs-press.net/ ijwmt

More information

Secure Cloud Transactions by Performance, Accuracy, and Precision

Secure Cloud Transactions by Performance, Accuracy, and Precision Secure Cloud Transactions by Performance, Accuracy, and Precision Patil Vaibhav Nivrutti M.Tech Student, ABSTRACT: In distributed transactional database systems deployed over cloud servers, entities cooperate

More information

SENSE Security overview 2014

SENSE Security overview 2014 SENSE Security overview 2014 Abstract... 3 Overview... 4 Installation... 6 Device Control... 7 Enrolment Process... 8 Authentication... 9 Network Protection... 12 Local Storage... 13 Conclusion... 15 2

More information

February. ISSN: 2321-8134

February. ISSN: 2321-8134 IJFEAT INTERNATIONAL JOURNAL FOR ENGINEERING APPLICATIONS AND TECHNOLOGY TITLE: DATA PLACE & MANAGE SECURITY IN CLOUD COMPUTING FOR EFFECTIVE AND FLEXIBLE DISTRIBUTED SYSTEM 1 Mr. Pritam S. Bhoyar, 2 Mr.

More information

How To Secure Cloud Data Storage

How To Secure Cloud Data Storage Enabling Data Storage Security in Cloud Computing for Banking Enterprise S.BIRUNTHA V.VENKATESA KUMAR, S.PALANISWAMI, II ME CSE Lect/CSE, Registrar Anna University Coimbatore, Anna University Coimbatore,

More information

Decentralized Information Accountability Framework for Information Sharing In Cloud Environment

Decentralized Information Accountability Framework for Information Sharing In Cloud Environment Decentralized Information Accountability Framework for Information Sharing In Cloud Environment Deepthi Srinivas, Shylaja BR, Rajeev RK, Muruli R 1 BNM Institute of technology 2,3,4 Rai Technology University

More information

A Survey on Data Integrity of Cloud Storage in Cloud Computing

A Survey on Data Integrity of Cloud Storage in Cloud Computing A Survey on Data Integrity of Cloud Storage in Cloud Computing A B S T R A C T Mr.Vitthal Raut, Prof. Suhasini Itkar Department Computer Engineering, PES Modern College of Engineering, Pune, India. raut.vitthal@gmail.com,

More information

Cloud Storage Security

Cloud Storage Security Cloud Storage Security Sven Vowé Fraunhofer Institute for Secure Information Technology (SIT) Darmstadt, Germany SIT is a member of CASED (Center for Advanced Security Research Darmstadt) Cloud Storage

More information

NETWORK ADMINISTRATION AND SECURITY

NETWORK ADMINISTRATION AND SECURITY NETWORK ADMINISTRATION AND SECURITY Unit I (NAS) (W- 10) Q. 1) What is Security Attack? Explain general categories of attack with examples. 7 Q. 2) List and define the five security services. 5 Q. 3) Define

More information

Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment

Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment Deepa Noorandevarmath 1, Rameshkumar H.K 2, C M Parameshwarappa 3 1 PG Student, Dept of CS&E, STJIT, Ranebennur. Karnataka, India

More information

15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM

15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM Dhanashri Bamane Vinayak Pottigar Subhash Pingale Department of Computer Science and Engineering SKN

More information

SECURITY FOR ENCRYPTED CLOUD DATA BY USING TOP-KEY TREE TECHNOLOGIES

SECURITY FOR ENCRYPTED CLOUD DATA BY USING TOP-KEY TREE TECHNOLOGIES SECURITY FOR ENCRYPTED CLOUD DATA BY USING TOP-KEY TREE TECHNOLOGIES 1 MANJOORULLASHA SHAIK, 2 SYED.ABDULHAQ, 3 P.BABU 1 PG SCHOLAR, CSE (CN), QCET, NELLORE 2,3 ASSOCIATE PROFESSOR, CSE, QCET, NELLORE

More information

Third Party Auditing For Secure Data Storage in Cloud through Trusted Third Party Auditor Using RC5

Third Party Auditing For Secure Data Storage in Cloud through Trusted Third Party Auditor Using RC5 Third Party Auditing For Secure Data Storage in Cloud through Trusted Third Party Auditor Using RC5 Miss. Nupoor M. Yawale 1, Prof. V. B. Gadicha 2 1 Student, M.E. Second year CSE, P R Patil COET, Amravati.INDIA.

More information

86 Int. J. Engineering Systems Modelling and Simulation, Vol. 6, Nos. 1/2, 2014

86 Int. J. Engineering Systems Modelling and Simulation, Vol. 6, Nos. 1/2, 2014 86 Int. J. Engineering Systems Modelling and Simulation, Vol. 6, Nos. 1/2, 2014 Dual server-based secure data-storage system for cloud storage Woong Go ISAA Lab, Department of Information Security Engineering,

More information

Keywords: Cloud Storage, Shared Data, Privacy Preserving, Secret Sharing, Authentication, Third Party Auditor(TPA).

Keywords: Cloud Storage, Shared Data, Privacy Preserving, Secret Sharing, Authentication, Third Party Auditor(TPA). Volume 5, Issue 4, April 215 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Data Security in

More information