EFFICIENT DISCOVERY OF INTEGRITY AUTOMATION IN HYBRID CLOUD COMPUTING

Similar documents
CLOUD BASED STORAGE SERVICES FOR SECURITY FOLLOWED BY THE DATA AUTHENTICATION

RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES

-

Data Security & Availability in Multi-Cloud Storage with Cooperative Provable Data Possession

AN EFFICIENT STRATEGY OF THE DATA INTEGRATION BASED CLOUD

Selective dependable storage services for providing security in cloud computing

Secrecy Maintaining Public Inspecting For Secure Cloud Storage

ISSN Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability

Insuring Security for Outsourced Data Stored in Cloud Environment

A Novel Re-Authentication Scheme on Cloud Based Storage Services T.G.V.V.Srinivas 1, P.Suresh Babu 2 1 Final M.Tech Student, 2 Associate professor

CONSIDERATION OF DYNAMIC STORAGE ATTRIBUTES IN CLOUD

Improving data integrity on cloud storage services

RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM

Performance Evaluation Panda for Data Storage and Sharing Services in Cloud Computing

Energy Efficiency in Secure and Dynamic Cloud Storage

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction

M. Nathiya 2 B.Tech. (IT), M.E. (CSE), Assistant Professor, Shivani Engineering College, Trichy, Tamilnadu, India.

Privacy-Preserving Public Auditing & Data Intrgrity for Secure Cloud Storage

Australian Journal of Basic and Applied Sciences. Secure and Efficient Dynamic Data Operations in Cloud Computing

IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD ENVIRONMENT

Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD

International Journal of Infinite Innovations in Engineering and Technology. ISSN (Online): , ISSN (Print):

Index Terms : cloud computing, Distributed Storage, error detection, data recovery, SHA, dynamic block operations

How To Ensure Data Integrity In Clouds

Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication

DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION

Surveying Cloud Storage Correctness using TPA with BLS

SHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING

February. ISSN:

Securing Cloud Data Storage

AN APPROACH TOWARDS FUNCTIONING OF PUBLIC AUDITABILITY FOR CLOUD ENRICHMENT

AN EXPOSURE TO RELIABLE STORAGE SERVICES IN CLOUD COMPUTING

Remote Data Integrity Checking in Cloud Computing

IJCSIET-ISSUE4-VOLUME2-SERIES1 Page 1

A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY

TITLE: Secure Auditing and Deduplicating Data in Cloud(Survey Paper)

Integrity Verification In Multiple Cloud Storage Using Cooperative PDP Method

How To Ensure Data Integrity In Cloud Computing

I. Introduction. A. Related Work

Improving Audit Service in Cloud for Outsourced Storage Dynamically

Review On Deduplicating Data and Secure Auditing in Cloud

IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD

A Secure and Dependable Cloud Storage Service in Cloud Computing

Secure Distribution of File on Cloud

Analysis of Secure Cloud Data Sharing Within a Group

Cloud Data Service for Issues in Scalable Data Integration Using Multi Authority Attribute Based Encryption

Keywords: - Ring Signature, Homomorphic Authenticable Ring Signature (HARS), Privacy Preserving, Public Auditing, Cloud Computing.

Development of enhanced Third party Auditing Scheme for Secure Cloud Storage

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD

Comparative Survey Data Availability and Integrity Verification in Multi-Cloud Server

Ensuring Data Integrity of Cloud Storage Services In Cloud Computing

International Journal of Computer Sciences and Engineering. Review Paper Volume-4, Issue-3 E-ISSN:

Enhance Data Security in Cloud Computing using Layered Interleaving Approach

SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE

Data Dynamics for Storage Security and Public Auditability in Cloud Computing

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION

Verifying Correctness of Trusted data in Clouds

SECURED DATA STORAGE IN CLOUD

Keywords: Cloud Computing, Third Party Auditor, Integrity.

OVERVIEW OF SECURITY ISSUES IN CLOUD COMPUTING

PERFORMANCE OF BALANCED STORAGE SERVICES IN CLOUD SYSTEM

Server Re-Tag Provable Data Possession in Public Cloud

Review On Regenerating Code Based Secure Cloud Storage Using Public Auditing Mr.Satish Shelar 1, Prof.S.Y.Raut 2

Near Sheltered and Loyal storage Space Navigating in Cloud

Cloud Data Storage Security and Public Auditing

Trusted Public Auditing Process for Secure Cloud Storage

Data Storage Security in Cloud Computing

Keywords: Cloud Storage, Shared Data, Privacy Preserving, Secret Sharing, Authentication, Third Party Auditor(TPA).

An Integrated Approach of Data storage and Security in Cloud Computing

How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System

International Journal of Advance Research in Computer Science and Management Studies

Authorized Auditing of Big Data Stored on Cloud with Auditability Aware Data Scheduling

Survey on Evidence of Retrievability Schemes of Cloud Storage Services for Resource-Strained Devices

SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING

Survey Paper on Integrity Auditing of Storage

PRIVACY PRESERVING PUBLIC AUDITING FOR SECURED DATA STORAGE IN CLOUD USING BLOCK AUTHENTICATION CODE

Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud

Secure Storage Services and Erasure Code Implementation in Cloud Servers

Public Auditing For Shared Data with Symposium on Security in the Cloud

Data Grid Privacy and Secure Storage Service in Cloud Computing

Keywords: Cloud Computing, Data Dynamics, Data Integrity, Error Localization, Third Party Auditor.

A Survey on Secure Storage Services in Cloud Computing

Identifying Data Integrity in the Cloud Storage

On the Security of Three Public Auditing Schemes in Cloud Computing

Cloud Database Storage Model by Using Key-as-a-Service (KaaS)

Efficient Remote Data Possession Checking In Critical Information Infrastructures Ensuring Data Storage Security In Cloud Computing

AN EFFECTIVE STUDY ON IMPROVED DATA AUTHENTICATION IN CLOUD SYSTEM

Replicated Data Integrity Verification in Cloud

A Survey Paper on Secure Auditing and Maintaining Block Level Integrity with Reliability of Data in Cloud

How To Secure Cloud Data Storage

Development of Effective Audit Service to Maintain Integrity of Migrated Data in Cloud

Privacy-Preserving Public Auditing For Secure Cloud Storage

PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING

A Survey on Data Integrity of Cloud Storage in Cloud Computing

ADVANCE SECURITY TO CLOUD DATA STORAGE

Energy Optimal Cloud Storage and Access Methods for Temporal Cloud Databases

Third Party Auditing For Secure Data Storage in Cloud through Trusted Third Party Auditor Using RC5

Security of Data from Public - Using Cloud Storage

Transcription:

INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE EFFICIENT DISCOVERY OF INTEGRITY AUTOMATION IN HYBRID CLOUD COMPUTING K.Saipriya 1, A.Ravi Kumar 2 1 M.Tech Student, Dept of CSE, Samskruti College of Engineering & Technology, Ghatkesar, R.R Dist, A.P, India 2 Assistant Professor, Dept of CSE, Samskruti College of Engineering & Technology, Ghatkesar, R.R Dist, A.P, India ABSTRACT: There is a technique based on the possession of the data provable oriented strategy in which integration of the data is being ensured in a well respective aspect and followed by the outsourcing of the data in a well efficient fashion respectively. Here a new strategy oriented framework based technique is implemented where the scheme oriented by the pdp based strategy in which possession of the data provable fashion analysis in a well stipulated format and its mechanism oriented construction takes place in a well effective manner respectively. Which is mainly used for the distribution of the data on behalf of the cloud based aspect in a well oriented fashion with respect to the reliability oriented scenario in terms of the efficient storage of the cloud based aspect related to the migration of the data in a scalable fashion improvement in the service and the efficiency based aspect. Here there is a huge strategy in which there is a problem with respect to the limited allocation of the resources but it is a major problem from the client based side for this m purpose this particular technique is replaced by the multi cloud oriented phenomena where their limitation got cancelled in a well oriented fashion in which the services are getting from the third party based strategy in a well efficient manner where each and every cloud are interconnected to one another followed by the each and every cloud are not dependent but directly access the services from the third party based strategy. Here security plays a major role for the data in the cloud that is the major frustration for the user based aspect where there should be a privacy related phenomena respectively. So for the above problem related to the security based aspect new technique is implemented by the help of the possession of the data in a well efficient fashion respectively. Experiments have been conducted on the present technique. 181 P a g e

where there is an accurate analysis in terms of the improvement in the performance based strategy followed by the accurate outcome in a well oriented fashion respectively. Keywords: Security based storage, Data authentication, PDP protocol, Cooperative network, Data authentication, Provable of the possession oriented data and Protocol interaction respectively. 1. INTRODUCTION In the earlier based strategy services based on the advancement in the internet oriented strategy by the storage of the cloud in a well efficient manner respectively [2]. Where there is a huge advancement in the system based aspect which is related to the reliability of the data transmission followed by the reduced cost oriented factor and also the clients related platform independent strategy in a well efficient manner respectively [1][3]. Here the architecture is designed based on the effective mechanism based phenomena in which there is an openness in the system based aspect followed by its interface related aspect in a well respective fashion where the service sof the internal and the external based aspects related to the cloud plays a vital role for the implementation of the system and should be in a position to cope up the phenomena in a well stipulated format respectively [10]. Where this type of the environment that is the above design oriented strategy is termed as the cloud based on the multi feature environment respectively [8][9]. Therefore there is a huge necessity of the implementation of the well respective technique in which there should be an efficient design oriented strategy followed by the effectiveness in the performance in a well oriented fashion respectively. BLOCK DIAGRAM Fig 1: Shows the block diagram of the present technique respectively 2. METHODOLOGY In this paper an efficient well known mechanism is designed by the following framework oriented fashion in which there should be an accurate outcome in the systems performance based aspect 182 Page

respectively [6][7]. Here the implementation of the present method is shown in the below figure in the form of the block diagram base approach and I explains in a brief elaborative fashion respectively [4][5]. There is a huge challenge for the present designed method where it is supposed to accurately analyzed the entire previous methods followed by the implementation and drawback based strategy where it is finalized with theoretical concept and then the implementation of the present method is rather easy respectively. strategy respectively. There is a huge analysis on the present implemented method in which there should be an accurate implementation of the mechanism oriented with respect to the design based strategy in a well effective manner followed by the control of the degraded performance of the several previous methods in a well efficient manner respectively where there should be an accurate outcome with respect to the entire system based strategy respectively. 3. EXPECTED RESULTS Here the present method is effective and efficient in terms of the performance based aspect followed by the accurate analysis related to the entire system oriented outcome respectively. A lot of analysis is made between the present method to that of the several previous method and the comparative analysis is shown in the below figure in the form of the graphical representation and explains in a brief elaborative fashion respectively. Here we finally conclude that the present method completely overcome the drawbacks of the several previous methods in a well oriented fashion and also improvement in the performance based Fig 2: Shows the graphical representation of the present technique respectively 4. CONCLUSION In this paper a new technique is implemented for the controlled strategy of the degraded performance followed by the accurate outcome related to the overall system based aspect respectively. Here in the present scenario there is an implementation of a scheme based on the PDP based aspect in which storage of the 183 Page

cloud related distributive phenomena takes place in the society. The scheme oriented with PDP based cooperative strategy where there is an implementation of the system based strategy for the verification response of the homo morphic scenario with respect to the hierarchy of the index oriented hash in a well stipulated format respectively. Here the present designed technique mainly supports the behavioural aspects related to the scalability of the dynamic support with respect to the servers of the storage based cloud in a well respective fashion. Here we finally conclude that the present method is implemented with a particular strategy in an ordered fashion where there is an accuracy in the system followed by the outcome based scenario in a well oriented fashion respectively. Here the system based aspect is extended towards the implementation of the design oriented parameters of the respective strategy of the design framework with respect to the effective construction of the CPDP where there is aproblem related to the previous methods in relation to the mapping oriented strategy of the bilinear method in which it is completely overcome the performance based strategy respectively. REFERENCES [1] L. Fortnow, J. Rompel, and M. Sipser, On the power of multiprover interactive protocols, in Theoretical Computer Science, 1988, pp. 156 161. [2] G. Ateniese, R. C. Burns, R. Curtmola, J. Herring, L. Kissner, Z. N. J. Peterson, and D. X. Song, Provable data possession at untrusted stores, in ACM Conference on Computer and Communications Security, P. Ning, S. D. C. di Vimercati, and P. F. Syverson, Eds. ACM, 2007, pp. 598 609. [3] A. Juels and B. S. K. Jr., Pors: proofs of retrievability for large files, in ACMConference on Computer and Communications Security, P. Ning, S. D. C. di Vimercati, and P. F. Syverson, Eds. ACM, 2007, pp. 584 597. [4] G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, Scalable and efficient provable data possession, in Proceedings of the 4th international conference on Security and privacy in communication netowrks, SecureComm, 2008, pp. 1 10. [5] C. C. Erway, A. K upc u, C. Papamanthou, and R. Tamassia, Dynamic provable data possession, in ACM Conference on Computer and Communications Security, E. Al-Shaer, S. Jha, and A. D. Keromytis, Eds. ACM, 2009, pp. 213 222. [6] H. Shacham and B. Waters, Compact proofs of retrievability, in ASIACRYPT, ser. Lecture Notes in Computer Science, J. 184 P age

Pieprzyk, Ed., vol. 5350. Springer, 2008, pp. 90 107. [7] Q. Wang, C.Wang, J. Li, K. Ren, and W. Lou, Enabling public verifiability and data dynamics for storage security in cloud computing, in ESORICS, ser. Lecture Notes in Computer Science, M. Backes and P. Ning, Eds., vol. 5789. Springer, 2009, pp. 355 370. [8] Y. Zhu, H. Wang, Z. Hu, G.-J. Ahn, H. Hu, and S. S. Yau, Dynamic audit services for integrity verification of outsourced storages in clouds, in SAC, W. C. Chu, W. E. Wong, M. J. Palakal, and C.-C. Hung, Eds. ACM, 2011, pp. 1550 1557. [9] K. D. Bowers, A. Juels, and A. Oprea, Hail: a high-availability and integrity layer for cloud storage, in ACM Conference on Computer and Communications Security, E. Al-Shaer, S. Jha, and A. D. Keromytis, Eds. ACM, 2009, pp. 187 198. [10] Y. Dodis, S. P. Vadhan, and D. Wichs, Proofs of retrievability via hardness amplification, in TCC, ser. Lecture Notes in Computer Science, O. Reingold, Ed., vol. 5444. Springer, 2009, pp. 109 127. 185 P age