Homomorphic Token and Distributed Erasure-Code for cloud

Size: px
Start display at page:

Download "Homomorphic Token and Distributed Erasure-Code for cloud"

Transcription

1 Homomorphic Token and Distributed Erasure-Code for cloud 1B.Anjani Kumar, 2K.Hari Prasad, 3C.Subash Chandra 1,3Dept. of CSE, Kakinada Institute of Engineering & Technology, Korangi, AP, India 2P.G.Department of CS, Ideal College of Arts & Sciences Vidyut Nagar, Kakinada, AP, India ABSTRACT: Cloud users store their data in the cloud environment which is privileged by the service provider. Cloud users can access their cloud storage. Here we propose a flexible distributed storage integrity auditing mechanism, utilizing the homomorphic token and distributed erasure-coded data. The proposed design allows users to audit the cloud storage with very lightweight communication and computation cost. The proposed scheme is highly efficient and resilient against Byzantine failure, malicious data modification attack, and even server colluding attacks. Keywords - Cloud computing, Data Integrity, Dependable Distributed Storage, Error Localization, Data Dynamics, Byzantine. I.INTRODUCTION Cloud computing is a recent prominent preference because to handle users data and applications. It offers computing through pool of resources over internet rather than on users local machines. In other words we can say that cloud computing is a new delivery model with a variety of scalable hosted services over internet. Cloud services offered are basically categorized into IaaS Infrastructure -asservice), PaaS Platform -as-a-service), SaaS software-as-a-service). There are several emerging trends in this domain with integration of services and technologies. With an increase in network bandwidth, a provision of flexible nature, reliable network connections leads to high quality remote service. Enterprises treat and store their data as files and but they are stored as objects in cloud. So a new data model is required and maintained as part of its scalable architecture. Related to cloud data storage. Cloud Users: Customers, who use the cloud storage provision to store their individual or enterprise data. Users are privileged data access to the cloud server for data management. Cloud server: It is maintained and managed by the cloud service providers for providing the storage space and computation resources to the users remotely. Third party auditor: who has capability to audit the cloud server based on the user request, if the users may not have trust-worthy data access to cloud. In the cloud environment, cloud users store their data into the set of cloud servers. These servers are running in co-operated, simultaneous and distributed manner. Users can communicate with cloud service providers to retrieve their data. In addition to it, users can perform operations on the cloud such as insert, append, delete and update. By using erasure technique, we can reduce the redundancy of the data to tolerate errors and/or even system crashes whenever user s data grow rapidly. In some cases, the user may need to perform block level operations on his data. We have recently different system and security models which high light the remote data integrity. These are useful when users possessing local data and focus on single scenario. In this paper, we propose an effective and flexible distributed storage correctness and availability of data which also support dynamic operations. As a complementary approach, researches have also introduced distributed protocols for storage correctness across multiple servers. It provides efficient storage verification and data availability. In this paper we propose effective and flexible distributed storage verification with dynamic data support. During the file distribution preparation we are using erasure correcting code, by using this. Byzantine Servers: The services provided by the internet must be available to the user without interruptions. The interruptions caused by mainly due to the operator mistakes, software bugs and malicious attack. Due to these we see sudden behavior in the system known as Byzantine faults tolerance.. Fig.1. Cloud storage service architecture Page 1069

2 Our mechanism also secures the localization of data errors i.e. identify the malware of servers. It also concentrates on dynamic data operations. we give an extension to our proposed main scheme to support third party auditing, so that users can safely assign their auditing tasks to third party auditors TPA). Our proposed scheme can be summarized in the 3 aspects as follows given below: 1) Our proposed system achieves strong assurance of storage correctness and data error localization, compared to previous techniques. 2) Not only for data integrity our proposed scheme also supports efficient and secure dynamic operations on blocks including insertion, deletion, append, modify etc. 3) Analysis shows that our scheme is against Byzantine failure, malicious data modification attack and server colluding attacks. II. PROBLEM STATMENT 2.1 System model Thereafter, the user interacts with the cloud servers via CSP to access for application purposes or to retrieve his data. In some special cases, the user may require need to perform block level operations such as insert, delete, update and append the block. Beyond this in our paper, we focus on the fileoriented cloud application other than non-file application data like social networking. however, we introduce TPA, for any leakages of user's outsourced data. 2.2 Adversary Model Security Threats in the cloud data storages are from two different resources. On the one hand, a cloud server be not trusted, may be self-interested, and cause malicious attacks. Meanwhile they move the data from that has not been or rarely accessed to a lower tier of storage than agreed, it may also lead to attempt or hide data loss incident due to management errors,byzantine failures and soon. There are two types of adversary. Weak Adversary: The adversary is interested in corrupting the user s data files stored in different individual servers. Strong Adversary: It is the worst case scenario, in which we assume that the adversary model 2.3 Design Goals Of The System We design the perfect mechanisms to support data verification and dynamic operations in cloud: i)correctness of stored data: we must provide the appropriate data and kept that undamaged in the cloud at all times. ii)fast localization of error data: we must efficiently modify the server even if the server failure occurs. iii)dynamic operations support for data: It supports dynamic operations if the users modify the data such as insert, delete, append. iv)dependability: It reduces the effect of data errors or server failures and protect the data against the byzantine failures, malicious data modification attack and server colluding attacks. iv)light-weight communication: It enables users to perform checks whether the data stored correctly with minimum expenses. 2.4 Notations and its importance F-is the stored file in the cloud. F is denoted with the matrix with equal sized data vectors consists of l blocks. These blocks are represented in the galois field GF2 p ) for p=8 or 16. A-the dipersal matrix used for Reed-Solomon coding. Dispersal matrix is also known as covariance matrix. G-the encoded file matrix,which includes set of n=m+k vectors,each consisting of l blocks. f key.) -pseudorandom function which is defined as f={0,1} * * key->gf2 p ). key.) - pseudorandom permutation, which is defined as ={0,1} log 2 l) * key->{0,1} log 2 l). ver- a version number bound with the index for individual blocks. initially the version is zero for all data blocks. s ver ij -the seed for pseudorandom function which depends on the file name, block index i,server position j as well as the optional block version number is ver. III. PROPOSED SYSTEM Securing Cloud Storage Data In cloud storage user's store their data and don't maintain that data locally. Whatever be the data stored in the cloud server must be secure. The important issue is to effectively detect any unauthorized data modification and corruption. This is occur due to the server collaborate to dispute and/or random byzantine failures. To address these Page 1070

3 kind of problems, we are using the scheme foe securing the data in the cloud server. In first step we distribute for file to cloud servers by dividing into blocks. After that the homomorphic token is introduced. This belongs to the family of hash functions[17]. Challenge-response authentication is a protocol in that we have two parities. The first party send the challenge to the second party. The second party responds to that and send valid data to that challenge. In our scheme, the challenge-response protocol is used to verify correctness of stored data as well identifying the misbehaving servers. The procedure for error recovery and file retrieval is also discussed here. Finally, we describe how to extend it to third party auditor. 3.1 Distributing The File In the distributed systems erasure correcting code is used to recover the server colluding attacks and byzantine failures. In the cloud storage systems we store our file. Before going to store we first distribute the file and redundancy store across the n=m+k distributed servers. In this we are using m,k) Reed-solomon erasure- correcting code for creation of k parity vectors from data vectors. So that the original file can be constructed from any one of m+k vectors. By distributing m+k vectors on different servers if any of the failures occur, we can recover our data without losing. For efficient sequential I/O our layout is maintained as systematic. Let us assume that our file is F=F 1,F 2...F m ) and F i =f 1i,f 2i,...f li ) T i {1,...,m}).Here F=file we are distributing, T is the transpose denotes that each F i is represented as a column vector, and l denotes that data vector represented in blocks. All blocks are represented in GF2 p ).coming to our schema the elements blocks are represented in GF.It is represented as dispersal matrix A is derived from mxm+k) vandermonde matrix where jj {1,...n}) are distinct elements randomly picked from Galois field2 p ).After the sequence of elementary row transformations the desired matrix A can be written as Where I is a mxm identity matrix and p is the secret parity generation matrix with size mxk.note that A is derived from a vandermonde matrix.the user encoded file by multiplying F By A,that is denoted by G. G=F.A=G 1),G 2),...,G m),g m+1),...,g n) ) =F 1,F 2,...,F m,g m+1),...,g n) ), where Gj)=g 1 j),g 2 j),...g l j) ) T j {1,...,n}) where G m+1),...,g n) ) are parity vectors generated based on F. 3.2 Token Precomputation And Challenge For Token To acheive the correctness of the stored data and error localization.we depend on the technique that is verification of precomputed token:it is described as follows:if the user want to storage file in the cloud server. He distribute his file on the different server.before distributin his file on different server he first compute the short verifiction token for verification on each G j j {1,n}) vector. These token cover all l blocks.after precompution of tokens user store their data in different servers. If the user intersted to retrive a block of he want to make check the storage correctness. He challenges the server based on the challenging request. The server computes short signatures over the specified blocks and returns to the user.the signature value should match with the user precomputed tokens. The user precompute the tokens by using PRF f.),a PRP.), a challenge key k chal, and a master permutation key k PRP. The user do the following steps: 1.determine the random challenge value α i of the GF 2p) by α i =f kchal i) and permutation key K PRP. 2.compute set of r randomly-chosen indices based on { 1,, 1 }, where = q). 3.calculate token as: = *, where =. A=I/P)= Page 1071

4 After the generation of the token computation user keep it locally or store in the server in encrypted form.in this user stores locally. Algorithm 1:Token Precomputation 1: Procedure 2: Choose parameters, and function, 3: Choose the number of token; 4: Choose the number of indicates per verification; 5: Generate master key and challenge key ; 6: for vector, 1, do 7: for round 1, do 8: Derive = and from. 9: Compute = 10: end for 11: end for 12: Store all for s locally. 13: end procedure. Once the token computation is finished the final step is blind to the each parity vector in G m+1),...,g n) ). It is represented as by + s ij ), i {1,...,l},After the completion of the blinding process the user distribute the file to diffferent servers.s1,s2,...sn. 3.3 Verification Of Storage Correctness And Localization Of Errors Error localization is the used to identify the erros at server side. The challenge-response protocol is used to give challenge server and response from server,not only determine this but also identify the potential threats from servers.the procedure for the ith challenge-response protocol over n servers is described as follows: 1.The user computes the tokens and sends a challenge to each server α i as well as the ith permutation key to each servers. 2.The server storing vector G j) j {1,...n}) aggregates those rows specified by index into linear groups send back responses = * G j) [ q)],and where j {1,...,n}). 3.user receiving ) from servers and from that substract blind values from that. -, ).,where I q = q). 4.Then,the user verifies whether the received values remain a valid codeword present in secret matrix p.,..., ).P?,..., ). After the verification matching the valid code words,the user thinks that file exist in server without corruption.if the challenge is fail,then for that each response ) is computed exactly in the same way as token.thus we users can simply find which server is misbehaving by verifying the following n equations.? =, j {1,...,n}. Algorithm 2: Correctness verification and error localization. 1: procedure CHALLENGE I) 2: Re compute = and from ; 3: Send, 4: Receive from servers: to all the cloud serves; = 1 5: for + 1, ) do 6:, = 7: end for 8:if than,, ). ==,, 9: Accept and ready for next challenge. 10: else 11: for 1, ) do 12: If )! = than 13: return server is misbehaving Page 1072

5 14: end if 15: end for 16: end if 17: end procedure. 3.4 Retriving And Recovery Of File: The user can Reconstruct the orginal data by downloading the file.since our layout is systematic.byusing the parametersr,l,t) appropraitely we can guarantee the retrieve of file.when the corruption of the file occurs compare precomputed tokens and received response.the correction of blocks is done by erasure correction. Algorithm 3:Error Recovery 1: procedure %Assume the corruptions of blocks have been detected among % the specified rows; %Assume s k servers have been identified misbehaving 2: Download r rows of blocks from servers; 3:Treat s servers as erasures and recover the blocks. 4:Resend the recovered blocks to corresponding servers. 5: end procedure. 3.5 Toward Third party Auditing If the user does not have time to verify his data in the cloud service provider.he can optionally give his work to third party Auditor. By introducing the third party auditor the scheme does not bring any vulnerabilities.our scheme is similiar to third party Auditor with slight modification.the only difference is blinding parity vectors before distribute the file to each server. 1.Before distributing the file,user blinds each file block G 1),G 2),...,G m) ) by +s ij ), i {1,...,l}, where k j is the secret key for data vector Gj) j {1,...,m}). 2.Based on the blinded data vectors G 1),...,G m) ), the user generates k parity vectors G m+1),...g n) ) by using the secret matrix P. 3.The user calculates the ith token for server j as pervious scheme: ) = *G j) [I q ], where G j) [I q ]= and = i) GF2 p ). 4.The user sends the token set { { } }{1 i t, 1 j n },secret matrix P, permutation and challenge key k PRP, and K chal to TPA for auditing delegation. The correctness validation and misbehaving server identification for TPA is just similiar the previous scheme.the only difference s TPA does not take the blinding values in from server response R j) j {1,...,n}).TPA does not take away blinding values from R j) 's.because it can not perform following equation. ) -.,where I, q = q).so,tpa didnot get the data during the auditing process.the TPA doesnt collude the user information. IV. DYNAMIC OPERATION SUPPORT TO CLOUD STORAGE DATA The static file is suitable when we are storing libraries and scientific data sets. But for various world applications like electronic documents, photos,log files etc. The data is dynamic. The User is always interested to do various operations like update, delete, append. So our proposed scheme should support these operations. By using the secret matrix user first generate parities for data blocks to perform anyone of the dynamic operations. 4.1 Update operation In the cloud storage, user always interested to perform update operation on his data. Suppose if he wishes to change a block to new value, the old block is termed as f ij and the new value is named with f ij+ f ij. We say this operation as update. The user can construct update matrix as: = =,,, ) In the we specify zero elements to denote unchanged blocks. To get the updated information for data vectors and parity vectors. We must multiply.. = 1),..., G m), G m+1),... G n) ) = F 1,... F m, G m+1),., G n) ), where j) j { m+1,...,n}) denotes the updated information for parity vector G j). After updating of the file blocks. The next calculation of token verification. To maintain the same storage Page 1073

6 correctness in G j),unused token is every time exclude of old file and replace it with new block 4.2 Delete operation The delete operation is same as the update operation. This operation is done if the user wants to delete some files blocks stored in the cloud server. In this operation the deleted file blocks is represented with zero or some special predetermined symbols, where as in the update operations the unmodified blocks are represented with zero or some special symbols. After that we also modify the affected token values and corresponding to that blind the affected parity vectors which is similar to the update operation. we represent - f ij in F. 4.3 Append operation If the user wants to add some more blocks where the data stored in the cloud server. By appending operation the user add more blocks at a time not a single block. Appending the blocks is done by adding the blocks at the end of the file. If we have only l row in the matrix F. Then to we add m blocks, denoted as f l+1,1,f l+1,2,...,f l+1,m ).with the secret matrix p, the user can directly append the blocks for each parity server as f l+1,1,f l+1,2,...,f l+1,m ).P =,..., ) ). 4.4 Insert Operation The insert operation is similar to Append operation. Insert the file block at desired position by maintaining data block structure. By inserting the new file blocks, previous all blocks are shifted starting to index j+1.so insertion is difficult. So to maintain the block index we need additional structures. The operation is doing from logical append operation. V.EXPERIMENTS RESULTS AND FUTURE WORK We focused our scheme in terms of storage correctness, security, and efficiency. Our security analysis mainly focuses on on adversary model defined. Beyond this we also evaluate the efficiency by implementing both file distribution preparation and verification token pre computation. 5.1 Performance Evaluation We focus on the cost of file distribution preparation as well as token generation. preparing 1 GB file before outsourcing. In fig 2.a), we set the data vectors m constant at 10, while of decreasing the number of parity vectors k from 10 to 2. In fig. 2 b) total m+k parity vectors fixed at 22 and change the number of data vectors from 18 to 10. From the fig - 2 we can say that number k is the dominant factor for cost of both parity generation and parity blinding. The parity blinding cost is expected to further improve. 5.2 Future Enhancement The nodes which are connected to the server will be connect to the security layer. If the user wants to send his file to private cloud,he has to select the security algorithm based on privacy level of data. The security server will protect document and save in db. If any user wish to select his data, he is connected to same security server. VI. CONCLUSION: we investigate the problem of data security in cloud data storage, which is essentially a distributed storage system. To achieve the assurances of cloud data integrity and availability and enforce the quality of dependable cloud storage service for users, we propose an effective and flexible distributed scheme with explicit dynamic data support, including block update, delete, and append. By improving performance of Byzantine failure, malicious data modification attack, and even server colluding attacks VI1.REFERENCES [1] A. Juels and B.S. Kaliski Jr., PORs: Proofs of Retrievability for Large Files, Proc. 14th ACM Conf. Computer and Comm. Security CCS 07), pp , Oct [2] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, Provable Data Possession at Untrusted Stores, Proc. 14th ACM Conf. Computer and Comm. Security CCS 07), pp , Oct [3] M.A. Shah, M. Baker, J.C. Mogul, and R. Swaminathan, Auditing to Keep Online Storage Services Honest, Proc. 11th USENIX Workshop Hot Topics in Operating Systems HotOS 07), pp. 1-6, [4] M.A. Shah, R. Swaminathan, and M. Baker, Privacy-Preserving Audit and Extraction of Digital Contents, Cryptology eprint Archive, Report 2008/186, Page 1074

7 ISSN Print) [5] G. Ateniese, R.D. Pietro, L.V. Mancini, and G. Tsudik, Scalable and Efficient Provable Data Possession, Proc. Fourth Int l Conf. Security and Privacy in Comm. Netowrks SecureComm 08), pp. 1-10, [6] Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing, Proc. 14th European Conf. Research in Computer Security ESORICS 09), pp , [7] C. Erway, A. Kupcu, C. Papamanthou, and R. Tamassia, Dynamic Provable Data Possession, Proc. 16th ACM Conf. Computer and Comm. Security CCS 09), pp , [8] H. Shacham and B. Waters, Compact Proofs of Retrievability, Proc. 14th Int l Conf. Theory and Application of Cryptology and Information Security: Advances in Cryptology Asiacrypt 08), pp , [9] K.D. Bowers, A. Juels, and A. Oprea, Proofs of Retrievability: Theory and Implementation, Proc. ACM Workshop Cloud Computing Security CCSW 09), pp , [10] R. Curtmola, O. Khan, R. Burns, and G. Ateniese, MR-PDP: Multiple-Replica Provable Data Possession, Proc. IEEE 28th Int l Conf. Distributed Computing Systems ICDCS 08), pp , Mr B.Anjani Kumar is a Student of Kakinada Institute of Engineering & Technology. Currently he is persuing his M.TechCS) from this college. He received his Post Graduation M.ScCS) from Andhra university. Mr. K. Hari Prasad received MCA from Andhra University and M.Tech CSE) from JNTU Kakinada is working as Assistant Professor in P.G. Department of Computer Science, Ideal College of Arts & Sciences, Vidyut Nagar Kakinada. He has 6 years of teaching experience. He has participated in three National Seminars and work shop conducted by IBM and ORACLE, Published Two National & International Journal in the area of Wireless Sensor Networks, Optimization problems and Dataa Mining. His areas of interest are DBMS, Networking, Artificial Intelligence and Cloud Computing Mr. Subash Chandra Chadalavada, received M.Sc. in Physics with Electronics specialization from Andhra University and M.Tech. CSE) from JNTU Kakinada is working as Associate Professor in Department of Computer Science Engineering, Kakinadaa Institute of Engineering and Technology, Korangi. He is an active member of CSI & ISTE. He has 10 years of teaching experience. There are a couple of publications both national and International Conferences / Journals to his credit. His area of interest includes Information Security, Cloud Computing, Computational Photography and other advances in Computer Applications. Page 1075

Delegating Auditing Task to TPA for Security in Cloud Computing

Delegating Auditing Task to TPA for Security in Cloud Computing Delegating Auditing Task to TPA for Security in Cloud Computing 1 Nallam Gowri, 2 D.Srinivas 1,2Dept. of CSE,Kakinada Institute of Engineering & Technology, Korangi, e.g.dt,ap, India Abstract: This paper

More information

Techniques for Efficiently Ensuring Data Storage Security in Cloud Computing

Techniques for Efficiently Ensuring Data Storage Security in Cloud Computing Techniques for Efficiently Ensuring Data Storage Security in Cloud Computing Vasu Raju, Raj Kumar, and Anand Raj vasuraju_1255@yahoo.com naaniraj@gmail.com, anandsofttech@gmail.com M.Tech (C.S.E), S.r.Engg

More information

QUALITY OF SEVICE WITH DATA STORAGE SECURITY IN CLOUD COMPUTING

QUALITY OF SEVICE WITH DATA STORAGE SECURITY IN CLOUD COMPUTING QUALITY OF SEVICE WITH DATA STORAGE SECURITY IN CLOUD COMPUTING ABSTRACT G KALYANI 1* 1. M.Tech Student, Dept of CSE Indira Institute of Engineering and Technology, Markapur, AP. Cloud computing has been

More information

Improving data integrity on cloud storage services

Improving data integrity on cloud storage services International Journal of Engineering Science Invention Volume 2 Issue 2 ǁ February. 2013 Improving data integrity on cloud storage services Miss. M.Sowparnika 1, Prof. R. Dheenadayalu 2 1 (Department of

More information

International Journal Of Global Innovations -Vol.5, Issue.I Paper Id: SP-V5-I1-P07 ISSN Online:

International Journal Of Global Innovations -Vol.5, Issue.I Paper Id: SP-V5-I1-P07 ISSN Online: TOWARDS SECURE AND DEPENDABLE AUDITING FOR REGENRATING-CODE -BASED CLOUD STORAGE #1 GADDAM VASUDHA, M.Tech Student, #2 S.NAVEEN KUMAR, Associate Professor, Department of CSE, SREE CHAITANYA INSTITUTE OF

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK TECHNIQUES FOR ENSURING DATA STORAGE SECURITY IN CLOUD COMPUTING GANESH B. CHAVAN

More information

Ensuring Data Storage Security in Cloud Computing using Sobol Sequence

Ensuring Data Storage Security in Cloud Computing using Sobol Sequence 2010 1st International Conference on Parallel, Distributed and Grid Computing (PDGC - 2010) Ensuring Data Storage Security in Cloud Computing using Sobol Sequence P. Syam Kumar, R. Subramanian and D. Thamizh

More information

DATA INTEGRITY TECHNIQUES IN CLOUD: AN ANALYSIS

DATA INTEGRITY TECHNIQUES IN CLOUD: AN ANALYSIS DATA INTEGRITY TECHNIQUES IN CLOUD: AN ANALYSIS 1 MS. R. K. PANDYA, 2 PROF. K. K. SUTARIA 1 M.E.[Cloud Computing] Student, Computer Engineering Department, V. V. P. Engineering College, Rajkot, Gujarat

More information

DATA SECURITY IN CLOUD

DATA SECURITY IN CLOUD International Journal of Scientific and Research Publications, Volume 2, Issue 5, May 2012 1 DATA SECURITY IN CLOUD Leena, Mrs A. Kakoli Rao, Chitra Kapoor CSE Department of Galgotia College of Engineering

More information

Key Terms: Cloud Computing, cloud Service Provider, Provable Data Possession, Dynamic File Block, Map Version Table.

Key Terms: Cloud Computing, cloud Service Provider, Provable Data Possession, Dynamic File Block, Map Version Table. Volume 6, Issue 6, June 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Dynamic File Block

More information

Secure Auditing For Outsourced Data in Cloud Using Homomorphic Token and Erasure Code

Secure Auditing For Outsourced Data in Cloud Using Homomorphic Token and Erasure Code Secure Auditing For Outsourced Data in Cloud Using Homomorphic Token and Erasure Code N.S. Monalisa Devi 1, T. Sounder Rajan 2 M.E. Department of CSE, K S R College for Engineering and Technology, Tiruchengode,

More information

Remote Data Checking: Auditing the Preservation Status of Massive Data Sets on Untrusted Store

Remote Data Checking: Auditing the Preservation Status of Massive Data Sets on Untrusted Store Remote Data Checking: Auditing the Preservation Status of Massive Data Sets on Untrusted Store Randal Burns randal@cs.jhu.edu www.cs.jhu.edu/~randal/ Department of Computer Science, Johns Hopkins Univers

More information

International Journal of Advance Engineering and Research Development. AN Optimal Matrix Approach for virtual load allocation and data sharing

International Journal of Advance Engineering and Research Development. AN Optimal Matrix Approach for virtual load allocation and data sharing Scientific Journal of Impact Factor (SJIF): 5.71 International Journal of Advance Engineering and Research Development Volume 5, Issue 02, February -2018 e-issn (O): 2348-4470 p-issn (P): 2348-6406 AN

More information

STRUCTURED EMINENT DYNAMIC AUDITING FOR SECURE DATA STORAGE IN CLOUD COMPUTING

STRUCTURED EMINENT DYNAMIC AUDITING FOR SECURE DATA STORAGE IN CLOUD COMPUTING INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 STRUCTURED EMINENT DYNAMIC AUDITING FOR SECURE DATA STORAGE IN CLOUD COMPUTING Mr.Elamparithi P 1, Mr.Thanga Mariappan

More information

A Public Auditing Framework for Cloud Storage Security

A Public Auditing Framework for Cloud Storage Security A Public Auditing Framework for Cloud Storage Security S. Satish Kumar A.Sudheer Kumar D.Venkatesh M.Tech Student (CSE) Assistant Professor Dean of CSE & IT GATES Institute of Tech, Gooty GATES Institute

More information

I. INTRODUCTION The services offered by cloud can be categorized into three categories that are broadly defined as:

I. INTRODUCTION The services offered by cloud can be categorized into three categories that are broadly defined as: Volume 6, Issue 4, April 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Enhanced Dynamic

More information

Batch Verification Scheme for Economic Cloud Storage Services

Batch Verification Scheme for Economic Cloud Storage Services Batch Verification Scheme for Economic Cloud Storage Services K. Sudha 1, Mr. S. Sivaraj, ME 2 II-M.E (CSE), Dept. of CSE, SSM College of Engineering, Komarapalayam, Tamilnadu, India 1 Assistant Professor,

More information

Available online at ScienceDirect. Procedia Computer Science 48 (2015 ) (ICCC-2014) (ICCC-2015)

Available online at   ScienceDirect. Procedia Computer Science 48 (2015 ) (ICCC-2014) (ICCC-2015) Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 48 (2015 ) 347 352 International Conference on Intelligent Computing, Communication & Convergence (ICCC-2015) (ICCC-2014)

More information

A Simple Secure Auditing for Cloud Storage

A Simple Secure Auditing for Cloud Storage A Simple Secure Auditing for Cloud Storage Lee-Hur Shing Institute of Information Science Academia Sinica leehurs@iis.sinica.edu.tw Marn-Ling Shing University of Taipei Yu-Hsuan Yeh, Yan-Zhi Hu and Shih-Ci

More information

Efficient Data Storage Security with Multiple Batch Auditing in Cloud Computing

Efficient Data Storage Security with Multiple Batch Auditing in Cloud Computing Efficient Data Storage Security with Multiple Batch Auditing in Cloud Computing P. Sukumar [1] Department of Computer Science Sri Venkateswara College of Engineering, Chennai B. Sathiya [2] Department

More information

Survey Paper on Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud

Survey Paper on Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,

More information

Enhancing Availability Using Identity Privacy Preserving Mechanism in Cloud Data Storage

Enhancing Availability Using Identity Privacy Preserving Mechanism in Cloud Data Storage Enhancing Availability Using Identity Privacy Preserving Mechanism in Cloud Data Storage V.Anjani Kranthi *1, Smt.D.Hemalatha *2 M.Tech Student, Dept of CSE, S.R.K.R engineering college, Bhimavaram, AP,

More information

Research Article. August 2017

Research Article. August 2017 International Journals of Advanced Research in Computer Science and Software Engineering ISSN: 2277-128X (Volume-7, Issue-8) a Research Article August 2017 Data Integrity Techniques in Cloud Computing:

More information

Preserving Data Integrity in Cloud Storage

Preserving Data Integrity in Cloud Storage Preserving Data Integrity in Cloud Storage Jegadeesan.K 1, Sivakumar.K 2 M.E, Department of CCE, Erode Builder Educational Trust s Group of Institutions, Kangayam, Tamilnadu, India 1 M.E, Department of

More information

Dynamic and Flexible Group Key Generation Based on User Behaviour Monitoring

Dynamic and Flexible Group Key Generation Based on User Behaviour Monitoring International Journal of Computing Academic Research (IJCAR) ISSN 2305-9184, Volume 5, Number 1 (February 2016), pp.27-32 MEACSE Publications http://www.meacse.org/ijcar Dynamic and Flexible Group Key

More information

A Secure Cloud Storage System for Supporting Privacy-Preserving Public Auditing

A Secure Cloud Storage System for Supporting Privacy-Preserving Public Auditing A Secure Cloud Storage System for Supporting Privacy-Preserving Public Auditing Yenduva Venkata Mukesh Naidu M.Tech Student Deparment of CSE, Chaitanya Engineering College, Kommadi, Madhurawada, Visakhapatnam.

More information

Keywords Cloud Data Storage, Privacy Preserving, Public Auditability, Cryptographic Protocols, Cloud Computing.

Keywords Cloud Data Storage, Privacy Preserving, Public Auditability, Cryptographic Protocols, Cloud Computing. Volume 4, Issue 10, October 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Implementation

More information

ISSN: [Shubhangi* et al., 6(8): August, 2017] Impact Factor: 4.116

ISSN: [Shubhangi* et al., 6(8): August, 2017] Impact Factor: 4.116 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY DE-DUPLICABLE EFFECTIVE VALIDATION of CAPACITY for DYNAMIC USER ENVIRONMENT Dr. Shubhangi D C *1 & Pooja 2 *1 HOD, Department

More information

Towards Server-side Repair for Erasure Coding-based Distributed Storage Systems

Towards Server-side Repair for Erasure Coding-based Distributed Storage Systems Towards Server-side Repair for Erasure Coding-based Distributed Storage Systems Bo Chen Computer Science Department Stony Brook University bochen1@cs.stonybrook.edu Anil Kumar Ammula, Reza Curtmola Department

More information

A Quasi group Encryption based Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing

A Quasi group Encryption based Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing Volume 4, No. 2, Jan-Feb 2013 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at www.ijarcs.info ISSN No. 0976-5697 A Quasi group Encryption based Privacy-Preserving

More information

ISSN Vol.08,Issue.16, October-2016, Pages:

ISSN Vol.08,Issue.16, October-2016, Pages: ISSN 2348 2370 Vol.08,Issue.16, October-2016, Pages:3146-3152 www.ijatir.org Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation VEDIRE AJAYANI 1, K. TULASI 2, DR P. SUNITHA

More information

Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage: Theory and Implementation (Supplementary File)

Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage: Theory and Implementation (Supplementary File) 1 Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage: Theory and Implementation (Supplementary File) Henry C. H. Chen and Patrick P. C. Lee 1 ADDITIONAL RELATED WORK This section

More information

An Efficient Dynamic Proof of Retrievability (PoR) Scheme

An Efficient Dynamic Proof of Retrievability (PoR) Scheme An Efficient Dynamic Proof of Retrievability (PoR) Scheme Zhen Mo Yian Zhou Shigang Chen Department of Computer & Information Science & Engineering University of Florida, Gainesville, FL 32611, USA Abstract

More information

A Dynamic Proof of Retrievability (PoR) Scheme with O(logn) Complexity

A Dynamic Proof of Retrievability (PoR) Scheme with O(logn) Complexity A Dynamic Proof of Retrievability (PoR) Scheme with O(logn) Complexity Zhen Mo Yian Zhou Shigang Chen Department of Computer & Information Science & Engineering University of Florida, Gainesville, FL 32611,

More information

International Journal of Advance Engineering and Research Development

International Journal of Advance Engineering and Research Development Scientific Journal of Impact Factor (SJIF): 3.134 International Journal of Advance Engineering and Research Development Volume 3, Issue 2, February -2016 e-issn (O): 2348-4470 p-issn (P): 2348-6406 Enabling

More information

SECURING DISTRIBUTED ACCOUNTABILITY FOR DATA SHARING IN CLOUD COMPUTING

SECURING DISTRIBUTED ACCOUNTABILITY FOR DATA SHARING IN CLOUD COMPUTING SECURING DISTRIBUTED ACCOUNTABILITY FOR DATA SHARING IN CLOUD COMPUTING N. RAMESH 1, D. ANIL M.E 2, M. KIRAN 3 1, M.TECH Scholar, VEC, Kavali 2, Assistant Professor, VEC, Kavali 3, Assistant Professor,

More information

Enabling Efficiency in Data Dynamics for Storage Security in Cloud Computing

Enabling Efficiency in Data Dynamics for Storage Security in Cloud Computing Enabling Efficiency in Data Dynamics for Storage Security in Cloud Computing K.Gayathri 1, P.Umamaheswari 2, P.Senthilkumar 3 Assistant Professor, Anna University, Tamilnadu, India 1,2 Assistant Professor,

More information

Public Verifiability of Stored Data in Cloud using Disassembly of Data Segment

Public Verifiability of Stored Data in Cloud using Disassembly of Data Segment Public Verifiability of Stored Data in Cloud using Disassembly of Data Segment Adhikrao.Y.Jadhav Department of Computer Science & Engg. Sachin P. Patil Department of Information Technology, Annasaheb Dange

More information

Scalability Services in Cloud Computing Using Eyeos

Scalability Services in Cloud Computing Using Eyeos Journal of Computer Science Original Research Paper Scalability Services in Cloud Computing Using Eyeos 1 Deivendran, P. and 2 E.R. Naganathan 1 Manonmaniam Sundaranar University, Tirunelveli, India 2

More information

PERFORMANCE OF CLOUD DATA INTEGRITY PROOFS IN CLOUD STORAGE SYSTEM USING CRYPTOGRAPHIC KEY

PERFORMANCE OF CLOUD DATA INTEGRITY PROOFS IN CLOUD STORAGE SYSTEM USING CRYPTOGRAPHIC KEY PERFORMANCE OF CLOUD DATA INTEGRITY PROOFS IN CLOUD STORAGE SYSTEM USING CRYPTOGRAPHIC KEY B.M.RAJESH 1 Asst Prof, Department of Information Technology, SNMV College of Arts and Science, Tamil Nadu, India

More information

Fine-Grained Data Updates on Cloud with Authorized Public Auditing

Fine-Grained Data Updates on Cloud with Authorized Public Auditing IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 03, 2015 ISSN (online): 2321-0613 Fine-Grained Data Updates on Cloud with Authorized Public Auditing Sindhu L 1 Ms Leelavathi

More information

MANAGING OF CLOUD STORAGE AUDITING FOR DATA INTEGRITY

MANAGING OF CLOUD STORAGE AUDITING FOR DATA INTEGRITY MANAGING OF CLOUD STORAGE AUDITING FOR DATA INTEGRITY GARNEPALLI MOUNIKA 1, N.SANTHOSH RAMCHANDER 2 M. Tech Student, CSE, SVS Group of Institutions, Warangal, TS 1 M.Tech (Ph.D) Assoc. Prof, CSE Dept,

More information

IMPROVING DATA DYNAMICS AND STORAGE SECURITY IN CLOUD COMPUTING

IMPROVING DATA DYNAMICS AND STORAGE SECURITY IN CLOUD COMPUTING International Journal of Advancements in Research & Technology, Volume 2, Issue4, April 2013 327 IMPROVING DATA DYNAMICS AND STORAGE SECURITY IN CLOUD COMPUTING Badi Alekhya Department of CSE T.J.S Engineering

More information

Dec-2017, Issue- V-5, I-8, SW-03 ISSN (Online) ISSN (Print)

Dec-2017, Issue- V-5, I-8, SW-03 ISSN (Online) ISSN (Print) IJDCST @ Dec-2017, Issue- V-5, I-8, SW-03 ISSN-2320-7884 (Online) ISSN-2321-0257 (Print) Dynamic and Public Open Examination with Reasonable Mediation for Cloud Information A.Swathi 1, G. Shameshwari 2

More information

AES and DES Using Secure and Dynamic Data Storage in Cloud

AES and DES Using Secure and Dynamic Data Storage in Cloud Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,

More information

Remote Data Checking for Network Codingbased. Distributed Storage Systems

Remote Data Checking for Network Codingbased. Distributed Storage Systems CCSW 0 Remote Data Checking for Network Coding-based Bo Chen, Reza Curtmola, Giuseppe Ateniese, Randal Burns New Jersey Institute of Technology Johns Hopkins University Motivation Cloud storage can release

More information

On the Security of a Lightweight Cloud Data Auditing Scheme

On the Security of a Lightweight Cloud Data Auditing Scheme On the Security of a Lightweight Cloud Data Auditing Scheme Reyhaneh Rabaninead a, Maryam Raabzadeh Asaar b, Mahmoud Ahmadian Attari a, Mohammad Reza Aref c a Department of Electrical Engineering, K. N.

More information

A Secured Public Auditing for Regenerating-Code-Based Cloud Storage

A Secured Public Auditing for Regenerating-Code-Based Cloud Storage P P A Secured Public Auditing for Regenerating-Code-Based Cloud Storage 1 Miss. Nirupamashree CP 1 2 P, Mrs. Pushpa RP PG Student, Department of Computer Science and Engineering, PAssistentProfessor, Department

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 4, Jul Aug 2017

International Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 4, Jul Aug 2017 RESEARCH ARTICLE A Survey on Data Integrity Auditing Schemes in Cloud Computing Purnima [1], Deepak Kumar Verma [2] Student of MTech. [1] Computer Science Department [2] IEC College of Engineering and

More information

Potential and Public Auditing with Fair Interposition for Cloud Data

Potential and Public Auditing with Fair Interposition for Cloud Data Potential and Public Auditing with Fair Interposition for Cloud Data Mrs. R. Lakshmi 1 M.Sc.,M.Phil., Assistant Prof,Mangayarkarasi College of Arts&science for Women R.Kalaiselvi 2, B.Nandhini 3, K.Meenakshi

More information

Provable Dynamic Data Possession by Datalog Rules

Provable Dynamic Data Possession by Datalog Rules 958 JOURNAL OF SOFTWARE, VOL. 9, NO. 4, APRIL 2014 Provable Dynamic Data Possession by Datalog Rules Jing Lu School of Optical Electrical and Computing Engineering University of Shanghai for Science and

More information

ABSTRACT. Keywords: Cloud Storage, Regenerating Code, Public Auditing, Dynamic Auditing, Privacy Preserving, Proxy I. INTRODUCTION

ABSTRACT. Keywords: Cloud Storage, Regenerating Code, Public Auditing, Dynamic Auditing, Privacy Preserving, Proxy I. INTRODUCTION 216 IJSRSET Volume 2 Issue 4 Print ISSN : 2395-199 Online ISSN : 2394-499 Themed Section: Engineering and Technology Privacy Preserving and Dynamic Auditing for Outsourced Storages in Cloud Satish Shelar*,

More information

HLA BASED THIRD PARTY AUDITING FOR SECURE CLOUD STORAGE

HLA BASED THIRD PARTY AUDITING FOR SECURE CLOUD STORAGE HLA BASED THIRD PARTY AUDITING FOR SECURE CLOUD STORAGE Mr. N.R. Rejin Paul Assistant Professor, Department of Computer Science and Engineering, Velammal Institute of Technology, Chennai, Tamilnadu, India.

More information

Vijayawada, Andhrapradesh, India 2 Dhanekula Institute of Engineering & Technology, Ganguru, Vijayawada, Andhrapradesh, India

Vijayawada, Andhrapradesh, India 2 Dhanekula Institute of Engineering & Technology, Ganguru, Vijayawada, Andhrapradesh, India Volume 4, Issue 10, October 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Privacy-Process

More information

ABSTRACT. Keywords: Cloud Computing, Storage, Authentication,Third Party Author, Encryption & Blocks.

ABSTRACT. Keywords: Cloud Computing, Storage, Authentication,Third Party Author, Encryption & Blocks. P P IJISET - International Journal of Innovative Science, Engineering & Technology, Vol. 3 Issue 8, August 2016 Secure User Data Using Encryption for Preserving Private Data in Cloud 1, 3 1 3 M Purnachandra

More information

EFFICIENT DATA SHARING WITH ATTRIBUTE REVOCATION FOR CLOUD STORAGE

EFFICIENT DATA SHARING WITH ATTRIBUTE REVOCATION FOR CLOUD STORAGE EFFICIENT DATA SHARING WITH ATTRIBUTE REVOCATION FOR CLOUD STORAGE Chakali Sasirekha 1, K. Govardhan Reddy 2 1 M.Tech student, CSE, Kottam college of Engineering, Chinnatekuru(V),Kurnool,Andhra Pradesh,

More information

Attribute Based Encryption with Privacy Protection in Clouds

Attribute Based Encryption with Privacy Protection in Clouds Attribute Based Encryption with Privacy Protection in Clouds Geetanjali. M 1, Saravanan. N 2 PG Student, Department of Information Technology, K.S.R College of Engineering, Tiruchengode, Tamilnadu, India

More information

THIRD PARTY AUDITING FOR SECURE DATA STORAGE IN CLOUD THROUGH DIGITAL SIGNATURE USING RSA

THIRD PARTY AUDITING FOR SECURE DATA STORAGE IN CLOUD THROUGH DIGITAL SIGNATURE USING RSA THIRD PARTY AUDITING FOR SECURE DATA STORAGE IN CLOUD THROUGH DIGITAL SIGNATURE USING RSA ABSTRACT K.Govinda #1, V.Gurunathaprasad #2, H.Sathishkumar #3 Cloud computing is the way of providing computing

More information

Secure Evaluation of Public Auditing For Personal and Shared Data with Efficient User Revocation in Cloud Computing

Secure Evaluation of Public Auditing For Personal and Shared Data with Efficient User Revocation in Cloud Computing Secure Evaluation of Public Auditing For Personal and Shared Data with Efficient User Revocation in Cloud Computing Chinta Mounika M.Tech Student, Department of Computer Science and Engineering, B.V.C

More information

THIRD PARTY AUDITING FOR CLOUD STORAGE

THIRD PARTY AUDITING FOR CLOUD STORAGE Int. J. Engg. Res. & Sci. & Tech. 2015 Kedar Jayesh Rasal and Sandip A Kahate, 2015 Research Paper ISSN 2319-5991 www.ijerst.com Vol. 4, No. 2, May 2015 2015 IJERST. All Rights Reserved THIRD PARTY AUDITING

More information

Enhancing Reliability and Scalability in Dynamic Group System Using Three Level Security Mechanisms

Enhancing Reliability and Scalability in Dynamic Group System Using Three Level Security Mechanisms Enhancing Reliability and Scalability in Dynamic Group System Using Three Level Security Mechanisms A.Sarika*1, Smt.J.Raghaveni*2 M.Tech Student, Dept of CSE, S.R.K.R Engineering college, Bhimavaram, AP,

More information

Privacy Preserving Public Auditing in Secured Cloud Storage Using Block Authentication Code

Privacy Preserving Public Auditing in Secured Cloud Storage Using Block Authentication Code Privacy Preserving Public Auditing in Secured Cloud Storage Using Block Authentication Code Sajeev V 1, Gowthamani R 2 Department of Computer Science, Nehru Institute of Technology, Coimbatore, India 1,

More information

HLA Based Third Party Auditing For Secure Cloud Storage

HLA Based Third Party Auditing For Secure Cloud Storage HLA Based Third Party Auditing For Secure Cloud Storage Chandinee Saraswathy K., Keerthi D., Padma G. Student, Department of Computer Science and Engineering Velammal Institute of Technology, Panchetti

More information

Improved Third Party Auditing Approach For Shared Data In The Cloud With Efficient Revocation Of User

Improved Third Party Auditing Approach For Shared Data In The Cloud With Efficient Revocation Of User Improved Third Party Auditing Approach For Shared Data In The Cloud With Efficient Revocation Of User Miss Madhuri Kulkarni PG Student, Dept. Of Computer Engineering, Alard Collage of Engineering and Management,

More information

Store, Forget & Check: Using Algebraic Signatures to Check Remotely Administered Storage

Store, Forget & Check: Using Algebraic Signatures to Check Remotely Administered Storage Store, Forget & Check: Using Algebraic Signatures to Check Remotely Administered Storage Ethan L. Miller & Thomas J. E. Schwarz Storage Systems Research Center University of California, Santa Cruz What

More information

A Result Analysis on Privacy-Preserving Public Auditing System of Data Storage Security in Cloud Computing through Trusted TPA

A Result Analysis on Privacy-Preserving Public Auditing System of Data Storage Security in Cloud Computing through Trusted TPA A Result Analysis on Privacy-Preserving Public Auditing System of Data Storage Security in Cloud Computing through Trusted TPA Nupoor M. Yawale, Prof. V. B. Gadicha # M.E. Second year CSE P R Patil COET,

More information

Efficient integrity verification of replicated data in cloud

Efficient integrity verification of replicated data in cloud Scholars' Mine Masters Theses Student Research & Creative Works Fall 2013 Efficient integrity verification of replicated data in cloud Raghul Mukundan Follow this and additional works at: http://scholarsmine.mst.edu/masters_theses

More information

Robust Remote Data Checking

Robust Remote Data Checking Robust Remote Data Checing Reza Curtmola Department of Computer Science New Jersey Institute of Technology Newar, NJ crix@njit.edu Osama Khan Randal Burns Department of Computer Science Johns Hopins University

More information

Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing

Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing IEEE INFOCOM 2010, San Diego, CA, March 2010 Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing Cong Wang 1, Qian Wang 1, Kui Ren 1, and Wenjing Lou 2 1 Illinois Institute

More information

Efficient integrity checking technique for securing client data in cloud computing

Efficient integrity checking technique for securing client data in cloud computing International Journal of Electrical & Computer Sciences IJECS-IJENS Vol: 11 No: 05 43 Efficient integrity checking technique for securing client data in cloud computing Dalia Attas and Omar Batrafi Computer

More information

A Survey on Cloud Computing Storage and Security

A Survey on Cloud Computing Storage and Security Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 1, January 2015,

More information

Proofs of Retrievability: Theory and Implementation

Proofs of Retrievability: Theory and Implementation Proofs of Retrievability: Theory and Implementation Kevin D. Bowers, Ari Juels, and Alina Oprea RSA Laboratories, Cambridge, MA ABSTRACT A proof of retrievability (POR) is a compact proof by a file system

More information

A compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems.

A compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems. A compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems. G Swetha M.Tech Student Dr.N.Chandra Sekhar Reddy Professor & HoD U V N Rajesh Assistant Professor Abstract Cryptography

More information

Auditing-as-a-Service for Cloud Storage

Auditing-as-a-Service for Cloud Storage Auditing-as-a-Service for Cloud Storage Alshaimaa Abo-alian, N. L. Badr, M. F. Tolba, Faculty of Information and Computer Sciences, Ain shams University, Cairo, Egypt shimo.fcis83@gmail.com, dr.nagwabadr@gmail.com,

More information

Public Auditing on Shared Data in the Cloud Using Ring Signature Mechanism

Public Auditing on Shared Data in the Cloud Using Ring Signature Mechanism Public Auditing on Shared Data in the Cloud Using Ring Signature Mechanism MS. Gayatri D Patwardhan Prof.B. W. Balkhande Abstract: Cloud computing is the long dreamed vision of computing as a utility,

More information

Third Party Auditing (TPA) For Secure Cloud Storage With Secret Sharing Algorithm. SHEETAL THITE[1], M TECH,Computer Engineering, BVDUCOE, Pune,india

Third Party Auditing (TPA) For Secure Cloud Storage With Secret Sharing Algorithm. SHEETAL THITE[1], M TECH,Computer Engineering, BVDUCOE, Pune,india , Impact Factor- 5.343 Third Party Auditing (TPA) For Secure Cloud Storage With Secret Sharing Algorithm SHEETAL THITE[1], M TECH,Computer Engineering, BVDUCOE, Pune,india Prof. S.S.DHOTRE Associate Professor,Department

More information

Data Integrity Protection scheme for Minimum Storage Regenerating Codes in Multiple Cloud Environment

Data Integrity Protection scheme for Minimum Storage Regenerating Codes in Multiple Cloud Environment International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Data Integrity Protection scheme for Minimum Storage Regenerating Codes in Multiple Cloud Environment Saravana

More information

A DYNAMIC APPROACH TO CLOUD COMPUTING SECURITY OVER CLOUD OF CLOUDS

A DYNAMIC APPROACH TO CLOUD COMPUTING SECURITY OVER CLOUD OF CLOUDS A DYNAMIC APPROACH TO CLOUD COMPUTING SECURITY OVER CLOUD OF CLOUDS B. MURALI KRISHNA 1, MD. SHAKEEL AHMAD 2 1, M.TECH Scholar, PBRVITS, Kavali 2, Associate Professor, PBRVITS, Kavali ABSTRACT: The convention

More information

Identifying Misuse of Data In Cloud

Identifying Misuse of Data In Cloud Identifying Misuse of Data In Cloud K.S.R. Chaitanya #1, T.Rajendra Prasad *2, # Department of IT, Kakinada Institute of Engineering and Technology korangi,ap,india 1 ksaichaitanya007@gmail.com 2 rajendraprasad.tanukula@gmail.com

More information

A Review on Remote Data Auditing in Cloud Computing

A Review on Remote Data Auditing in Cloud Computing A Review on Remote Data Auditing in Cloud Computing [1] Arjun U, [2] Vinay S [1] Asst. Professor, [2] Professor [1] Dept. of ISE, PESITM Shivamogga, [2] Dept. of CSE, PESCE, Mandya Abstract: Cloud computing

More information

Implementation of Decentralized Access Control with Anonymous Authentication in Cloud

Implementation of Decentralized Access Control with Anonymous Authentication in Cloud Volume-5, Issue-6, December-2015 International Journal of Engineering and Management Research Page Number: 210-214 Implementation of Decentralized Access Control with Anonymous Authentication in Cloud

More information

Accountability in Distributed Environment For Data Sharing in the Cloud

Accountability in Distributed Environment For Data Sharing in the Cloud Accountability in Distributed Environment For Data Sharing in the Cloud K.Neeraja B.Savitha Reddy D. Rajani JNTU Hyderabad JNTU Hyderabad JNTU Hyderabad Hyderabad, India Hyderabad, India Hyderabad, India

More information

Result Paper on Public Auditing by using KERBEROS to Secure Cloud Storage

Result Paper on Public Auditing by using KERBEROS to Secure Cloud Storage Result Paper on Public Auditing by using KERBEROS to Secure Cloud Storage Ved M. Kshirsagar, Prof. V.S.Gulhane Information Technology, Computer Science, SGBAU University Amravati, Maharashtra, India Abstract

More information

System Approach for Single Keyword Search for Encrypted data files Guarantees in Public Infrastructure Clouds

System Approach for Single Keyword Search for Encrypted data files Guarantees in Public Infrastructure Clouds System Approach for Single Keyword Search for Encrypted data files Guarantees in Public Infrastructure s B.Nandan 1, M.Haripriya 2, N.Tejaswi 3, N. Sai Kishore 4 Associate Professor, Department of CSE,

More information

An Efficient Provable Data Possession Scheme based on Counting Bloom Filter for Dynamic Data in the Cloud Storage

An Efficient Provable Data Possession Scheme based on Counting Bloom Filter for Dynamic Data in the Cloud Storage , pp. 9-16 http://dx.doi.org/10.14257/ijmue.2016.11.4.02 An Efficient Provable Data Possession Scheme based on Counting Bloom Filter for Dynamic Data in the Cloud Storage Eunmi Jung 1 and Junho Jeong 2

More information

ROBUST AND ANONYMOUS AUTHENTICATION OF DATA STORED IN CLOUDS WITH DECENTRALIZED ACCESS CONTROL

ROBUST AND ANONYMOUS AUTHENTICATION OF DATA STORED IN CLOUDS WITH DECENTRALIZED ACCESS CONTROL ROBUST AND ANONYMOUS AUTHENTICATION OF DATA STORED IN CLOUDS WITH DECENTRALIZED ACCESS CONTROL S.Vijaya Madhavi 1, G.Rama Subba Reddy 2 1 M.tech Scholar (CSE), 2 Headof Department (CSE), Vignana Bharathi

More information

International Journal of Advance Research in Engineering, Science & Technology

International Journal of Advance Research in Engineering, Science & Technology Impact Factor (SJIF): 5.302 International Journal of Advance Research in Engineering, Science & Technology e-issn: 2393-9877, p-issn: 2394-2444 Volume 5, Issue 3, March-2018 Key Aggregate Tagged File Searching(KATFS)

More information

Cloud Computing Security from Single to Multi-Clouds

Cloud Computing Security from Single to Multi-Clouds Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 2, Issue. 10, October 2013,

More information

A Methodology for Assigning Access Control to Public Clouds

A Methodology for Assigning Access Control to Public Clouds Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 12, December 2014,

More information

Secure Data De-Duplication With Dynamic Ownership Management In Cloud Storage

Secure Data De-Duplication With Dynamic Ownership Management In Cloud Storage Secure Data De-Duplication With Dynamic Ownership Management In Cloud Storage 1 A. Sumathi, PG Scholar, Department Of Computer Science And Engineering, Maha Barathi Engineering College, Chinna Salem, Villupuram,

More information

Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage: Theory and Implementation

Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage: Theory and Implementation 1 Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage: Theory and Implementation Henry C. H. Chen and Patrick P. C. Lee Abstract To protect outsourced data in cloud storage against

More information

SDD: A Novel Technique for Enhancing Cloud Security with Self Destructing Data

SDD: A Novel Technique for Enhancing Cloud Security with Self Destructing Data SDD: A Novel Technique for Enhancing Cloud Security with Self Destructing Data Kishore K, Ramchand V M.Tech Student, Dept. of CSE, The Oxford College Of Engineering, Bangalore, India Associate Professor,

More information

S. Indirakumari, A. Thilagavathy

S. Indirakumari, A. Thilagavathy International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 2 ISSN : 2456-3307 A Secure Verifiable Storage Deduplication Scheme

More information

International Journal of Advance Engineering and Research Development. Carefree Data Access Solution for Public Cloud Storage

International Journal of Advance Engineering and Research Development. Carefree Data Access Solution for Public Cloud Storage Scientific Journal of Impact Factor (SJIF): 4.14 International Journal of Advance Engineering and Research Development Volume 3, Issue 3, March -2016 Carefree Data Access Solution for Public Cloud Storage

More information

International Journal of Informative & Futuristic Research

International Journal of Informative & Futuristic Research International Journal of Informative & Futuristic Research www.ijifr.com Volume 6 Issue 2 October 2018 ISSN : 2347-1697 REVIEW OF AUTHORIZED AUDITING OF DYNAMIC BIG-DATA ON CLOUD Paper ID IJIFR/V6/ E2/

More information

A LTERATURE SURVEY ON REVOCABLE MULTIAUTHORITY CIPHER TEXT-POLICY ATTRIBUTE-BASED ENCRYPTION (CP-ABE) SCHEME FOR CLOUD STORAGE

A LTERATURE SURVEY ON REVOCABLE MULTIAUTHORITY CIPHER TEXT-POLICY ATTRIBUTE-BASED ENCRYPTION (CP-ABE) SCHEME FOR CLOUD STORAGE A LTERATURE SURVEY ON REVOCABLE MULTIAUTHORITY CIPHER TEXT-POLICY ATTRIBUTE-BASED ENCRYPTION (CP-ABE) SCHEME FOR CLOUD STORAGE Vinoth Kumar P, Dr.P.D.R. Vijaya Kumar 1 PG Student, INFO Institute of Engineering,

More information

A Comparative Analysis of Provable Data Possession Schemes in Cloud

A Comparative Analysis of Provable Data Possession Schemes in Cloud A Comparative Analysis of Provable Data Possession Schemes in Cloud Pooja Natu #, Prof. Shikha Pachouly * # PG scholar AISSMS COE, Department of Computer Engineering, Savitribai Phule Pune University,

More information

Provable ownership of files in deduplication cloud storage

Provable ownership of files in deduplication cloud storage SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks 2015; 8:2457 2468 Published online 19 July 2013 in Wiley Online Library (wileyonlinelibrary.com)..784 SPECIAL ISSUE PAPER Provable ownership

More information

DYNAMIC AGGREGATE KEY GENERATOR FOR CLOUD COMPUTING

DYNAMIC AGGREGATE KEY GENERATOR FOR CLOUD COMPUTING DYNAMIC AGGREGATE KEY GENERATOR FOR CLOUD COMPUTING Deepika Patil, Ashish Modak, Swagnik Das, Arshi Akab Abstract Cloud storage enables users to remotely store their data and enjoy the on-demand high quality

More information

Efficient Information Retrieval for Ranked Queries in Cost-Effective Cloud Environments

Efficient Information Retrieval for Ranked Queries in Cost-Effective Cloud Environments Efficient Information Retrieval for Ranked Queries in Cost-Effective Cloud Environments Qin Liu, Chiu C. Tan, Jie Wu, and Guojun Wang School of Information Science and Engineering, Central South University,

More information