(IJEETE) 03, 04, JUL-AUG, SCRAM BASED SECURITY FOR DATA SHARING IN DYNAMIC CLOUD ENVIRONMENT

Size: px
Start display at page:

Download "(IJEETE) 03, 04, JUL-AUG, SCRAM BASED SECURITY FOR DATA SHARING IN DYNAMIC CLOUD ENVIRONMENT"

Transcription

1 SCRAM BASED SECURITY FOR DATA SHARING IN DYNAMIC CLOUD ENVIRONMENT B.Gunalan CMS College of Science and Commerce, Coimbatore, Tamilnadu Supervisor Dr.T.Christoper,Ph.D Government Arts College, Coimbatore, Tamilnadu ABSTRACT Basically, the cloud data storage process uses the multiple virtualized pools where store the different application and data in term of electronic format which are typically hosted by cloud third party. The main advantage of cloud storage system is minimize the different web application management over the dynamic updates,provide high capacity of cloud storage, provide more flexibility, provide high capacity of cloud storage,reduce IT management of data and hardware (SaranyaEswaran, SunithaAbburu, 2012). However, the Cloud has some disadvantage like unauthorized data access, data integrity, data privacy, data loss and etc.(nedhal A. AL.Saiyd, Nada Sail et al., 2013). Some of the very signification problem ispublic data integrity auditing process. In cloud any kind of process is starts from cloud storage process some of the well-known cloud storage systems are EMC Atmos, Google App Engine Blostrore, icloud, Apple, Amazon S3 and Windows Azure Storage. I. INTRODUCTION In the cloud storage process the cloud data integrity is a vital process among the other kind of cloud storage issues. Because the cloud data integrity creates that ensure that the data is of accessible, high quality, consistent and correct. After the done thedata storage process, start the data transforming to the cloud, during this process the data owner believes that their storage and transmitted application and data are accessed in secured manner (Adarsh R,P. ChidanandaMurthy, 2014) (N.Vidhya and P.Jegathesh, 2014). However, that the data owner s believes may fail in some point of viewmeans the data owner may be deleted or changed that data. In other term the group member may change or deleted that data. From this scenario, the cloud data is significant to verify a twice in term of the data has been tampered or deleted. To validate (examine) the data, often the data owner must download that data. During the data downloading process, In casethe stored in different server mean such kindofdownloading process take much time and this process direct to data integrity (ThombareKishor. Vet. al., 2014), (Siddhartha Rao et al., 2014).Data integrity process may become too expensivebecause of increased time and cost of bandwidth, mainly this process need frequent data checks. II. PROBLEM DEFINITION In cloud environment, the storage service is one of the emerging services which are utilized to give the different services to various kinds of users.additionally, Countless Cloud Service Providers (CSP) provides cloud storage as in term of service. The cloud data is transferred from one cloud user s machine to be stored on huge Data Centers (DC). Even though the CSP often state that they offer authorized environment for data storage. In this environment can find where user s data has been altered or lost because of some human error or some security breach.in the cloud storage services different users ISSN All Rights Reserved 2016 IJEETE Page 233

2 continuously store their high volume of information and altered or updating the information for enhancing the cloud storage services quality. During the cloud storage services, revocation, confidentiality, and data integrity of the shared data is one of the main issues because of different user change their information at the same time. For an improved level of data durability, availability and scalability, some users many need their data to be replicated on multiple servers over the countless data centers. The data replication differs from nature of data and need more duplication process for critical data reproducing process. The more duplications, the CSP is need to store more data and the more cost charged for the cloud users. Different kinds of auditing techniques are processed during the cloud storage process which is also manage the auditing cost, modified data in the cloud, however, it has some limitation in term of client read only data.thus, in this research work mainly focuses a designing issue in dynamic cloud data operation such as the data storage in term of public auditabilityand data dynamics. III. RELATED WORK (Franklin Malugu and K. Suresh Babu, 2015) authors propose privacy preserving auditing scheme which process actsas the ring signature to compute verifications required to audit data integrity access. This proposed method, the find the user who are preserved private from public verification and how the dynamic groups are supported to that user and finds which user newlyadded into the available group and a newly created group member may be revoked during data sharing depends on the data. (Amala. U, 2012)author proposed a scheme byutilizing the Provable Data Possession (PDP)for verifying the integrity of data which is one of the cryptographic method. This proposed work processed in the form of without retrieving an untrusted server and this process achieve zero knowledge property and the minimum communication cost respectively. (GauriThorat,S.R.Todmal, 2015) author analysis the basic problem of cloud computing such as data privacy and data integrity as well as author present the user revocation problem during the data sharing process. Additionally in this work use new public auditing mechanism such as PANDA plus. This process used for maintain the data sharing integrity. This process works depends on the proxy re-signatures concept at the time of user revocation process. The PANDA Plus is term as public auditor who audits the shared data s integrity without retrieving the whole data from the cloud environment. This process simultaneously verifies the multiple auditing tasks. (N. Siva Priya, 2015) author utilizes ring signatures to createholomorphic authenticators because of this process the public verifier can easily audit the integrity of shared data without retrieving the whole data from the cloud environment. From this process cannot differentiate who is singer on each data block in cloud environment. In this proposed work, the Identity Privacy, Unforgeability, Correctness and public auditing process are done by using Oruta. Fragment structure is used for constructed the proposed system and timelyanomaly detection and outsource the data is done by using supporting provable updates. Additionally, in this work use the periodic verification for enhancing the auditing performance. ISSN All Rights Reserved 2016 IJEETE Page 234

3 (R.Balachandar et al., 2014)authors propose a new framework such as Secure Flexible Framework (SFF). This SFF is mainly used for achieving the cloud data integrity, fine grained cloud data access control, Usage tracking of actual data from the outsourced data. This proposed work used for cloud user to correctly access their data along with fine grained, flexible and scalable control of outsourced data. (Suresh Kathi and MamidiVeerakumari, 2014) authors presenting a new platform for cloud computing named as Data Protection as a Service. This Data Protection as a Service significantly minimizes the data storage risk as well as this process provides the protection for stored data on the remote system. Additionally, in this work shows the different method for securing data utilizing offensive decoy technology in cloud environment. When suspects the un-authentication access, the challenge question launch in term of decoy information to the attacker, this process help to protect the unauthorized user. IV PROPOSED WORK In this research work two different kinds of efficient user revocation and public auditing process is done by using different kind of techniques is as follows The Homomorphic secret sharing and Salted Challenge Response Authentication Mechanism (SCRAM) techniques is used for secret key authentication and sharing process. In this work used for efficiently manage the cloud data storage process. This proposed authentication technique, authenticate the server and user s secret keys during the process of cloud data modification. This process can be improves the error detection probability from this probability can easily find the un-authorization process. Additionally in this proposed work also consider the efficient public auditing and user revocation process. AModified Boneh-Lynn-Shacham Signing Dynamic Auditing (MBLSSDA) algorithm is proposed for privacy-preserving public auditing process in term of dynamic cloud data storage. To enable the Third Party Auditing(TPA)in term ofsimultaneously and efficiently performs the auditing process for multiple users as well doing the batch auditing for multiple users is efficiently done this proposed work. V. CONTRIBUTION OF THE RESEARCH The contribution of this research work is as follows: The main contribution of this work is as achieve the efficient user revocation and public auditing process. To done this user revocation and public auditability has to made the proper solution and it can meet essential requirement like cloud data retrievability, high process efficiency and public data integrity. In public auditability process has some trouble in term of while keeping user s private information at the time of data storage. Thus, creating the efficient verification protocol with the help of novel approach. Additionally improves the cloud data storage security with the of novel approach A. SCRAM Based Data Sharing In the Dynamic Cloud Environment ISSN All Rights Reserved 2016 IJEETE Page 235

4 In this propose work consider a Salted Challenge Response Authentication Mechanism(SCRAM) Based data sharing in the dynamic cloud environment which is contain three different entities such as TPA, group users, and cloud server is as presented in Figure 1. The SCRAM is part of Simple Authentication and Security Layer (SASL) protocols. In this work proposes a secret key authentication mechanism and a secret key sharing are used to manage the cloud storage data which is done by using the Homomorphic secret sharing and the SCRAM techniques.in this work use well-know Homomorphic Secret Sharing technique such as Shamir Secret Sharing (SSS) for secret key sharing process. Nonetheless, SSS is not a multiplicatively homographic system, is an additively homorophic process so in this work use one added step in this process is termed as degree reduction step is as follows The SSS- Plus Degree Reduction Step 1: Step 2: Step 3: Step4: Step5: Step6: Step7: Step8: Step9: Cloud Storage Server Public Parameter Group Users Revoked Group Users Data Integrity Auditing Results Third Party Auditor Figure 1.System Model of SCRAM Based Data Sharing In the Dynamic Cloud Environment ISSN All Rights Reserved 2016 IJEETE Page 236

5 The proposed SCRAM protocol as presented in Figure 2 and this process offers the following functionalities: 4.2 Modified Boneh-Lynn-Shacham Signing Dynamic Auditing (MBLSSDA)WithRijandael algorithm The SCRAM messages are in text based messages and it containspair of value/ attributes which is divided by commas and each value/attribute has a single-letter name. Here, the authentication is defined by a data owner. Authentication occurs on the group members as well as data owner side and here simultaneouslychecks whetheractually server did hold the proper password. Here, the hash value of cloud file is transparent and this hash value can be modified, as well as what kind of process creates the protocol farther proof. The passwords of group users can be hashed and as well as salted on the server side. User Username, UserNonce Salt, iteration, CombinedNonce UserProof, CombinedNonce Server Signature Figure 2. SCRAM protocol s Authentication Session Server Modified Boneh-Lynn-Shacham signing dynamic auditing process can attain following goal Light Weight: To permit TPA to perform auditing with lowest computation overhead and minimum communicationcost. Privacy preserving: The proposed MBLSSDA work givesproper data security and improves thedata sharing performance and in this work TPA can t read the about the user s data during the auditing phase. Storage Correctness: This process ensures that there isno cheating on cloud servers. Batch auditing: From the batch auditing where simultaneously handled the multiple users request during data auditing process. Public auditability: In this work permits TPA to audit about the user s data without recovering the any copy of the user s data. In this proposed public auditing scheme contain four different processes such as (SigGen, KeyGen, GenProof, and VerifyProof. The KeyGenprocess generates a key which is used to run the user setup. SigGen is utilized by user to create the metadata verification, which may contain signature, MAC, other wanted information for auditing process. GenProof is used for run the loud server and it can create the correctness of data storage proof, while, theverifyproof, the user can verify their data, in this work a batch auditing process is done by using Rijandael algorithm which is known as Advanced Encryption Standard algorithm. The Rijandael algorithm is used for creating the One Time ISSN All Rights Reserved 2016 IJEETE Page 237

6 Key Generation Time (Sec) Authentication Signature International Journal of Exploring Emerging Trends in Engineering (IJEETE) Password (OTP), in this work, the cloud user initially create the registration process, after done the registration process the OTP will created that will be send for data owner s phone or mail. This OTP password can used for upload the file into cloud and as well as during the batch audition process. 5. Experimental Results and Discussion The proposed cloud secure sharing evaluation process is done by using JAVA with JAVA Pairing-Based Cryptography Library (jpbc) (A. De Caro and V. Iovino, 2011) on Amarzon EC2 cloud. On the cloud server, employ nodes running Linux with 32GB memory and 8-core CPU. The group users machines are used as laptops which is using running Linux with 8GB memory, 2.50GHz Intel i5-2520m CPU. The verifier is a set as desktop with running Linux with ASUS Android Iconia A200 Tablet using 1-GHz NvidiaTegra 2 Dual Core Mobile CPU or 16GBmemeroy and 3.4GHz Intel i CPU. In order to compare the two different proposed works such asscram Based Data auditing and Modified Boneh-Lynn-Shacham Signing Dynamic Auditing (MBKSSDA) with the same setup of experiment work. All the experimental results signify the mean of 100 trails SCRA M MBLS SDA Figure 3 Key Generation Time Initially assess the public key and signature generation process of the two different proposed systems such as SCRAM Based Data auditing and Modified Boneh-Lynn- Shacham Signing Dynamic Auditing (MBKSSDA). Figure 3 shows that the public key generation time, here shows that the each proposed systems get the promising result in term of minimum key generation time with small deviations Numerb of Block SCRA M MBLS SDA Figure 4. Authentication Signature Generation Time Figure 4 shows that the signature generation time is comparedwith the block size, here shows that the each proposed systems get the promising result in term of minimum authentication signature generation time with small deviations. Number of Group Users ISSN All Rights Reserved 2016 IJEETE Page 238

7 Communication Cost (KB) User Verification Time (Sec) International Journal of Exploring Emerging Trends in Engineering (IJEETE) Figure 5. User Verification Time Figure 5 shows that the user verification time is comparedwith the file size, here shows that the each proposed systems get the promising result in term of minimum user verification time with small deviations Figure 6 Communication Cost Figure 5 shows the comparison results of two proposed works in term of communication cost. From the results shows that, although proposed SCRAM and MBKSSDA has get tolerable communication cost and when communication cost increases its computational cost also increases on the TPA process. 6. Conclusion File Size (Block Number) SCRAM File Size (Block Number) MBKSSDA In this research work a proposes atwo different efficient and secure cloud auditing process with the intention of data integrity and additionally analysis the dynamic data sharingprocess with group user with kind of modification permission.the Homomorphic secret sharing and Salted Challenge Response Authentication Mechanism (SCRAM) techniques and Modified Boneh-Lynn- Shacham Signing Dynamic Auditing (MBLSSDA) With Rijandael algorithm are proposed in this research work efficiently. In this two proposed work help to share the secret key and authentication process and also it can help of manage the cloud storage data. Thus, the proposed work shows that the efficient public auditing and data integrity process. This public auditing and data integrity is check by using different experimental analysis. Here different kind of metrics are used to analysis the proposed systems such as user verification time, key generation time,authentication signature generation time and communication cost. References [1] Adarsh R,P. ChidanandaMurthy, Secure Storage and Data Integrity Proof in Cloud, International Journal of Computer Science and Information Technologies, Vol. 5, No.4, PP , [2] Amala. U, Dynamic Audit Services for Achieving Data Integrity in Clouds,International Journal of Advanced Research in Computer and Communication Engineering, Vol. 1, Issue 10, PP , [3] R.Balachandar, M.S.Kavitha, K.Seenivasan, An Approach For Broader Range Of Security In Cloud Computing,International Journal of Security, Privacy and Trust ISSN All Rights Reserved 2016 IJEETE Page 239

8 Management ( IJSPTM), Vol 2, No 1, PP.43-54, [4] De Caro and V. Iovino, jpbc: Java pairing based cryptography, 16th IEEE Symp. Comput. Commun. (ISCC), Corfu, Greece, PP , [5] Franklin Malugu, K. Suresh Babu, Public Audit of Cloud Shared Data by Using Efficient Privacy Preserving Scheme,International Journal of Scientific Engineering and Research (IJSER),Vol.3, Issue 4, PP , [6] GauriThorat,S.R.Todmal, A Survey on Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud, International Journal of Computer Science and Information Technologies (IJCSIT), Vol. 6 (1), PP , [7] Nedhal A. AL.Saiyd, Nada Sail, Data Integrity In Cloud Computing Security,Journal of Theoretical and Applied Information Technology,Vol. 58 No.3, PP , [8] Suresh Kathi, MamidiVeerakumari, Data Invulnerability and Data Integrity Verification of Multi Cloud Storage,International Journal of Research in Computer and Communication Technology, Vol 3, Issue 1, PP.70-74, [9] SaranyaEswaran, SunithaAbburu, Identifying Data Integrity in the Cloud Storage,IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 2, No 1, PP , [10] Siddhartha Rao, SavanGujrathi, MithunSanghvi, Shubham Shah, Analysis on Data Integrity in Cloud Environment,IOSR Journal of Computer Engineering (IOSR-JCE), Vol.16, Issue 5, Ver. IX, PP.71-76, [11] N. Siva Priya, Periodic Updation in TPA for Secure Dynamic Audit Services of Outsourced Storages in Clouds,Journal of Network Communications and Emerging Technologies (JNCET), Vol.2, Issue 1, PP , [12] ThombareKishor. V, SuryawanshiNilesh D, Patil Ganesh S, WadnereSwapnil, Data Integrity Proof in Cloud Storage, International Journal of Emerging Technology and Advanced Engineering,Vol.4, Issue 4, PP , [13] N.Vidhya, P.Jegathesh, Secure File Sharing Of Dynamic Audit Services in Cloud Storage,International Journal of Research in Engineering and Technology (IJRET),Vol. 03, Issue.05, ISSN All Rights Reserved 2016 IJEETE Page 240

ISSN Vol.08,Issue.16, October-2016, Pages:

ISSN Vol.08,Issue.16, October-2016, Pages: ISSN 2348 2370 Vol.08,Issue.16, October-2016, Pages:3146-3152 www.ijatir.org Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation VEDIRE AJAYANI 1, K. TULASI 2, DR P. SUNITHA

More information

Efficient integrity checking technique for securing client data in cloud computing

Efficient integrity checking technique for securing client data in cloud computing International Journal of Electrical & Computer Sciences IJECS-IJENS Vol: 11 No: 05 43 Efficient integrity checking technique for securing client data in cloud computing Dalia Attas and Omar Batrafi Computer

More information

Survey Paper on Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud

Survey Paper on Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,

More information

Keywords Cloud Data Storage, Privacy Preserving, Public Auditability, Cryptographic Protocols, Cloud Computing.

Keywords Cloud Data Storage, Privacy Preserving, Public Auditability, Cryptographic Protocols, Cloud Computing. Volume 4, Issue 10, October 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Implementation

More information

DATA INTEGRITY TECHNIQUES IN CLOUD: AN ANALYSIS

DATA INTEGRITY TECHNIQUES IN CLOUD: AN ANALYSIS DATA INTEGRITY TECHNIQUES IN CLOUD: AN ANALYSIS 1 MS. R. K. PANDYA, 2 PROF. K. K. SUTARIA 1 M.E.[Cloud Computing] Student, Computer Engineering Department, V. V. P. Engineering College, Rajkot, Gujarat

More information

Fine-Grained Data Updates on Cloud with Authorized Public Auditing

Fine-Grained Data Updates on Cloud with Authorized Public Auditing IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 03, 2015 ISSN (online): 2321-0613 Fine-Grained Data Updates on Cloud with Authorized Public Auditing Sindhu L 1 Ms Leelavathi

More information

Integrity Check Mechanism in Cloud Using SHA-512 Algorithm

Integrity Check Mechanism in Cloud Using SHA-512 Algorithm www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 5 may, 2014 Page No. 6033-6037 Integrity Check Mechanism in Cloud Using SHA-512 Algorithm Mrs.Shantala

More information

Improving data integrity on cloud storage services

Improving data integrity on cloud storage services International Journal of Engineering Science Invention Volume 2 Issue 2 ǁ February. 2013 Improving data integrity on cloud storage services Miss. M.Sowparnika 1, Prof. R. Dheenadayalu 2 1 (Department of

More information

Batch Verification Scheme for Economic Cloud Storage Services

Batch Verification Scheme for Economic Cloud Storage Services Batch Verification Scheme for Economic Cloud Storage Services K. Sudha 1, Mr. S. Sivaraj, ME 2 II-M.E (CSE), Dept. of CSE, SSM College of Engineering, Komarapalayam, Tamilnadu, India 1 Assistant Professor,

More information

International Journal of Advance Engineering and Research Development. Carefree Data Access Solution for Public Cloud Storage

International Journal of Advance Engineering and Research Development. Carefree Data Access Solution for Public Cloud Storage Scientific Journal of Impact Factor (SJIF): 4.14 International Journal of Advance Engineering and Research Development Volume 3, Issue 3, March -2016 Carefree Data Access Solution for Public Cloud Storage

More information

Privacy Preserving Public Auditing in Secured Cloud Storage Using Block Authentication Code

Privacy Preserving Public Auditing in Secured Cloud Storage Using Block Authentication Code Privacy Preserving Public Auditing in Secured Cloud Storage Using Block Authentication Code Sajeev V 1, Gowthamani R 2 Department of Computer Science, Nehru Institute of Technology, Coimbatore, India 1,

More information

EFFICIENT DATA SHARING WITH ATTRIBUTE REVOCATION FOR CLOUD STORAGE

EFFICIENT DATA SHARING WITH ATTRIBUTE REVOCATION FOR CLOUD STORAGE EFFICIENT DATA SHARING WITH ATTRIBUTE REVOCATION FOR CLOUD STORAGE Chakali Sasirekha 1, K. Govardhan Reddy 2 1 M.Tech student, CSE, Kottam college of Engineering, Chinnatekuru(V),Kurnool,Andhra Pradesh,

More information

Public Auditing on Shared Data in the Cloud Using Ring Signature Mechanism

Public Auditing on Shared Data in the Cloud Using Ring Signature Mechanism Public Auditing on Shared Data in the Cloud Using Ring Signature Mechanism MS. Gayatri D Patwardhan Prof.B. W. Balkhande Abstract: Cloud computing is the long dreamed vision of computing as a utility,

More information

Enhancing Reliability and Scalability in Dynamic Group System Using Three Level Security Mechanisms

Enhancing Reliability and Scalability in Dynamic Group System Using Three Level Security Mechanisms Enhancing Reliability and Scalability in Dynamic Group System Using Three Level Security Mechanisms A.Sarika*1, Smt.J.Raghaveni*2 M.Tech Student, Dept of CSE, S.R.K.R Engineering college, Bhimavaram, AP,

More information

Data Integrity Verification in Cloud Storage without using Trusted Third Party Auditor

Data Integrity Verification in Cloud Storage without using Trusted Third Party Auditor Data Integrity Verification in Cloud Storage without using Trusted Third Party Auditor Rana M Pir Lecturer Leading university, sylhet Bangladesh Ranapir@yahoo.com Abstract Data security is biggest problem.

More information

SECURING DISTRIBUTED ACCOUNTABILITY FOR DATA SHARING IN CLOUD COMPUTING

SECURING DISTRIBUTED ACCOUNTABILITY FOR DATA SHARING IN CLOUD COMPUTING SECURING DISTRIBUTED ACCOUNTABILITY FOR DATA SHARING IN CLOUD COMPUTING N. RAMESH 1, D. ANIL M.E 2, M. KIRAN 3 1, M.TECH Scholar, VEC, Kavali 2, Assistant Professor, VEC, Kavali 3, Assistant Professor,

More information

SEGMENT STATURE HASH TABLE BASED COST EFFICIENT DATA SHARING IN CLOUD ENVIRONMENT

SEGMENT STATURE HASH TABLE BASED COST EFFICIENT DATA SHARING IN CLOUD ENVIRONMENT SEGMENT STATURE HASH TABLE BASED COST EFFICIENT DATA SHARING IN CLOUD ENVIRONMENT K. Karthika Lekshmi 1, Dr. M. Vigilsonprem 2 1 Assistant Professor, Department of Information Technology, Cape Institute

More information

ABSTRACT I. INTRODUCTION. Telangana, India 2 Professor, Department of Computer Science & Engineering, Shadan College of Engineering & Technology,

ABSTRACT I. INTRODUCTION. Telangana, India 2 Professor, Department of Computer Science & Engineering, Shadan College of Engineering & Technology, International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 6 ISSN : 2456-3307 Secure Proxy Server Data Sharing Scheme in Hybrid

More information

A Quasi group Encryption based Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing

A Quasi group Encryption based Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing Volume 4, No. 2, Jan-Feb 2013 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at www.ijarcs.info ISSN No. 0976-5697 A Quasi group Encryption based Privacy-Preserving

More information

ISSN: [Shubhangi* et al., 6(8): August, 2017] Impact Factor: 4.116

ISSN: [Shubhangi* et al., 6(8): August, 2017] Impact Factor: 4.116 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY DE-DUPLICABLE EFFECTIVE VALIDATION of CAPACITY for DYNAMIC USER ENVIRONMENT Dr. Shubhangi D C *1 & Pooja 2 *1 HOD, Department

More information

Cloud security is an evolving sub-domain of computer and. Cloud platform utilizes third-party data centers model. An

Cloud security is an evolving sub-domain of computer and. Cloud platform utilizes third-party data centers model. An Abstract Cloud security is an evolving sub-domain of computer and network security. Cloud platform utilizes third-party data centers model. An example of cloud platform as a service (PaaS) is Heroku. In

More information

Available online at ScienceDirect. Procedia Computer Science 48 (2015 ) (ICCC-2014) (ICCC-2015)

Available online at   ScienceDirect. Procedia Computer Science 48 (2015 ) (ICCC-2014) (ICCC-2015) Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 48 (2015 ) 347 352 International Conference on Intelligent Computing, Communication & Convergence (ICCC-2015) (ICCC-2014)

More information

Secure Evaluation of Public Auditing For Personal and Shared Data with Efficient User Revocation in Cloud Computing

Secure Evaluation of Public Auditing For Personal and Shared Data with Efficient User Revocation in Cloud Computing Secure Evaluation of Public Auditing For Personal and Shared Data with Efficient User Revocation in Cloud Computing Chinta Mounika M.Tech Student, Department of Computer Science and Engineering, B.V.C

More information

SECURE SHARING OF DATA IN PRIVATE CLOUD BY RSA OAEP ALGORITHM. SRM University, Chennai

SECURE SHARING OF DATA IN PRIVATE CLOUD BY RSA OAEP ALGORITHM. SRM University, Chennai Volume 115 No. 6 2017, 689-695 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu SECURE SHARING OF DATA IN PRIVATE CLOUD BY RSA OAEP ALGORITHM S. Selvakumar

More information

Efficient Data Storage Security with Multiple Batch Auditing in Cloud Computing

Efficient Data Storage Security with Multiple Batch Auditing in Cloud Computing Efficient Data Storage Security with Multiple Batch Auditing in Cloud Computing P. Sukumar [1] Department of Computer Science Sri Venkateswara College of Engineering, Chennai B. Sathiya [2] Department

More information

AES and DES Using Secure and Dynamic Data Storage in Cloud

AES and DES Using Secure and Dynamic Data Storage in Cloud Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,

More information

A Survey on Secure Storage in Cloud Computing

A Survey on Secure Storage in Cloud Computing Indian Journal of Science and Technology A Survey on Secure Storage in Cloud Computing A. Rajathi 1* and N. Saravanan 2 1 PG Student, School of Computing, SASTRA University, 613401, Thanjavur, Tamilnadu,

More information

Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing

Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing S.NO PROJECT CODE IEEE JAVA PROJECT TITLES DOMAIN 1 NEO1501 A Hybrid Cloud Approach for Secure Authorized Deduplication 2 NEO1502 A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud

More information

Secure Auditing For Outsourced Data in Cloud Using Homomorphic Token and Erasure Code

Secure Auditing For Outsourced Data in Cloud Using Homomorphic Token and Erasure Code Secure Auditing For Outsourced Data in Cloud Using Homomorphic Token and Erasure Code N.S. Monalisa Devi 1, T. Sounder Rajan 2 M.E. Department of CSE, K S R College for Engineering and Technology, Tiruchengode,

More information

Dynamic and Flexible Group Key Generation Based on User Behaviour Monitoring

Dynamic and Flexible Group Key Generation Based on User Behaviour Monitoring International Journal of Computing Academic Research (IJCAR) ISSN 2305-9184, Volume 5, Number 1 (February 2016), pp.27-32 MEACSE Publications http://www.meacse.org/ijcar Dynamic and Flexible Group Key

More information

Group User Revocation in Cloud for Shared Data

Group User Revocation in Cloud for Shared Data Group User Revocation in Cloud for Shared Data Mahesh Salunke, Harshal Meher, Ajay Tambe, Sudir Deshmukh,Prof.Sanjay Agarwal Abstract With the excessive use of internet cloud has received much of the attention.

More information

Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage

Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage Dr.S.Masood Ahamed 1, N.Mounika 2, N.vasavi 3, M.Vinitha Reddy 4 HOD, Department of Computer Science & Engineering,, Guru Nanak

More information

Void main Technologies

Void main Technologies Sno Title Domain 1. A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification 2. A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing 3. A Modified

More information

International Journal of Advance Research in Engineering, Science & Technology

International Journal of Advance Research in Engineering, Science & Technology Impact Factor (SJIF): 5.302 International Journal of Advance Research in Engineering, Science & Technology e-issn: 2393-9877, p-issn: 2394-2444 Volume 5, Issue 3, March-2018 Key Aggregate Tagged File Searching(KATFS)

More information

International Journal of Advance Engineering and Research Development. AN Optimal Matrix Approach for virtual load allocation and data sharing

International Journal of Advance Engineering and Research Development. AN Optimal Matrix Approach for virtual load allocation and data sharing Scientific Journal of Impact Factor (SJIF): 5.71 International Journal of Advance Engineering and Research Development Volume 5, Issue 02, February -2018 e-issn (O): 2348-4470 p-issn (P): 2348-6406 AN

More information

Preserving Data Integrity in Cloud Storage

Preserving Data Integrity in Cloud Storage Preserving Data Integrity in Cloud Storage Jegadeesan.K 1, Sivakumar.K 2 M.E, Department of CCE, Erode Builder Educational Trust s Group of Institutions, Kangayam, Tamilnadu, India 1 M.E, Department of

More information

Remote Data Checking: Auditing the Preservation Status of Massive Data Sets on Untrusted Store

Remote Data Checking: Auditing the Preservation Status of Massive Data Sets on Untrusted Store Remote Data Checking: Auditing the Preservation Status of Massive Data Sets on Untrusted Store Randal Burns randal@cs.jhu.edu www.cs.jhu.edu/~randal/ Department of Computer Science, Johns Hopkins Univers

More information

A LTERATURE SURVEY ON REVOCABLE MULTIAUTHORITY CIPHER TEXT-POLICY ATTRIBUTE-BASED ENCRYPTION (CP-ABE) SCHEME FOR CLOUD STORAGE

A LTERATURE SURVEY ON REVOCABLE MULTIAUTHORITY CIPHER TEXT-POLICY ATTRIBUTE-BASED ENCRYPTION (CP-ABE) SCHEME FOR CLOUD STORAGE A LTERATURE SURVEY ON REVOCABLE MULTIAUTHORITY CIPHER TEXT-POLICY ATTRIBUTE-BASED ENCRYPTION (CP-ABE) SCHEME FOR CLOUD STORAGE Vinoth Kumar P, Dr.P.D.R. Vijaya Kumar 1 PG Student, INFO Institute of Engineering,

More information

Improved Third Party Auditing Approach For Shared Data In The Cloud With Efficient Revocation Of User

Improved Third Party Auditing Approach For Shared Data In The Cloud With Efficient Revocation Of User Improved Third Party Auditing Approach For Shared Data In The Cloud With Efficient Revocation Of User Miss Madhuri Kulkarni PG Student, Dept. Of Computer Engineering, Alard Collage of Engineering and Management,

More information

A Public Auditing Framework for Cloud Storage Security

A Public Auditing Framework for Cloud Storage Security A Public Auditing Framework for Cloud Storage Security S. Satish Kumar A.Sudheer Kumar D.Venkatesh M.Tech Student (CSE) Assistant Professor Dean of CSE & IT GATES Institute of Tech, Gooty GATES Institute

More information

SDD: A Novel Technique for Enhancing Cloud Security with Self Destructing Data

SDD: A Novel Technique for Enhancing Cloud Security with Self Destructing Data SDD: A Novel Technique for Enhancing Cloud Security with Self Destructing Data Kishore K, Ramchand V M.Tech Student, Dept. of CSE, The Oxford College Of Engineering, Bangalore, India Associate Professor,

More information

STRUCTURED EMINENT DYNAMIC AUDITING FOR SECURE DATA STORAGE IN CLOUD COMPUTING

STRUCTURED EMINENT DYNAMIC AUDITING FOR SECURE DATA STORAGE IN CLOUD COMPUTING INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 STRUCTURED EMINENT DYNAMIC AUDITING FOR SECURE DATA STORAGE IN CLOUD COMPUTING Mr.Elamparithi P 1, Mr.Thanga Mariappan

More information

QUALITY OF SEVICE WITH DATA STORAGE SECURITY IN CLOUD COMPUTING

QUALITY OF SEVICE WITH DATA STORAGE SECURITY IN CLOUD COMPUTING QUALITY OF SEVICE WITH DATA STORAGE SECURITY IN CLOUD COMPUTING ABSTRACT G KALYANI 1* 1. M.Tech Student, Dept of CSE Indira Institute of Engineering and Technology, Markapur, AP. Cloud computing has been

More information

MANAGING OF CLOUD STORAGE AUDITING FOR DATA INTEGRITY

MANAGING OF CLOUD STORAGE AUDITING FOR DATA INTEGRITY MANAGING OF CLOUD STORAGE AUDITING FOR DATA INTEGRITY GARNEPALLI MOUNIKA 1, N.SANTHOSH RAMCHANDER 2 M. Tech Student, CSE, SVS Group of Institutions, Warangal, TS 1 M.Tech (Ph.D) Assoc. Prof, CSE Dept,

More information

JAVA IEEE TRANSACTION ON CLOUD COMPUTING. 1. ITJCC01 Nebula: Distributed Edge Cloud for Data Intensive Computing

JAVA IEEE TRANSACTION ON CLOUD COMPUTING. 1. ITJCC01 Nebula: Distributed Edge Cloud for Data Intensive Computing JAVA IEEE TRANSACTION ON CLOUD COMPUTING 1. ITJCC01 Nebula: Distributed Edge Cloud for Data Intensive Computing 2. ITJCC02 A semi-automatic and trustworthy scheme for continuous cloud service certification

More information

Enhancing Availability Using Identity Privacy Preserving Mechanism in Cloud Data Storage

Enhancing Availability Using Identity Privacy Preserving Mechanism in Cloud Data Storage Enhancing Availability Using Identity Privacy Preserving Mechanism in Cloud Data Storage V.Anjani Kranthi *1, Smt.D.Hemalatha *2 M.Tech Student, Dept of CSE, S.R.K.R engineering college, Bhimavaram, AP,

More information

IMPROVING DATA SECURITY USING ATTRIBUTE BASED BROADCAST ENCRYPTION IN CLOUD COMPUTING

IMPROVING DATA SECURITY USING ATTRIBUTE BASED BROADCAST ENCRYPTION IN CLOUD COMPUTING IMPROVING DATA SECURITY USING ATTRIBUTE BASED BROADCAST ENCRYPTION IN CLOUD COMPUTING 1 K.Kamalakannan, 2 Mrs.Hemlathadhevi Abstract -- Personal health record (PHR) is an patient-centric model of health

More information

Implementation of IBE with Outsourced Revocation technique in Cloud Computing

Implementation of IBE with Outsourced Revocation technique in Cloud Computing Implementation of IBE with Outsourced Revocation technique in Cloud Computing M.MOHANRAO, POCKLA PAVANI Assistant Professor, M.TECH STUDENT Dept of CSE,Megha Institute of Engineering & Technology For womens,edulabad,ghatkesar

More information

A Review on Remote Data Auditing in Cloud Computing

A Review on Remote Data Auditing in Cloud Computing A Review on Remote Data Auditing in Cloud Computing [1] Arjun U, [2] Vinay S [1] Asst. Professor, [2] Professor [1] Dept. of ISE, PESITM Shivamogga, [2] Dept. of CSE, PESCE, Mandya Abstract: Cloud computing

More information

Efficient Auditable Access Control Systems for Public Shared Cloud Storage

Efficient Auditable Access Control Systems for Public Shared Cloud Storage Efficient Auditable Access Control Systems for Public Shared Cloud Storage Vidya Patil 1, Prof. Varsha R. Dange 2 Student, Department of Computer Science Dhole Patil College of Engineering, Pune, Maharashtra,

More information

Attribute Based Encryption with Privacy Protection in Clouds

Attribute Based Encryption with Privacy Protection in Clouds Attribute Based Encryption with Privacy Protection in Clouds Geetanjali. M 1, Saravanan. N 2 PG Student, Department of Information Technology, K.S.R College of Engineering, Tiruchengode, Tamilnadu, India

More information

Key Terms: Cloud Computing, cloud Service Provider, Provable Data Possession, Dynamic File Block, Map Version Table.

Key Terms: Cloud Computing, cloud Service Provider, Provable Data Possession, Dynamic File Block, Map Version Table. Volume 6, Issue 6, June 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Dynamic File Block

More information

Secure Data De-Duplication With Dynamic Ownership Management In Cloud Storage

Secure Data De-Duplication With Dynamic Ownership Management In Cloud Storage Secure Data De-Duplication With Dynamic Ownership Management In Cloud Storage 1 A. Sumathi, PG Scholar, Department Of Computer Science And Engineering, Maha Barathi Engineering College, Chinna Salem, Villupuram,

More information

Certificateless Public Key Cryptography

Certificateless Public Key Cryptography Certificateless Public Key Cryptography Mohsen Toorani Department of Informatics University of Bergen Norsk Kryptoseminar November 9, 2011 1 Public Key Cryptography (PKC) Also known as asymmetric cryptography.

More information

THIRD PARTY AUDITING FOR CLOUD STORAGE

THIRD PARTY AUDITING FOR CLOUD STORAGE Int. J. Engg. Res. & Sci. & Tech. 2015 Kedar Jayesh Rasal and Sandip A Kahate, 2015 Research Paper ISSN 2319-5991 www.ijerst.com Vol. 4, No. 2, May 2015 2015 IJERST. All Rights Reserved THIRD PARTY AUDITING

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK TECHNIQUES FOR ENSURING DATA STORAGE SECURITY IN CLOUD COMPUTING GANESH B. CHAVAN

More information

Implementation of Decentralized Access Control with Anonymous Authentication in Cloud

Implementation of Decentralized Access Control with Anonymous Authentication in Cloud Volume-5, Issue-6, December-2015 International Journal of Engineering and Management Research Page Number: 210-214 Implementation of Decentralized Access Control with Anonymous Authentication in Cloud

More information

THIRD PARTY AUDITING FOR SECURE DATA STORAGE IN CLOUD THROUGH DIGITAL SIGNATURE USING RSA

THIRD PARTY AUDITING FOR SECURE DATA STORAGE IN CLOUD THROUGH DIGITAL SIGNATURE USING RSA THIRD PARTY AUDITING FOR SECURE DATA STORAGE IN CLOUD THROUGH DIGITAL SIGNATURE USING RSA ABSTRACT K.Govinda #1, V.Gurunathaprasad #2, H.Sathishkumar #3 Cloud computing is the way of providing computing

More information

A Secure Cloud Storage System for Supporting Privacy-Preserving Public Auditing

A Secure Cloud Storage System for Supporting Privacy-Preserving Public Auditing A Secure Cloud Storage System for Supporting Privacy-Preserving Public Auditing Yenduva Venkata Mukesh Naidu M.Tech Student Deparment of CSE, Chaitanya Engineering College, Kommadi, Madhurawada, Visakhapatnam.

More information

DECENTRALIZED ATTRIBUTE-BASED ENCRYPTION AND DATA SHARING SCHEME IN CLOUD STORAGE

DECENTRALIZED ATTRIBUTE-BASED ENCRYPTION AND DATA SHARING SCHEME IN CLOUD STORAGE DECENTRALIZED ATTRIBUTE-BASED ENCRYPTION AND DATA SHARING SCHEME IN CLOUD STORAGE ABSTRACT We propose a Multi-Authority Attribute-Based Encryption (ABE) system. In our system, any party can become an authority

More information

A Comparative Analysis of Provable Data Possession Schemes in Cloud

A Comparative Analysis of Provable Data Possession Schemes in Cloud A Comparative Analysis of Provable Data Possession Schemes in Cloud Pooja Natu #, Prof. Shikha Pachouly * # PG scholar AISSMS COE, Department of Computer Engineering, Savitribai Phule Pune University,

More information

IMPLEMENTATION OF KERBEROS BASED AUTHENTICATED KEY EXCHANGE PROTOCOL FOR PARALLEL NETWORK FILE SYSTEMS IN CLOUD

IMPLEMENTATION OF KERBEROS BASED AUTHENTICATED KEY EXCHANGE PROTOCOL FOR PARALLEL NETWORK FILE SYSTEMS IN CLOUD [1] [1] ISSN: 0976-3104 SPECIAL ISSUE: Emerging Technologies in Networking and Security (ETNS) Chandravathi et al. ARTICLE OPEN ACCESS IMPLEMENTATION OF KERBEROS BASED AUTHENTICATED KEY EXCHANGE PROTOCOL

More information

JAVA IEEE TRANSACTION ON CLOUD COMPUTING. 1. ITJCC01 Nebula: Distributed Edge Cloud for Data Intensive Computing

JAVA IEEE TRANSACTION ON CLOUD COMPUTING. 1. ITJCC01 Nebula: Distributed Edge Cloud for Data Intensive Computing JAVA IEEE TRANSACTION ON CLOUD COMPUTING 1. ITJCC01 Nebula: Distributed Edge for Data Intensive Computing 2. ITJCC02 A semi-automatic and trustworthy scheme for continuous cloud service certification 3.

More information

Product Brief. Circles of Trust.

Product Brief. Circles of Trust. Product Brief Circles of Trust www.cryptomill.com product overview Circles of Trust is an enterprise security software system that eliminates the risks associated with data breaches from a hacker attack

More information

Auditing-as-a-Service for Cloud Storage

Auditing-as-a-Service for Cloud Storage Auditing-as-a-Service for Cloud Storage Alshaimaa Abo-alian, N. L. Badr, M. F. Tolba, Faculty of Information and Computer Sciences, Ain shams University, Cairo, Egypt shimo.fcis83@gmail.com, dr.nagwabadr@gmail.com,

More information

Enhanced Novel Multilevel Secure User Authentication Scheme in Cloud.

Enhanced Novel Multilevel Secure User Authentication Scheme in Cloud. Enhanced Novel Multilevel Secure User Authentication Scheme in Cloud. A.Lakshmi Pavani 1, K.Devi Priya 2 1 M. Tech Student, Department of Computer Science and Engineering, Aditya Engineering College, Surampalem,

More information

Security context. Technology. Solution highlights

Security context. Technology. Solution highlights Code42 CrashPlan Security Code42 CrashPlan provides continuous, automatic desktop and laptop backup. Our layered approach to security exceeds industry best practices and fulfills the enterprise need for

More information

Securing Distributed Computation via Trusted Quorums. Yan Michalevsky, Valeria Nikolaenko, Dan Boneh

Securing Distributed Computation via Trusted Quorums. Yan Michalevsky, Valeria Nikolaenko, Dan Boneh Securing Distributed Computation via Trusted Quorums Yan Michalevsky, Valeria Nikolaenko, Dan Boneh Setting Distributed computation over data contributed by users Communication through a central party

More information

Authentication Technology for a Smart eid Infrastructure.

Authentication Technology for a Smart eid Infrastructure. Authentication Technology for a Smart eid Infrastructure. www.aducid.com One app to access all public and private sector online services. One registration allows users to access all their online accounts

More information

ADVANCES in NATURAL and APPLIED SCIENCES

ADVANCES in NATURAL and APPLIED SCIENCES ADVANCES in NATURAL and APPLIED SCIENCES ISSN: 1995-0772 Published BY AENSI Publication EISSN: 1998-1090 http://www.aensiweb.com/anas 2016 May 10(5): pages 223-227 Open Access Journal An Efficient Proxy

More information

ENSURING PRIVACY OF E-MEDICAL HEALTH RECORDS USING TRIPLE- DES ALGORITHM

ENSURING PRIVACY OF E-MEDICAL HEALTH RECORDS USING TRIPLE- DES ALGORITHM ENSURING PRIVACY OF E-MEDICAL HEALTH RECORDS USING TRIPLE- DES ALGORITHM Ms. S. P. Vidhya Priya 1, Dharani.N.R 2, Gokilavani.M 3, Jeevitha.R 4 1,2,3,4 Department of Information Technology, Kathir College

More information

Short-term Linkable Group Signatures with Categorized Batch Verification

Short-term Linkable Group Signatures with Categorized Batch Verification Short-term Linkable Group Signatures with Categorized Batch Verification Lukas Malina 1, Jordi Castella-Rocà 2, Arnau Vives-Guasch 2, Jan Hajny 1 1 Department of Telecommunications Faculty of Electrical

More information

Cryptographic proof of custody for incentivized file-sharing

Cryptographic proof of custody for incentivized file-sharing Cryptographic proof of custody for incentivized file-sharing Pavel Kravchenko 1, Vlad Zamfir 2 1 Distributed Lab, pavel@distributedlab.com 2 Coinculture, vlad@coinculture.info Abstract. A cryptographic

More information

Secure Role-Based Access Control on Encrypted Data in Cloud Storage using ARM

Secure Role-Based Access Control on Encrypted Data in Cloud Storage using ARM Secure Role-Based Access Control on Encrypted Data in Cloud Storage using ARM Rohini Vidhate, V. D. Shinde Abstract With the rapid developments occurring in cloud computing and services, there has been

More information

International Journal of Computer Engineering and Applications,

International Journal of Computer Engineering and Applications, International Journal of Computer Engineering and Applications, Volume XI, Issue IX, September 17, www.ijcea.com ISSN 2321-3469 DATA INTEGRITY CHECK IN CLOUD COMPUTING: A FRAMEWORK Neha Thakur 1, Aman

More information

RADIAN6 SECURITY, PRIVACY, AND ARCHITECTURE

RADIAN6 SECURITY, PRIVACY, AND ARCHITECTURE ADIAN6 SECUITY, PIVACY, AND ACHITECTUE Last Updated: May 6, 2016 Salesforce s Corporate Trust Commitment Salesforce is committed to achieving and maintaining the trust of our customers. Integral to this

More information

Secure Data Sharing using Attribute Based Encryption with Revocation in Cloud Computing

Secure Data Sharing using Attribute Based Encryption with Revocation in Cloud Computing ISSN No: 2454-9614 Secure Data Sharing using Attribute Based Encryption with Revocation in Cloud Computing *Corresponding Author: D. Vaduganathan E-mail:vaduganathan.kce@gmail.com D. Vaduganathan a a)

More information

CloudSky: A Controllable Data Self-Destruction System for Untrusted Cloud Storage Networks

CloudSky: A Controllable Data Self-Destruction System for Untrusted Cloud Storage Networks CloudSky: A Controllable Data Self-Destruction System for Untrusted Cloud Storage Networks The material in these slides mainly comes from the paper CloudSky: A Controllable Data Self-Destruction System

More information

Virtual Machine Encryption Security & Compliance in the Cloud

Virtual Machine Encryption Security & Compliance in the Cloud Virtual Machine Encryption Security & Compliance in the Cloud Pius Graf Director Sales Switzerland 27.September 2017 Agenda Control Your Data In The Cloud Overview Virtual Machine Encryption Architecture

More information

PRIVACY PRESERVING RANKED MULTI KEYWORD SEARCH FOR MULTIPLE DATA OWNERS. SRM University, Kattankulathur, Chennai, IN.

PRIVACY PRESERVING RANKED MULTI KEYWORD SEARCH FOR MULTIPLE DATA OWNERS. SRM University, Kattankulathur, Chennai, IN. Volume 115 No. 6 2017, 585-589 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu PRIVACY PRESERVING RANKED MULTI KEYWORD SEARCH FOR MULTIPLE DATA OWNERS

More information

HLA BASED THIRD PARTY AUDITING FOR SECURE CLOUD STORAGE

HLA BASED THIRD PARTY AUDITING FOR SECURE CLOUD STORAGE HLA BASED THIRD PARTY AUDITING FOR SECURE CLOUD STORAGE Mr. N.R. Rejin Paul Assistant Professor, Department of Computer Science and Engineering, Velammal Institute of Technology, Chennai, Tamilnadu, India.

More information

ISSN Vol.04,Issue.05, May-2016, Pages:

ISSN Vol.04,Issue.05, May-2016, Pages: WWW.IJITECH.ORG ISSN 2321-8665 Vol.04,Issue.05, May-2016, Pages:0737-0741 Secure Cloud Storage using Decentralized Access Control with Anonymous Authentication C. S. KIRAN 1, C. SRINIVASA MURTHY 2 1 PG

More information

FADE: A Secure Overlay Cloud Storage System with Access Control and Assured Deletion. Patrick P. C. Lee

FADE: A Secure Overlay Cloud Storage System with Access Control and Assured Deletion. Patrick P. C. Lee FADE: A Secure Overlay Cloud Storage System with Access Control and Assured Deletion Patrick P. C. Lee 1 Cloud Storage is Emerging Cloud storage is now an emerging business model for data outsourcing Individual

More information

Security Digital Certificate Manager

Security Digital Certificate Manager System i Security Digital Certificate Manager Version 6 Release 1 System i Security Digital Certificate Manager Version 6 Release 1 Note Before using this information and the product it supports, be sure

More information

Analysis of Attribute Set-Based Encryption Solution for Access Control in Cloud Computing

Analysis of Attribute Set-Based Encryption Solution for Access Control in Cloud Computing Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 2, Issue. 9, September 2013,

More information

Cloud Computing Security: From Single to Multi-Clouds

Cloud Computing Security: From Single to Multi-Clouds 2012 45th Hawaii International Conference on System Sciences Cloud Computing Security: From Single to Multi-Clouds Abstract: The use of cloud computing has increased rapidly in many organizations. Cloud

More information

Secure Data Storage and Data Retrieval in Cloud Storage using Cipher Policy Attribute based Encryption

Secure Data Storage and Data Retrieval in Cloud Storage using Cipher Policy Attribute based Encryption Indian Journal of Science and Technology, Vol 8(S9), 318 325, May 2015 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 DOI: 10.17485/ijst/2015/v8iS9/65600 Secure Data Storage and Data Retrieval in Cloud

More information

IBM. Security Digital Certificate Manager. IBM i 7.1

IBM. Security Digital Certificate Manager. IBM i 7.1 IBM IBM i Security Digital Certificate Manager 7.1 IBM IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in

More information

A Simple Secure Auditing for Cloud Storage

A Simple Secure Auditing for Cloud Storage A Simple Secure Auditing for Cloud Storage Lee-Hur Shing Institute of Information Science Academia Sinica leehurs@iis.sinica.edu.tw Marn-Ling Shing University of Taipei Yu-Hsuan Yeh, Yan-Zhi Hu and Shih-Ci

More information

Pass, No Record: An Android Password Manager

Pass, No Record: An Android Password Manager Pass, No Record: An Android Password Manager Alex Konradi, Samuel Yeom December 4, 2015 Abstract Pass, No Record is an Android password manager that allows users to securely retrieve passwords from a server

More information

VIAF: Verification-based Integrity Assurance Framework for MapReduce. YongzhiWang, JinpengWei

VIAF: Verification-based Integrity Assurance Framework for MapReduce. YongzhiWang, JinpengWei VIAF: Verification-based Integrity Assurance Framework for MapReduce YongzhiWang, JinpengWei MapReduce in Brief Satisfying the demand for large scale data processing It is a parallel programming model

More information

HOST Authentication Overview ECE 525

HOST Authentication Overview ECE 525 Authentication Overview Authentication refers to the process of verifying the identity of the communicating principals to one another Usually sub-divided into Entity authentication Authentication in real-time

More information

ENCRYPTED DATA MANAGEMENT WITH DEDUPLICATION IN CLOUD COMPUTING

ENCRYPTED DATA MANAGEMENT WITH DEDUPLICATION IN CLOUD COMPUTING ENCRYPTED DATA MANAGEMENT WITH DEDUPLICATION IN CLOUD COMPUTING S KEERTHI 1*, MADHAVA REDDY A 2* 1. II.M.Tech, Dept of CSE, AM Reddy Memorial College of Engineering & Technology, Petlurivaripalem. 2. Assoc.

More information

HIGH LEVEL SECURITY IMPLEMENTATION IN DATA SHARING ON SOCIAL WEBSITES

HIGH LEVEL SECURITY IMPLEMENTATION IN DATA SHARING ON SOCIAL WEBSITES HIGH LEVEL SECURITY IMPLEMENTATION IN DATA SHARING ON SOCIAL WEBSITES P.Senthil Kumar 1 Associate professor, PSNA college of engineering and technology,dindigul,tamilnadu,india Abstract: With the recent

More information

Development of new security infrastructure design principles for distributed computing systems based on open protocols

Development of new security infrastructure design principles for distributed computing systems based on open protocols Development of new security infrastructure design principles for distributed computing systems based on open protocols Yu. Yu. Dubenskaya a, A. P. Kryukov, A. P. Demichev Skobeltsyn Institute of Nuclear

More information

PERFORMANCE OF CLOUD DATA INTEGRITY PROOFS IN CLOUD STORAGE SYSTEM USING CRYPTOGRAPHIC KEY

PERFORMANCE OF CLOUD DATA INTEGRITY PROOFS IN CLOUD STORAGE SYSTEM USING CRYPTOGRAPHIC KEY PERFORMANCE OF CLOUD DATA INTEGRITY PROOFS IN CLOUD STORAGE SYSTEM USING CRYPTOGRAPHIC KEY B.M.RAJESH 1 Asst Prof, Department of Information Technology, SNMV College of Arts and Science, Tamil Nadu, India

More information

BACKUP APP V7 CLOUUD FILE BACKUP & RESTORE GUIDE FOR WINDOWS

BACKUP APP V7 CLOUUD FILE BACKUP & RESTORE GUIDE FOR WINDOWS V7 CLOUUD FILE BACKUP & RESTORE GUIDE FOR WINDOWS Table of Contents 1 Overview... 1 1.1 About This Document... 7 2 Preparing for Backup and Restore... 8 2.1 Hardware Requirement... 8 2.2 Software Requirement...

More information

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data An Efficient Privacy-Preserving Ranked Keyword Search Method Cloud data owners prefer to outsource documents in an encrypted form for the purpose of privacy preserving. Therefore it is essential to develop

More information

Public-key Cryptography: Theory and Practice

Public-key Cryptography: Theory and Practice Public-key Cryptography Theory and Practice Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Chapter 1: Overview What is Cryptography? Cryptography is the study of

More information

Survey on Efficient Audit Service to Ensure Data Integrity in Cloud Environment

Survey on Efficient Audit Service to Ensure Data Integrity in Cloud Environment Global Journal of Computer Science and Technology Software & Data Engineering Volume 13 Issue 4 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information