AN EFFICIENT STRATEGY OF THE DATA INTEGRATION BASED CLOUD



Similar documents
EFFICIENT DISCOVERY OF INTEGRITY AUTOMATION IN HYBRID CLOUD COMPUTING

-

How To Ensure Data Integrity In Clouds

CLOUD BASED STORAGE SERVICES FOR SECURITY FOLLOWED BY THE DATA AUTHENTICATION

Integrity Verification In Multiple Cloud Storage Using Cooperative PDP Method

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY

Data Integrity for Secure Dynamic Cloud Storage System Using TPA

AN EFFECTIVE STUDY ON IMPROVED DATA AUTHENTICATION IN CLOUD SYSTEM

Performance Evaluation Panda for Data Storage and Sharing Services in Cloud Computing

Development of enhanced Third party Auditing Scheme for Secure Cloud Storage

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION

Public Auditing for Shared Data in the Cloud by Using AES

Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.

An Efficient Secure Multi Owner Data Sharing for Dynamic Groups in Cloud Computing

SECURE RE-ENCRYPTION IN UNRELIABLE CLOUD USINGSYNCHRONOUS CLOCK

MODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENT

How To Understand Cloud Computing

Data Security & Availability in Multi-Cloud Storage with Cooperative Provable Data Possession

AN APPROACH TOWARDS FUNCTIONING OF PUBLIC AUDITABILITY FOR CLOUD ENRICHMENT

SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE

CLOUD STORAGE SYSTEM MANAGING SECURE FILE EXCLUSION

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Data Integrity Check using Hash Functions in Cloud environment

Keywords: - Ring Signature, Homomorphic Authenticable Ring Signature (HARS), Privacy Preserving, Public Auditing, Cloud Computing.

A Survey Paper on Secure Auditing and Maintaining Block Level Integrity with Reliability of Data in Cloud

Constructing Pairing-Friendly Elliptic Curves with Embedding Degree 10

TITLE: Secure Auditing and Deduplicating Data in Cloud(Survey Paper)

Copyright IEEE. Citation for the published paper:

THE CLOUD AND ITS EFFECTS ON WEB DEVELOPMENT

RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES

Secrecy Maintaining Public Inspecting For Secure Cloud Storage

Selective dependable storage services for providing security in cloud computing

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD

Sheltered Multi-Owner Data distribution For vibrant Groups in the Cloud

Review On Deduplicating Data and Secure Auditing in Cloud

IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD

DESIGN OF CLUSTER OF SIP SERVER BY LOAD BALANCER

Geoprocessing in Hybrid Clouds

PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING

A Hybrid Scheduling Approach for Scalable Heterogeneous Hadoop Systems

Enhanced Survey and Proposal to secure the data in Cloud Computing Environment

How To Understand The Individual Competences Of An It Manager

An Efficient and Light weight Secure Framework for Applications of Cloud Environment using Identity Encryption Method

MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction

Privacy Preservation and Secure Data Sharing in Cloud Storage

A SECURE FRAMEWORK WITH KEY- AGGREGATION FOR DATA SHARING IN CLOUD

An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud

Analysis of Service Broker Policies in Cloud Analyst Framework

Development of Effective Audit Service to Maintain Integrity of Migrated Data in Cloud

Data management using Virtualization in Cloud Computing

Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving,

Enable Public Audit ability for Secure Cloud Storage

Survey Paper on Integrity Auditing of Storage

CONSIDERATION OF DYNAMIC STORAGE ATTRIBUTES IN CLOUD

Energy Optimal Cloud Storage and Access Methods for Temporal Cloud Databases

EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE

Review On Regenerating Code Based Secure Cloud Storage Using Public Auditing Mr.Satish Shelar 1, Prof.S.Y.Raut 2

International Journal of Advanced Research in Computer Science and Software Engineering

Security in Cloud Network

Preserving Data Integrity and Public Auditing for Data Storage in Cloud Computing

Third Party Auditing For Secure Data Storage in Cloud through Trusted Third Party Auditor Using RC5

How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System

Analysis of Secure Cloud Data Sharing Within a Group

INVESTIGATION OF RENDERING AND STREAMING VIDEO CONTENT OVER CLOUD USING VIDEO EMULATOR FOR ENHANCED USER EXPERIENCE

Efficient Unlinkable Secret Handshakes for Anonymous Communications

SECURED DATA STORAGE IN CLOUD

Optimized and Secured Educlouds by Implementing Virtualization

Advanced Task Scheduling for Cloud Service Provider Using Genetic Algorithm

SECURING CLOUD DATA COMMUNICATION USING AUTHENTICATION TECHNIQUE

SHORT VERSION, NO EXAMPLE AND APPENDIX 1. (MC 2 ) 2 : A Generic Decision-Making Framework and its Application to Cloud Computing

Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment

Security of Data from Public - Using Cloud Storage

SECURITY FOR ENCRYPTED CLOUD DATA BY USING TOP-KEY TREE TECHNOLOGIES

PRIVACY PRESERVING PUBLIC AUDITING FOR SECURED DATA STORAGE IN CLOUD USING BLOCK AUTHENTICATION CODE

A SIGNIFICANT REDUCTION OF CLOUD STORAGE BY ELIMINATION OF REPETITIVE DATA

Privacy-Preserving Public Auditing & Data Intrgrity for Secure Cloud Storage

CLOUD COMPUTING SECURITY IN UNRELIABLE CLOUDS USING RELIABLE RE-ENCRYPTION

G.J. E.D.T.,Vol.3(1):43-47 (January-February, 2014) ISSN: SUODY-Preserving Privacy in Sharing Data with Multi-Vendor for Dynamic Groups

DEFINING CLOUD COMPUTING: AN ATTEMPT AT GIVING THE CLOUD AN IDENTITY.

International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS)

IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD ENVIRONMENT

A Secure Model for Cloud Computing Based Storage and Retrieval

Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication

AN EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA IN TEGRITY IN CLOUDS

AN ANALYSIS ON CLOUD PARADIGM IN ONLINE BANKING Shreya Paul 1, Atma Prakash Singh 2 and Madhulika Sharma 3

Cloud Based Enterprise Resource Planning Using Software As A Service

Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage

A Hybrid Load Balancing Policy underlying Cloud Computing Environment

Security Issues in Cloud Computing & Study on Encryption Method

Providing Access Permissions to Legitimate Users by Using Attribute Based Encryption Techniques In Cloud

ORUTA: SECRECY PRESERVING POPULACE INSPECTING FOR OUTSOURCED DATA IN CLOUD

EXAMINING OF HEALTH SERVICES BY UTILIZATION OF MOBILE SYSTEMS. Dokuri Sravanthi 1, P.Rupa 2

Secured Storage of Outsourced Data in Cloud Computing

Decentralized Access Control Secure Cloud Storage using Key Policy Attribute Based Encryption

A Review of Load Balancing Algorithms for Cloud Computing

Performance Analysis of VM Scheduling Algorithm of CloudSim in Cloud Computing

SECURITY THREATS TO CLOUD COMPUTING

Performance of Cloud Computing Centers with Multiple Priority Classes

A Comparative Study of Applying Real- Time Encryption in Cloud Computing Environments

Transcription:

INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF THE DATA INTEGRATION BASED CLOUD Koncha Anantha Laxmi Prasad 1, M.Yaseen Pasha 2, V.Hari Prasad 3 1 M.Tech Student, Dept of CSE, Sphoorthy Engineering College, Hyderabad, A.P, India 2 Assistant Professor, Dept of CSE, Sphoorthy Engineering College, Hyderabad, A.P, India 3 Professor, Dept of CSE, Sphoorthy Engineering College, Hyderabad, A.P, India ABSTRACT: Here a new technique is proposed by the help of the analysis related to the strategy oriented with outsourcing of the data integrity in a well oriented fashion followed by the storage of the cloud based server by the help of the strategy of oriented with possession of the provable data in a well defined manner respectively. Here in the present strategy a scheme related to the aspect of the orientation of the PDP based aspect in a well defined fashion respectively storage of the cloud based distributed fashion by which data migration followed by the service of the scalability oriented scenario takes place in the system in a well oriented fashion respectively. Where there is an integration of the service provider followed by the users in a well defined fashion that too with respect to the storage of the cloud followed by the network oriented with the distributed environment in a well oriented fashion respectively. Here a technique is proposed based on the strategy of the cooperative scheme of the PDP in a well respective fashion takes place in the system and its representation by the verification of the homo morphed response in a well effective manner by the hierarchy of the index based fashion respectively. Here the system related to the aspect of the knowledge based on the zero strategy in which there is an analysis with respect to the strategy of the oriented response in the system based fashion by the analysis of the security oriented scheme in a well respective fashion takes place in the system respectively. Where there is an effective improvement in the performance on the aspect of the completeness and also with respect to the soundness knowledge in a well oriented fashion respectively. Therefore the system is designed with a well effective strategy by the above technique and it is successful in its implementation based aspect respectively. Simulations have been conducted the present method and a number 543 P a g e

of analysis is made where there is an evaluation of the accurate performance based strategy followed by the outcome in a well oriented aspect respectively. Keywords: Computation of the cloud, Dynamic scalability, Data authentication, Knowledge based zero strategy, Network related to the cooperative phenomena respectively. 1. INTRODUCTION There is a lot of advancement related to the strategy of the computation oriented cloud in a well effective manner respectively. Here this particular strategy is implemented by the help of the internet based aspect in a well oriented fashion respectively. Service based on the storage oriented cloud is implemented by the rapid oriented strategy in a well effective manner and also the low cost comparative provision based strategy in a well oriented fashion respectively [1][2]. Here the data of the client is completely based on the service involvement followed by the reduced cost and the reliable data transfer in a well oriented fashion with the help of the reduced power respectively [3]. Here the environment related to the computation of the cloud based strategy plays an important role for the aspect of the analysis which is based on the design oriented phenomena in a well respective fashion respectively. Where its architecture is completely open followed by the accurate analysis and also the implementation is quite efficient in its terminology in a well respective fashion takes place in the system respectively [4][5]. 2. METHODOLOGY Here the present method is effective and efficient in terms of the performance based strategy followed by the outcome with respect to the entire system in a well oriented fashion respectively [6]. In this paper a method is designed with a well efficient frame work where the mechanism is very powerful for the implementation of the system in a well oriented aspect respectively. Here the implementation of the present method is shown in the above figure in the block diagram and is explained in the elaborative fashion respectively. There is a huge challenge for the present method where it is supposed to accurately analyze the problems of the previous methods in a well efficient manner followed by the improvement in the performance of the system where there is a controlled strategy of the degradation of the performance of 544 P a g e

the several previous methods in a well oriented aspect respectively [7][8]. BLOCK DIAGRAM to accurately analyze the problems of the previous methods in a well oriented fashion and control the degraded performance of the previous method and improve the outcome of the system respectively [9]. Fig 1: Shows the block diagram of the present method respectively 3. EXPECTED RESULTS A comparative analysis is made between the present method and the several previous methods in a well effective fashion and is shown in the below figure in the form of the graphical representation is explained din the elaborative fashion respectively. A lot of analysis is made between the present method and huge number of the computation is applied on the large number of the data sets ina well oriented fashion and which is applied on the different types of the environment respectively. There is a huge challenge for the present method in which it is supposed Fig 2: shows the graphical representation of the present method respectively 4. CONCLUSION In this paper a method is designed with a well efficient framework oriented strategy in which the implementation of the present method in its analysis followed by the respective strategy in a well oriented fashion by the improvement in the performance based aspect followed by the outcome of the system based aspect respectively. Here a new technique is proposed by the help of the scheme oriented with the PDP based analysis in a well oriented fashion respectively where there is a storage of the cloud based distributed strategy in a well respective fashion takes place in the system based 545 P a g e

aspect respectively. Here the response related to the strategy of the homo morphic based environment where the verification is accurate in its aspect followed by the hierarchy of the index oriented hash function based phenomena in a well analysis respectively. Here a new technique is proposed based on the scheme oriented with scheme of the PDP based strategy in which cooperative phenomena in a well oriented fashion by the help of the scalable of the dynamic support in a well respective fashion takes place in the system by the help of the servers oriented multiple storage based strategy respectively. Here we finally conclude that the present method is used in the improved perspective for the overall system based analysis in a well respective fashion respectively. REFERENCES [1] L. Fortnow, J. Rompel, and M. Sipser, On the power of multiprover interactive protocols, in Theoretical Computer Science, 1988, pp. 156 161. [2] Y. Zhu, H. Hu, G.-J. Ahn, Y. Han, and S. Chen, Collaborative integrity verification in hybrid clouds, in IEEE Conference on the 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom, Orlando, Florida, USA, October 15-18, 2011, pp. 197 206. [3] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, Above the clouds: A berkeley view of cloud computing, EECS Department, University of California, Berkeley, Tech. Rep., Feb 2009. [4] D. Boneh and M. Franklin, Identitybased encryption from the weil pairing, in Advances in Cryptology (CRYPTO 2001), vol. 2139 of LNCS, 2001, pp. 213 229. [5] O. Goldreich, Foundations of Cryptography: Basic Tools. Cambridge University Press, 2001. [6] P. S. L. M. Barreto, S. D. Galbraith, C. O Eigeartaigh, and M. Scott, Efficient pairing computation on supersingular abelian varieties, Des. Codes Cryptography, vol. 42, no. 3, pp. 239 271, 2007. [7] J.-L. Beuchat, N. Brisebarre, J. Detrey, and E. Okamoto, Arithmetic operators for pairing-based cryptography, in CHES, ser. Lecture Notes in Computer Science, P. Paillier and I. Verbauwhede, Eds., vol. 4727. Springer, 2007, pp. 239 255. 546 P a g e

[8] H. Hu, L. Hu, and D. Feng, On a class of pseudorandom sequences from elliptic curves over finite fields, IEEE Transactions on Information Theory, vol. 53, no. 7, pp. 2598 2605, 2007. [9] A. Bialecki, M. Cafarella, D. Cutting, and O. O Malley, Hadoop: A framework for running applications on large clusters built of commodity hardware, Tech. Rep., 2005.[Online]. 547 P a g e