Management of Heterogeneous Data Storage Using Deduplication in Cloud Computing

Size: px
Start display at page:

Download "Management of Heterogeneous Data Storage Using Deduplication in Cloud Computing"

Transcription

1 Management of Heterogeneous Data Storage Using Deduplication in Cloud Computing 1 Naveen Kumar.B 2 Mr.Praveen Babu.G 1 M.Tech Student, Software Engineering, School of Information Technology JNTUH, Village Kukatpally, Telangana, India. 2 Associate Professor, Department of CSE, School of Information Technology JNTUH, Village Kukatpally, Telangana, India. ABSTRACT: Distributed storage as a standout amongst the most essential administrations of distributed computing helps cloud clients break the bottleneck of limited assets and extend their capacity without overhauling their gadgets. So as to ensure the security and protection of cloud clients, information are constantly outsourced in an encoded shape. Consistently expanding volume of go down information in distributed storage might be a key test. There is a need of information administration as go down windows are contracting because of development of data. In this way, to make information administration versatile de-duplication idea is utilized. It is a system of keeping just a single one of a kind occurrence of information duplicate by distinguishing indistinguishable information duplicates and disposing of those with the goal that it could enhance stockpiling use, framework execution of capacity framework.. Be that as it may, scrambled information could acquire much misuse of cloud capacity and confound information sharing among approved clients. We are as yet confronting challenges on scrambled information stockpiling and administration with de-duplication. Conventional de-duplication plots dependably center on particular application situations, in which the deduplication is totally controlled by either information proprietors or cloud servers. They can't adaptable fulfill different requests of information proprietors as indicated by the level of information affectability. In this paper, we propose a heterogeneous information stockpiling administration conspire, which adaptable offers both de-duplication administration and access control in the meantime over numerous Cloud Specialist co-ops (CSPs). We assess its execution with security examination, correlation and usage. The outcomes demonstrate its security, viability and productivity towards potential down to earth use. Keywords: Data Deduplication, Cloud Computing, Access Control, Storage Management. 1. INTRODUCTION Cloud computing lets in centralized statistics garage and online get right of entry to pc services or resources. It offers another method for Information Technology (IT) administrations by re-organizing different assets and giving them to clients in light of their requests. Distributed computing has enormously advanced inescapable administrations and turn into a promising administration stage because of various Page No:1523

2 alluring properties, for example, versatility, flexibility, fault tolerance, and pay-per-utilize. Information stockpiling administration is a standout amongst the most broadly devoured cloud administrations. Cloud clients have significantly profited from distributed storage since they can store immense volume of information without redesigning their gadgets and access them whenever and in wherever. Be that as it may, cloud information capacity offered by Cloud Service Providers (CSPs) still acquires a few issues. Above all else, different information put away at the cloud may ask distinctive methods for insurance because of various information affectability. The information put away at the cloud incorporate delicate individual data, openly shared information, information shared inside a gathering, et cetera. Clearly, urgent information ought to be shielded at the cloud to keep from any entrance of unapproved parties. Some insignificant information, in any case, has no such a necessity. As outsourced information could uncover individual or even touchy data, information proprietors some of the time might want to control their information by themselves, while on some event, they like to appoint their control to an outsider since they can't be continuously on the web or have no clue how to perform such a control. Instructions to make cloud information get to control adjust to different situations and fulfill distinctive client requests turns into a basically essential issue. Access control on scrambled information has been broadly contemplated in the writing. Be that as it may, few of them can adaptable bolster different prerequisites on cloud information security in a uniform route, particularly with financial de-duplication administration. Second, adaptable cloud information de-duplication with information get to control is as yet an open issue. Copied information could be put away at the cloud in an encoded frame by the same or diverse clients, in the same or distinctive CSPs. From the outlook of similarity, it is very expected that information de-duplication can collaborate well with information get to control. That is similar information (either encoded or not) are just put away once at the cloud, yet can be gotten to by distinctive clients in view of the strategies of information proprietors or information holders (i.e., the qualified information clients who hold unique information). In spite of the fact that distributed storage space is immense, copied information capacity could enormously squander organizing assets, expend a lot of energy vitality, increment task costs, also, make information administration confounded. Financial capacity will enormously profit CSPs by diminishing their task costs and conversely advantage cloud clients with diminished administration expenses. Clearly, cloud information de-duplication is especially critical for enormous information stockpiling and administration. Be that as it may, the writing still needs contemplates on adaptable cloud information de-duplication over various CSPs. Existing work can't offer a bland answer for help both de-duplication and access control in an adaptable and uniform route over the cloud. In this paper, we propose an all encompassing and heterogeneous information stockpiling administration conspire with a specific end goal to settle the above issues. The proposed conspire is good with the entrance control conspire proposed. It further acknowledges adaptable distributed storage administration with the two information deduplication and access control that can be worked by either the information proprietor or a confided in outsider or both or none of them. In addition, the Page No:1524

3 proposed plan can fulfill different information security requests and in the meantime spare storage rooms with de-duplication over various CSPs. Consequently it can fit into different information stockpiling situations. Our plan is unique and not quite the same as the current work. It is a nonexclusive plan to acknowledge encoded cloud information de-duplication with get to control, which underpins the collaboration between different CSPs. 2. RELATED WORK R. Chow et al go ahead to prescribe that "engineers would be insightful to outline their up and coming age of frameworks to be sent into Cloud Computing". While a large number of the expectations might be cloud buildup, they trust the updated IT obtainment demonstrate offered by distributed computing is digging in for the long haul. Regardless of whether appropriation moves toward becoming as predominant and profound as a few figure will depend to a great extent on beating fears of the cloud. Cloud fears generally originate from the apparent loss of control of delicate information. Current control measures don't enough address distributed computing outsider information stockpiling and preparing needs. In their vision, they propose to broaden control measures from the venture into the cloud using Trusted Computing what's more, connected cryptographic systems. They outline a protected information sharing plot, Mona, for dynamic gatherings in an un-trusted cloud. In Mona, a client can impart information to others in the gathering without uncovering character security to the cloud. Furthermore, Mona underpins effective client disavowal and new client joining. All the more uniquely, effective client disavowal can be accomplished through an open disavowal list without refreshing the private keys of the rest of the clients, what's more, new clients can straightforwardly unscramble records put away in the cloud before their cooperation. Also, the capacity overhead and the encryption calculation cost are consistent. Broad examinations demonstrate that their proposed plot fulfills the coveted security necessities and ensures productivity too. By separating records into document gatherings and encoding each record amass with a one of a kind document piece key, the information proprietor can share the record bunches with others through conveying the relating lockbox key, where the lockbox key is utilized to scramble the record square keys. Notwithstanding, it brings about an overwhelming key dissemination overhead for large scale document sharing. Moreover, the document piece key should be refreshed and disseminated again for a client denial. Q. Liu et al. proposed three EIRQ plans in view of an ADL to give differential inquiry administrations while client privacy. By utilizing their schemes, a client can recover unique rates of coordinated records by indicating inquiries of diverse ranks. By additionally lessening the correspondence cost brought about on the cloud, the EIRQ plans make the private looking procedure more material to a cost-efficient cloud environment. However, in the EIRQ schemes; they decides the rank of each record by the most elevated rank of inquiries it matches. For their future work, we will attempt to plan an adaptable positioning system for the EIRQ plot. 3. PROPOSED SYSTEM We propose a plan for heterogeneous information stockpiling administration with de-duplication. It can be adaptable connected into such situations that cloud Page No:1525

4 information de-duplication is dealt with 1) just by the information proprietor; 2) by any put stock in third party; 3) by both the information proprietor and the trusted outsider; 4) by no one (i.e., plain information is put away at the cloud); 5) by either the information proprietor or the trusted outsider. Solidly, we utilize the hash code of information to check information duplication amid information stockpiling at the cloud. The information holder signs the hash code of the information for passing the creativity confirmation of CSP. In the interim, various hash codes of haphazardly chose particular parts of the information are computed with their files (e.g., the hash code of the initial 15.1% of, the hash code of 21-25% of ). We call these hash codes as the hash code set (( )) of information. 1) System Setup. This calculation is led at the KGC. It creates essential framework parameters identified with ABE what's more, PRE, for example, generators and widespread traits, and so forth. ( ). In light of the framework parameters, cloud client creates its own key sets including ABE ace key combine and utilized for ABE encryption and client decoding key issuance, PKC key combine ' and ' for marking, and also and with respect to PRE. ( ). With hub character and open keys as info, this calculation led at KGC yields a number of client accreditations, ( ), ( ' ) and ( ), which can be checked by CSPs and their clients.. AP starts itself by producing and. is communicated to the clients of CSPs. 2) ABE Key Generation (, ). This calculation checks the strategies about and yields 1D,u for client to permit to control its information de-duplication and access. (,, '). This calculation is controlled by to issue,,' to ' if the qualification check of ' is sure. Else, it yields. In particular, client checks the properties of. On the off chance that they fulfill with the approach characterized by, issues a mystery key to for sharing the copied information capacity and permit its future access. Else, it rejects the request. 3) Data Encryption and Decryption (, ) encodes with and yields cipher text to ensure put away at CSP. (, ) unscrambles with and yields. It is executed at the information holders to get the plain substance of put away at CSP. 4) Symmetric Key Management ( ). On input, this calculation yields various fractional keys, e.g., 1,u,and 2,u in view of irregular partition. Isolating into different parts can likewise be performed if necessary. (,,, ). On input fractional keys of, e.g., 1,u, and 2,u, this calculation yields the full key through blend. 5) Partial Key Control in view of ABE Operated by Data Owner (,,,, ) encodes 2, with strategy and yields figure key 2, by taking 2,, and, as information. This calculation is directed at. (,,,,,, ') decodes cipher key 2, and yields Page No:1526

5 2, if the approach under which 2, was encoded can be fulfilled; else it yields NULL. This calculation is directed at. 6) Partial Key Control in view of PRE Operated by AP We utilizes PRE to empower AP to play out the reencryption of 1. Amid cipher text re-encryption, CSP adapts nothing about 1. The calculations identified with PRE are spoken to as underneath: (,,) yields 1 = (, 1,) by taking and 1,, as info. (,, ') yields re-encryption key ' for the intermediary CSP by taking,, and ' as information. ( ', ) takes input ' and 1, and yields ( ', 1) = ( ', 1, ) = 1, which can be unscrambled with '. (, ' ) yields 1, by taking and '1 as info. Fig 2:Data de duplication across multiple CSPs 4. EXPERIMENTAL RESULTS In light of the execution, we played out various tests to assess the productivity of our proposed plot. Test 1.Efficiency of document encryption and decryption We tried the time spent to scramble and unscramble a document with various sizes by applying AES with 3 distinctive key sizes, in particular 128 bits, 196 bits and 256 bits. We see from Figure 3(a) Fig 1: shows Data de duplication at CSP controlled by the data owner Page No:1527

6 that scrambling or unscrambling a record of 500 megabytes (MB) with 256-piece AES takes around 100 seconds. It is a sensible and commonsense decision to apply symmetric encryption for information security. different application situations and requests and offer monetary huge information stockpiling administration over different CSPs. It can accomplish information deduplication and access control with various security prerequisites. Security examination, examination with existing work and usage based execution assessment demonstrated that our plan is secure, progressed and effective. Our plan underpins information protection of cloud clients since the information put away at the cloud is in a scrambled frame. One approach to help personality protection is to apply nom de plumes Key Generation Center (KGC), where a genuine character is connected to a pen name, is confirmed and guaranteed by the KGC. 6. FUTURE WORK Our investigations demonstrate that distinctive compartment sizes in information servers have little effect on the de-duplication proportion. We set the compartment size to a settled esteem 16 MB in view of the three reasons. The settled holder estimate makes designation and de-allocation of compartments less demanding. The execution of this algorithm depends on HDFS, which is inviting with extensive pieces. The substantial granularity of a compartment compose accomplishes high I/O throughput. 5. CONCLUSION Information de-duplication is critical and huge in the routine with regards to cloud information stockpiling, particularly for huge information stockpiling administration. In this paper, we proposed a heterogeneous information stockpiling administration conspire, which offers adaptable cloud information deduplication and access control. Our plan can adjust to In our future work, we will additionally upgrade client protection what's more, enhance the execution of our plan towards pragmatic organization. Likewise, we will direct amusement hypothetical investigation to additionally demonstrate the soundness and security of the proposed conspire. REFERENCES [1] R. Chow, P. Golle, M. Jakobsson, E. Shi, J. Staddon, R. Masuoka, and J. Molina, "Controlling data in the cloud: outsourcing computation without outsourcing control," in Proc ACM Workshop Cloud Comput. Secur., pp , [2] S. Kamara, and K. Lauter, "Cryptographic cloud storage," Financ. Crypto. Data Secur., pp , Springer, [3] Q. Liu, C. C. Tan, J. Wu, and G. Wang, "Efficient information retrieval for ranked queries in cost- Page No:1528

7 effective cloud environments," in Proc IEEE INFOCOM, pp , [4] M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, "Plutus: scalable secure file sharing on untrusted storage," in Proc. USENIX Conf. File Storage Technol., pp , [5] E.-J. Goh, H. Shacham, N. Modadugu, and D. Boneh, "SiRiUS: securing remote untrusted storage," in Proc. Netw. Distrib. Syst. Secur. Symp., pp , [6] J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-policy attribute-based encryption," in Proc. of IEEE Symp.Secur.Privacy (SP'07), pp , [7] V. Goyal, O. Pandey, A. Sahai, and B. Waters, Attribute-based encryption for fine-grained access control of encrypted data, in Proc. of 13th ACM Comput. Commun.Secur., pp , [8] S. Muller, S. Katzenbeisser, and C. Eckert, Distributed attribute-based encryption, in Proc. of 11th Annual Int. Conf. Inf. Secur.Crypto., pp , [9] A. Sahai, and B. Waters, Fuzzy identity-based encryption, in Proc. of 24th Int. Conf. Theory App. Cryptographic Tech., pp , [10] S. C. Yu, C. Wang, K. Ren, and W. J. Lou, Achieving secure, scalable, and fine-grained data access control in cloud computing, in Proc. of IEEE INFOCOM, pp , 2010 Page No:1529

Enhancing Reliability and Scalability in Dynamic Group System Using Three Level Security Mechanisms

Enhancing Reliability and Scalability in Dynamic Group System Using Three Level Security Mechanisms Enhancing Reliability and Scalability in Dynamic Group System Using Three Level Security Mechanisms A.Sarika*1, Smt.J.Raghaveni*2 M.Tech Student, Dept of CSE, S.R.K.R Engineering college, Bhimavaram, AP,

More information

Secure and Flexible Data Sharing for Dynamic Groups in the Cloud

Secure and Flexible Data Sharing for Dynamic Groups in the Cloud Secure and Flexible Data Sharing for Dynamic Groups in the Cloud Srinivas Tutigunta. 1, K. Ravi Chadaran 2 1 Dept. of CSE, Nova College of Engineering & Technology, Jangareddy Gudem, A.P, India 2 Associate

More information

Decentralized Anonymous Authentication of Data Stored in Clouds Praveen.N, Krishna Kumar.P.R, Vinitha V Yadav

Decentralized Anonymous Authentication of Data Stored in Clouds Praveen.N, Krishna Kumar.P.R, Vinitha V Yadav Decentralized Anonymous Authentication of Data Stored in Clouds Praveen.N, Krishna Kumar.P.R, Vinitha V Yadav Abstract: Distributed computing is area that permits clients to store the information. Distributed

More information

A Procedural Based Encryption Technique for Accessing Data on Cloud

A Procedural Based Encryption Technique for Accessing Data on Cloud A Procedural Based Encryption Technique for Accessing Data on Cloud Avinash N 1, Divya C 2 P.G. Student, Department of Computer Science and Engineering, SVIT, Bangalore, Karnataka, India 1 Assistant Professor,

More information

Secure Multi-Keyword Ranked Search over Encrypted Cloud Data Dynamically

Secure Multi-Keyword Ranked Search over Encrypted Cloud Data Dynamically Secure Multi-Keyword Ranked Search over Encrypted Cloud Data Dynamically G. Sunil Santhosh Kumar 1, M. Swapna 2 1 Assistant Professor, Marri Laxman Reddy Institute of Technology and Management, Telangana

More information

Time-Based Proxy Re-encryption Review

Time-Based Proxy Re-encryption Review Time-Based Proxy Re-encryption Review Meghatai Maruti Bhoite 1, I Govardhan Rao 2 CSE, University College of Engineering Osmania University, Hyderabad, India Abstract :- Fundamentals approach for secure

More information

Advanced Searchable Encryption Scheme for Secure Data Sharing in Cloud

Advanced Searchable Encryption Scheme for Secure Data Sharing in Cloud Advanced Searchable Encryption Scheme for Secure Data Sharing in Cloud Anusha K 1, Babitha M N 2 PG Student, Department of Computer Science & Engineering, SSIT, Tumakuru, Karnataka, India 1 Assistant Professor,

More information

Protected and Effective Transmission of Data in Peer-To-Peer Network Using SGA

Protected and Effective Transmission of Data in Peer-To-Peer Network Using SGA Protected and Effective Transmission of Data in Peer-To-Peer Network Using SGA Sushma T Shanbhogue 1, Poonguzhali E 2 P.G. Student, Department of Computer Engineering, AMC Engineering College, Bangalore,

More information

Ramesh Polisetti, Chikram Sridhar, Chenagoni Nagaraju

Ramesh Polisetti, Chikram Sridhar, Chenagoni Nagaraju International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 6 ISSN : 2456-3307 Dynamic Secure Multi-Keyword Ranked Search over

More information

IDENTITY BASED REMOTE DATA INTEGRITY CHECKING WITH PERFECT DATA PRIVACY PRESERVING FOR CLOUD STORAGE BASED ON OTP 1 S.V.KAVYA, 2M.HEMAMALINI, 3 K.

IDENTITY BASED REMOTE DATA INTEGRITY CHECKING WITH PERFECT DATA PRIVACY PRESERVING FOR CLOUD STORAGE BASED ON OTP 1 S.V.KAVYA, 2M.HEMAMALINI, 3 K. Volume 119 No. 15 2018, 995-1000 ISSN: 1314-3395 (on-line version) url: http://www.acadpubl.eu/hub/ http://www.acadpubl.eu/hub/ IDENTITY BASED REMOTE DATA INTEGRITY CHECKING WITH PERFECT DATA PRIVACY PRESERVING

More information

A Less Weight Secure Data Sharing Scheme for Mobile Cloud Computing

A Less Weight Secure Data Sharing Scheme for Mobile Cloud Computing A Less Weight Secure Data Sharing Scheme for Mobile Cloud Computing P. Likitha Department of Computer Science and Engineering, MJR College of Engineering & Technology, Piler, A.P - 517214, India. ABSTRACT:

More information

A Review Paper on Multi keyword Ranked Search on Encrypted Cloud Data

A Review Paper on Multi keyword Ranked Search on Encrypted Cloud Data A Review Paper on Multi keyword Ranked Search on Encrypted Cloud Data Purva Jain 1, Dr. Abhijit Banubakode 2 ( Computer, RSCOE, University of Pune, Pune, Maharashtra India) 1 ( I.T., RSCOE, University

More information

Efficient Access Control Scheme with Multiple Attribute Authorities for Public Cloud Storage

Efficient Access Control Scheme with Multiple Attribute Authorities for Public Cloud Storage Efficient Access Control Scheme with Multiple Attribute Authorities for Public Cloud Storage Mr. Ramesh 1, Prof. Girish Kumar D 2, Student, M.tech(Computer Networking) 1,, Assistant Professor, Computer

More information

DATA WAREHOUSING DEVELOPING OPTIMIZED ALGORITHMS TO ENHANCE THE USABILITY OF SCHEMA IN DATA MINING AND ALLIED DATA INTELLIGENCE MODELS

DATA WAREHOUSING DEVELOPING OPTIMIZED ALGORITHMS TO ENHANCE THE USABILITY OF SCHEMA IN DATA MINING AND ALLIED DATA INTELLIGENCE MODELS DATA WAREHOUSING DEVELOPING OPTIMIZED ALGORITHMS TO ENHANCE THE USABILITY OF SCHEMA IN DATA MINING AND ALLIED DATA INTELLIGENCE MODELS Harshit Yadav Student, Bal Bharati Public School, Dwarka, New Delhi

More information

Exploration Encryption Mechanism Using Single Key for Public Cloud Storage

Exploration Encryption Mechanism Using Single Key for Public Cloud Storage International Journal of Emerging Trends in Science and Technology Impact Factor: 2.838 DOI: http://dx.doi.org/10.18535/ijetst/v3i05.07 Exploration Encryption Mechanism Using Single Key for Public Cloud

More information

Military Secured Network Data Transmission

Military Secured Network Data Transmission Military Secured Network Data Transmission Shubham Jain 1, Umesh Dusane 2, Smita Lokhande 3, Vinod Kadam 4, Asst. Prof. Neha Jamdar 5 1University of Pune, Sinhgad Institute of Technology and Science, jains7272@gmail.com

More information

Dynamic Secure Multi-Keyword Ranked Search over Encrypted Cloud Data

Dynamic Secure Multi-Keyword Ranked Search over Encrypted Cloud Data Volume 2, Issue 3, ISSN [O]: 2455-4545 Macaw International Journal of advanced Research in Computer Science and Engineering (MIJARCSE) Available online at: http://www.macawpublications.com Dynamic Secure

More information

Using Circuit Cipher text-policy Hybrid Encryption with Data Sharing in Cloud Computing

Using Circuit Cipher text-policy Hybrid Encryption with Data Sharing in Cloud Computing Using Circuit Cipher text-policy Hybrid Encryption with Data Sharing in Cloud Computing K.Moulika, S. Neelima, Dr.Ch.N.Santhosh Kumar 1 M-Tech, Dept. of CS, SwarnaBharthi Institute Of Science and Technology

More information

Linear Programming Solution for Secure and Outsourcing in Cloud Computing

Linear Programming Solution for Secure and Outsourcing in Cloud Computing Linear Programming Solution for Secure and Outsourcing in Cloud Computing V.SANDEEP PG Scholar, Dept. Computer Science Engineering, Kakinada Institute Of Engineering Technology, KORANGI, KAKINADA. CH.SUBHASH

More information

International Journal of Modern Electronics and Communication Engineering (IJMECE) ISSN: Volume No.-4, Issue No.

International Journal of Modern Electronics and Communication Engineering (IJMECE) ISSN: Volume No.-4, Issue No. A Review on Multi-Keyword Based Image Retrieval System for Encrypted Image Data Stored On Cloud Pawandeep 1, Hardeep Singh 2 1 Student, CSE department, CGC-COE Landran, Pawandeep.saini@gmail.com 2 Asst.

More information

A compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems.

A compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems. A compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems. G Swetha M.Tech Student Dr.N.Chandra Sekhar Reddy Professor & HoD U V N Rajesh Assistant Professor Abstract Cryptography

More information

Abstract. Asia-pacific Journal of Convergent Research Interchange Vol.2, No.2, June 30 (2016), pp

Abstract. Asia-pacific Journal of Convergent Research Interchange Vol.2, No.2, June 30 (2016), pp Vol.2, No.2, June 30 (2016), pp. 35-41 http://dx.doi.org/10.21742/apjcri.2016.06.05 1) 2) Abstract Cloud computing gives an adaptable and helpful route for information sharing, which brings different advantages

More information

Hierarchical Attribute Based Revocable Data Access Control For Multi Authority Cloud Storage

Hierarchical Attribute Based Revocable Data Access Control For Multi Authority Cloud Storage IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 19, Issue 4, Ver. I (Jul - Aug 2017), PP 91-97 www.iosrjournals.org Hierarchical Attribute Based Revocable Data

More information

PRIVACY PRESERVING CONTENT BASED SEARCH OVER OUTSOURCED IMAGE DATA

PRIVACY PRESERVING CONTENT BASED SEARCH OVER OUTSOURCED IMAGE DATA PRIVACY PRESERVING CONTENT BASED SEARCH OVER OUTSOURCED IMAGE DATA Supriya Pentewad 1, Siddhivinayak Kulkarni 2 1 Department of Computer Engineering. MIT College of Engineering, Pune, India 2 Department

More information

HIGH LEVEL SECURITY IMPLEMENTATION IN DATA SHARING ON SOCIAL WEBSITES

HIGH LEVEL SECURITY IMPLEMENTATION IN DATA SHARING ON SOCIAL WEBSITES HIGH LEVEL SECURITY IMPLEMENTATION IN DATA SHARING ON SOCIAL WEBSITES P.Senthil Kumar 1 Associate professor, PSNA college of engineering and technology,dindigul,tamilnadu,india Abstract: With the recent

More information

[Patil*, 4(7): July, 2017] ISSN Impact Factor: 2.805

[Patil*, 4(7): July, 2017] ISSN Impact Factor: 2.805 KEY AGGREGATE SEARCHABLE ENCRYPTION FOR SHARING THE DATA ON MULTI CLOUD R. U. Patil *1 & Prof. A. J. Kadam 2 M.E, Department of Computer Engineering, All India Shri Shivaji Memorial Society's, College

More information

ROBUST AND ANONYMOUS AUTHENTICATION OF DATA STORED IN CLOUDS WITH DECENTRALIZED ACCESS CONTROL

ROBUST AND ANONYMOUS AUTHENTICATION OF DATA STORED IN CLOUDS WITH DECENTRALIZED ACCESS CONTROL ROBUST AND ANONYMOUS AUTHENTICATION OF DATA STORED IN CLOUDS WITH DECENTRALIZED ACCESS CONTROL S.Vijaya Madhavi 1, G.Rama Subba Reddy 2 1 M.tech Scholar (CSE), 2 Headof Department (CSE), Vignana Bharathi

More information

A Secure & Encrypted Multi-Keyword Ranked Search in Cloud Storage

A Secure & Encrypted Multi-Keyword Ranked Search in Cloud Storage A Secure & Encrypted Multi-Keyword Ranked Search in Cloud Storage Jeniphar Francis #, Chetna Getme # Priyanka Bagde # Ruchika Bansod # Prof. Ashish Palandurkar * # Student, Dept. of Information Technology

More information

ENCRYPTED DATA MANAGEMENT WITH DEDUPLICATION IN CLOUD COMPUTING

ENCRYPTED DATA MANAGEMENT WITH DEDUPLICATION IN CLOUD COMPUTING ENCRYPTED DATA MANAGEMENT WITH DEDUPLICATION IN CLOUD COMPUTING S KEERTHI 1*, MADHAVA REDDY A 2* 1. II.M.Tech, Dept of CSE, AM Reddy Memorial College of Engineering & Technology, Petlurivaripalem. 2. Assoc.

More information

Volume 6, Issue 1, January 2018 International Journal of Advance Research in Computer Science and Management Studies

Volume 6, Issue 1, January 2018 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) e-isjn: A4372-3114 Impact Factor: 7.327 Volume 6, Issue 1, January 2018 International Journal of Advance Research in Computer Science and Management Studies Research Article /

More information

International Journal of Advance Research in Engineering, Science & Technology

International Journal of Advance Research in Engineering, Science & Technology Impact Factor (SJIF): 5.302 International Journal of Advance Research in Engineering, Science & Technology e-issn: 2393-9877, p-issn: 2394-2444 Volume 5, Issue 3, March-2018 Key Aggregate Tagged File Searching(KATFS)

More information

SECURE DATA SHARING IN CLOUD COMPUTING USING REVOCABLE STORAGE IDENTITY BASED ENCRYPTION

SECURE DATA SHARING IN CLOUD COMPUTING USING REVOCABLE STORAGE IDENTITY BASED ENCRYPTION SECURE DATA SHARING IN CLOUD COMPUTING USING REVOCABLE STORAGE IDENTITY BASED ENCRYPTION 1 K.Uma, 2 A.Mahesh. 1 Pursuing M.Tech (CSE), 2 Working as an Assistant Professor, Department of CSE, Visvesvaraya

More information

Secure Sensitive Data

Secure Sensitive Data Secure Sensitive Data Praneet Mohanbala 1, Manisha Parida 2, Dr.Roopa R 3 U.G. Student, Department of Information Science &Engg, BMS College of Engineering, Bangalore, India 1 U.G. Student, Department

More information

ABSTRACT I. INTRODUCTION. Telangana, India 2 Professor, Department of Computer Science & Engineering, Shadan College of Engineering & Technology,

ABSTRACT I. INTRODUCTION. Telangana, India 2 Professor, Department of Computer Science & Engineering, Shadan College of Engineering & Technology, International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 6 ISSN : 2456-3307 Secure Proxy Server Data Sharing Scheme in Hybrid

More information

International Journal of Advance Engineering and Research Development. Secure and dynamic Multi-keyword Ranked Search Over Cloud Data

International Journal of Advance Engineering and Research Development. Secure and dynamic Multi-keyword Ranked Search Over Cloud Data Scientific Journal of Impact Factor (SJIF): 4.72 International Journal of Advance Engineering and Research Development Volume 4, Issue 5, May -2017 e-issn (O): 2348-4470 p-issn (P): 2348-6406 Secure and

More information

Control Cloud Data Access Privilege And Anonymity With Fully Anonymous Attribute Based Encryption

Control Cloud Data Access Privilege And Anonymity With Fully Anonymous Attribute Based Encryption Control Cloud Data Access Privilege And Anonymity With Fully Anonymous Attribute Based Encryption Mr.K.Raju 1,N.Naga Sai Anuradha 2,P.Pramitha Sharon 3,Md.Yasmeen 4 Assistant Professor 1, CSE,Andhra Loyola

More information

IMPROVING DATA SECURITY USING ATTRIBUTE BASED BROADCAST ENCRYPTION IN CLOUD COMPUTING

IMPROVING DATA SECURITY USING ATTRIBUTE BASED BROADCAST ENCRYPTION IN CLOUD COMPUTING IMPROVING DATA SECURITY USING ATTRIBUTE BASED BROADCAST ENCRYPTION IN CLOUD COMPUTING 1 K.Kamalakannan, 2 Mrs.Hemlathadhevi Abstract -- Personal health record (PHR) is an patient-centric model of health

More information

An Efficient Verifiable Multi-Authority Secret Access control scheme in Cloud Storage M.Sreelakshmi & P.Gangadhara

An Efficient Verifiable Multi-Authority Secret Access control scheme in Cloud Storage M.Sreelakshmi & P.Gangadhara An Efficient Verifiable Multi-Authority Secret Access control scheme in Cloud Storage M.Sreelakshmi & P.Gangadhara 1 M.Tech, Dept of CSE,Shri Shirdi Sai Institute of Science and Engineering, Affiliated

More information

ISSN: [Shubhangi* et al., 6(8): August, 2017] Impact Factor: 4.116

ISSN: [Shubhangi* et al., 6(8): August, 2017] Impact Factor: 4.116 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY DE-DUPLICABLE EFFECTIVE VALIDATION of CAPACITY for DYNAMIC USER ENVIRONMENT Dr. Shubhangi D C *1 & Pooja 2 *1 HOD, Department

More information

Attribute Based Encryption with Privacy Protection in Clouds

Attribute Based Encryption with Privacy Protection in Clouds Attribute Based Encryption with Privacy Protection in Clouds Geetanjali. M 1, Saravanan. N 2 PG Student, Department of Information Technology, K.S.R College of Engineering, Tiruchengode, Tamilnadu, India

More information

AN EFFICIENT USER REVOCABLE STORAGE IDENTITY BASED ENCRYPTION WITH PROTECTED DATA DISTRIBUTION IN CLOUD COMPUTING

AN EFFICIENT USER REVOCABLE STORAGE IDENTITY BASED ENCRYPTION WITH PROTECTED DATA DISTRIBUTION IN CLOUD COMPUTING AN EFFICIENT USER REVOCABLE STORAGE IDENTITY BASED ENCRYPTION WITH PROTECTED DATA DISTRIBUTION IN CLOUD COMPUTING Vanaparthi Hari Priya 1, A.Sanjeeva Raju 2, G.Deepak 3 1 Pursuing M.Tech (CSE), 2 Working

More information

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data An Efficient Privacy-Preserving Ranked Keyword Search Method Cloud data owners prefer to outsource documents in an encrypted form for the purpose of privacy preserving. Therefore it is essential to develop

More information

Privacy Preserving Public Auditing in Secured Cloud Storage Using Block Authentication Code

Privacy Preserving Public Auditing in Secured Cloud Storage Using Block Authentication Code Privacy Preserving Public Auditing in Secured Cloud Storage Using Block Authentication Code Sajeev V 1, Gowthamani R 2 Department of Computer Science, Nehru Institute of Technology, Coimbatore, India 1,

More information

Received on Accepted on

Received on Accepted on ISSN: 0975-766X CODEN: IJPTFI Available Online through Research Article www.ijptonline.com EFFICIENT SEARCHING WITH MULTIPLE KEYWORD OVER ENCRYPTED CLOUD DATA BY BLIND STORAGE K.Santhi* 1, M.Deepa 2, M.Lawanya

More information

Multi-Keyword Ranked Search in Encrypted Cloud Storage

Multi-Keyword Ranked Search in Encrypted Cloud Storage Multi-Keyword Ranked Search in Encrypted Cloud Storage Akshay Kasulkar, Sahil Kamble, Nikhil Shettiwar, Tejaswini Dongre Prof. Vijay Masne UG Student, Dept. of Computer Science & Engineering, DBACER College,

More information

ABSTRACT I. INTRODUCTION

ABSTRACT I. INTRODUCTION 2018 IJSRSET Volume 4 Issue 4 Print ISSN: 2395-1990 Online ISSN : 2394-4099 Themed Section : Engineering and Technology An Efficient Search Method over an Encrypted Cloud Data Dipeeka Radke, Nikita Hatwar,

More information

Secure Data Storage and Data Retrieval in Cloud Storage using Cipher Policy Attribute based Encryption

Secure Data Storage and Data Retrieval in Cloud Storage using Cipher Policy Attribute based Encryption Indian Journal of Science and Technology, Vol 8(S9), 318 325, May 2015 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 DOI: 10.17485/ijst/2015/v8iS9/65600 Secure Data Storage and Data Retrieval in Cloud

More information

A NEW TECHNIQUE FOR SECURE INFORMATION PART-TAKING IN CLOUD

A NEW TECHNIQUE FOR SECURE INFORMATION PART-TAKING IN CLOUD A NEW TECHNIQUE FOR SECURE INFORMATION PART-TAKING IN CLOUD 1 J Laxman Naik, 2 Syed Amreen, 3 Dr. Bhaludra Raveendranadh Singh 1 Pursuing M. Tech (CSE), 2 Assistant Professor, 3 Professor& Principal, 1,2,3

More information

International Journal of Computer Engineering and Applications, Volume XII, Special Issue, May 18, ISSN

International Journal of Computer Engineering and Applications, Volume XII, Special Issue, May 18,  ISSN International Journal of Computer Engineering and Applications, Volume XII, Special Issue, May 18, www.ijcea.com ISSN 2321-3469 SECURE MOBILE HEALTH CARE SYSTEM THROUGH SHARABLE AND TRACEABLE FEATURES

More information

Query Result Extraction Using Dynamic Query Forms

Query Result Extraction Using Dynamic Query Forms Query Result Extraction Using Dynamic Query Forms #1 Mrs. I. Anitha Rani, #2 Y.Vijay, #3 Abdul Moseen #1 Assistant Professor, Department of Computer Science Engineering,Andhra Loyola Institute Of Engineering

More information

Multi-keyword Stratified Search over Encrypted Cloud Data P. Uma Rani 1, Dr. B. Jhansi Vazram 2, G. Raphi 3 1

Multi-keyword Stratified Search over Encrypted Cloud Data P. Uma Rani 1, Dr. B. Jhansi Vazram 2, G. Raphi 3 1 Multi-keyword Stratified Search over Encrypted Cloud Data P. Uma Rani 1, Dr. B. Jhansi Vazram 2, G. Raphi 3 1 M.Tech Student, Department of CSE, Narasaraopet Engineering College, Narasaraopet Guntur dist,

More information

Secure Role-Based Access Control on Encrypted Data in Cloud Storage using ARM

Secure Role-Based Access Control on Encrypted Data in Cloud Storage using ARM Secure Role-Based Access Control on Encrypted Data in Cloud Storage using ARM Rohini Vidhate, V. D. Shinde Abstract With the rapid developments occurring in cloud computing and services, there has been

More information

ENCRYPTED KEY SEARCHING FOR DATA SHARING OVER GROUPS IN THE CLOUD STORAGE THEJA #1, GARREPALLI PRASAD #2,

ENCRYPTED KEY SEARCHING FOR DATA SHARING OVER GROUPS IN THE CLOUD STORAGE THEJA #1, GARREPALLI PRASAD #2, ENCRYPTED KEY SEARCHING FOR DATA SHARING OVER GROUPS IN THE CLOUD STORAGE THEJA #1, GARREPALLI PRASAD #2, DEPARTMENT OF CSE SAHAJA INSTITUTE OF TECHNOLOGY & SCIENCES FOR WOMEN, KARIMNAGAR ABSTRACT: The

More information

International Journal of Science Engineering and Advance Technology, IJSEAT,Vol.3,Issue 8

International Journal of Science Engineering and Advance Technology, IJSEAT,Vol.3,Issue 8 Multi-keyword Ranked Search over Encrypted Cloud Data Using RSA Algorithm KandiKattu Balaji Swamy 1, K.KISHORE RAJU 2 1 M.Tech (Information Technology), S.R.K.R ENGINEERING COLLEGE, A.P., India. 2 ASSISTANT

More information

SDD: A Novel Technique for Enhancing Cloud Security with Self Destructing Data

SDD: A Novel Technique for Enhancing Cloud Security with Self Destructing Data SDD: A Novel Technique for Enhancing Cloud Security with Self Destructing Data Kishore K, Ramchand V M.Tech Student, Dept. of CSE, The Oxford College Of Engineering, Bangalore, India Associate Professor,

More information

Secure Data De-Duplication With Dynamic Ownership Management In Cloud Storage

Secure Data De-Duplication With Dynamic Ownership Management In Cloud Storage Secure Data De-Duplication With Dynamic Ownership Management In Cloud Storage 1 A. Sumathi, PG Scholar, Department Of Computer Science And Engineering, Maha Barathi Engineering College, Chinna Salem, Villupuram,

More information

EFFICIENT DATA SHARING WITH ATTRIBUTE REVOCATION FOR CLOUD STORAGE

EFFICIENT DATA SHARING WITH ATTRIBUTE REVOCATION FOR CLOUD STORAGE EFFICIENT DATA SHARING WITH ATTRIBUTE REVOCATION FOR CLOUD STORAGE Chakali Sasirekha 1, K. Govardhan Reddy 2 1 M.Tech student, CSE, Kottam college of Engineering, Chinnatekuru(V),Kurnool,Andhra Pradesh,

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 3, March 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Reliable Proxy

More information

ISSN Vol.04,Issue.05, May-2016, Pages:

ISSN Vol.04,Issue.05, May-2016, Pages: WWW.IJITECH.ORG ISSN 2321-8665 Vol.04,Issue.05, May-2016, Pages:0737-0741 Secure Cloud Storage using Decentralized Access Control with Anonymous Authentication C. S. KIRAN 1, C. SRINIVASA MURTHY 2 1 PG

More information

Identity Based Encryption and Data Self Destruction in Cloud Computing

Identity Based Encryption and Data Self Destruction in Cloud Computing Identity Based Encryption and Data Self Destruction in Cloud Computing Madhavi S. Langute M.E (Computer) Department of Computer Engineering, Jayawantrao Sawant College of Engineering, Savitribai Phule

More information

Session Based Ciphertext Policy Attribute Based Encryption Method for Access Control in Cloud Storage

Session Based Ciphertext Policy Attribute Based Encryption Method for Access Control in Cloud Storage IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 04, Issue 09 (September. 2014), V3 PP 21-25 www.iosrjen.org Session Based Ciphertext Policy Attribute Based Encryption

More information

S. Indirakumari, A. Thilagavathy

S. Indirakumari, A. Thilagavathy International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 2 ISSN : 2456-3307 A Secure Verifiable Storage Deduplication Scheme

More information

Assistant Professor, Dept of CSE, Vasireddy Venkatadri Institute of Technology (VVIT), Nambur (v), Guntur, Andhra Pradesh, India

Assistant Professor, Dept of CSE, Vasireddy Venkatadri Institute of Technology (VVIT), Nambur (v), Guntur, Andhra Pradesh, India Volume 5, Issue 10, October-2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Efficient User

More information

A LTERATURE SURVEY ON REVOCABLE MULTIAUTHORITY CIPHER TEXT-POLICY ATTRIBUTE-BASED ENCRYPTION (CP-ABE) SCHEME FOR CLOUD STORAGE

A LTERATURE SURVEY ON REVOCABLE MULTIAUTHORITY CIPHER TEXT-POLICY ATTRIBUTE-BASED ENCRYPTION (CP-ABE) SCHEME FOR CLOUD STORAGE A LTERATURE SURVEY ON REVOCABLE MULTIAUTHORITY CIPHER TEXT-POLICY ATTRIBUTE-BASED ENCRYPTION (CP-ABE) SCHEME FOR CLOUD STORAGE Vinoth Kumar P, Dr.P.D.R. Vijaya Kumar 1 PG Student, INFO Institute of Engineering,

More information

Attribute Based Encryption with Verifiable Time Stamped Decryption

Attribute Based Encryption with Verifiable Time Stamped Decryption Attribute Based Encryption with Verifiable Time Stamped Decryption Miss. Madhavi Phalak M.E student, Computer department GF s Godavari college of Engineering, Jalgaon Jalgaon, Maharahshtra, India madhaviphalak@gmail.com

More information

Attribute-based encryption with encryption and decryption outsourcing

Attribute-based encryption with encryption and decryption outsourcing Edith Cowan University Research Online Australian Information Security Management Conference Conferences, Symposia and Campus Events 2014 Attribute-based encryption with encryption and decryption outsourcing

More information

A Secure and Dynamic Multi Keyword Ranked Search Scheme over encrypted

A Secure and Dynamic Multi Keyword Ranked Search Scheme over encrypted ISSN (O): 2349-7084 International Journal of Computer Engineering In Research Trends Available online at: www.ijcert.org A Secure and Dynamic Multi Keyword Ranked Search Scheme over encrypted 1 A.Raghavendra

More information

FINE-GRAINED QUERY RESULTS VERIFICATION FOR SECURE SEARCH SCHEME OVER ENCRYPTED CLOUD DATA

FINE-GRAINED QUERY RESULTS VERIFICATION FOR SECURE SEARCH SCHEME OVER ENCRYPTED CLOUD DATA FINE-GRAINED QUERY RESULTS VERIFICATION FOR SECURE SEARCH SCHEME OVER ENCRYPTED CLOUD DATA 1 M MOUNIKA 1 M.Tech Student, Department of CSE, Jyothishmathi institute of Technology & science, karimnagar,

More information

A New Distributed Access Control Schema For Secure Data Stored In Clouds

A New Distributed Access Control Schema For Secure Data Stored In Clouds A New Distributed Access Control Schema For Secure Data Stored In Clouds 1 P.PRAVEEN KUMAR, 2 DR. G.VENKATA RAMI REDDY 1 M.Tech Student, Department of CSE, School of Information Techology, JNTUH, Kukatpally,

More information

Privacy Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data

Privacy Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data Privacy Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data Muzammil Ahmed 1, Asrarullah Khan 2 1M.E Dept. of CSE, Matoshri Pratishthan Group of Institutions, Khupsarwadi, Nanded, Maharashtra

More information

International Journal of Advance Engineering and Research Development. Data Masking: A Secured Data Storage on Cloud

International Journal of Advance Engineering and Research Development. Data Masking: A Secured Data Storage on Cloud Scientific Journal of Impact Factor (SJIF): 4.72 International Journal of Advance Engineering and Research Development Volume 4, Issue 11, November -2017 Data Masking: A Secured Data Storage on Cloud Mrs.

More information

Secure Conjunctive Keyword Ranked Search over Encrypted Cloud Data

Secure Conjunctive Keyword Ranked Search over Encrypted Cloud Data Secure Conjunctive Keyword Ranked Search over Encrypted Cloud Data Shruthishree M. K, Prasanna Kumar R.S Abstract: Cloud computing is a model for enabling convenient, on-demand network access to a shared

More information

PRIVACY PRESERVING RANKED MULTI KEYWORD SEARCH FOR MULTIPLE DATA OWNERS. SRM University, Kattankulathur, Chennai, IN.

PRIVACY PRESERVING RANKED MULTI KEYWORD SEARCH FOR MULTIPLE DATA OWNERS. SRM University, Kattankulathur, Chennai, IN. Volume 115 No. 6 2017, 585-589 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu PRIVACY PRESERVING RANKED MULTI KEYWORD SEARCH FOR MULTIPLE DATA OWNERS

More information

User Revocation And Fine Grained Access Control Of Phr In Cloud Using Hasbe

User Revocation And Fine Grained Access Control Of Phr In Cloud Using Hasbe User Revocation And Fine Grained Access Control Of Phr In Cloud Using Hasbe T.Radhika 1, S.Vasumathi Kannagi 2 P.G.Scholar, Department of CSE, Info Institute of Engineering, Coimbatore, India 1 Assistant

More information

An Efficient And Secure Data Sharing By Preventing Collusion Attack In Cloud

An Efficient And Secure Data Sharing By Preventing Collusion Attack In Cloud An Efficient And Secure Data Sharing By Preventing Collusion Attack In Cloud Jyoti Pingat 1, Swati Mandwade 2, 1Student, Savy Software Pvt.Ltd,Pune 2 Student,,Savy Software Pvt.Ltd,Pune Email: jyotipingat123@gmail.com

More information

Volume1, Issue 2 October ISSN: Title. The importance of Computer Visualization in technical education. Anshu Singhal

Volume1, Issue 2 October ISSN: Title. The importance of Computer Visualization in technical education. Anshu Singhal Title The importance of Computer Visualization in technical education Anshu Singhal Student, Department of Computer Engineering BMN college of Engineering and Technology, India ABSTRACT Computer 3D displaying

More information

Survey on Incremental MapReduce for Data Mining

Survey on Incremental MapReduce for Data Mining Survey on Incremental MapReduce for Data Mining Trupti M. Shinde 1, Prof.S.V.Chobe 2 1 Research Scholar, Computer Engineering Dept., Dr. D. Y. Patil Institute of Engineering &Technology, 2 Associate Professor,

More information

Identification of Fake Location Based Service Providers Using Secure Abstraction of Top-K Query Processing

Identification of Fake Location Based Service Providers Using Secure Abstraction of Top-K Query Processing ISSN No: 2454-9614 Identification of Fake Location Based Service Providers Using Secure Abstraction of Top-K Query Processing *Corresponding Author: P. Shyamala E-mail: shyamala.se14@bitsathy.ac.in P.

More information

Generating Aggregate Key for Group Data Sharing by Means of Cloud Data Storage

Generating Aggregate Key for Group Data Sharing by Means of Cloud Data Storage ISSN (O): 2349-7084 International Journal of Computer Engineering In Research Trends Available online at: www.ijcert.org Generating Aggregate Key for Group Data Sharing by Means of Cloud Data Storage 1

More information

Security Weaknesses of an Anonymous Attribute Based Encryption appeared in ASIACCS 13

Security Weaknesses of an Anonymous Attribute Based Encryption appeared in ASIACCS 13 Security Weaknesses of an Anonymous Attribute Based Encryption appeared in ASIACCS 13 Payal Chaudhari, Manik Lal Das, Anish Mathuria DA-IICT, Gandhinagar, India {payal chaudhari, maniklal das, anish mathuria}@daiict.ac.in

More information

Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage

Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage Dr.S.Masood Ahamed 1, N.Mounika 2, N.vasavi 3, M.Vinitha Reddy 4 HOD, Department of Computer Science & Engineering,, Guru Nanak

More information

ISSN Page 311. Ch.S.K.V.R.Naidu et al, IJMCA, Vol. 4, No. 3, July - August 2016

ISSN Page 311. Ch.S.K.V.R.Naidu et al, IJMCA, Vol. 4, No. 3, July - August 2016 Enhanced Scalability and Security on Data for tolerant Military Networks Ch.S.K.V.R.Naidu Associate Professor in Dept of Computer Science and Engineering, Indo American Institutions Technical Campus, Anakapalle,AP,INDIA,

More information

Catch You in the event that You Misbehave Ranked Keyword Search Results Verification in Cloud Computing

Catch You in the event that You Misbehave Ranked Keyword Search Results Verification in Cloud Computing International Journal for Modern Trends in Science and Technology Volume: 03, Issue No: 09, September 2017 ISSN: 2455-3778 http://www.ijmtst.com Catch You in the event that You Misbehave Ranked Keyword

More information

Fortified and Revocable Access Control for Multi- Authority Cloud Storage using CPABE

Fortified and Revocable Access Control for Multi- Authority Cloud Storage using CPABE Fortified and Revocable Access Control for Multi- Authority Cloud Storage using CPABE Bhuvaneswari Thangaraj PG scholar, Maharaja Engineering College, Avinashi, India, S. Umarani Assistant Professor, Maharaja

More information

Secure Socket Layer Based Load Balancing Methodology In Distributed Servers

Secure Socket Layer Based Load Balancing Methodology In Distributed Servers 1st International Conference on Applied Soft Computing Techniques 22 & 23.04.2017 In association with International Journal of Scientific Research in Science and Technology Secure Socket Layer Based Load

More information

Hyderabad, Telangana, India

Hyderabad, Telangana, India GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES IMPLEMENTING AN ENHANCED HADOOP ARCHITECTURE TOREDUCE THE COMPUTATION COST ASSOCIATED WITH BIGDATAANALYSIS M. Praveen *1 & Ch. Prashanth 2 *1&2 M.Tech,

More information

CLIENT DATA NODE NAME NODE

CLIENT DATA NODE NAME NODE Volume 6, Issue 12, December 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Efficiency

More information

Improving Keyword Query Suggestions On Document Proximity With Using LKS Framework And PA Algorithm

Improving Keyword Query Suggestions On Document Proximity With Using LKS Framework And PA Algorithm Improving Keyword Query Suggestions On Document Proximity With Using LKS Framework And PA Algorithm 1 N.VARUN KUMARI 2 MRS. P. SREE LAKSHMI 1 M. Tech Student, Department of CSE, B.V. Raju Institute of

More information

Enhanced Key Expansion Algorithm for Advanced Encryption Standard using Different S- Box Implementation on FPGA

Enhanced Key Expansion Algorithm for Advanced Encryption Standard using Different S- Box Implementation on FPGA GRD Journals- Global Research and Development Journal for Engineering Volume 1 Issue 5 April 2016 ISSN: 2455-5703 Enhanced Key Expansion Algorithm for Advanced Encryption Standard using Different S- Box

More information

SUBSCRIBE SYSTEMS WITH SECURITY AND ERADICATING INTERMEDIARIES THROUGH IDENTITY BASED ENCRYPTION TECHNIQUE

SUBSCRIBE SYSTEMS WITH SECURITY AND ERADICATING INTERMEDIARIES THROUGH IDENTITY BASED ENCRYPTION TECHNIQUE SUBSCRIBE SYSTEMS WITH SECURITY AND ERADICATING INTERMEDIARIES THROUGH IDENTITY BASED ENCRYPTION TECHNIQUE Sepuri Kranthi Kumar 1, K Krishna Reddy 2 1 M.tech Scholar CSE, 2 Associate Professor, Dept. of

More information

Improving Privacy Multi-Keyword Top-K Retrieval Search Over Encrypted Cloud Data

Improving Privacy Multi-Keyword Top-K Retrieval Search Over Encrypted Cloud Data www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 4 April 2015, Page No. 11385-11390 Improving Privacy Multi-Keyword Top-K Retrieval Search Over Encrypted

More information

[ICESTM-2018] ISSN Impact Factor

[ICESTM-2018] ISSN Impact Factor GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES A COMPARATIVE STUDY OF HIGH-PERFORMANCE COMPUTING ON THE CLOUD FOR SCIENTIFIC APPLICATIONS A.Shraban Kumar* 1 & Dr.S.V.Achuta Rao 2 *1 Assoc.Professor,

More information

Efficient Information Retrieval for Ranked Queries in Cost-Effective Cloud Environments

Efficient Information Retrieval for Ranked Queries in Cost-Effective Cloud Environments Efficient Information Retrieval for Ranked Queries in Cost-Effective Cloud Environments Qin Liu, Chiu C. Tan, Jie Wu, and Guojun Wang School of Information Science and Engineering, Central South University,

More information

Sharing of PHR s in Cloud Computing

Sharing of PHR s in Cloud Computing 86 Sharing of PHR s in Cloud Computing Dussa Manasa K.Rajesh Khanna In Cse Dept, Vaagdevi Engineering college, Warangal, Andhra Pradesh, India Abstract Personal health records (PHRs) grant patients access

More information

Applications - Aware Big Data Deduplication in Cloud Environment

Applications - Aware Big Data Deduplication in Cloud Environment Applications - Aware Big Data Deduplication in Cloud Environment S. PRASAD 1, N. PHANI KUMAR 2 1 PG Scholar, Department of CSE, S.V. College of Engineering 2 Assistant Professor, Department of CSE, S.V.

More information

UNCOVERING OF ANONYMOUS ATTACKS BY DISCOVERING VALID PATTERNS OF NETWORK

UNCOVERING OF ANONYMOUS ATTACKS BY DISCOVERING VALID PATTERNS OF NETWORK UNCOVERING OF ANONYMOUS ATTACKS BY DISCOVERING VALID PATTERNS OF NETWORK Dr G.Charles Babu Professor MRE College Secunderabad, India. charlesbabu26@gmail.com N.Chennakesavulu Assoc.Professor Wesley PG

More information

Secure Token Based Storage System to Preserve the Sensitive Data Using Proxy Re-Encryption Technique

Secure Token Based Storage System to Preserve the Sensitive Data Using Proxy Re-Encryption Technique Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,

More information

CO-RELATION TECHNIQUE FOR SEARCHING OF ENCRYPTED DATA OVER CLOUD 1

CO-RELATION TECHNIQUE FOR SEARCHING OF ENCRYPTED DATA OVER CLOUD 1 CO-RELATION TECHNIQUE FOR SEARCHING OF ENCRYPTED DATA OVER CLOUD 1 Vrushali R. Charde, 2 Prof. Nitin S. More 1,2 Dept. of Information Technology Smt. Kashibai Navale College of Engg. Pune, India 1 vrushali24692@gmail.com,

More information

ISSN (PRINT): , (ONLINE): , VOLUME-4, ISSUE-8,

ISSN (PRINT): , (ONLINE): , VOLUME-4, ISSUE-8, A NOVEL HOP-BY-HOP ROUTING SYSTEM FOR GREEN INTERNET Dr. Anuradha M S 1, Bhagyashree 2 Prof., P.G. Student Department of Electronics and communication engineering, GNDEC, Karnataka (India) Abstract The

More information

A Survey on Phrase Search over Encrypted Cloud Storage with Multiple Data Owners

A Survey on Phrase Search over Encrypted Cloud Storage with Multiple Data Owners A Survey on Phrase Search over Encrypted Cloud Storage with Multiple Data Owners [1] Pavan Kumar Kandukuri, [2] G. Vishnu Murthy [2] Professor, [1] Dept. of Computer Science & Engineering, Anurag Group

More information