Secured Public Auditing for Shared Data in the Cloud

Size: px
Start display at page:

Download "Secured Public Auditing for Shared Data in the Cloud"

Transcription

1 International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume 2, Issue 8, August 2015, PP ISSN (Print) & ISSN (Online) Secured Public Auditing for Shared Data in the Cloud 1 A.Anitha, 2 Y.Prathibha Bharathi, 3 R.M.Mallika 1 PG Scholor, 2 Asst Professor, 3 Associate Professor 1,2,3 Gokula Krishna College of Engineering, Sullurpeta, India. Abstract: With cloud information administrations, it is typical for information to be put away in the cloud, as well as shared over different clients. Lamentably, the respectability of cloud information is liable to wariness because of the presence of equipment/programming disappointments and human blunders. A few instruments have been intended to permit both information proprietors and open verifiers to proficiently review cloud information uprightness without recovering the whole information from the cloud server. Nonetheless, open inspecting on the honesty of imparted information to these current instruments will definitely uncover classified data character security to open verifiers. In this paper, we propose a novel protection saving instrument that backings open examining on shared information put away in the cloud. Specifically, we adventure ring marks to register confirmation metadata expected to review the accuracy of shared information. With our instrument, the character of the underwriter on every piece in shared information is kept private from open verifiers, who have the capacity to productively check shared information uprightness without recovering the whole record. Moreover, our instrument has the capacity perform different inspecting assignments at the same time as opposed to confirming them one by one. Our trial results exhibit the adequacy and productivity of our instrument when reviewing shared information respectabil 1. INTRODUCTION The time of distributed computing rules with progressions in innovation, the innovation gives different administrations to the human's need furthermore it asks the more need for the rising innovation. Could figuring gives a stage to other propelled advances like enormous information, versatile processing to instill its administration and give the QOS to the clients. The cloud has developed to an unlimited stretch out over the time of years. Every one of the administrations that are given to the client are done utilizing could as their spine, it give unlimited measure of assets and base to customer who goes about as merchants to little scale business and cloud could give administrations to completely fledged association with less cost. Sorting out the administration and developing the administration relying on the developing needs of the client could be accomplished by cloud administration and base. The real issue is the assets, while any administration should be augmented, the assets with the administration merchant assumes a basic part. Contributing colossal aggregate of dollars on equipment is only one piece of augmentation, keeping up the equipment along the administrations gave would convey huge amounts of dollars. Where cloud gives space to broadening the administrations as an administration supplier furthermore it can give foundation administration to little scale administration merchants. 2. PROBLEM DEFINITION There are two sorts of clients in a gathering: the first client and various gathering clients. The first client at first makes shared information in the cloud, and shares it with gathering clients. Both the first client and gathering clients are individuals from the gathering. Each individual from the gathering is permitted to get to and adjust shared information. Shared information and its check metadata (i.e., marks) are both put away in the cloud server. An open verifier, for example, a thirdparty evaluator giving master information reviewing administrations or an information client outside the gathering expecting to use shared information, has the capacity freely check the trustworthiness of shared information storedin the cloud server. At the point when an open verifier wishes to check the ARC Page 10

2 A.Anitha et al. uprightness of shared information, it first sends an examining test to the cloud server. In the wake of getting the evaluating test, the cloud server reacts to people in general verifier with a reviewing evidence of the ownership of shared information. At that point, this open verifier checks the rightness of the whole information by confirming the accuracy of the examining confirmation. 3. SYSTEM ARCHITECTURE The development of a computer based data plan concedes a plan investigation stage which creates or raises the data sample which itself is a trailblazer to making or increasing a database. At that delineate are various different gets to plan investigation. When a computer-based information scheme is acquired, scheme analysis (allotting to the waterfall example) would appoint the costing steps: The growth of a feasibility study, regarding deciding whether a design is economically, socially, technologically of logically and organizational executable. Carrying fact-detecting measurements, conception to for certain the necessities of the scheme s endusers. These typically pair consultations, questionnaires, or optical reflections of bring on the costing scheme. Estimating how the end-users would assure the scheme (in conditions of universal feel in applying computer hardware or software), what the scheme would be applied as etc. Approximately other opinion abstracts a staged access to the action. This access breakings schemes analysis into 5 stages: 4. ALGORITHM For notational convenience, we assume that transmissions are between base stations and front ends, rather than to the actual users making the requests. We first determine the capacity region, which is the set of all feasible requests. Note that this model, in which front ends have independent and distinct channels to the caches, differs from the previously studied wired caching systems because the wireless channels are not always ON. Therefore, the placement and scheduling must be properly coordinated according to the channel states. HARS contains three algorithms: KeyGen RingSign RingVerify KeyGen:In KeyGen, each user in the group generates his/her public key and private key. RingSign:In RingSign, a user in the group is able to generate a signature on a block and its block identifier with his/her private key and all the group members public keys. A block identifier is a string that can distinguish the corresponding block from others. RingVerify:A verifier is able to check whether a given block issigned by a group member in RingVerify. International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Page 11

3 Secured Public Auditing for Shared Data in the Cloud 5. MODULES Cloud server Group of clients Public verifier Auditing Module Cloud server: In the first module, we plan our framework with Cloud Server, where the pieces of information are put away all around. Our instrument, Oruta, ought to be intended to accomplish taking after properties: (1) Public Auditing: An open verifier has the capacity freely check the honesty of shared information without recovering the whole information from the cloud. (2) Correctness: An open verifier has the capacity effectively check shared information honesty. (3) Unforgeability: Only a client in the gathering can create substantial check metadata (i.e., marks) on shared information. International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Page 12

4 A.Anitha et al. (4) Identity Privacy: An open verifier can't recognize the character of the underwriter on every square in shared information amid the procedure of examining. Gathering of clients: There are two sorts of clients in a gathering: the first client and various gathering clients. The first client at first makes shared information in the cloud, and shares it with gathering clients. Both the first client and gathering clients are individuals from the gathering. Each individual from the gathering is permitted to get to and adjust shared information. Shared information and its confirmation metadata (i.e., marks) are both put away in the cloud server. An open verifier, for example, an outsider inspector giving master information examining administrations or an information client outside the gathering planning to use shared information, has the capacity freely check the trustworthiness of shared information put away in the cloud server. Owner Registration: In this module a proprietor needs to transfer its records in a cloud server, he/she ought to enlist first. At that point just he/she can have the capacity to do it. For that he needs to fill the points of interest in the enlistment structure. These points of interest are kept up in a database. Owner Login: In this module, proprietors need to login, they ought to login by giving their id and secret key. User Registration: In this module if a client needs to get to the information which is put away in a cloud, he/she ought to enroll their points of interest first. These points of interest are kept up in a Database. User Login: If the client is an approved client, he/she can download the document by utilizing record id which has been put away by information proprietor when it was transferring. Open verifier: When an open verifier wishes to check the uprightness of shared information, it first sends an evaluating test to the cloud server. In the wake of getting the reviewing Cloud server reacts to the general population verifier with an inspecting evidence of the ownership of shared information. Then, this open verifier checks the rightness of the whole information by confirming the accuracy of the inspecting confirmation. Basically, the procedure of open evaluating is a test and-reaction convention between an open verifier and the cloud server Inspecting Module In this module, if an outsider examiner TPA (maintainer of mists) ought to enroll first. This framework permits just cloud administration suppliers. After outsider examiner gets signed in, He/She can perceive what number of information proprietors have transferred their records into the cloud. Here we are giving TPA to looking after mists. We just consider how to review the honesty of imparted information in the cloud to static gatherings. It implies the gathering is pre-characterized before shared information is made in the cloud and the enrollment of clients in the gathering is not changed amid information sharing. The unique client is in charge of choosing why should capable share her information before outsourcing information to the cloud. Another intriguing issue is the means by which to review the trustworthiness of imparted information in the cloud to element bunches another client can be included into the gathering and a current gathering part can be repudiated amid information sharing 6. CONCLUSION In this paper, we propose Oruta, a security saving open reviewing system for shared information in the cloud. We use ring marks to develop homomorphic authenticators, so that an open verifier has the capacity review shared information honesty without recovering the whole information, yet it can't recognize who is the underwriter on every piece. To enhance the productivity of confirming various evaluating undertakings, we further extend our system to bolster cluster reviewing. There are two intriguing issues we will keep on concentrating on for our future work. One of them is traceability, which implies the capacity for the gathering chief (i.e., the first client) to uncover the personality of the endorser in light of check metadata in some unique circumstances. Since Oruta is in view of ring marks, where the personality of the underwriter is unequivocally secured, the present outline of our own does not bolster traceability. To the best of our insight, outlining a productive open evaluating International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Page 13

5 Secured Public Auditing for Shared Data in the Cloud system with the abilities of safeguarding personality security and supporting traceability is still open. Another issue for our future work is the manner by which to demonstrate information freshness (demonstrate the cloud has the most recent rendition of shared information) while as yet saving character security. ACKNOWLEDGEMENT I like to thank our HOD, PRINCIPAL and OTHER FACULTIES for their valuable comments and helpful suggestions. REFERENCES [1]. M. Armbrust, A. Fox, R. Griffith, A. D.Joseph, R. H.Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, A View of Cloud Computing, Communications of the ACM, vol. 53, no. 4, pp , Apirl [2]. G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson,and D. Song, Provable Data Possession at Untrusted Stores, in Proc. ACM Conference on Computer and Communications Security (CCS), 2007, pp [3]. C. Wang, Q. Wang, K. Ren, and W. Lou, Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing, in Proc. IEEE International Conference on Computer Communications (INFOCOM), 2010, pp [4]. R. L. Rivest, A. Shamir, and Y. Tauman, How to Leak a Secret, in Proc. International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT). Springer-Verlag, 2001, pp [5]. D. Boneh, C. Gentry, B. Lynn, and H. Shacham, Aggregate and Verifiably Encrypted Signatures from Bilinear Maps, in Proc. In-ternational Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT). Springer-Verlag, 2003, pp [6]. H. Shacham and B. Waters, Compact Proofs of Retrievability, in Proc. International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT). Springer-Verlag, 2008, pp [7]. Y. Zhu, H.Wang, Z. Hu, G.-J. Ahn, H. Hu, and S. S.Yau, Dynamic Audit Services for Integrity Verification of Outsourced Storage in Clouds, in Proc. ACM Symposium on Applied Computing (SAC), 2011, pp [8]. S. Yu, C. Wang, K. Ren, and W. Lou, Achieving Secure, Scalable,and Fine-grained Data Access Control in Cloud Computing, in Proc. IEEE International Conference on Computer Communications (INFOCOM), 2010, pp [9]. D. Boneh, B. Lynn, and H. Shacham, Short Signature from the Weil Pairing, in Proc. International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT). Springer-Verlag, 2001, pp [10]. D. Boneh and D. M. Freeman, Homomorphic Signatures for Polynomial Functions, in Proc. International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT).Springer-Verlag, 2011, pp [11]. A. L. Ferrara, M. Green, S. Hohenberger, and M. Ø. Pedersen, Practical Short Signature Batch Verification, in Proc. RSA Con-ference, the Cryptographers Track (CT-RSA). Springer-Verlag, 2009,pp [12]. V. Goyal, O. Pandey, A. Sahai, and B. Waters, Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data, in Proc. ACM Conference on Computer and Communications Security (CCS), 2006, pp [13]. A. Juels and B. S. Kaliski, PORs: Proofs pf Retrievability for Large Files, in Proc. ACM Conference on Computer and Communications Security (CCS), 2007, pp [14]. G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, Scalable and Efficient Provable Data Possession, in Proc. International Conference on Security and Privacy in Communication Networks (SecureComm), [15]. C. Erway, A. Kupcu, C. Papamanthou, and R. Tamassia, Dynamic Provable Data Possession, in Proc. ACM Conference on Computer and Communications Security (CCS), 2009, pp International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Page 14

6 A.Anitha et al. [16]. C. Wang, Q. Wang, K. Ren, and W. Lou, Ensuring Data Storage Security in Cloud Computing, in Proc. IEEE/ACM International Workshop on Quality of Service (IWQoS), 2009, pp [17]. B. Chen, R. Curtmola, G. Ateniese, and R. Burns, Remote Data Checking for Network Codingbased Distributed Stroage Systems, in Proc. ACM Cloud Computing Security Workshop (CCSW),2010, pp [18]. N. Cao, S. Yu, Z. Yang, W. Lou, and Y. T. Hou, LT Codesbased Secure and Reliable Cloud Storage Service, in Proc. IEEE International Conference on Computer Communications (INFOCOM), [19]. S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg, Proofs of Ownership in Remote Storage Systems, in Proc. ACM Conference on Computer and Communications Security (CCS), 2011, pp [20]. Q. Zheng and S. Xu, Secure and Efficient Proof of Storage with Deduplication, in Proc. ACM Conference on Data and Application Security and Privacy (CODASPY), [21]. M. Franz, P. Williams, B. Carbunar, S. Katzenbeisser, and R. Sion, Oblivious Outsourced Storage with Delegation, in Proc. Finan-cial Cryptography and Data Security Conference (FC), 2011, pp [22]. S. D. C. di Vimercati, S. Foresti, S. Paraboschi, G. Pelosi, and P. Samarati, Efficient and Private Access to Outsourced Data AUTHORS BIOGRAPHY Miss A. Anitha, Pursuing my M.Tech (CSE) in GOKULKRISHNA COLLEGE OF ENGINEERING, Sullurpeta, and my area of interest is networking and cloud computing, Miss Y.Prathibha Bharathi., ASST PROFESSOR in the Department of CSE at GOKULA KRISHNA COLLEGE OF ENGINEERING, Sullurpeta, and my area of interest is Cloud computing, OS,&SPM etc, R.M.Mallika, Associate Professor in the Department of CSE at GOKULA KRISHNA COLLEGE OF ENGINEERING, Sullurpeta, and my area of interest is DMDW, COMPILER DESIGN, NETWORKS and she has 10 Years of Teaching Experience. International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Page 15

Public Auditing on Shared Data in the Cloud Using Ring Signature Mechanism

Public Auditing on Shared Data in the Cloud Using Ring Signature Mechanism Public Auditing on Shared Data in the Cloud Using Ring Signature Mechanism MS. Gayatri D Patwardhan Prof.B. W. Balkhande Abstract: Cloud computing is the long dreamed vision of computing as a utility,

More information

Enhancing Availability Using Identity Privacy Preserving Mechanism in Cloud Data Storage

Enhancing Availability Using Identity Privacy Preserving Mechanism in Cloud Data Storage Enhancing Availability Using Identity Privacy Preserving Mechanism in Cloud Data Storage V.Anjani Kranthi *1, Smt.D.Hemalatha *2 M.Tech Student, Dept of CSE, S.R.K.R engineering college, Bhimavaram, AP,

More information

A Simple Secure Auditing for Cloud Storage

A Simple Secure Auditing for Cloud Storage A Simple Secure Auditing for Cloud Storage Lee-Hur Shing Institute of Information Science Academia Sinica leehurs@iis.sinica.edu.tw Marn-Ling Shing University of Taipei Yu-Hsuan Yeh, Yan-Zhi Hu and Shih-Ci

More information

Improved Third Party Auditing Approach For Shared Data In The Cloud With Efficient Revocation Of User

Improved Third Party Auditing Approach For Shared Data In The Cloud With Efficient Revocation Of User Improved Third Party Auditing Approach For Shared Data In The Cloud With Efficient Revocation Of User Miss Madhuri Kulkarni PG Student, Dept. Of Computer Engineering, Alard Collage of Engineering and Management,

More information

Dynamic and Flexible Group Key Generation Based on User Behaviour Monitoring

Dynamic and Flexible Group Key Generation Based on User Behaviour Monitoring International Journal of Computing Academic Research (IJCAR) ISSN 2305-9184, Volume 5, Number 1 (February 2016), pp.27-32 MEACSE Publications http://www.meacse.org/ijcar Dynamic and Flexible Group Key

More information

A Secure Cloud Storage System for Supporting Privacy-Preserving Public Auditing

A Secure Cloud Storage System for Supporting Privacy-Preserving Public Auditing A Secure Cloud Storage System for Supporting Privacy-Preserving Public Auditing Yenduva Venkata Mukesh Naidu M.Tech Student Deparment of CSE, Chaitanya Engineering College, Kommadi, Madhurawada, Visakhapatnam.

More information

Enhancing Reliability and Scalability in Dynamic Group System Using Three Level Security Mechanisms

Enhancing Reliability and Scalability in Dynamic Group System Using Three Level Security Mechanisms Enhancing Reliability and Scalability in Dynamic Group System Using Three Level Security Mechanisms A.Sarika*1, Smt.J.Raghaveni*2 M.Tech Student, Dept of CSE, S.R.K.R Engineering college, Bhimavaram, AP,

More information

A Public Auditing Framework for Cloud Storage Security

A Public Auditing Framework for Cloud Storage Security A Public Auditing Framework for Cloud Storage Security S. Satish Kumar A.Sudheer Kumar D.Venkatesh M.Tech Student (CSE) Assistant Professor Dean of CSE & IT GATES Institute of Tech, Gooty GATES Institute

More information

STRUCTURED EMINENT DYNAMIC AUDITING FOR SECURE DATA STORAGE IN CLOUD COMPUTING

STRUCTURED EMINENT DYNAMIC AUDITING FOR SECURE DATA STORAGE IN CLOUD COMPUTING INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 STRUCTURED EMINENT DYNAMIC AUDITING FOR SECURE DATA STORAGE IN CLOUD COMPUTING Mr.Elamparithi P 1, Mr.Thanga Mariappan

More information

Secure Auditing For Outsourced Data in Cloud Using Homomorphic Token and Erasure Code

Secure Auditing For Outsourced Data in Cloud Using Homomorphic Token and Erasure Code Secure Auditing For Outsourced Data in Cloud Using Homomorphic Token and Erasure Code N.S. Monalisa Devi 1, T. Sounder Rajan 2 M.E. Department of CSE, K S R College for Engineering and Technology, Tiruchengode,

More information

Efficient Data Storage Security with Multiple Batch Auditing in Cloud Computing

Efficient Data Storage Security with Multiple Batch Auditing in Cloud Computing Efficient Data Storage Security with Multiple Batch Auditing in Cloud Computing P. Sukumar [1] Department of Computer Science Sri Venkateswara College of Engineering, Chennai B. Sathiya [2] Department

More information

Secure Evaluation of Public Auditing For Personal and Shared Data with Efficient User Revocation in Cloud Computing

Secure Evaluation of Public Auditing For Personal and Shared Data with Efficient User Revocation in Cloud Computing Secure Evaluation of Public Auditing For Personal and Shared Data with Efficient User Revocation in Cloud Computing Chinta Mounika M.Tech Student, Department of Computer Science and Engineering, B.V.C

More information

Improving data integrity on cloud storage services

Improving data integrity on cloud storage services International Journal of Engineering Science Invention Volume 2 Issue 2 ǁ February. 2013 Improving data integrity on cloud storage services Miss. M.Sowparnika 1, Prof. R. Dheenadayalu 2 1 (Department of

More information

ISSN: [Shubhangi* et al., 6(8): August, 2017] Impact Factor: 4.116

ISSN: [Shubhangi* et al., 6(8): August, 2017] Impact Factor: 4.116 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY DE-DUPLICABLE EFFECTIVE VALIDATION of CAPACITY for DYNAMIC USER ENVIRONMENT Dr. Shubhangi D C *1 & Pooja 2 *1 HOD, Department

More information

International Journal of Advance Engineering and Research Development. AN Optimal Matrix Approach for virtual load allocation and data sharing

International Journal of Advance Engineering and Research Development. AN Optimal Matrix Approach for virtual load allocation and data sharing Scientific Journal of Impact Factor (SJIF): 5.71 International Journal of Advance Engineering and Research Development Volume 5, Issue 02, February -2018 e-issn (O): 2348-4470 p-issn (P): 2348-6406 AN

More information

Key Terms: Cloud Computing, cloud Service Provider, Provable Data Possession, Dynamic File Block, Map Version Table.

Key Terms: Cloud Computing, cloud Service Provider, Provable Data Possession, Dynamic File Block, Map Version Table. Volume 6, Issue 6, June 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Dynamic File Block

More information

Survey Paper on Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud

Survey Paper on Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,

More information

Vijayawada, Andhrapradesh, India 2 Dhanekula Institute of Engineering & Technology, Ganguru, Vijayawada, Andhrapradesh, India

Vijayawada, Andhrapradesh, India 2 Dhanekula Institute of Engineering & Technology, Ganguru, Vijayawada, Andhrapradesh, India Volume 4, Issue 10, October 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Privacy-Process

More information

International Journal of Advance Engineering and Research Development

International Journal of Advance Engineering and Research Development Scientific Journal of Impact Factor (SJIF): 3.134 International Journal of Advance Engineering and Research Development Volume 3, Issue 2, February -2016 e-issn (O): 2348-4470 p-issn (P): 2348-6406 Enabling

More information

QUALITY OF SEVICE WITH DATA STORAGE SECURITY IN CLOUD COMPUTING

QUALITY OF SEVICE WITH DATA STORAGE SECURITY IN CLOUD COMPUTING QUALITY OF SEVICE WITH DATA STORAGE SECURITY IN CLOUD COMPUTING ABSTRACT G KALYANI 1* 1. M.Tech Student, Dept of CSE Indira Institute of Engineering and Technology, Markapur, AP. Cloud computing has been

More information

ABSTRACT I. INTRODUCTION. Telangana, India 2 Professor, Department of Computer Science & Engineering, Shadan College of Engineering & Technology,

ABSTRACT I. INTRODUCTION. Telangana, India 2 Professor, Department of Computer Science & Engineering, Shadan College of Engineering & Technology, International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 6 ISSN : 2456-3307 Secure Proxy Server Data Sharing Scheme in Hybrid

More information

ISSN Vol.08,Issue.16, October-2016, Pages:

ISSN Vol.08,Issue.16, October-2016, Pages: ISSN 2348 2370 Vol.08,Issue.16, October-2016, Pages:3146-3152 www.ijatir.org Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation VEDIRE AJAYANI 1, K. TULASI 2, DR P. SUNITHA

More information

DATA INTEGRITY TECHNIQUES IN CLOUD: AN ANALYSIS

DATA INTEGRITY TECHNIQUES IN CLOUD: AN ANALYSIS DATA INTEGRITY TECHNIQUES IN CLOUD: AN ANALYSIS 1 MS. R. K. PANDYA, 2 PROF. K. K. SUTARIA 1 M.E.[Cloud Computing] Student, Computer Engineering Department, V. V. P. Engineering College, Rajkot, Gujarat

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 4, Jul Aug 2017

International Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 4, Jul Aug 2017 RESEARCH ARTICLE A Survey on Data Integrity Auditing Schemes in Cloud Computing Purnima [1], Deepak Kumar Verma [2] Student of MTech. [1] Computer Science Department [2] IEC College of Engineering and

More information

ABSTRACT. Keywords: Cloud Storage, Regenerating Code, Public Auditing, Dynamic Auditing, Privacy Preserving, Proxy I. INTRODUCTION

ABSTRACT. Keywords: Cloud Storage, Regenerating Code, Public Auditing, Dynamic Auditing, Privacy Preserving, Proxy I. INTRODUCTION 216 IJSRSET Volume 2 Issue 4 Print ISSN : 2395-199 Online ISSN : 2394-499 Themed Section: Engineering and Technology Privacy Preserving and Dynamic Auditing for Outsourced Storages in Cloud Satish Shelar*,

More information

Batch Verification Scheme for Economic Cloud Storage Services

Batch Verification Scheme for Economic Cloud Storage Services Batch Verification Scheme for Economic Cloud Storage Services K. Sudha 1, Mr. S. Sivaraj, ME 2 II-M.E (CSE), Dept. of CSE, SSM College of Engineering, Komarapalayam, Tamilnadu, India 1 Assistant Professor,

More information

Available online at ScienceDirect. Procedia Computer Science 48 (2015 ) (ICCC-2014) (ICCC-2015)

Available online at   ScienceDirect. Procedia Computer Science 48 (2015 ) (ICCC-2014) (ICCC-2015) Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 48 (2015 ) 347 352 International Conference on Intelligent Computing, Communication & Convergence (ICCC-2015) (ICCC-2014)

More information

An Efficient Provable Data Possession Scheme based on Counting Bloom Filter for Dynamic Data in the Cloud Storage

An Efficient Provable Data Possession Scheme based on Counting Bloom Filter for Dynamic Data in the Cloud Storage , pp. 9-16 http://dx.doi.org/10.14257/ijmue.2016.11.4.02 An Efficient Provable Data Possession Scheme based on Counting Bloom Filter for Dynamic Data in the Cloud Storage Eunmi Jung 1 and Junho Jeong 2

More information

Keywords Cloud Data Storage, Privacy Preserving, Public Auditability, Cryptographic Protocols, Cloud Computing.

Keywords Cloud Data Storage, Privacy Preserving, Public Auditability, Cryptographic Protocols, Cloud Computing. Volume 4, Issue 10, October 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Implementation

More information

ADVANCES in NATURAL and APPLIED SCIENCES

ADVANCES in NATURAL and APPLIED SCIENCES ADVANCES in NATURAL and APPLIED SCIENCES ISSN: 1995-0772 Published BY AENSI Publication EISSN: 1998-1090 http://www.aensiweb.com/anas 2016 May 10(5): pages 223-227 Open Access Journal An Efficient Proxy

More information

Abstract. Asia-pacific Journal of Convergent Research Interchange Vol.2, No.2, June 30 (2016), pp

Abstract. Asia-pacific Journal of Convergent Research Interchange Vol.2, No.2, June 30 (2016), pp Vol.2, No.2, June 30 (2016), pp. 35-41 http://dx.doi.org/10.21742/apjcri.2016.06.05 1) 2) Abstract Cloud computing gives an adaptable and helpful route for information sharing, which brings different advantages

More information

ABSTRACT. Keywords: Cloud Computing, Storage, Authentication,Third Party Author, Encryption & Blocks.

ABSTRACT. Keywords: Cloud Computing, Storage, Authentication,Third Party Author, Encryption & Blocks. P P IJISET - International Journal of Innovative Science, Engineering & Technology, Vol. 3 Issue 8, August 2016 Secure User Data Using Encryption for Preserving Private Data in Cloud 1, 3 1 3 M Purnachandra

More information

Dec-2017, Issue- V-5, I-8, SW-03 ISSN (Online) ISSN (Print)

Dec-2017, Issue- V-5, I-8, SW-03 ISSN (Online) ISSN (Print) IJDCST @ Dec-2017, Issue- V-5, I-8, SW-03 ISSN-2320-7884 (Online) ISSN-2321-0257 (Print) Dynamic and Public Open Examination with Reasonable Mediation for Cloud Information A.Swathi 1, G. Shameshwari 2

More information

Preserving Data Integrity in Cloud Storage

Preserving Data Integrity in Cloud Storage Preserving Data Integrity in Cloud Storage Jegadeesan.K 1, Sivakumar.K 2 M.E, Department of CCE, Erode Builder Educational Trust s Group of Institutions, Kangayam, Tamilnadu, India 1 M.E, Department of

More information

International Journal of Advance Research in Engineering, Science & Technology

International Journal of Advance Research in Engineering, Science & Technology Impact Factor (SJIF): 5.302 International Journal of Advance Research in Engineering, Science & Technology e-issn: 2393-9877, p-issn: 2394-2444 Volume 5, Issue 3, March-2018 Key Aggregate Tagged File Searching(KATFS)

More information

Fine-Grained Data Updates on Cloud with Authorized Public Auditing

Fine-Grained Data Updates on Cloud with Authorized Public Auditing IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 03, 2015 ISSN (online): 2321-0613 Fine-Grained Data Updates on Cloud with Authorized Public Auditing Sindhu L 1 Ms Leelavathi

More information

A Result Analysis on Privacy-Preserving Public Auditing System of Data Storage Security in Cloud Computing through Trusted TPA

A Result Analysis on Privacy-Preserving Public Auditing System of Data Storage Security in Cloud Computing through Trusted TPA A Result Analysis on Privacy-Preserving Public Auditing System of Data Storage Security in Cloud Computing through Trusted TPA Nupoor M. Yawale, Prof. V. B. Gadicha # M.E. Second year CSE P R Patil COET,

More information

Provable Dynamic Data Possession by Datalog Rules

Provable Dynamic Data Possession by Datalog Rules 958 JOURNAL OF SOFTWARE, VOL. 9, NO. 4, APRIL 2014 Provable Dynamic Data Possession by Datalog Rules Jing Lu School of Optical Electrical and Computing Engineering University of Shanghai for Science and

More information

Delegating Auditing Task to TPA for Security in Cloud Computing

Delegating Auditing Task to TPA for Security in Cloud Computing Delegating Auditing Task to TPA for Security in Cloud Computing 1 Nallam Gowri, 2 D.Srinivas 1,2Dept. of CSE,Kakinada Institute of Engineering & Technology, Korangi, e.g.dt,ap, India Abstract: This paper

More information

A Quasi group Encryption based Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing

A Quasi group Encryption based Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing Volume 4, No. 2, Jan-Feb 2013 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at www.ijarcs.info ISSN No. 0976-5697 A Quasi group Encryption based Privacy-Preserving

More information

Auditing-as-a-Service for Cloud Storage

Auditing-as-a-Service for Cloud Storage Auditing-as-a-Service for Cloud Storage Alshaimaa Abo-alian, N. L. Badr, M. F. Tolba, Faculty of Information and Computer Sciences, Ain shams University, Cairo, Egypt shimo.fcis83@gmail.com, dr.nagwabadr@gmail.com,

More information

SDD: A Novel Technique for Enhancing Cloud Security with Self Destructing Data

SDD: A Novel Technique for Enhancing Cloud Security with Self Destructing Data SDD: A Novel Technique for Enhancing Cloud Security with Self Destructing Data Kishore K, Ramchand V M.Tech Student, Dept. of CSE, The Oxford College Of Engineering, Bangalore, India Associate Professor,

More information

MANAGING OF CLOUD STORAGE AUDITING FOR DATA INTEGRITY

MANAGING OF CLOUD STORAGE AUDITING FOR DATA INTEGRITY MANAGING OF CLOUD STORAGE AUDITING FOR DATA INTEGRITY GARNEPALLI MOUNIKA 1, N.SANTHOSH RAMCHANDER 2 M. Tech Student, CSE, SVS Group of Institutions, Warangal, TS 1 M.Tech (Ph.D) Assoc. Prof, CSE Dept,

More information

On the Security of a Lightweight Cloud Data Auditing Scheme

On the Security of a Lightweight Cloud Data Auditing Scheme On the Security of a Lightweight Cloud Data Auditing Scheme Reyhaneh Rabaninead a, Maryam Raabzadeh Asaar b, Mahmoud Ahmadian Attari a, Mohammad Reza Aref c a Department of Electrical Engineering, K. N.

More information

A Procedural Based Encryption Technique for Accessing Data on Cloud

A Procedural Based Encryption Technique for Accessing Data on Cloud A Procedural Based Encryption Technique for Accessing Data on Cloud Avinash N 1, Divya C 2 P.G. Student, Department of Computer Science and Engineering, SVIT, Bangalore, Karnataka, India 1 Assistant Professor,

More information

Attribute Based Encryption with Privacy Protection in Clouds

Attribute Based Encryption with Privacy Protection in Clouds Attribute Based Encryption with Privacy Protection in Clouds Geetanjali. M 1, Saravanan. N 2 PG Student, Department of Information Technology, K.S.R College of Engineering, Tiruchengode, Tamilnadu, India

More information

Secure Token Based Storage System to Preserve the Sensitive Data Using Proxy Re-Encryption Technique

Secure Token Based Storage System to Preserve the Sensitive Data Using Proxy Re-Encryption Technique Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,

More information

Privacy Preserving Public Auditing in Secured Cloud Storage Using Block Authentication Code

Privacy Preserving Public Auditing in Secured Cloud Storage Using Block Authentication Code Privacy Preserving Public Auditing in Secured Cloud Storage Using Block Authentication Code Sajeev V 1, Gowthamani R 2 Department of Computer Science, Nehru Institute of Technology, Coimbatore, India 1,

More information

A compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems.

A compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems. A compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems. G Swetha M.Tech Student Dr.N.Chandra Sekhar Reddy Professor & HoD U V N Rajesh Assistant Professor Abstract Cryptography

More information

A Review on Secure Multi Owner Multi-keyword Ranked Search Scheme Over Encrypted Cloud Data By Using 3DES Approach

A Review on Secure Multi Owner Multi-keyword Ranked Search Scheme Over Encrypted Cloud Data By Using 3DES Approach A Review on Secure Multi Owner Multi-keyword Ranked Search Scheme Over Encrypted Cloud Data By Using 3DES Approach Mr Vaibhav Sawalkar 1,Prof.Megha Singh 2 1 MTECH Student,Dept of Computer Science, CIIIT

More information

A Survey on Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud

A Survey on Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud A Survey on Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud Pallavi S. Kaulage 1, S. N. Kini 2 1 Department of Computer Engineering, Jayawantrao Sawant College

More information

Cloud Data Integrity Auditing Over Dynamic Data for Multiple Users

Cloud Data Integrity Auditing Over Dynamic Data for Multiple Users Received: June 13, 2017 239 Cloud Data Integrity Auditing Over Dynamic Data for Multiple Users Santhosh Kumar 1* Latha Parthiban 2 1 Sathyabama University, Tamilnadu, India 2 Pondicherry Community College,

More information

A Comparative Analysis of Provable Data Possession Schemes in Cloud

A Comparative Analysis of Provable Data Possession Schemes in Cloud A Comparative Analysis of Provable Data Possession Schemes in Cloud Pooja Natu #, Prof. Shikha Pachouly * # PG scholar AISSMS COE, Department of Computer Engineering, Savitribai Phule Pune University,

More information

SECURE SHARING OF DATA IN PRIVATE CLOUD BY RSA OAEP ALGORITHM. SRM University, Chennai

SECURE SHARING OF DATA IN PRIVATE CLOUD BY RSA OAEP ALGORITHM. SRM University, Chennai Volume 115 No. 6 2017, 689-695 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu SECURE SHARING OF DATA IN PRIVATE CLOUD BY RSA OAEP ALGORITHM S. Selvakumar

More information

Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing

Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing Vanita Gadekar 1, Baisa Gunjal. 2 1 Student, Computer Department, Amruthvahini College Of Engineering, Maharashtra,

More information

Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage: Theory and Implementation (Supplementary File)

Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage: Theory and Implementation (Supplementary File) 1 Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage: Theory and Implementation (Supplementary File) Henry C. H. Chen and Patrick P. C. Lee 1 ADDITIONAL RELATED WORK This section

More information

Three Levels of Access Control to Personal Health Records in a Healthcare Cloud

Three Levels of Access Control to Personal Health Records in a Healthcare Cloud Three Levels of Access Control to Personal Health Records in a Healthcare Cloud Gabriel Sanchez Bautista and Ning Zhang School of Computer Science The University of Manchester Manchester M13 9PL, United

More information

IMPROVING DATA DYNAMICS AND STORAGE SECURITY IN CLOUD COMPUTING

IMPROVING DATA DYNAMICS AND STORAGE SECURITY IN CLOUD COMPUTING International Journal of Advancements in Research & Technology, Volume 2, Issue4, April 2013 327 IMPROVING DATA DYNAMICS AND STORAGE SECURITY IN CLOUD COMPUTING Badi Alekhya Department of CSE T.J.S Engineering

More information

Decentralized Anonymous Authentication of Data Stored in Clouds Praveen.N, Krishna Kumar.P.R, Vinitha V Yadav

Decentralized Anonymous Authentication of Data Stored in Clouds Praveen.N, Krishna Kumar.P.R, Vinitha V Yadav Decentralized Anonymous Authentication of Data Stored in Clouds Praveen.N, Krishna Kumar.P.R, Vinitha V Yadav Abstract: Distributed computing is area that permits clients to store the information. Distributed

More information

International Journal of Advance Engineering and Research Development

International Journal of Advance Engineering and Research Development Scientific Journal of Impact Factor (SJIF): 4.14 International Journal of Advance Engineering and Research Development Volume 3, Issue 10, October -2016 e-issn (O): 2348-4470 p-issn (P): 2348-6406 Efficient

More information

EFFICIENT DATA SHARING WITH ATTRIBUTE REVOCATION FOR CLOUD STORAGE

EFFICIENT DATA SHARING WITH ATTRIBUTE REVOCATION FOR CLOUD STORAGE EFFICIENT DATA SHARING WITH ATTRIBUTE REVOCATION FOR CLOUD STORAGE Chakali Sasirekha 1, K. Govardhan Reddy 2 1 M.Tech student, CSE, Kottam college of Engineering, Chinnatekuru(V),Kurnool,Andhra Pradesh,

More information

6367(Print), ISSN (Online) Volume 4, Issue 3, May June (2013), IAEME & TECHNOLOGY (IJCET)

6367(Print), ISSN (Online) Volume 4, Issue 3, May June (2013), IAEME & TECHNOLOGY (IJCET) INTERNATIONAL International Journal of Computer JOURNAL Engineering OF COMPUTER and Technology ENGINEERING (IJCET), ISSN 0976- & TECHNOLOGY (IJCET) ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4,

More information

A Less Weight Secure Data Sharing Scheme for Mobile Cloud Computing

A Less Weight Secure Data Sharing Scheme for Mobile Cloud Computing A Less Weight Secure Data Sharing Scheme for Mobile Cloud Computing P. Likitha Department of Computer Science and Engineering, MJR College of Engineering & Technology, Piler, A.P - 517214, India. ABSTRACT:

More information

Enabling Efficiency in Data Dynamics for Storage Security in Cloud Computing

Enabling Efficiency in Data Dynamics for Storage Security in Cloud Computing Enabling Efficiency in Data Dynamics for Storage Security in Cloud Computing K.Gayathri 1, P.Umamaheswari 2, P.Senthilkumar 3 Assistant Professor, Anna University, Tamilnadu, India 1,2 Assistant Professor,

More information

PERFORMANCE OF CLOUD DATA INTEGRITY PROOFS IN CLOUD STORAGE SYSTEM USING CRYPTOGRAPHIC KEY

PERFORMANCE OF CLOUD DATA INTEGRITY PROOFS IN CLOUD STORAGE SYSTEM USING CRYPTOGRAPHIC KEY PERFORMANCE OF CLOUD DATA INTEGRITY PROOFS IN CLOUD STORAGE SYSTEM USING CRYPTOGRAPHIC KEY B.M.RAJESH 1 Asst Prof, Department of Information Technology, SNMV College of Arts and Science, Tamil Nadu, India

More information

Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud

Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud Gondesi Srikar Reddy Student Department of Computer Science & Systems Engineering AU College of Engineering

More information

HLA BASED THIRD PARTY AUDITING FOR SECURE CLOUD STORAGE

HLA BASED THIRD PARTY AUDITING FOR SECURE CLOUD STORAGE HLA BASED THIRD PARTY AUDITING FOR SECURE CLOUD STORAGE Mr. N.R. Rejin Paul Assistant Professor, Department of Computer Science and Engineering, Velammal Institute of Technology, Chennai, Tamilnadu, India.

More information

Session Based Ciphertext Policy Attribute Based Encryption Method for Access Control in Cloud Storage

Session Based Ciphertext Policy Attribute Based Encryption Method for Access Control in Cloud Storage IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 04, Issue 09 (September. 2014), V3 PP 21-25 www.iosrjen.org Session Based Ciphertext Policy Attribute Based Encryption

More information

An Efficient Dynamic Proof of Retrievability (PoR) Scheme

An Efficient Dynamic Proof of Retrievability (PoR) Scheme An Efficient Dynamic Proof of Retrievability (PoR) Scheme Zhen Mo Yian Zhou Shigang Chen Department of Computer & Information Science & Engineering University of Florida, Gainesville, FL 32611, USA Abstract

More information

ENSURING PRIVACY OF E-MEDICAL HEALTH RECORDS USING TRIPLE- DES ALGORITHM

ENSURING PRIVACY OF E-MEDICAL HEALTH RECORDS USING TRIPLE- DES ALGORITHM ENSURING PRIVACY OF E-MEDICAL HEALTH RECORDS USING TRIPLE- DES ALGORITHM Ms. S. P. Vidhya Priya 1, Dharani.N.R 2, Gokilavani.M 3, Jeevitha.R 4 1,2,3,4 Department of Information Technology, Kathir College

More information

HLA Based Third Party Auditing For Secure Cloud Storage

HLA Based Third Party Auditing For Secure Cloud Storage HLA Based Third Party Auditing For Secure Cloud Storage Chandinee Saraswathy K., Keerthi D., Padma G. Student, Department of Computer Science and Engineering Velammal Institute of Technology, Panchetti

More information

SECURING DISTRIBUTED ACCOUNTABILITY FOR DATA SHARING IN CLOUD COMPUTING

SECURING DISTRIBUTED ACCOUNTABILITY FOR DATA SHARING IN CLOUD COMPUTING SECURING DISTRIBUTED ACCOUNTABILITY FOR DATA SHARING IN CLOUD COMPUTING N. RAMESH 1, D. ANIL M.E 2, M. KIRAN 3 1, M.TECH Scholar, VEC, Kavali 2, Assistant Professor, VEC, Kavali 3, Assistant Professor,

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 3, March 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Reliable Proxy

More information

AES and DES Using Secure and Dynamic Data Storage in Cloud

AES and DES Using Secure and Dynamic Data Storage in Cloud Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,

More information

Attribute Based Encryption with Privacy Preserving In Clouds

Attribute Based Encryption with Privacy Preserving In Clouds Attribute Based Encryption with Privacy Preserving In Clouds M. Suriyapriya 1, A. Joicy 2 PG Scholar 1 Assistant Professor CSE Department 2 St.Joseph College of Engineering Sriperumbudur, Chennai-602105

More information

A Survey on Secure Storage in Cloud Computing

A Survey on Secure Storage in Cloud Computing Indian Journal of Science and Technology A Survey on Secure Storage in Cloud Computing A. Rajathi 1* and N. Saravanan 2 1 PG Student, School of Computing, SASTRA University, 613401, Thanjavur, Tamilnadu,

More information

A Methodology for Assigning Access Control to Public Clouds

A Methodology for Assigning Access Control to Public Clouds Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 12, December 2014,

More information

A Dynamic Proof of Retrievability (PoR) Scheme with O(logn) Complexity

A Dynamic Proof of Retrievability (PoR) Scheme with O(logn) Complexity A Dynamic Proof of Retrievability (PoR) Scheme with O(logn) Complexity Zhen Mo Yian Zhou Shigang Chen Department of Computer & Information Science & Engineering University of Florida, Gainesville, FL 32611,

More information

Remote Data Checking: Auditing the Preservation Status of Massive Data Sets on Untrusted Store

Remote Data Checking: Auditing the Preservation Status of Massive Data Sets on Untrusted Store Remote Data Checking: Auditing the Preservation Status of Massive Data Sets on Untrusted Store Randal Burns randal@cs.jhu.edu www.cs.jhu.edu/~randal/ Department of Computer Science, Johns Hopkins Univers

More information

ENCRYPTED KEY SEARCHING FOR DATA SHARING OVER GROUPS IN THE CLOUD STORAGE THEJA #1, GARREPALLI PRASAD #2,

ENCRYPTED KEY SEARCHING FOR DATA SHARING OVER GROUPS IN THE CLOUD STORAGE THEJA #1, GARREPALLI PRASAD #2, ENCRYPTED KEY SEARCHING FOR DATA SHARING OVER GROUPS IN THE CLOUD STORAGE THEJA #1, GARREPALLI PRASAD #2, DEPARTMENT OF CSE SAHAJA INSTITUTE OF TECHNOLOGY & SCIENCES FOR WOMEN, KARIMNAGAR ABSTRACT: The

More information

Result Paper on Public Auditing by using KERBEROS to Secure Cloud Storage

Result Paper on Public Auditing by using KERBEROS to Secure Cloud Storage Result Paper on Public Auditing by using KERBEROS to Secure Cloud Storage Ved M. Kshirsagar, Prof. V.S.Gulhane Information Technology, Computer Science, SGBAU University Amravati, Maharashtra, India Abstract

More information

Cloud Storage Security Based on Trusted Third Party Auditing

Cloud Storage Security Based on Trusted Third Party Auditing Cloud Storage Security Based on Trusted Third Party Auditing Priyanka S. Nangare 1, Prof. Varsha Dange 2 M.E. Student, Dept. of Computer Engineering, DPCOE, Pune, India 1 Assistant Professor, Dept. of

More information

Provable dynamic auditing in mobile cloud computing for secure storage of e- health data.

Provable dynamic auditing in mobile cloud computing for secure storage of e- health data. Biomedical Research 2018; Special Issue: S88-S94 ISSN 0970-938X www.biomedres.info Provable dynamic auditing in mobile cloud computing for secure storage of e- health data. Suguna M *, Mercy Shalinie S

More information

Secure and Flexible Data Sharing for Dynamic Groups in the Cloud

Secure and Flexible Data Sharing for Dynamic Groups in the Cloud Secure and Flexible Data Sharing for Dynamic Groups in the Cloud Srinivas Tutigunta. 1, K. Ravi Chadaran 2 1 Dept. of CSE, Nova College of Engineering & Technology, Jangareddy Gudem, A.P, India 2 Associate

More information

Fortified and Revocable Access Control for Multi- Authority Cloud Storage using CPABE

Fortified and Revocable Access Control for Multi- Authority Cloud Storage using CPABE Fortified and Revocable Access Control for Multi- Authority Cloud Storage using CPABE Bhuvaneswari Thangaraj PG scholar, Maharaja Engineering College, Avinashi, India, S. Umarani Assistant Professor, Maharaja

More information

Techniques for Efficiently Ensuring Data Storage Security in Cloud Computing

Techniques for Efficiently Ensuring Data Storage Security in Cloud Computing Techniques for Efficiently Ensuring Data Storage Security in Cloud Computing Vasu Raju, Raj Kumar, and Anand Raj vasuraju_1255@yahoo.com naaniraj@gmail.com, anandsofttech@gmail.com M.Tech (C.S.E), S.r.Engg

More information

Research Article. August 2017

Research Article. August 2017 International Journals of Advanced Research in Computer Science and Software Engineering ISSN: 2277-128X (Volume-7, Issue-8) a Research Article August 2017 Data Integrity Techniques in Cloud Computing:

More information

Homomorphic encryption (whiteboard)

Homomorphic encryption (whiteboard) Crypto Tutorial Homomorphic encryption Proofs of retrievability/possession Attribute based encryption Hidden vector encryption, predicate encryption Identity based encryption Zero knowledge proofs, proofs

More information

Security Weaknesses of an Anonymous Attribute Based Encryption appeared in ASIACCS 13

Security Weaknesses of an Anonymous Attribute Based Encryption appeared in ASIACCS 13 Security Weaknesses of an Anonymous Attribute Based Encryption appeared in ASIACCS 13 Payal Chaudhari, Manik Lal Das, Anish Mathuria DA-IICT, Gandhinagar, India {payal chaudhari, maniklal das, anish mathuria}@daiict.ac.in

More information

Knox: Privacy-Preserving Auditing for Shared Data with Large Groups in the Cloud

Knox: Privacy-Preserving Auditing for Shared Data with Large Groups in the Cloud Knox: Privacy-Preserving Auditing for Shared Data with Large Groups in the Cloud Boyang Wang 1,2,BaochunLi 2,andHuiLi 1 1 State Key Laboratory of Integrated Services Networks, Xidian University, China

More information

International Journal of Modern Electronics and Communication Engineering (IJMECE) ISSN: Volume No.-4, Issue No.

International Journal of Modern Electronics and Communication Engineering (IJMECE) ISSN: Volume No.-4, Issue No. A Review on Multi-Keyword Based Image Retrieval System for Encrypted Image Data Stored On Cloud Pawandeep 1, Hardeep Singh 2 1 Student, CSE department, CGC-COE Landran, Pawandeep.saini@gmail.com 2 Asst.

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK TECHNIQUES FOR ENSURING DATA STORAGE SECURITY IN CLOUD COMPUTING GANESH B. CHAVAN

More information

Fine-Grained Data Sharing Supporting Attribute Extension in Cloud Computing

Fine-Grained Data Sharing Supporting Attribute Extension in Cloud Computing wwwijcsiorg 10 Fine-Grained Data Sharing Supporting Attribute Extension in Cloud Computing Yinghui Zhang 12 1 National Engineering Laboratory for Wireless Security Xi'an University of Posts and Telecommunications

More information

Thakare B. Monika, Dhande M. N.; International Journal of Advance Research, Ideas and Innovations in Technology.

Thakare B. Monika, Dhande M. N.; International Journal of Advance Research, Ideas and Innovations in Technology. ISSN: 2454-132X Impact factor: 4.295 (Volume3, Issue2) Available online at www.ijariit.com Privacy Preserving and Secure Data Integrity Protection security in Regenerating Coding Based Public Cloud Storage

More information

Implementation of Decentralized Access Control with Anonymous Authentication in Cloud

Implementation of Decentralized Access Control with Anonymous Authentication in Cloud Volume-5, Issue-6, December-2015 International Journal of Engineering and Management Research Page Number: 210-214 Implementation of Decentralized Access Control with Anonymous Authentication in Cloud

More information

SecCloud: Bridging Secure Storage and Computation in Cloud

SecCloud: Bridging Secure Storage and Computation in Cloud 2010 2010 IEEE International 30th International Conference Conference Distributed on Distributed Computing Computing Systems Systems Workshops Workshops SecCloud: Bridging Secure Storage and Computation

More information

Third Party Auditing (TPA) For Secure Cloud Storage With Secret Sharing Algorithm. SHEETAL THITE[1], M TECH,Computer Engineering, BVDUCOE, Pune,india

Third Party Auditing (TPA) For Secure Cloud Storage With Secret Sharing Algorithm. SHEETAL THITE[1], M TECH,Computer Engineering, BVDUCOE, Pune,india , Impact Factor- 5.343 Third Party Auditing (TPA) For Secure Cloud Storage With Secret Sharing Algorithm SHEETAL THITE[1], M TECH,Computer Engineering, BVDUCOE, Pune,india Prof. S.S.DHOTRE Associate Professor,Department

More information

FAC-MACS: Fortified Access Control for Multi-Authority Cloud Storage Using CPABE

FAC-MACS: Fortified Access Control for Multi-Authority Cloud Storage Using CPABE FAC-MACS: Fortified Access Control for Multi-Authority Cloud Storage Using CPABE Bhuvaneswari Thangaraj 1, S.Umarani 2, D.Sharmila 3 1 PG scholar, Maharaja Engineering College, Avinashi, India 2 Assistant

More information

An Improved Remote User Authentication Scheme with Smart Cards using Bilinear Pairings

An Improved Remote User Authentication Scheme with Smart Cards using Bilinear Pairings An Improved Remote User Authentication Scheme with Smart Cards using Bilinear Pairings Debasis Giri and P. D. Srivastava Department of Mathematics Indian Institute of Technology, Kharagpur 721 302, India

More information

Implementation of IBE with Outsourced Revocation technique in Cloud Computing

Implementation of IBE with Outsourced Revocation technique in Cloud Computing Implementation of IBE with Outsourced Revocation technique in Cloud Computing M.MOHANRAO, POCKLA PAVANI Assistant Professor, M.TECH STUDENT Dept of CSE,Megha Institute of Engineering & Technology For womens,edulabad,ghatkesar

More information