PUBLIC ANALYZING FOR SHARED AND SECURE INFORMATION STORAGE IN CLOUD USING STEGANOGRAPHY



Similar documents
Public Auditing for Shared Data in the Cloud by Using AES

Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.

preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY

Preserving Data Integrity and Public Auditing for Data Storage in Cloud Computing

IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD

PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE

Data Integrity for Secure Dynamic Cloud Storage System Using TPA

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD

Improving data integrity on cloud storage services

Secrecy Maintaining Public Inspecting For Secure Cloud Storage

RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM

PRIVACY PRESERVING PUBLIC AUDITING FOR SECURED DATA STORAGE IN CLOUD USING BLOCK AUTHENTICATION CODE

Secure Way of Storing Data in Cloud Using Third Party Auditor

Privacy Preserving Public Auditing for Data in Cloud Storage

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD

PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING

Near Sheltered and Loyal storage Space Navigating in Cloud

Enable Public Audit ability for Secure Cloud Storage

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption

Cloud Data Storage Services Considering Public Audit for Security

Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing.

How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System

An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud

Secure Cloud StorageForPrivacy-Preserving Public Audit

An Efficient Data Correctness Approach over Cloud Architectures

Data Integrity Check using Hash Functions in Cloud environment

ADVANCE SECURITY TO CLOUD DATA STORAGE

Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage

Secure Data transfer in Cloud Storage Systems using Dynamic Tokens.

A SIGNIFICANT REDUCTION OF CLOUD STORAGE BY ELIMINATION OF REPETITIVE DATA

Development of enhanced Third party Auditing Scheme for Secure Cloud Storage

SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE

Performance Evaluation Panda for Data Storage and Sharing Services in Cloud Computing

A Survey on Privacy-Preserving Techniques for Secure Cloud Storage

Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving,

Third Party Auditing For Secure Data Storage in Cloud through Trusted Third Party Auditor Using RC5

Sheltered Multi-Owner Data distribution For vibrant Groups in the Cloud

To Provide Security & Integrity for Storage Services in Cloud Computing

Survey Paper on Integrity Auditing of Storage

ORUTA: SECRECY PRESERVING POPULACE INSPECTING FOR OUTSOURCED DATA IN CLOUD

Verifying Correctness of Trusted data in Clouds

SHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING

Security Saving Open Examining for Secure Cloud storage

Trusted Public Auditing Process for Secure Cloud Storage

Cloud Server Storage Security Using TPA

Keywords: - Ring Signature, Homomorphic Authenticable Ring Signature (HARS), Privacy Preserving, Public Auditing, Cloud Computing.

Enabling Public Auditing for Secured Data Storage in Cloud Computing

Data Grid Privacy and Secure Storage Service in Cloud Computing

A Survey Paper on Secure Auditing and Maintaining Block Level Integrity with Reliability of Data in Cloud

AN APPROACH TOWARDS FUNCTIONING OF PUBLIC AUDITABILITY FOR CLOUD ENRICHMENT

AN INVESTIGATION OF SECURITY THEME FOR CLOUD COMPUTING

Privacy-Preserving Public Auditing for Secure Cloud Storage

Efficient and Secure Dynamic Auditing Protocol for Integrity Verification In Cloud Storage

How To Ensure Correctness Of Data In The Cloud

Index Terms: Cloud Computing, Cloud Security, Mitigation Attack, Service Composition, Data Integrity. 1. Introduction

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA

AN ENHANCED ATTRIBUTE BASED ENCRYPTION WITH MULTI PARTIES ACCESS IN CLOUD AREA

Cloud Data Service for Issues in Scalable Data Integration Using Multi Authority Attribute Based Encryption

Security in Cloud Audit Using the Key Based Homomorphic Linear Authenticator

An Efficient Secure Multi Owner Data Sharing for Dynamic Groups in Cloud Computing

Data Integrity and Dynamic Storage Way in Cloud Computing

DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION

A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA

Privacy Preservation and Secure Data Sharing in Cloud Storage

Data Storage Security in Cloud Computing

Ensuring Data Storage Security in Cloud Computing

Improve Access Policy Using Role Based System In Cloud Database

ISSN Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability

How To Ensure Correctness Of Data In The Cloud

A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments

A Comparative Study of Applying Real- Time Encryption in Cloud Computing Environments

A Review of Cloud Environment and Recognition of Highly Secure Public Data Verification Architecture using Secure Public Verifier Auditor

Secure and Dependable Cloud Storage Services for CRM

Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud

How To Design A Cloud Data Storage Service For A Cloud Computer System

Surveying Cloud Storage Correctness using TPA with BLS

Selective dependable storage services for providing security in cloud computing

Privacy preserving technique to secure cloud

A Secure and Dependable Cloud Storage Service in Cloud Computing

International Journal of Computer Engineering and Technology (IJCET), ISSN (Print), INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING &

International Journal of Infinite Innovations in Engineering and Technology. ISSN (Online): , ISSN (Print):

International Journal of Advanced Research in Computer Science and Software Engineering

Secure Privacy Preserving Public Auditing for Cloud storage

TITLE: Secure Auditing and Deduplicating Data in Cloud(Survey Paper)

PERFORMANCE OF BALANCED STORAGE SERVICES IN CLOUD SYSTEM

Verification of Data Reliability and Secure Service for Dynamic Data in Cloud Storage

A Proxy-Based Data Security Solution in Mobile Cloud

Distributing, Ensuring and Recovery of Data Stored in Cloud

SPACK FIREWALL RESTRICTION WITH SECURITY IN CLOUD OVER THE VIRTUAL ENVIRONMENT

Keyword Ranked MetaData Indexed Object Clawler in Cloud Servers

Cryptographic Data Security over Cloud

DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION

Keywords: Cloud Computing, Data Dynamics, Data Integrity, Error Localization, Third Party Auditor.

Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud

Cloud Data Storage Security and Public Auditing

Optimized And Secure Data Backup Solution For Cloud Using Data Deduplication

Data Security in Cloud Using Elliptic Curve Crytography

COMPUSOFT, An international journal of advanced computer technology, 4 (4), April-2015 (Volume-IV, Issue-IV)

Transcription:

PUBLIC ANALYZING FOR SHARED AND SECURE INFORMATION STORAGE IN CLOUD USING STEGANOGRAPHY G.SHAIK ABDULLAH 1, B.MUTHULAKSHMI 2 1 2 Post Graduate Student, Assistant Professor 1&2 Department of Computer Science and Engineering A.V.C. College of Engineering Mayiladuthurai shaikit13@gmail.com 1, kavithakamalan240101@gmail.com 2 Abstract - Cloud computing is an associate rising technology paradigm that migrates current technological and computing ideas. Clouds bring out a large vary of profits allowing configurable computing resources, economic savings, and service flexibility. Still, security and privacy comes to be the main obstruction to a broad acceptance of cloud. The novel conception that clouds introduce such like multi threading, resource share out and outsource, make newly challengeable to the protection community. So as to use a cloud serviceable entirely you demand is a web browser and an online. The most prominent disadvantageously in cloud computation is that the information protection. As a result of the information that is making up stored in the cloud providers server. Therefore this lead to hacking of knowledge by unauthorized soul. Within the business model utilizing software as a service, users are providence access to application software and databases. The cloud suppliers handle the infrastructure and platforms on that the applications run. The main objective of the planned system, however we will secure our information in cloud computing. We have proposed a powerful and an innovative approach to information on cloud computing by thinks of covering the information within audio pursuing is the embody of Steganography. We can also propose privacy maintaining mechanism that admits public analyze on shared information storage within the cloud. We tend to utilize ring signature to compute the verifiable information required to analyzing the unity of sharing data, so that the Third Person Auditing (TPA) is able to audit the correctness of shared data, however it cannot recover the initial information. In future, steganography is applied to secure the virtual images within the cloud computing. Keywords - Cloud Computing, Steganography, Ring signature, Third Person Auditing I. INTRODUCTION Cloud protection is associate evolving sub-domain of personal computer security, web security and additional loosely, data security. It looks up a large band of policies, technologies, and controls distributed to safeguard information, applications, and therefore the related infrastructure of cloud computing. Organizations use the cloud in an exceedingly style of completely different service models (SaaS, PaaS, and IaaS) and deployment models (Private, Public, and Hybrid). There is range of protection problems/concerns related to cloud computing however these problems make up two broad types such as Security issues faced by cloud providers and Security problems faced by their customers. The duty goes each ways that, but the supplier should make sure that their infrastructure is safe which their client s information and applications square measure protected whereas the user should make sure that the supplier has taken the right security measures to safeguard their data, and therefore the user should take measures to use robust passwords and authentication measures. Today s giant demand of cloud applications needs information to be carried in a secure manner. Information transmitting publicly communicating scheme isn t secure due to interception and improper use by snooper. Therefore the engaging resolution for this drawback is steganography that is the art and science of writing hidden messages in such the way that nobody except the sender and intend recipient, suspects the existence of the message, a variety of security through obscurity. Audio steganography is that the theme of concealment the existence of secret data by concealing it into another medium like audio file. The initial data is is converted into ISSN: 2393-9184 1

an ASCII format and this format is converted into a binary format which is further converted into encoded format by using RSA algorithm. The embedding method is employed to mix each encrypted audio and information. Cloud based outsourced store saves the client s load for storage management and maintenance by provide a lowcost, scalable, location-independent platform. However, the actual fact that purchasers now not have physical possession of knowledge indicates that they're facing a doubtless formidable risk for missing or corrupted data. To avoid the safety risks, audit services square measure crucial to guarantee the integrity and availableness of outsourced information and to win digital forensics and believability on cloud computing. A dynamical audit service for asserting of untrusted and outsourced storage. The audit service, constructed based on the encryption techniques can supportable provable informs to outsourced information, and timely abnormal detection. Then propose the attribute based signature to implement the cryptanalytic techniques. Then we have a tendency to implement the proof generation and proof verification to audit the each and every information in cloud storage system. implement obvious information possession model II. EXISTING SYSTEM In existing system, to keep up information in cloud it's going to not be absolutely trustworthy as a result of consumer doesn t have copy of all hold on information. However any users don t tell us information integrity through its user and CSP level by comparison before and when the information updates in cloud. Information owner needs to rely upon TPA for information integrity whenever he doesn t have time for auditing and he mechanically can t have the any hold on information size when any such malicious, byzantine and system failures to grasp regarding information modification, delete and append in his own information. A single server handles the multiple requests from the user. Here the server needs to method the each the request from the user at the same time that the interval can high. This might results in loss of information and corrupted. The server cannot method the question from the user a correct manner. Therefore interval gets raised. Software package update and patches might am indent security settings, assignment privileges too low, or maybe a lot of alarmingly too high permitting access to your information by alternative parties. The threats in cloud computing is change of state with information within the cloud that interfere with the unauthorized modifications for the information, that result in associate effectiveness on processors, information storage and information flow. Then, they suggested different solutions technique for this threat. And ISSN: 2393-9184 2

for guaranteeing possession of files on untrusted storages. It concentrates a lot of on time intense for user virtually user needs to rely upon TPA for information integrity whenever he doesn t have time for auditing and he mechanically can t have the any hold on information size when any failures to grasp regarding information modification, delete and append in his own information. however it doesn't tell regarding information computer storage capability for user s hold on information in cloud before and when in cloud cargo area or in server. Therefore it's a serious issue to user and conjointly virtually users ought to rely upon CSP for in depth security analysis and rely partly on TPA. It doesn t build economical rout for information integrity whenever user wish needed information from his earliest storage in cloud server. However here complete access goes to CSP. Therefore CSP will behave in its own approach by concealing any loss of knowledge since existing system doesn t tell regarding the load or price of hold on data victimization any rule. efficient TPA, the auditing method ought to herald III. THE PLANNED SYSTEM Steganography depends on activity covert message in unsuspected transmission information and is mostly employed in secret communication between acknowledged parties. Steganography works by replacement bits of useless or unused information in regular computer files with bits of various, invisible data. This hidden data is plain text, cipher text, or maybe pictures. The planned system is considered to be an efficient method for hiding text in audio files such that data can reach the destination in a safe manner without being modified. The original data is converted into an ASCII format and this format is converted into a binary format which is further converted into encoded format by using RSA algorithm. The embedding process is used to combine both encrypted audio and data. Using cloud storage, users can remotely store their data and enjoy the on-demand high-quality applications and services from a shared pool of configurable computing resources, while not the burden of native information storage and maintenance. However, the actual fact those users now not have physical possession of the outsourced information makes the information integrity protection in cloud computing a formidable task, particularly for users with forced computing resources. Moreover, users ought to be ready to simply use the cloud storage as if it's native, without concern concerning the necessity to verify its integrity. Thus, sanctionative public audit ability for cloud storage is of crucial importance in order that users will resort to a third-party auditor to examine the integrity of outsourced information and be worry free. To securely introduce an ISSN: 2393-9184 3

no new vulnerabilities toward user information privacy, and introduce no further on-line burden to user. During this project, propose a secure cloud storage system supporting privacy-preserving public auditing. Data owner files area unit spilted into user outlined blocks by mistreatment homophoric techniques. Random Keys area unit generated for every block. Mistreatment these keys to cipher the block by attribute based mostly signature. These encrypted blocks are stored in cloud. Information house owners to permit TPA to verify the correctness of the cloud information on demand and generating proof generation, then send this proof to cloud supplier through TPA. Then cloud provider send proof verification to TPA. Now TPA auditing the particular file block. Finally, TPA auditing reports send to the Data owner. Our planned system to permit TPA to perform auditing with minimum communication and computation overhead. accustomed transmits secure data. This ensures IV. THE PLANNED FRAMEWORK Fig. 1: Privacy Analysing Data and Security in Steganography A. AUDIO FILE AND DATA FILE ENCRYPTION In this module, information owner choose audio and information. The encoding method uses associate audio primarily based steganography for securing customer s information. Then cipher audio exploitation RSA rule by the employment of public key. Audio encoding may be a technique ISSN: 2393-9184 4

audio security between Sender and Receiver likewise as cloud service providers. The first information is born-again into ASCII code format, additional ASCII code forma is born-again into a binary format, and also the output of the binary format is encrypted exploitation RSA rule by the employment of public key. To cipher the information, to produce security so solely the involved user will access it. By securing the information, we tend to aren't permitting unauthorized access to it. Fig. 2: Audio File and Data File Encryption B. DATA EMBEDDED Information concealment technique could be a new reasonably secret communication technology. The bulk of today s data concealment systems use transmission objects like audio. Embedding secret messages in digital sound is sometimes a harder method. Styles of techniques for embedding data in digital audio are established. During this module we are going to attend the overall principles of concealment secret data mistreatment audio knowledge. A strong methodology of insensible audio knowledge concealment. This method is to produce a decent, economical methodology for concealment the information from hackers and sent to the destination during a safe manner. This projected system won't amendment the dimensions of the file even once cryptography and conjointly appropriate for any variety of audio file format. Therefore we have a tendency to conclude that an audio knowledge concealment technique is used for variety of functions aside from covert communication or refutable knowledge storage, data tracing and finger printing, tamper detection. Once embedding knowledge, cloud owner hold on these details in cloud supplier in secure manner. ISSN: 2393-9184 5

linear critic with random masking Fig. 3: Data Embedded C. INFORMATION CONTENT RESCUE In this model, users can retaking data from cloud service provider. Initial user registers within the cloud to induce approved, at the moment get data concerning cloud. The user search information in cloud. The cloud service providers to show the list of information to user. Users send the actual information request to CSP, the CSP send the actual information request to information Owner. A knowledge Owner, initial check the licensed person, if it's licensed suggests that information owner send the secret key to user. Users will recover the information from encrypted audio from CSP. Fig. 4: Information Content Rescue D. DATA BLOCK SIGN GENERATION A knowledge owner choose the file user and spilt files into blocks. To realize privacy-preserving public auditing, we have a tendency to propose to unambiguously integrate the homomorphic ISSN: 2393-9184 6

technique. During this protocol, the linear combination of sampled blocks within the server s response is cloaked with randomness generated by the server. With random masking, the TPA now not has all the mandatory info to create up an accurate cluster of linear equations and so cannot derive the user s knowledge content, despite what number linear mixtures of constant set of file blocks are often collected. On the opposite hand, the correctness validation of the block-authenticator pairs will still be administrated in an exceedingly new method which can be shown shortly, even with the presence of the randomness. The look makes use of an attribute based signature, to equip the auditing protocol with public audit ability. Fig. 5: Data Block Sign Generation E. PROOF CONFIRMATION The situation this work attempts to work on is to protect the privacy of the client from vulnerable TPA s. Clients, at some purpose of your time once come upon inconsistent information, simply then they notice the information loss. thus so as to avoid such essential things this work brings in an exceedingly novel verification theme wherever TPA s have restricted access to client s information i.e. the information of regardless of the shopper owns within the cloud. During this module we have a tendency to make sure the correctness of ISSN: 2393-9184 7

International Journal of Emerging Researches in Engineering Science and Technology, Volume 2, Issue 12, December 15 information victimization third party auditor. The TPA verifies the integrity of the information keep within the cloud. This theme ensures that the storage at the shopper facet is lowest which can be helpful for shoppers. Cloud shoppers then introduced a 3rd party who is liable for the verification method thereby authorization the authority to TPA. Therefore an information owner send request to the TPA. It includes user id, particular file block as well as secret key. Finally, TPA sends the information proof to Cloud service providers. is hacking by outside person. TPA analyzing the report that is sends by the data owner. Fig. 6: Proof Confirmation F. TPA ANALYSING AND REPORT In this module, sanctioning public auditing services can play a very important role for this emergent cloud economy to become absolutely established; wherever users can would like ways that to assess risk and gain trust within the cloud. To support ascendible and economical privacy-preserving public storage auditing in cloud thus we have a tendency to implement theme achieves auditing wherever auditing tasks from users will be performed at the same time by the TPA during a privacy-preserving manner. During this module, Now Cloud service providers check the request from TPA, CSP check the request whether it is authorized person details or hackers. If the TPA send information detail is correct means it can send the particular file block to the TPA. Further, TPA auditing the file block. If it is file block contain same information, it means data owner file blocks are safe and secure manner in cloud otherwise file ISSN: 2393-9184 8

Fig. 7: TPA Analysing and Report V. IMPLEMENTATION RESULT This planned system is to produce a decent, economical methodology for concealment the information from hackers and sent out to the destination in a very secure mode. This planned system won't amendment the dimensions of the file even once cryptography and additionally the standard of the audio file is preserved. Encoding and decoding techniques are accustomed create the safety system strongly. A privacy maintaining public analyzing system for information storage protection in cloud. We have a tendency to utilize the homomorphic critic to ensure that the TPA wouldn't learn any information regarding the info content keep on the cloud server throughout the economical auditing method, that not solely eliminates the burden of cloud user from the tedious and presumably expensive auditing task, however additionally alleviates the users worry of their outsourced knowledge outflow. Data owner files are spilted into user defined blocks by exploitation homophoric techniques. Random keys are generated for every block. Exploitation these keys to cipher the block by attribute based mostly signature. These cipher blocks are stored in cloud. Communication price of planned is especially analyzed by two factors such as the auditing message and the auditing proof. Therefore planned system cut back computation and communication price in terms of memory size. Finally our planned system preserve privacy and security in real time cloud environments. ISSN: 2393-9184 9

VI. PERFORMANCE EVALUATION Security We implemented our approach using the concept of steganography. Our experiment is conducted using JAVA CLOUDSIM and CLOUD ANALYST on a system with Intel(R) Pentium (CPU) running at 2.60 GHz, 2048 MB of RAM, a 7200RPM Western Digital 500 GB Serial ATA drive with an 8MB buffer. It has been found that our implemented system successfully stores information within audio and retrieves information from audio and auditing data are secure manner. (a) (b) Fig. 8: (a) Third Personal Auditing Task (Auditing Time and Security) / (b) Embedded Task and ISSN: 2393-9184 10

VII. CONCLUSION identification schemes: Proofs of security against A tendency to solve the matter knowledge of information protection in cloud data storage that is basically a distributed storage system. To confirm the correctness of user s information in cloud information storage, we have a tendency to planned economical and versatile distributed theme with efficient search techniques. This project permits TPA to audit the cloud information storage while not difficult users time, practicableness or resources. We have looked into the matter of security in cloud computing, that is basically a distributed storage system. To confirm the safety of user information in cloud storage, we have a tendency to planned a good and efficient steganographic strategy for enhancing security on data-at-rest. So, once these audio area units keep within the cloud information centre, nobody will read the first content of the information with none correct identification. Through elaborate security and performance analysis, we've seen that our theme nearly guarantees the safety of information once it's residing on the info center of any Cloud Service Provider (CSP). The thought we've mentioned here, can facilitate to create a powerful design for security within the field of cloud computation. This sort of structure of security also will be able to improve customer satisfaction to a good extent and that we will attract more investor during this cloud computation concept for industrial also as future research farms. Security during a very giant scale cross cloud surroundings is a full of life issue. This gift theme in a very position is ready to handle solely a restricted range of security threats in fairly little surroundings. We want additional simulations to verify the performance. REFERENCES [1] B. Wang, B. Li, and H. Li, Oruta: Privacy- Preserving Public Auditing for Shared Data in the Cloud, Proc. IEEE Fifth Int l Conf. Cloud Computing, pp. 295-302, 2012. [2] M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, A. Konwinski, G. Lee, D.A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, A View of Cloud Computing, Comm. ACM, vol. 53, no. 4, pp. 50-58, Apr. 2010. [3] K. Ren, C. Wang, and Q. Wang, Security Challenges for the Public Cloud, IEEE Internet Computing, vol. 16, no. 1, pp. 69-73, 2012. [4] D. Song, E. Shi, I. Fischer, and U. Shankar, Cloud Data Protection for the Masses, Computer, vol. 45, no. 1, pp. 39-45, 2012. [5] C. Wang, Q. Wang, K. Ren, and W. Lou, Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing, Proc. IEEE INFOCOM, pp. 525-533, 2010. [6] M. Bellare and A. Palacio. Gq and schnorr ISSN: 2393-9184 11

International Journal of Emerging Researches in Engineering Science and Technology, Volume 2, Issue 12, December 15 impersonation under active and concurrent attacks. In CRYPTO, pages 162 177, 2002. [7] S. Bugiel, S. Nurnberger, A. Sadeghi, and T. Schneider. Twin clouds: An architecture for secure cloud computing. In Workshop on Cryptography and Security in Clouds (WCSC 2011), 2011. [8] J. R. Douceur, A. Adya, W. J. Bolosky, D. Simon, and M. Theimer. Reclaiming space from duplicate files in a serverless distributed file system. In ICDCS, pages 617 624, 2002. ISSN: 2393-9184 12