International Journal of Advance Research in Engineering, Science & Technology. Deduplication & Proof Of Storage with Data Dynamic Operation

Size: px
Start display at page:

Download "International Journal of Advance Research in Engineering, Science & Technology. Deduplication & Proof Of Storage with Data Dynamic Operation"

Transcription

1 Impact Factor (SJIF): International Journal of Advance Research in Engineering, Science & Technology e-issn: , p-issn: Volume 5, Issue 7, July-2018 Deduplication & Proof Of Storage with Data Dynamic Operation Heena A. Sattar Gangrekar 1, Prof. A. W. Kiwlekar 2 1 Department of Computer Engineering, Dr. Babashaheb Ambedkar Technological University Lonere, Raigad. Maharashtra, India 2 Department of Computer Engineering, Dr. Babashaheb Ambedkar Technological University Lonere, Raigad. Maharashtra, India Abstract Data deduplication is nothing just Information pressure approach which is made utilization of evacuate the repeat duplicates of copying data. This methodology is frequently made utilization of bringing down the capacity zone and in addition save transmission limit under web server. Dynamic Proof of Storage (PoS) is a valuable cryptographic crude that enables a client to look at the trustworthiness of outsourced information and in addition to effectively update the information in a web server. Despite the fact that researchers have really suggested a few dynamic PoS frameworks in single-client settings, the issue in multiclient settings has really not been analyzed totally. A sensible multi-client distributed storage space framework requires the ensured customer side cross-client deduplication system, which allows a person to miss the posting technique and also obtain the responsibility for information immediately, when different proprietors of the extremely same information have really submitted them to the web server. In this present the possibility of deduplicatable dynamic confirmation of capacity and also prescribe a viable working, to achieve dynamic PoS and also secured cross-client deduplication, in the meantime. In this undertaking exist the licensed data deduplication to secure the data assurance by comprising of advantages benefits or highlight of people in the duplicate check. Different new deduplication structures accommodated managing authorize reproduce check. INTRODUCTION The present cloud arrangement suppliers offer each incredibly gave capacity and extraordinarily parallel figuring sources at moderately ease. One vital trouble of distributed storage arrangements is that the organization of the regularly expanding amount of understanding [1]. To acquire understanding organization ascendable in distributed computing, deduplication has really been an outstanding system and in addition has really gotten additional and furthermore additional concentration recently. Data deduplication may be a specific data pressure procedure for expelling recreate duplicates of continuation data away space. The system is utilized to enhance storage room utilization and furthermore may likewise be identified with arrange data exchange to decrease the amount of bytes that should be conveyed as opposed to looking after information Guide Name PC Engineering School Name Pune, India copies with an equivalent substance, deduplication expels redundant information by keeping up essentially one physical copy and also alluding different dreary data to it copy. Deduplication will positively occur at either the document level or the square level. For filelevel deduplication, it expels imitate duplicates of an equivalent document. Deduplication could likewise occur at the square level, that evacuates imitate pieces of data that occur in non-indistinguishable files[2]. Data security is only a standout amongst the most fundamental private properties when an individual outsources its information to distributed storage space. People must be supported that the information spared in the web 25

2 server are not interfered. Regular procedures for securing data dependability, for example, message validation codes (MACs) and additionally advanced marks, require people to download each one of the records from the web server for affirmation, which manages a substantial connection price[3]. These systems are not proper for distributed storage space arrangements where people may look at the strength frequently, for example, consistently [4]. Hence, researchers displayed Proof of Storage PoS) [5] for inspecting the security without downloading information from the web server. Furthermore, people may moreover require various dynamic tasks, for example, change, addition, and in addition cancellation, to redesign their information, while keeping the capacity of PoS. Dynamic PoS [6] is recommended for such unique activities. In such a certify deduplication framework, every individual is given element all through framework introduction. Every datum presented on the cloud is moreover limited by ascribe to characterize which sort of people is allowed to execute the repeat check and additionally access the information. Before sending his repeat check ask for a few information, the individual needs to take this information and in addition characteristics with information as sources of info. The individual can find an imitate for this information if and just if there is a copy of this information and a coordinated property spared in cloud. I. PROBLEM STATEMENT For Higher settled quality, especially in authentic capacity framework where data are essential and should be spared over long-lasting periods in deduplication framework and conveyed stockpiling framework which is in multi-client conditions has not been explored adequately II. LITERATURE REVIEW 1. Title : Proofs of Ownership in Remote Storage Systems Author:- Shai Halevi, Danny Harnik, Benny Pinkas, Alexandra Shulman-Peleg. Distributed storage space frameworks are coming to be altogether favored. An empowering development that keeps up their cost down is deduplication, which stores only a solitary copy of rehashing data. Customer side deduplication endeavors to decide deduplication risks presently at the customer and also preserve the transmission limit of submitting copies of existing information to the server. In this work decide assaults that make utilization of customer side deduplication, allowing an assailant to get to subjective size information of different people in light of an amazingly little hash marks of these information. Additional particularly, an aggressor that perceives the hash mark of an information could empower the storage room benefit that it has that information, in this manner the web server permits the assailant download the entire information. To get over such assaults, display the idea of verifications of proprietorship (PoWs), which permits a customer adequately show to a web server that the customer holds an information, rather than just some short insights about it. In this characterize confirmation of-possession, under broad security implications, and additionally broad proficiency needs of Petabyte go storage room frameworks. After that current arrangements in view of Merkle trees and additionally specific encodings, and also look at their security. In this executed one variant of the arrangement. Our productivity measurements demonstrate that the framework acquires only a little costs contrasted and credulous customer side deduplication. 2. Title : Reclaiming Space from Duplicate Files in a Serverless Distributed File System Author:- John R. Douceur, Atul Adya William, J. Bolosky Dan, Simon Marvin Theimer The Farsite scattered information framework offers availability by copying every datum into a few PC. Given that this duplication takes in extensive capacity territory ; it is basic to recuperate already possessed space where practical. Estimation of more than 500 work area information frameworks uncovers that just about 50% of all taken in region is occupied by reproduce information. In this give a framework to recuperate territory from this accidental replication to procure it offered for directed information replication. Our framework comprises of 1) concurrent encryption, which permits reproduce information to coordinated into the space of a record, likewise if the information are encoded with different people keys, and in addition 2) SALAD, a SelfArranging, Lossy, Associative Database for aggregating information content and also area points of interest in a decentralized, adaptable, blame tolerant way. Huge reproduction tests uncover that the copy document mixing framework is adaptable, greatly effective, and also blame tolerant. 3. Title : Message-Locked Proofs of Retrievability with Secure Deduplication Author:- Dimitrios Vasilopoulos, Melek Önen, Kaoutar Elkhiyaoui, Refik Molva 26

3 This paper manages the issue of information retrievability in distributed computing frameworks executing deduplication to improve their space reserve funds: While there exist an assortment of verification of retrievability (PoR) arrangements that guarantee stockpiling precision with cryptographic techniques, these administrations however accompany probabilities with the deduplication advancement. To determine evidences of retrievability with record based crossuser deduplication, propose the message-bolted PoR methodology whereby the PoR result on imitate data is measures up to and in addition relies on the estimation of the information fragment, just. As a proof of thought, characterize two instantiations of existing PoRs and in addition demonstrate that the essential development is done amid the course of action organize wherein both the keying item and additionally the encoded adaptation of the to-be-outsourced information is figured in view of the information itself. Besides recommend another server-supported message-bolted key age system that contrasted with related work gives better security ensures. 4. Title:- Boosting Efficiency and Security in Proof of Ownership for Deduplication Author:- Roberto Di Pietro, Alessandro Sorniotti Deduplication is a system used to limit the amount of capacity required by specialist organizations. It depends on the intuition that various clients should need to spare extremely same substance. In this manner, sparing a solitary copy of these information is adequate. But simple in principle, the execution of this thought displays heaps of security dangers. In this paper manage the most genuine one: an enemy, show a novel Proof of Ownership (POW) arrange for that has all characteristics of the propelled arrangement while supporting only a bit of the above experienced by the contender; second, the security of the recommended frameworks relies upon subtle elements scholastic rather than computational assumptions; furthermore propose down to earth enhancement procedures that better enhance the framework's effectiveness. In conclusion, the nature of our proposition is managed by generous seat stamping. III. EXISTING SYSTEM Notwithstanding the way that deduplication methodology can save the capacity for the dispersed stockpiling specialist co-op, it diminishes the enduring nature of the framework. Deduplication framework and disseminated stockpiling framework are normal by customers and applications for higher relentless quality, especially in recorded capacity framework where data are fundamental and should be spared over prolonged stretch of time periods. IV. ALGORITHM MD5 (Message-Digest algorithm 5): is a widely used cryptographic function with a 128- bit hash value. MD5 has been employed in a wide variety of security applications, and is also commonly used to check the integrity of files. An MD5 hash is typically expressed as a 32-digit hexadecimal number. 1.1 ALGORITHM:-MD5 processes a variable-length message into a fixed-length output of 128 bits. 1.2 STEPS: 1.The input message is broken up into chunks of 512-bit blocks (sixteen 32-bit little endian integers),the message is padded so that its length is divisible by The padding works as follows: first a single bit, 1, is appended to the end of the message. 3.This is followed by as many zeros as are required to bring the length of the message up to 64 bits fewer than a multiple of The remaining bits are filled up with a 64-bit integer representing the length of the original message, in bits. 5.The MD5 algorithm uses 4 state variables, each of which is a 32 bit integer (an unsigned long on most systems). These variables are sliced and diced and are (eventually) the message digest. The variables are initialized as follows: A = 0x B = 0xEFCDAB89 C = 0x98BADCFE D = 0x Now on to the actual meat of the algorithm: the main part of the algorithm uses four functions to thoroughly goober the above state variables. Those functions are as follows: F(X,Y,Z) = (X & Y) (~(X) & Z) G(X,Y,Z) = (X & Z) (Y & ~(Z)) H(X,Y,Z) = X ^ Y ^ Z I(X,Y,Z) = Y ^ (X ~(Z)) Where &,, ^, and ~ are the bit-wise AND, OR, XOR, and NOT operators 27

4 7. These functions, using the state variables and the message as input, are used to transform the state variables from their initial state into what will become the message digest. For each 512 bits of the message, the rounds performed (this is only pseudo-code, don t try to compile it) After this step, the message digest is stored in the state variables (A, B, C, and D). To get it into the hexadecimal form you are used to seeing, output the hex values of each the state variables, least significant byte first. For example, if after the digest: A = 0x ; B = 0x89ABCDEF; C = 0x1337D00D D = 0xA Then the message digest would be: EFCDAB890DD A5 (required hash value of the input value). V.MATHEMATICAL MODEL Let S be the Whole system which consists, S= {I, P, O} Where, I-Input, P- Procedure, O- Outcome. I-{F,Q} F-File collection of {f1,f2,,fn} Q- Users Query{q1,q2,,qN} Procedure(P): Where : F = stands the file, e=encryption key. Step 1: Pre-process Stage In the pre-process Stage, e H(F), id H(e). After that, the individual introduces that it has a specific file through id. If the file does not exist, the individual enters into the upload stage. Otherwise, the individual enters into the deduplication stage. FileTag(File, Attribute) - It calculates SHA-1 hash of the File as well as Attribute as File Tag. Step 2 The Upload Stage Allow the file F = (m1,...,mn). The individual initially invokes the encoding according (C, T ) Encode(e, F) FileEncrypt(File) - It encrypts the File with Convergent Encryption making use of Hybrid AES-DES algorithm. FileUploadReq(FileID, File, Tag) It uploads the File Data to the Storage Web server if the file is Distinct as well as updates the File Tag saved. Step 3. The Deduplication Stage If a file introduced by an individual in the pre-process stage exists in the cloud web server, the individual enters into the deduplication stage as well as runs the deduplication method res {0, 1} Deduplicate{U(e, F), S(T)} DupCheckReq(Tag) - It demands the Storage web server for duplicate check of the file by sending out the file Tag. Step: 4 The Update Stage In this stage, an individual could randomly update the file, by invoking the update method res {(e *, (C *, T * )) } Update{U(e, ι, m, OP), S(C, T )} Insertion(Tag, File) It ask for insert the new data. Modification(Tag, File) It ask for modify the file that he is uploaded right into file that currently offered in cloud. Deletion(Tag, File) It ask for delete the file that currently offered in cloud. Step 5: The Proof of Storage Stage At any moment, individuals could enter into the proof of storage stage if they have the ownerships of the files. The individuals as well as the cloud web server run the checking method. res {0, 1} Check{S(C, T ), U(e)} Step 6: Access Stage When each file uploaded to the cloud is additionally bounded by a privilege or attribute to define which type of individuals is permitted to execute the replicate check as well as access the files. 28

5 ShareFileReq(File, Attribute) - It demands the Storage web server to create the Share File with the File Tag as well as Target Sharing Attribute. Output(O): Individual could upload, download, update as well as access file with attribute on cloud web server as well as offer data deduplication. ARCHITECTURE DIAGRAM OF SYSTEM Figure 4.2. Architecture diagram Our framework configuration considers two sorts of elements: the cloud web server and in addition people, as showed in Figure.1 For each datum, unique client is the person that transferred the information to the cloud web server, while consequent client is the person that demonstrated the responsibility for information however did not by any stretch of the imagination transfer the information to the cloud web server. There are five phases in a deduplicatable dynamic PoS framework: pre-process, transfer, deduplication, refresh and additionally verification of capacity, get to. In the pre-process organize, people intend to transfer their neighborhood information. The cloud web server decides if these information must be transferred. On the off chance that the transfer system is given, go into the transfer organize; or the consequences will be severe, go into the deduplication arrange. In the transfer arrange, the information to be transferred with benefit or trait don't exist in the cloud web server. The underlying people encodes the neighborhood information and also transfer them to the cloud web server. In the deduplication organize, the information to be transferred as of now exist in the cloud web server. The ensuing people have the information locally and also the cloud web server stores the verified structures of the information. Ensuing people need to persuade the cloud web server that they have the information without transferring them to the cloud web server. In the refresh arrange, people may alter, embed, or erase the documents. From that point onward, they refresh the coordinating parts of the encoded documents and in addition the validated structures in the cloud web server, even the underlying records were not transferred alone. Remember that, people could refresh the documents just on the off chance that they have the possessions of the records. For each refresh, the cloud web server needs to hold the underlying document and also the verified system if there exist different proprietors, and record the refreshed piece of the document and additionally the confirmed structure. In the verification of capacity arrange, people simply have a little steady size metadata locally and they plan to analyze whether the information are reliably spared in the cloud web server without downloading them. The 29

6 information won't not be transferred by these people, in any case they pass the deduplication arrange and demonstrate that they have the possessions of the documents. In get to arrange, when each document transferred to the cloud is moreover limited by a benefit or credit to characterize which kind of people is allowed to execute the reproduce check and in addition get to the records. Preceding presenting his imitate check request some document, the individual needs to take this record and in addition benefit or quality as sources of info. The individual can find an imitate for this document if and only if there is a copy of this record and a coordinated benefit or characteristic spared in cloud. System Processors : Core2Duo Speed : 2.4 GHz Hard Disk : 150 GB HARDWARE REQUIREMENT V. ADVANTAGES The copy records are mapped with a solitary duplicate of the document by mapping with the current document in the cloud The far reaching necessities in multi-client distributed storage frameworks and presented the model of deduplicatable dynamic PoS. VI. RESULT ANALYSIS Table I: Performance of File Size with Time 10(KB) 50(KB) 100(KB) 200(KB) File Encryption Time File Decryption Time Tag Generation Fig : Graph of File Size with Time On this graph showing the time graph between various methods like encryption, decryption, tag generation. VII. CONCLUSION AND FUTURE SCOPE 30

7 In this proposed the broad requests in multi-client distributed storage frameworks and additionally displayed the plan of deduplicatable dynamic PoS. The hypothetical and in addition test results demonstrate that our Deduplicatable Dynamic Proof of Storage execution is compelling, particularly when the document estimate is large and also information dynamic activity is done on record and when each document transferred to the cloud is moreover limited by a benefit or credit to characterize which kind of people is allowed to execute the repeat check and in addition get to the documents. We besides offered a few new deduplication structures maintaining copy check tag of records are made by the cloud web server. ACKNOWLEDGMENT Authors want to acknowledge Principal, Head of department and guide of their project for all the support and help rendered. To express profound feeling of appreciation to their regarded guardians for giving the motivation required to the finishing of paper. REFERENCES [1] Kun He, Jing Chen, Ruiying Du, Qianhong Wu, Guoliang Xue, and Xiang Zhang DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments IEEE Transactions on Computer, Volume: 65, Issue: 12, pp , [2] J. Li, Y. K. Li, X. Chen, P. Lee, and W. Lou, A Hybrid Cloud Approach for Secure Authorized Deduplication, IEEE Transactions on Parallel and Distributed Systems, vol. 26, no. 5, pp ,2015. [3] Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, Provable data possession at untrusted stores, in Proc. of CCS, pp , [4] Ateniese, R. Di Pietro, L. V. Mancini, and G. Tsudik, Scalable and Efficient Provable Data Possession, in Proc. of SecureComm, pp. 1 10, [5] G. Ateniese, S. Kamara, and J. Katz, Proofs of storage from homomorphic identification protocols, in Proc. of ASIACRYPT,pp , [6] Erway, A. K upc u, C. Papamanthou, and R. Tamassia, Dynamic provable data possession, in Proc. of CCS, pp , [7] S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg, Proofs of ownership in remote storage systems, in Proc. of CCS, pp , [8] J. Douceur, A. Adya, W. Bolosky, P. Simon, and M. Theimer, Reclaiming space from duplicate files in a serverless distributed file system, in Proc. of ICDCS, pp , [9] J. Chen, L. Zhang, K. He, R. Du, and L. Wang, Message-locked proof of ownership and retrievability with remote reparing in cloud, Security and Communication Networks, [10] R. Di Pietro and A. Sorniotti, Boosting Efficiency and Security in Proof of Ownership for Deduplication, in Proc. of ASIACCS, pp , 2012 [11] J. Li, X. Chen, M. Li, J. Li, P. Lee, and W. Lou, Secure Deduplication with Efficient and Reliable Convergent Key Management, IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 6, pp ,

ISSN: [Shubhangi* et al., 6(8): August, 2017] Impact Factor: 4.116

ISSN: [Shubhangi* et al., 6(8): August, 2017] Impact Factor: 4.116 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY DE-DUPLICABLE EFFECTIVE VALIDATION of CAPACITY for DYNAMIC USER ENVIRONMENT Dr. Shubhangi D C *1 & Pooja 2 *1 HOD, Department

More information

Improving data integrity on cloud storage services

Improving data integrity on cloud storage services International Journal of Engineering Science Invention Volume 2 Issue 2 ǁ February. 2013 Improving data integrity on cloud storage services Miss. M.Sowparnika 1, Prof. R. Dheenadayalu 2 1 (Department of

More information

International Journal of Advance Engineering and Research Development IMPROVED RELIABILITY IN DISTRIBUTED DEDUPLICATION SYSTEMS

International Journal of Advance Engineering and Research Development IMPROVED RELIABILITY IN DISTRIBUTED DEDUPLICATION SYSTEMS Scientific Journal of Impact Factor (SJIF): 3.134 e-issn (O): 2348-4470 p-issn (P): 2348-6406 International Journal of Advance Engineering and Research Development Volume 3, Issue 2, February -2016 IMPROVED

More information

Survey Paper on Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud

Survey Paper on Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,

More information

DATA INTEGRITY TECHNIQUES IN CLOUD: AN ANALYSIS

DATA INTEGRITY TECHNIQUES IN CLOUD: AN ANALYSIS DATA INTEGRITY TECHNIQUES IN CLOUD: AN ANALYSIS 1 MS. R. K. PANDYA, 2 PROF. K. K. SUTARIA 1 M.E.[Cloud Computing] Student, Computer Engineering Department, V. V. P. Engineering College, Rajkot, Gujarat

More information

Secure Data De-Duplication With Dynamic Ownership Management In Cloud Storage

Secure Data De-Duplication With Dynamic Ownership Management In Cloud Storage Secure Data De-Duplication With Dynamic Ownership Management In Cloud Storage 1 A. Sumathi, PG Scholar, Department Of Computer Science And Engineering, Maha Barathi Engineering College, Chinna Salem, Villupuram,

More information

LOAD BALANCING AND DEDUPLICATION

LOAD BALANCING AND DEDUPLICATION LOAD BALANCING AND DEDUPLICATION Mr.Chinmay Chikode Mr.Mehadi Badri Mr.Mohit Sarai Ms.Kshitija Ubhe ABSTRACT Load Balancing is a method of distributing workload across multiple computing resources such

More information

SECURE DATA AUDITING WITH PROXY CODE REGENERATION IN CLOUD DATA DEDUPLICATION ENVIRONMENT

SECURE DATA AUDITING WITH PROXY CODE REGENERATION IN CLOUD DATA DEDUPLICATION ENVIRONMENT SECURE DATA AUDITING WITH PROXY CODE REGENERATION IN CLOUD DATA DEDUPLICATION ENVIRONMENT Miss. Arti L. Bairagi 1, Prof. P. M. Yawalkar 2 1 M.E. Student, Department of Computer Engineering, Savitribai

More information

Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage

Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage Dr.S.Masood Ahamed 1, N.Mounika 2, N.vasavi 3, M.Vinitha Reddy 4 HOD, Department of Computer Science & Engineering,, Guru Nanak

More information

A Simple Secure Auditing for Cloud Storage

A Simple Secure Auditing for Cloud Storage A Simple Secure Auditing for Cloud Storage Lee-Hur Shing Institute of Information Science Academia Sinica leehurs@iis.sinica.edu.tw Marn-Ling Shing University of Taipei Yu-Hsuan Yeh, Yan-Zhi Hu and Shih-Ci

More information

International Journal of Advance Engineering and Research Development. AN Optimal Matrix Approach for virtual load allocation and data sharing

International Journal of Advance Engineering and Research Development. AN Optimal Matrix Approach for virtual load allocation and data sharing Scientific Journal of Impact Factor (SJIF): 5.71 International Journal of Advance Engineering and Research Development Volume 5, Issue 02, February -2018 e-issn (O): 2348-4470 p-issn (P): 2348-6406 AN

More information

QUALITY OF SEVICE WITH DATA STORAGE SECURITY IN CLOUD COMPUTING

QUALITY OF SEVICE WITH DATA STORAGE SECURITY IN CLOUD COMPUTING QUALITY OF SEVICE WITH DATA STORAGE SECURITY IN CLOUD COMPUTING ABSTRACT G KALYANI 1* 1. M.Tech Student, Dept of CSE Indira Institute of Engineering and Technology, Markapur, AP. Cloud computing has been

More information

Decentralized Anonymous Authentication of Data Stored in Clouds Praveen.N, Krishna Kumar.P.R, Vinitha V Yadav

Decentralized Anonymous Authentication of Data Stored in Clouds Praveen.N, Krishna Kumar.P.R, Vinitha V Yadav Decentralized Anonymous Authentication of Data Stored in Clouds Praveen.N, Krishna Kumar.P.R, Vinitha V Yadav Abstract: Distributed computing is area that permits clients to store the information. Distributed

More information

DATA DEDUPLCATION AND MIGRATION USING LOAD REBALANCING APPROACH IN HDFS Pritee Patil 1, Nitin Pise 2,Sarika Bobde 3 1

DATA DEDUPLCATION AND MIGRATION USING LOAD REBALANCING APPROACH IN HDFS Pritee Patil 1, Nitin Pise 2,Sarika Bobde 3 1 DATA DEDUPLCATION AND MIGRATION USING LOAD REBALANCING APPROACH IN HDFS Pritee Patil 1, Nitin Pise 2,Sarika Bobde 3 1 Department of Computer Engineering 2 Department of Computer Engineering Maharashtra

More information

Fine-Grained Data Updates on Cloud with Authorized Public Auditing

Fine-Grained Data Updates on Cloud with Authorized Public Auditing IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 03, 2015 ISSN (online): 2321-0613 Fine-Grained Data Updates on Cloud with Authorized Public Auditing Sindhu L 1 Ms Leelavathi

More information

Secure Auditing For Outsourced Data in Cloud Using Homomorphic Token and Erasure Code

Secure Auditing For Outsourced Data in Cloud Using Homomorphic Token and Erasure Code Secure Auditing For Outsourced Data in Cloud Using Homomorphic Token and Erasure Code N.S. Monalisa Devi 1, T. Sounder Rajan 2 M.E. Department of CSE, K S R College for Engineering and Technology, Tiruchengode,

More information

An Efficient Provable Data Possession Scheme based on Counting Bloom Filter for Dynamic Data in the Cloud Storage

An Efficient Provable Data Possession Scheme based on Counting Bloom Filter for Dynamic Data in the Cloud Storage , pp. 9-16 http://dx.doi.org/10.14257/ijmue.2016.11.4.02 An Efficient Provable Data Possession Scheme based on Counting Bloom Filter for Dynamic Data in the Cloud Storage Eunmi Jung 1 and Junho Jeong 2

More information

Key Terms: Cloud Computing, cloud Service Provider, Provable Data Possession, Dynamic File Block, Map Version Table.

Key Terms: Cloud Computing, cloud Service Provider, Provable Data Possession, Dynamic File Block, Map Version Table. Volume 6, Issue 6, June 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Dynamic File Block

More information

STRUCTURED EMINENT DYNAMIC AUDITING FOR SECURE DATA STORAGE IN CLOUD COMPUTING

STRUCTURED EMINENT DYNAMIC AUDITING FOR SECURE DATA STORAGE IN CLOUD COMPUTING INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 STRUCTURED EMINENT DYNAMIC AUDITING FOR SECURE DATA STORAGE IN CLOUD COMPUTING Mr.Elamparithi P 1, Mr.Thanga Mariappan

More information

ABSTRACT. Keywords: Cloud Storage, Regenerating Code, Public Auditing, Dynamic Auditing, Privacy Preserving, Proxy I. INTRODUCTION

ABSTRACT. Keywords: Cloud Storage, Regenerating Code, Public Auditing, Dynamic Auditing, Privacy Preserving, Proxy I. INTRODUCTION 216 IJSRSET Volume 2 Issue 4 Print ISSN : 2395-199 Online ISSN : 2394-499 Themed Section: Engineering and Technology Privacy Preserving and Dynamic Auditing for Outsourced Storages in Cloud Satish Shelar*,

More information

ISSN (PRINT): , (ONLINE): , VOLUME-4, ISSUE-9,

ISSN (PRINT): , (ONLINE): , VOLUME-4, ISSUE-9, DATA DEDUPLICATION FOR DISTRIBUTED STORAGE SYSTEMS M. Manjusha 1, S. Rajesh 2 1,2 M.Tech, CSE, V. R. Siddhartha Engineering College, Andhra Pradesh, India Abstract Distributed Storage Data Storages reduces

More information

International Journal of Advance Research in Engineering, Science & Technology

International Journal of Advance Research in Engineering, Science & Technology Impact Factor (SJIF): 5.302 International Journal of Advance Research in Engineering, Science & Technology e-issn: 2393-9877, p-issn: 2394-2444 Volume 5, Issue 3, March-2018 Key Aggregate Tagged File Searching(KATFS)

More information

Efficient Data Storage Security with Multiple Batch Auditing in Cloud Computing

Efficient Data Storage Security with Multiple Batch Auditing in Cloud Computing Efficient Data Storage Security with Multiple Batch Auditing in Cloud Computing P. Sukumar [1] Department of Computer Science Sri Venkateswara College of Engineering, Chennai B. Sathiya [2] Department

More information

ENCRYPTED DATA MANAGEMENT WITH DEDUPLICATION IN CLOUD COMPUTING

ENCRYPTED DATA MANAGEMENT WITH DEDUPLICATION IN CLOUD COMPUTING ENCRYPTED DATA MANAGEMENT WITH DEDUPLICATION IN CLOUD COMPUTING S KEERTHI 1*, MADHAVA REDDY A 2* 1. II.M.Tech, Dept of CSE, AM Reddy Memorial College of Engineering & Technology, Petlurivaripalem. 2. Assoc.

More information

Survey on Authorized Data Deduplication System using Cryptographic and Access Control Techniques

Survey on Authorized Data Deduplication System using Cryptographic and Access Control Techniques Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 1, January 2015,

More information

ABSTRACT I. INTRODUCTION. Telangana, India 2 Professor, Department of Computer Science & Engineering, Shadan College of Engineering & Technology,

ABSTRACT I. INTRODUCTION. Telangana, India 2 Professor, Department of Computer Science & Engineering, Shadan College of Engineering & Technology, International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 6 ISSN : 2456-3307 Secure Proxy Server Data Sharing Scheme in Hybrid

More information

International Journal of Advance Engineering and Research Development. Duplicate File Searcher and Remover

International Journal of Advance Engineering and Research Development. Duplicate File Searcher and Remover Scientific Journal of Impact Factor (SJIF): 4.72 International Journal of Advance Engineering and Research Development Volume 4, Issue 4, April -2017 Duplicate File Searcher and Remover Remover Of Duplicate

More information

SECURING DISTRIBUTED ACCOUNTABILITY FOR DATA SHARING IN CLOUD COMPUTING

SECURING DISTRIBUTED ACCOUNTABILITY FOR DATA SHARING IN CLOUD COMPUTING SECURING DISTRIBUTED ACCOUNTABILITY FOR DATA SHARING IN CLOUD COMPUTING N. RAMESH 1, D. ANIL M.E 2, M. KIRAN 3 1, M.TECH Scholar, VEC, Kavali 2, Assistant Professor, VEC, Kavali 3, Assistant Professor,

More information

Research Article. August 2017

Research Article. August 2017 International Journals of Advanced Research in Computer Science and Software Engineering ISSN: 2277-128X (Volume-7, Issue-8) a Research Article August 2017 Data Integrity Techniques in Cloud Computing:

More information

ISSN Vol.08,Issue.16, October-2016, Pages:

ISSN Vol.08,Issue.16, October-2016, Pages: ISSN 2348 2370 Vol.08,Issue.16, October-2016, Pages:3146-3152 www.ijatir.org Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation VEDIRE AJAYANI 1, K. TULASI 2, DR P. SUNITHA

More information

Batch Verification Scheme for Economic Cloud Storage Services

Batch Verification Scheme for Economic Cloud Storage Services Batch Verification Scheme for Economic Cloud Storage Services K. Sudha 1, Mr. S. Sivaraj, ME 2 II-M.E (CSE), Dept. of CSE, SSM College of Engineering, Komarapalayam, Tamilnadu, India 1 Assistant Professor,

More information

Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage: Theory and Implementation (Supplementary File)

Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage: Theory and Implementation (Supplementary File) 1 Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage: Theory and Implementation (Supplementary File) Henry C. H. Chen and Patrick P. C. Lee 1 ADDITIONAL RELATED WORK This section

More information

A Public Auditing Framework for Cloud Storage Security

A Public Auditing Framework for Cloud Storage Security A Public Auditing Framework for Cloud Storage Security S. Satish Kumar A.Sudheer Kumar D.Venkatesh M.Tech Student (CSE) Assistant Professor Dean of CSE & IT GATES Institute of Tech, Gooty GATES Institute

More information

International Journal of Advance Engineering and Research Development

International Journal of Advance Engineering and Research Development Scientific Journal of Impact Factor (SJIF): 4.14 International Journal of Advance Engineering and Research Development Volume 3, Issue 3, March -2016 e-issn (O): 2348-4470 p-issn (P): 2348-6406 Identify

More information

Applying a Single Sign-On Algorithm Based On Cloud Computing Concepts for SaaS Applications Using MD5 Encryption

Applying a Single Sign-On Algorithm Based On Cloud Computing Concepts for SaaS Applications Using MD5 Encryption Applying a Single Sign-On Algorithm Based On Cloud Computing Concepts for SaaS Applications Using MD5 Encryption Amol Suruse 1,Shrikant Udmale 2,Vaibhav Doifode 3,Amol Waghade 4 1 2 3 4 (Computer Department,JSPM

More information

PRIVACY PRESERVING CONTENT BASED SEARCH OVER OUTSOURCED IMAGE DATA

PRIVACY PRESERVING CONTENT BASED SEARCH OVER OUTSOURCED IMAGE DATA PRIVACY PRESERVING CONTENT BASED SEARCH OVER OUTSOURCED IMAGE DATA Supriya Pentewad 1, Siddhivinayak Kulkarni 2 1 Department of Computer Engineering. MIT College of Engineering, Pune, India 2 Department

More information

Enhancing Availability Using Identity Privacy Preserving Mechanism in Cloud Data Storage

Enhancing Availability Using Identity Privacy Preserving Mechanism in Cloud Data Storage Enhancing Availability Using Identity Privacy Preserving Mechanism in Cloud Data Storage V.Anjani Kranthi *1, Smt.D.Hemalatha *2 M.Tech Student, Dept of CSE, S.R.K.R engineering college, Bhimavaram, AP,

More information

Management of Heterogeneous Data Storage Using Deduplication in Cloud Computing

Management of Heterogeneous Data Storage Using Deduplication in Cloud Computing Management of Heterogeneous Data Storage Using Deduplication in Cloud Computing 1 Naveen Kumar.B 2 Mr.Praveen Babu.G 1 M.Tech Student, Software Engineering, School of Information Technology JNTUH, Village

More information

Provable Dynamic Data Possession by Datalog Rules

Provable Dynamic Data Possession by Datalog Rules 958 JOURNAL OF SOFTWARE, VOL. 9, NO. 4, APRIL 2014 Provable Dynamic Data Possession by Datalog Rules Jing Lu School of Optical Electrical and Computing Engineering University of Shanghai for Science and

More information

SECURE SHARING OF DATA IN PRIVATE CLOUD BY RSA OAEP ALGORITHM. SRM University, Chennai

SECURE SHARING OF DATA IN PRIVATE CLOUD BY RSA OAEP ALGORITHM. SRM University, Chennai Volume 115 No. 6 2017, 689-695 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu SECURE SHARING OF DATA IN PRIVATE CLOUD BY RSA OAEP ALGORITHM S. Selvakumar

More information

MANAGING OF CLOUD STORAGE AUDITING FOR DATA INTEGRITY

MANAGING OF CLOUD STORAGE AUDITING FOR DATA INTEGRITY MANAGING OF CLOUD STORAGE AUDITING FOR DATA INTEGRITY GARNEPALLI MOUNIKA 1, N.SANTHOSH RAMCHANDER 2 M. Tech Student, CSE, SVS Group of Institutions, Warangal, TS 1 M.Tech (Ph.D) Assoc. Prof, CSE Dept,

More information

Efficient integrity checking technique for securing client data in cloud computing

Efficient integrity checking technique for securing client data in cloud computing International Journal of Electrical & Computer Sciences IJECS-IJENS Vol: 11 No: 05 43 Efficient integrity checking technique for securing client data in cloud computing Dalia Attas and Omar Batrafi Computer

More information

Third Party Auditing (TPA) For Secure Cloud Storage With Secret Sharing Algorithm. SHEETAL THITE[1], M TECH,Computer Engineering, BVDUCOE, Pune,india

Third Party Auditing (TPA) For Secure Cloud Storage With Secret Sharing Algorithm. SHEETAL THITE[1], M TECH,Computer Engineering, BVDUCOE, Pune,india , Impact Factor- 5.343 Third Party Auditing (TPA) For Secure Cloud Storage With Secret Sharing Algorithm SHEETAL THITE[1], M TECH,Computer Engineering, BVDUCOE, Pune,india Prof. S.S.DHOTRE Associate Professor,Department

More information

Privacy Preserving Public Auditing in Secured Cloud Storage Using Block Authentication Code

Privacy Preserving Public Auditing in Secured Cloud Storage Using Block Authentication Code Privacy Preserving Public Auditing in Secured Cloud Storage Using Block Authentication Code Sajeev V 1, Gowthamani R 2 Department of Computer Science, Nehru Institute of Technology, Coimbatore, India 1,

More information

A Comparative Analysis of Provable Data Possession Schemes in Cloud

A Comparative Analysis of Provable Data Possession Schemes in Cloud A Comparative Analysis of Provable Data Possession Schemes in Cloud Pooja Natu #, Prof. Shikha Pachouly * # PG scholar AISSMS COE, Department of Computer Engineering, Savitribai Phule Pune University,

More information

Dynamic and Flexible Group Key Generation Based on User Behaviour Monitoring

Dynamic and Flexible Group Key Generation Based on User Behaviour Monitoring International Journal of Computing Academic Research (IJCAR) ISSN 2305-9184, Volume 5, Number 1 (February 2016), pp.27-32 MEACSE Publications http://www.meacse.org/ijcar Dynamic and Flexible Group Key

More information

Public Verifiability of Stored Data in Cloud using Disassembly of Data Segment

Public Verifiability of Stored Data in Cloud using Disassembly of Data Segment Public Verifiability of Stored Data in Cloud using Disassembly of Data Segment Adhikrao.Y.Jadhav Department of Computer Science & Engg. Sachin P. Patil Department of Information Technology, Annasaheb Dange

More information

Secured Public Auditing for Shared Data in the Cloud

Secured Public Auditing for Shared Data in the Cloud International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume 2, Issue 8, August 2015, PP 10-15 ISSN 2349-4840 (Print) & ISSN 2349-4859 (Online) www.arcjournals.org Secured

More information

Deduplication on Scrambled Enormous Information in Cloud

Deduplication on Scrambled Enormous Information in Cloud Deduplication on Scrambled Enormous Information in Cloud Dr.R.Balakrishna, Prasad.A.Y, Monika R, Megha S Dr.R.Balakrishna,Principal,Rajarajeshwari college of Engineering,Bangalore. Prasad.A.Y, Asst Professor,Rajarajeshwari

More information

Enhanced Key Expansion Algorithm for Advanced Encryption Standard using Different S- Box Implementation on FPGA

Enhanced Key Expansion Algorithm for Advanced Encryption Standard using Different S- Box Implementation on FPGA GRD Journals- Global Research and Development Journal for Engineering Volume 1 Issue 5 April 2016 ISSN: 2455-5703 Enhanced Key Expansion Algorithm for Advanced Encryption Standard using Different S- Box

More information

INFORMATION SECURITY AND PRIVACY IN CLOUD USING HYBRID CRYPTOGRAPHIC ALGORITHM

INFORMATION SECURITY AND PRIVACY IN CLOUD USING HYBRID CRYPTOGRAPHIC ALGORITHM INFORMATION SECURITY AND PRIVACY IN CLOUD USING HYBRID CRYPTOGRAPHIC ALGORITHM PRIYA K Assistant Professor, Information Science and Engineering, MVJ College Of Engineering, Bangalore, India Abstract From

More information

Outline. Hash Function. Length of Hash Image. AIT 682: Network and Systems Security. Hash Function Properties. Question

Outline. Hash Function. Length of Hash Image. AIT 682: Network and Systems Security. Hash Function Properties. Question Hash function lengths Outline AIT 682: Network and Systems Security Topic 4. Cryptographic Hash Functions Instructor: Dr. Kun Sun Hash function applications MD5 standard SHA-1 standard Hashed Message Authentication

More information

Outline. AIT 682: Network and Systems Security. Hash Function Properties. Topic 4. Cryptographic Hash Functions. Instructor: Dr.

Outline. AIT 682: Network and Systems Security. Hash Function Properties. Topic 4. Cryptographic Hash Functions. Instructor: Dr. AIT 682: Network and Systems Security Topic 4. Cryptographic Hash Functions Instructor: Dr. Kun Sun Hash function lengths Outline Hash function applications MD5 standard SHA-1 standard Hashed Message Authentication

More information

Provable Data Processing (PDP) a Model for Client s Secured Data on Cloud

Provable Data Processing (PDP) a Model for Client s Secured Data on Cloud Journal for Research Volume 03 Issue 01 March 2017 ISSN: 2395-7549 Provable Data Processing (PDP) a Model for Client s Secured Data on Cloud S. Ramacharan A. Anusha Associate Professor D. Sravya G. Dharani

More information

Keywords Cloud Data Storage, Privacy Preserving, Public Auditability, Cryptographic Protocols, Cloud Computing.

Keywords Cloud Data Storage, Privacy Preserving, Public Auditability, Cryptographic Protocols, Cloud Computing. Volume 4, Issue 10, October 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Implementation

More information

Preserving Data Integrity in Cloud Storage

Preserving Data Integrity in Cloud Storage Preserving Data Integrity in Cloud Storage Jegadeesan.K 1, Sivakumar.K 2 M.E, Department of CCE, Erode Builder Educational Trust s Group of Institutions, Kangayam, Tamilnadu, India 1 M.E, Department of

More information

International Journal of Advance Engineering and Research Development

International Journal of Advance Engineering and Research Development Scientific Journal of Impact Factor (SJIF): 3.134 International Journal of Advance Engineering and Research Development Volume 3, Issue 2, February -2016 e-issn (O): 2348-4470 p-issn (P): 2348-6406 Enabling

More information

On the Security of a Lightweight Cloud Data Auditing Scheme

On the Security of a Lightweight Cloud Data Auditing Scheme On the Security of a Lightweight Cloud Data Auditing Scheme Reyhaneh Rabaninead a, Maryam Raabzadeh Asaar b, Mahmoud Ahmadian Attari a, Mohammad Reza Aref c a Department of Electrical Engineering, K. N.

More information

AES and DES Using Secure and Dynamic Data Storage in Cloud

AES and DES Using Secure and Dynamic Data Storage in Cloud Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,

More information

Encrypted Data Deduplication in Cloud Storage

Encrypted Data Deduplication in Cloud Storage Encrypted Data Deduplication in Cloud Storage Chun- I Fan, Shi- Yuan Huang, Wen- Che Hsu Department of Computer Science and Engineering Na>onal Sun Yat- sen University Kaohsiung, Taiwan AsiaJCIS 2015 Outline

More information

Text Data Compression and Decompression Using Modified Deflate Algorithm

Text Data Compression and Decompression Using Modified Deflate Algorithm Text Data Compression and Decompression Using Modified Deflate Algorithm R. Karthik, V. Ramesh, M. Siva B.E. Department of Computer Science and Engineering, SBM COLLEGE OF ENGINEERING AND TECHNOLOGY, Dindigul-624005.

More information

International Journal of Advance Engineering and Research Development

International Journal of Advance Engineering and Research Development Scientific Journal of Impact Factor (SJIF): 5.71 International Journal of Advance Engineering and Research Development Volume 5, Issue 05, May -2018 e-issn (O): 2348-4470 p-issn (P): 2348-6406 PRIVACY-PRESERVING

More information

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. Study on secure data storage based on cloud computing ABSTRACT KEYWORDS

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. Study on secure data storage based on cloud computing ABSTRACT KEYWORDS [Type text] [Type text] [Type text] ISSN : 0974-7435 Volume 10 Issue 22 BioTechnology 2014 An Indian Journal FULL PAPER BTAIJ, 10(22), 2014 [13778-13783] Study on secure data storage based on cloud computing

More information

Techniques for Efficiently Ensuring Data Storage Security in Cloud Computing

Techniques for Efficiently Ensuring Data Storage Security in Cloud Computing Techniques for Efficiently Ensuring Data Storage Security in Cloud Computing Vasu Raju, Raj Kumar, and Anand Raj vasuraju_1255@yahoo.com naaniraj@gmail.com, anandsofttech@gmail.com M.Tech (C.S.E), S.r.Engg

More information

Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space

Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space Martin Mulazzani, Sebastian Schrittwieser, Manuel Leithner, Markus Huber, Edgar Weippl SBA Research Outline Cloud

More information

PERFORMANCE OF CLOUD DATA INTEGRITY PROOFS IN CLOUD STORAGE SYSTEM USING CRYPTOGRAPHIC KEY

PERFORMANCE OF CLOUD DATA INTEGRITY PROOFS IN CLOUD STORAGE SYSTEM USING CRYPTOGRAPHIC KEY PERFORMANCE OF CLOUD DATA INTEGRITY PROOFS IN CLOUD STORAGE SYSTEM USING CRYPTOGRAPHIC KEY B.M.RAJESH 1 Asst Prof, Department of Information Technology, SNMV College of Arts and Science, Tamil Nadu, India

More information

Protected and Effective Transmission of Data in Peer-To-Peer Network Using SGA

Protected and Effective Transmission of Data in Peer-To-Peer Network Using SGA Protected and Effective Transmission of Data in Peer-To-Peer Network Using SGA Sushma T Shanbhogue 1, Poonguzhali E 2 P.G. Student, Department of Computer Engineering, AMC Engineering College, Bangalore,

More information

Provable ownership of files in deduplication cloud storage

Provable ownership of files in deduplication cloud storage SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks 2015; 8:2457 2468 Published online 19 July 2013 in Wiley Online Library (wileyonlinelibrary.com)..784 SPECIAL ISSUE PAPER Provable ownership

More information

Remote Data Checking: Auditing the Preservation Status of Massive Data Sets on Untrusted Store

Remote Data Checking: Auditing the Preservation Status of Massive Data Sets on Untrusted Store Remote Data Checking: Auditing the Preservation Status of Massive Data Sets on Untrusted Store Randal Burns randal@cs.jhu.edu www.cs.jhu.edu/~randal/ Department of Computer Science, Johns Hopkins Univers

More information

Self Destruction Of Data On Cloud Computing

Self Destruction Of Data On Cloud Computing Volume 118 No. 24 2018 ISSN: 1314-3395 (on-line version) url: http://www.acadpubl.eu/hub/ http://www.acadpubl.eu/hub/ Self Destruction Of Data On Cloud Computing Pradnya Harpale 1,Mohini Korde 2, Pritam

More information

A Survey on Secure Storage in Cloud Computing

A Survey on Secure Storage in Cloud Computing Indian Journal of Science and Technology A Survey on Secure Storage in Cloud Computing A. Rajathi 1* and N. Saravanan 2 1 PG Student, School of Computing, SASTRA University, 613401, Thanjavur, Tamilnadu,

More information

Network and System Security

Network and System Security Network and System Security Lecture 5 2/12/2013 Hashes and Message Digests Mohammad Almalag 1 Overview 1. What is a cryptographic hash? 2. How are hashes used? 3. One-Way Functions 4. Birthday Problem

More information

Deduplication on Encrypted Big Data in HDFS

Deduplication on Encrypted Big Data in HDFS Deduplication on Encrypted Big Data in HDFS Saif Ahmed Salim 1, Prof. Latika R. Desai 2 1Department of Computer Engineering, Dr. D.Y. Patil Institute of Technology, Pune University, Pune, India 2Department

More information

S. Indirakumari, A. Thilagavathy

S. Indirakumari, A. Thilagavathy International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 2 ISSN : 2456-3307 A Secure Verifiable Storage Deduplication Scheme

More information

CSCI 454/554 Computer and Network Security. Topic 4. Cryptographic Hash Functions

CSCI 454/554 Computer and Network Security. Topic 4. Cryptographic Hash Functions CSCI 454/554 Computer and Network Security Topic 4. Cryptographic Hash Functions Hash function lengths Outline Hash function applications MD5 standard SHA-1 standard Hashed Message Authentication Code

More information

VIVAVIDEO PRO APK VIDEO EDITOR

VIVAVIDEO PRO APK VIDEO EDITOR VIVAVIDEO PRO APK VIDEO EDITOR NOVEMBER 30, 2017 Contents VivaVideo Pro Apk Editor... 3 VivaVideo Pro Apk Editor Get Viva Video Download APK Android App, iphone, for PC. Introduce and Download Viva Video

More information

Concealing Information in Images using Progressive Recovery

Concealing Information in Images using Progressive Recovery Concealing Information in Images using Progressive Recovery Pooja R 1, Neha S Prasad 2, Nithya S Jois 3, Sahithya KS 4, Bhagyashri R H 5 1,2,3,4 UG Student, Department Of Computer Science and Engineering,

More information

Attacking MD5: Tunneling & Multi- Message Modification. Team Short Bus: Daniel Liu John Floren Tim Sperr

Attacking MD5: Tunneling & Multi- Message Modification. Team Short Bus: Daniel Liu John Floren Tim Sperr Attacking MD5: Tunneling & Multi- Message Modification Team Short Bus: Daniel Liu John Floren Tim Sperr Introduction The MD5 Message Digest Description of Algorithm Our Implementation Description of Attacks:

More information

Cloud Storage Security Based on Trusted Third Party Auditing

Cloud Storage Security Based on Trusted Third Party Auditing Cloud Storage Security Based on Trusted Third Party Auditing Priyanka S. Nangare 1, Prof. Varsha Dange 2 M.E. Student, Dept. of Computer Engineering, DPCOE, Pune, India 1 Assistant Professor, Dept. of

More information

IDENTITY BASED REMOTE DATA INTEGRITY CHECKING WITH PERFECT DATA PRIVACY PRESERVING FOR CLOUD STORAGE BASED ON OTP 1 S.V.KAVYA, 2M.HEMAMALINI, 3 K.

IDENTITY BASED REMOTE DATA INTEGRITY CHECKING WITH PERFECT DATA PRIVACY PRESERVING FOR CLOUD STORAGE BASED ON OTP 1 S.V.KAVYA, 2M.HEMAMALINI, 3 K. Volume 119 No. 15 2018, 995-1000 ISSN: 1314-3395 (on-line version) url: http://www.acadpubl.eu/hub/ http://www.acadpubl.eu/hub/ IDENTITY BASED REMOTE DATA INTEGRITY CHECKING WITH PERFECT DATA PRIVACY PRESERVING

More information

An Optimized Time Series based Two phase strategy Pre-Copy Algorithm for Live Virtual Machine Migration

An Optimized Time Series based Two phase strategy Pre-Copy Algorithm for Live Virtual Machine Migration An Optimized Time Series based Two phase strategy Pre-Copy Algorithm for Live Virtual Machine Migration Ruchi Tailwal P.G. Scholar, Graphic Era Hill University Dehradun, India Avita Katal Assistant Professor,

More information

International Journal of Advance Engineering and Research Development. Secure and dynamic Multi-keyword Ranked Search Over Cloud Data

International Journal of Advance Engineering and Research Development. Secure and dynamic Multi-keyword Ranked Search Over Cloud Data Scientific Journal of Impact Factor (SJIF): 4.72 International Journal of Advance Engineering and Research Development Volume 4, Issue 5, May -2017 e-issn (O): 2348-4470 p-issn (P): 2348-6406 Secure and

More information

Attribute Based Encryption with Privacy Protection in Clouds

Attribute Based Encryption with Privacy Protection in Clouds Attribute Based Encryption with Privacy Protection in Clouds Geetanjali. M 1, Saravanan. N 2 PG Student, Department of Information Technology, K.S.R College of Engineering, Tiruchengode, Tamilnadu, India

More information

Random Oracles - OAEP

Random Oracles - OAEP Random Oracles - OAEP Anatoliy Gliberman, Dmitry Zontov, Patrick Nordahl September 23, 2004 Reading Overview There are two papers presented this week. The first paper, Random Oracles are Practical: A Paradigm

More information

Cross breed Provable Data Possession at Untrusted Stores in Cloud Computing

Cross breed Provable Data Possession at Untrusted Stores in Cloud Computing Cross breed Provable Data Possession at Untrusted Stores in Cloud Computing Dr.R.Balakrishna, Prasad.A.Y, Geethanjali.S, Shravani P.M Dr.R.Balakrishna,Principal, Rajarajeshwari college of Engineering,

More information

Auditing-as-a-Service for Cloud Storage

Auditing-as-a-Service for Cloud Storage Auditing-as-a-Service for Cloud Storage Alshaimaa Abo-alian, N. L. Badr, M. F. Tolba, Faculty of Information and Computer Sciences, Ain shams University, Cairo, Egypt shimo.fcis83@gmail.com, dr.nagwabadr@gmail.com,

More information

Based on Distance Comparison Shortest Path Algorithm

Based on Distance Comparison Shortest Path Algorithm Volume 118 No. 20 2018, 853-860 ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu Based on Distance Comparison Shortest Path Algorithm 1 Y. NavyaSri, 2 K. Meghana, 3 D. Nageswari and

More information

Encrypting the Auto Detected Face Part of Human in a Image Using RC4 and Hiding the Data in Image

Encrypting the Auto Detected Face Part of Human in a Image Using RC4 and Hiding the Data in Image Encrypting the Auto Detected Face Part of Human in a Image Using RC4 and Hiding the Data in Image N.Mahesh Chandra M.Tech Student, Sreenidhi Institute of Science and Technology. Abstract: In this paper,

More information

Available online at ScienceDirect. Procedia Computer Science 48 (2015 ) (ICCC-2014) (ICCC-2015)

Available online at   ScienceDirect. Procedia Computer Science 48 (2015 ) (ICCC-2014) (ICCC-2015) Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 48 (2015 ) 347 352 International Conference on Intelligent Computing, Communication & Convergence (ICCC-2015) (ICCC-2014)

More information

MULTI - KEYWORD RANKED SEARCH OVER ENCRYPTED DATA SUPPORTING SYNONYM QUERY

MULTI - KEYWORD RANKED SEARCH OVER ENCRYPTED DATA SUPPORTING SYNONYM QUERY ISSN: 0976-3104 SPECIAL ISSUE Jayanthi and Prabadevi RESEARCH OPEN ACCESS MULTI - KEYWORD RANKED SEARCH OVER ENCRYPTED DATA SUPPORTING SYNONYM QUERY Jayanthi M.* and Prabadevi School of Information Technology

More information

SecurityFirst DataKeep

SecurityFirst DataKeep A Report on the Technical and Usability Advantages of SecurityFirst DataKeep 2017 September 23 Prepared by Avi Rubin, Ph.D. and Paul D. Martin, Ph.D. Page 2 Table of Contents I. Introduction... 3 II. Security

More information

[Patil*, 4(7): July, 2017] ISSN Impact Factor: 2.805

[Patil*, 4(7): July, 2017] ISSN Impact Factor: 2.805 KEY AGGREGATE SEARCHABLE ENCRYPTION FOR SHARING THE DATA ON MULTI CLOUD R. U. Patil *1 & Prof. A. J. Kadam 2 M.E, Department of Computer Engineering, All India Shri Shivaji Memorial Society's, College

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK TECHNIQUES FOR ENSURING DATA STORAGE SECURITY IN CLOUD COMPUTING GANESH B. CHAVAN

More information

Result Analysis: Decentralized Access Control with Anonymous Authentication

Result Analysis: Decentralized Access Control with Anonymous Authentication Result Analysis: Decentralized Access Control with Anonymous Authentication Prof D.S.Thosar 1, Punam S.Jadhav 2,Shruti S.Thosar 3,Swapnali D.Sarode 4 1 Assistant Prof. Computer Department, 2,3,4 Student

More information

Identification of Fake Location Based Service Providers Using Secure Abstraction of Top-K Query Processing

Identification of Fake Location Based Service Providers Using Secure Abstraction of Top-K Query Processing ISSN No: 2454-9614 Identification of Fake Location Based Service Providers Using Secure Abstraction of Top-K Query Processing *Corresponding Author: P. Shyamala E-mail: shyamala.se14@bitsathy.ac.in P.

More information

Integrity Check Mechanism in Cloud Using SHA-512 Algorithm

Integrity Check Mechanism in Cloud Using SHA-512 Algorithm www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 5 may, 2014 Page No. 6033-6037 Integrity Check Mechanism in Cloud Using SHA-512 Algorithm Mrs.Shantala

More information

A Top Catching Scheme Consistency Controlling in Hybrid P2P Network

A Top Catching Scheme Consistency Controlling in Hybrid P2P Network A Top Catching Scheme Consistency Controlling in Hybrid P2P Network V. Asha*1, P Ramesh Babu*2 M.Tech (CSE) Student Department of CSE, Priyadarshini Institute of Technology & Science, Chintalapudi, Guntur(Dist),

More information

Securing WMSN using SHAREMIND

Securing WMSN using SHAREMIND Securing WMSN using SHAREMIND Prof. Dhanshri Patil 1, Priyanka Kanse 2, Priyanka Kakade 3, Ketaki Sortur 4, Akshata Nalawade 5 1, 2,3,4,5 UG Student Department of Computer Engineering, PCET s Nutan Maharashtra

More information

CSM # 1 Secure Communication Field Session 2008

CSM # 1 Secure Communication Field Session 2008 CSM # 1 Secure Communication Field Session 2008 CLIENT: Dr. Roman Tankelevich WRITTEN BY: Kevin Kaiser Michael Keesey Phillip Woods Submitted June 19, 2008 Executive Summary Information can be passed discretely

More information

FINE-GRAINED QUERY RESULTS VERIFICATION FOR SECURE SEARCH SCHEME OVER ENCRYPTED CLOUD DATA

FINE-GRAINED QUERY RESULTS VERIFICATION FOR SECURE SEARCH SCHEME OVER ENCRYPTED CLOUD DATA FINE-GRAINED QUERY RESULTS VERIFICATION FOR SECURE SEARCH SCHEME OVER ENCRYPTED CLOUD DATA 1 M MOUNIKA 1 M.Tech Student, Department of CSE, Jyothishmathi institute of Technology & science, karimnagar,

More information