A Public Auditing Framework for Cloud Storage Security

Size: px
Start display at page:

Download "A Public Auditing Framework for Cloud Storage Security"

Transcription

1 A Public Auditing Framework for Cloud Storage Security S. Satish Kumar A.Sudheer Kumar D.Venkatesh M.Tech Student (CSE) Assistant Professor Dean of CSE & IT GATES Institute of Tech, Gooty GATES Institute of Tech, Gooty GATES Institute of Tech,Gooty Abstract Commoditization of computing resources has become a reality with cloud computing which is a new computing model. Users are no longer required to invest on procuring computing resources. Instead they use resources provided by cloud service providers in pay as you use fashion. Users are able to use huge storage and processing capabilities of the cloud. However, they feel that they do not have control over data as it is stored in a remote server. Many auditing schemes came into existence for data integrity verification in order to ensure the storage inconsistencies if any are known to end users. Thus they encouraged people to use cloud storage services by providing secure environment. Wang et al. introduced a protocol specification which guarantees security and performance. In this paper we implemented that protocol using Azure cloud. We have developed a prototype that facilitates end user to avail storage and data integrity verification services thus assuring cloud storage security. The empirical results revealed that the protocol is efficient and highly secure. Index Terms Cloud computing, data storage, data integrity, auditing protocol I. INTRODUCTION In the history of IT, cloud computing has brought unprecedented benefits to the computing world. It has made it possible to have a different computing model that does not suffer with scarcity of resources. Cloud computing enables to share computing resources without the need for investment in pay as you use fashion. Cloud service providers such as Microsoft, Oracle, Amazon, Google etc. are able to provide huge clouds which are nothing but computing resources that are provided on demand through Internet [1]. The way IT infrastructure has been used; is changing with the emergence of cloud computing paradigm. One important aspect of cloud computing is that data is stored in a centralized server which is linked to cloud data center. The storage and other services provided by cloud can be utilized by individuals and organizations alike without the need for capital investment. To organizations and individuals cloud provides very useful benefits as they are relieved from storage management, investment, and maintenance [2]. Along with the advantages, it also has challenges in terms of security threats. This is because the users data is stored in a remote server which is considered untrusted. Users are losing control over their data and the storage facilities are under control of cloud service providers. Thus the correctness or integrity of the data is questioned. The cloud data storage might be subjected to internal and external threats. It causes security concern on part of cloud users [3]. Security problems surfaced in cloud computing were known to the world [4], [5], [6]. On the other hand CSPs might have intentions to be unfair towards cloud users and their outsourced data besides hiding security flaws in their storage infrastructure [7], [8]. Out sourcing data to cloud have benefits in the long run provided the security risks are addressed positively. In order to secure cloud data the usage of cryptography to secure data is not feasible as the data is no longer physically stored in the user s machine [9]. At the same time obtaining complete data which has been outsourced for integrity verification is not ideal solution as it is expensive. Cloud users should be able to audit their data without the expensive approach as their systems are resource constrained [10], [7]. The data integrity verification should be done intuitively as that should not give trouble to end Page 450

2 users. The verification process should be inbuilt in cloud so as to enable the owner of data to send integrity verification request to cloud server. Keeping all such things in mind, it is essential to have some sort of public auditing service which enables data owners to verify the data integrity with ease. The public auditing service takes care of periodical verification of data integrity. It helps cloud users to be confident of their outsourced data and cloud service providers can assure storage integrity that makes cloud usage much more popular by improving their services [11]. Many public auditing schemes were introduced for cloud computing [8], [12], [9], [13]. Many such schemes did not consider privacy protection of cloud users except [13]. Encrypting data before outsourcing [4], [9] provides security but adds unnecessary burden on the system. The problems in cryptography might jeopardize the interests of cloud users as it is not suitable solution for secure cloud storage. Therefore it is a wise choice to have public auditing of data dynamics pertaining to each and every user of particular cloud. In [13] introduced homomorpic linear authenticator [8], [12], [7] for enabling public third party auditability. In this paper we implement the protocols provided in [13] for Azure platform in order to make it robust and secure. Our contributions include implementation of privacy preserving protocol for third party auditing; supporting scalable auditing services; improved performance with respect to cloud storage security. The remainder of this paper is organized into the following sections. Section II reviews prior work on privacy preserving public auditing in cloud storage services. Section III provides the proposed security model. Section IV discusses implementation and results while section V concludes the paper. II. PRIOR WORK Considerable research was involved on cloud storage security issues. First of that kind is in [8] proposed by Ateniese et al. [8]which ensures provable data procession. They performed audit on outsourced data using RSA based homomorphic authenticators. One of the schemes proposed by them provides data access to external auditor which may cause security problems. Another security model was proposed by Juels et al. [9]. They used the concept of error correcting codes for proof of irretrievability. The limitation of this solution is that the number of audits is fixed. Moreover this works with only encrypted data. This work was later improved by Bowers et al. [14]. The proof of irretrievability is further studied and improved by Dodi et al. [15]. Afterwards, it is further enhanced with the usage of BLS signatures by Shacham et al. [12]. However, their approaches are not privacy preserving. In order to ensure secure storage and retrieval in cloud computing Shah et al. [16], [11] introduced TPA (Third Pa rty Auditing). Towards it they encrypted data first and then using pre-computed symmetric keyed hashes for auditing purposes. However, this scheme has limitation as it works only with encrypted files. In the recent literature it is found that researcher focuses on data dynamics besides data security which is stored in cloud. First partially dynamic PDP (Provable Data Procession) scheme was introduced by Ateniese et al. [17]. They achieved it using symmetric cryptography. Similar kind of work was done by Wang et al. [18] with some additional feature known as error localization. In their subsequent work [7], they combined techniques such as MHT and HLS for supporting data dynamics in cloud storage. At the same time Erway et al. [19] proposed a scheme for provable data procession with full data dynamics. Linear combination of blocks was used to verify the integrity of cloud storage. Thus [19], [8] and [12] do not providing privacy preserving data integrity. In other prior works, remote data procession protocol was introduced by Sebe et al. [20]. This protocol has no limitations in integrity verification. Across many servers running in distributed environment, data integrity checking was studied by Schwarz and Miller [21]. In the similar fashion Curtmola et al. [22] made experiments on provable data procession in multiple server replicas. In fact they improved the scheme proposed in [8] in order to scale it to multiple server replicas without the need for encoding each replica separately thus providing guaranteed data integrity. Erasure correcting codes were used by Bowers et al. [23] which is an extended model of proof of irretrievability. All the schemes discussed about provide mechanisms for auditing cloud storage. However, they do not meet the true requirements of the privacy preserving auditing. Moreover they do not support batch auditing. Wang et al. [13] proposed privacy preserving public auditing which supports batch auditing too. III. THREAT MODEL AND PROPOSED PROTOCOLS This section provides information about the proposed threat model and also the protocols implemented to ensure privacy preserving public auditing. Threat Model The cloud security threat model considered in this paper is similar to the one used by Wang et al. [13]. It considers three parties in the model. They include cloud data owners, cloud service providers (CSPs) Page 451

3 and third party auditor (TPA). The cloud user or cloud data owner has huge amount of data to be outsourced to cloud. The cloud service provider provides cloud services to cloud data owners while the third party auditor is a trusted entity responsible for auditing of the data of cloud users. The proposed threat model considers the internal and external threats to the cloud data integrity. There might be hardware and software bugs which are hidden by CSP. We also assume that cloud servers do not intentionally disclose the data to third parties. The CSPs are committed to data integrity as per the assumption of this paper. The cloud server is expected to respond to the integrity calls of the TPA in order to verify the data. The communication is done through digital certificates. Figure 1 shows the architecture of the threat model. setup phase and audit phase. In the setup phase, cloud user generates signatures for authentication. Then user takes a file whose number of blocks is known to TPA sends the file and its metadata for verification to server. The local copy may be deleted after outsourcing data. In the audit phase, the following protocol is applied. Fig 2 shows the public auditing protocol implemented in this paper using Azure cloud. Fig. 2 privacy preserving auditing protocol Fig. 1 Cloud storage service architecture (excerpt from [13]) As can be seen in fig. 1 there is data flow between cloud users and cloud servers. Data auditing is done by TPA. Public data auditing is performed by TPA which in privacy preserving fashion. The design goals of the solution provided in [13]include verification of cloud users data in privacy preserving fashion; ensuring storage correctness; ensuring the TPA can t gain access to users data; ensuring that the auditing mechanism is lightweight resulting less computation and communication cost. Proposed Protocols The proposed scheme makes use of four algorithms. They are KeyGen for generation of security keys which is run by cloud user, SigGen for signature generation which is run by cloud user, GenProof is meant for generating proof of correct storage which is run by cloud server, VerifyProof is meant for audit the proof sent by cloud server which is executed by TPA. The proposed scheme assumes that the TPA works in stateless fashion. It works for all cloud users. There are two phases in the scheme namely As can be seen in fig 1, the protocol applied between the cloud user and cloud server is presented. The TPA is capable of verifying the data integrity by challenging the server as per the protocol. Fig. 3 provides the protocol for batch auditing. Fig. 3 Batch auditing protocol Page 452

4 As seen in fig. 3, the batch auditing protocol enables the TPA and cloud server to verify integrity of data of different cloud users concurrently. The batch auditing enables the TPA to work efficiently in real time and serve multiple user sessions simultaneously. However, the TPA works in stateless mode and does not remember the users between the delegations. IV. IMPLEMENTATION AND RESULTS The experiments are made using the prototype application that we have built to test the efficiency of the protocols. The prototype was tested in a PC with 4GB of RAM and Core 2 processor. C# is the programming language used to implement the protocols and facilitate user operations. Microsoft Azure cloud is used to store and retrieve data. The cost of privacy preserving protocol is evaluated with many experiments. Then we focused on batch processing efficiency as well. The quantification of cost enabled us to assess the performance of the protocols implemented in this paper. Fig. 4 shows individual and batch auditing performances. Fig. 4 Performance of individual vs. batch auditing As shown in fig. 4, the horizontal axis represents number of auditing tasks performed while the vertical axis represents the time taken for auditing of each task. It is evident in the graph that when compared with individual auditing, the batch auditing reduces the computation cost by 15%. Fig. 5 - Performance of individual vs. batch auditing with invalid responses As seen in fig. 5, the horizontal axis represents fraction of invalid responses while the vertical axis represents auditing time per task. The results reveal that even when the invalid responses exceed 18% of the batch, the batch auditing performance is still is preferable to individual auditing. V. CONCLUSION In this paper, we have implemented a public auditing protocol in Azure cloud which enables individuals and organizations to store data in cloud without security concerns. The third party auditing protocol we implemented ensures complete storage security as it enables end users to relieve from the security concerns of cloud storage. Our third party auditing protocol does not access to actual data but it is capable of performing audit on data and verifies the integrity of stored data. The protocol helps in auditing data pertaining to concurrent sessions of cloud users. We have built a prototype application that interacts with Azure cloud and demonstrates the efficiency of the proposed system. The empirical results revealed that the proposed protocol provides high security and performance. REFERENCES [1] P. Mell and T. Grance, Draft NIST working definition of cloudcomputing, Referenced on June. 3rd, [2] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz,A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica,and M. Zaharia, Above the clouds: A Berkeley view of cloud computing, University of California, Berkeley, Tech. Rep. UCBEECS , Feb Page 453

5 [3] Cloud Security Alliance, Top threats to cloud computing, 2010, [4] M. Arrington, Gmail disaster: Reports of mass deletions, 2006, [5] J. Kincaid, MediaMax/TheLinkup closes its doors, July 2008, elinkup-closes-its-doors/. [6] Amazon.com, Amazon s3 availability event: July 20, 2008, [7] Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, Enabling publicauditability and data dynamics for storage security in cloudcomputing, IEEE Transactions on Parallel and Distributed Systems,vol. 22, no. 5, pp , [8] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson,and D. Song, Provable data possession at un-trusted stores, in Proc. of CCS 07, 2007, pp [9] A. Juels and J. Burton S. Kaliski, PORs: Proofs of retrievability for large files, in Proc. of CCS 07, October 2007, pp [10] Cloud Security Alliance, Security guidance for criticalareas of focus in cloud computing, 2009, [11] M. A. Shah, R. Swaminathan, and M. Baker, Privacy-preservingaudit and extraction of digital contents, Cryptology eprintarchive, Report 2008/186, [12] H. Shacham and B. Waters, Compact proofs of retrievability, inproc. of Asiacrypt, vol. 5350, Dec 2008, pp [13] Cong Wang, Student Member, IEEE, Sherman S.M. Chow, Qian Wang, Student Member, IEEE,Kui Ren, Senior Member, IEEE, and Wenjing Lou, Senior Member, IEEE, Privacy-Preserving Public Auditing for Secure Cloud Storage, IEEE TRANSACTIONS ON COMPUTERS, [14] K. D. Bowers, A. Juels, and A. Oprea, Proofs of retrievability:theory and implementation, in Proc. of ACM workshop on CloudComputing security (CCSW 09), 2009, pp [15] Y. Dodis, S. P. Vadhan, and D. Wichs, Proofs of retrievability viahardness amplification, in TCC, 2009, pp [16] M. A. Shah, M. Baker, J. C. Mogul, and R. Swaminathan, Auditing to keep online storage services honest, in Proc. of HotOS 07,2007, pp [17] G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, Scalable and efficient provable data possession, in Proc. of SecureComm 08,2008, pp [18] C. Wang, Q. Wang, K. Ren, and W. Lou, Towards secure and dependablestorage services in cloud computing, IEEE Transactionson Service Computing, 2011, to appear. [19] C. Erway, A. Kupcu, C. Papamanthou, and R. Tamassia, Dynamic provable data possession, in Proc. of CCS 09, 2009, pp [20] F. Sebe, J. Domingo-Ferrer, A. Mart ınez- Balleste, Y. Deswarte, andj.-j. Quisquater, Efficient remote data possession checking in critical information infrastructures, IEEE Transactions on Knowledge and Data Engineering, vol. 20, no. 8, pp , August [21] T. Schwarz and E. L. Miller, Store, forget, and check: Using algebraic signatures to check remotely administered storage, inproc. of ICDCS 06, [22] R. Curtmola, O. Khan, R. Burns, and G. Ateniese, MR-PDP:Multiple-replica provable data possession, in Proc. of ICDCS 08.IEEE Computer Society, 2008, pp [23] K. D. Bowers, A. Juels, and A. Oprea, HAIL: A high-availability and integrity layer for cloud storage, in Proc. of CCS 09, 2009,pp Page 454

A Simple Secure Auditing for Cloud Storage

A Simple Secure Auditing for Cloud Storage A Simple Secure Auditing for Cloud Storage Lee-Hur Shing Institute of Information Science Academia Sinica leehurs@iis.sinica.edu.tw Marn-Ling Shing University of Taipei Yu-Hsuan Yeh, Yan-Zhi Hu and Shih-Ci

More information

A Secure Cloud Storage System for Supporting Privacy-Preserving Public Auditing

A Secure Cloud Storage System for Supporting Privacy-Preserving Public Auditing A Secure Cloud Storage System for Supporting Privacy-Preserving Public Auditing Yenduva Venkata Mukesh Naidu M.Tech Student Deparment of CSE, Chaitanya Engineering College, Kommadi, Madhurawada, Visakhapatnam.

More information

Batch Verification Scheme for Economic Cloud Storage Services

Batch Verification Scheme for Economic Cloud Storage Services Batch Verification Scheme for Economic Cloud Storage Services K. Sudha 1, Mr. S. Sivaraj, ME 2 II-M.E (CSE), Dept. of CSE, SSM College of Engineering, Komarapalayam, Tamilnadu, India 1 Assistant Professor,

More information

Improving data integrity on cloud storage services

Improving data integrity on cloud storage services International Journal of Engineering Science Invention Volume 2 Issue 2 ǁ February. 2013 Improving data integrity on cloud storage services Miss. M.Sowparnika 1, Prof. R. Dheenadayalu 2 1 (Department of

More information

Keywords Cloud Data Storage, Privacy Preserving, Public Auditability, Cryptographic Protocols, Cloud Computing.

Keywords Cloud Data Storage, Privacy Preserving, Public Auditability, Cryptographic Protocols, Cloud Computing. Volume 4, Issue 10, October 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Implementation

More information

Vijayawada, Andhrapradesh, India 2 Dhanekula Institute of Engineering & Technology, Ganguru, Vijayawada, Andhrapradesh, India

Vijayawada, Andhrapradesh, India 2 Dhanekula Institute of Engineering & Technology, Ganguru, Vijayawada, Andhrapradesh, India Volume 4, Issue 10, October 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Privacy-Process

More information

HLA BASED THIRD PARTY AUDITING FOR SECURE CLOUD STORAGE

HLA BASED THIRD PARTY AUDITING FOR SECURE CLOUD STORAGE HLA BASED THIRD PARTY AUDITING FOR SECURE CLOUD STORAGE Mr. N.R. Rejin Paul Assistant Professor, Department of Computer Science and Engineering, Velammal Institute of Technology, Chennai, Tamilnadu, India.

More information

Delegating Auditing Task to TPA for Security in Cloud Computing

Delegating Auditing Task to TPA for Security in Cloud Computing Delegating Auditing Task to TPA for Security in Cloud Computing 1 Nallam Gowri, 2 D.Srinivas 1,2Dept. of CSE,Kakinada Institute of Engineering & Technology, Korangi, e.g.dt,ap, India Abstract: This paper

More information

QUALITY OF SEVICE WITH DATA STORAGE SECURITY IN CLOUD COMPUTING

QUALITY OF SEVICE WITH DATA STORAGE SECURITY IN CLOUD COMPUTING QUALITY OF SEVICE WITH DATA STORAGE SECURITY IN CLOUD COMPUTING ABSTRACT G KALYANI 1* 1. M.Tech Student, Dept of CSE Indira Institute of Engineering and Technology, Markapur, AP. Cloud computing has been

More information

Remote Data Checking: Auditing the Preservation Status of Massive Data Sets on Untrusted Store

Remote Data Checking: Auditing the Preservation Status of Massive Data Sets on Untrusted Store Remote Data Checking: Auditing the Preservation Status of Massive Data Sets on Untrusted Store Randal Burns randal@cs.jhu.edu www.cs.jhu.edu/~randal/ Department of Computer Science, Johns Hopkins Univers

More information

Privacy Preserving Public Auditing in Secured Cloud Storage Using Block Authentication Code

Privacy Preserving Public Auditing in Secured Cloud Storage Using Block Authentication Code Privacy Preserving Public Auditing in Secured Cloud Storage Using Block Authentication Code Sajeev V 1, Gowthamani R 2 Department of Computer Science, Nehru Institute of Technology, Coimbatore, India 1,

More information

HLA Based Third Party Auditing For Secure Cloud Storage

HLA Based Third Party Auditing For Secure Cloud Storage HLA Based Third Party Auditing For Secure Cloud Storage Chandinee Saraswathy K., Keerthi D., Padma G. Student, Department of Computer Science and Engineering Velammal Institute of Technology, Panchetti

More information

STRUCTURED EMINENT DYNAMIC AUDITING FOR SECURE DATA STORAGE IN CLOUD COMPUTING

STRUCTURED EMINENT DYNAMIC AUDITING FOR SECURE DATA STORAGE IN CLOUD COMPUTING INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 STRUCTURED EMINENT DYNAMIC AUDITING FOR SECURE DATA STORAGE IN CLOUD COMPUTING Mr.Elamparithi P 1, Mr.Thanga Mariappan

More information

DATA INTEGRITY TECHNIQUES IN CLOUD: AN ANALYSIS

DATA INTEGRITY TECHNIQUES IN CLOUD: AN ANALYSIS DATA INTEGRITY TECHNIQUES IN CLOUD: AN ANALYSIS 1 MS. R. K. PANDYA, 2 PROF. K. K. SUTARIA 1 M.E.[Cloud Computing] Student, Computer Engineering Department, V. V. P. Engineering College, Rajkot, Gujarat

More information

Secure Auditing For Outsourced Data in Cloud Using Homomorphic Token and Erasure Code

Secure Auditing For Outsourced Data in Cloud Using Homomorphic Token and Erasure Code Secure Auditing For Outsourced Data in Cloud Using Homomorphic Token and Erasure Code N.S. Monalisa Devi 1, T. Sounder Rajan 2 M.E. Department of CSE, K S R College for Engineering and Technology, Tiruchengode,

More information

Enhancing Availability Using Identity Privacy Preserving Mechanism in Cloud Data Storage

Enhancing Availability Using Identity Privacy Preserving Mechanism in Cloud Data Storage Enhancing Availability Using Identity Privacy Preserving Mechanism in Cloud Data Storage V.Anjani Kranthi *1, Smt.D.Hemalatha *2 M.Tech Student, Dept of CSE, S.R.K.R engineering college, Bhimavaram, AP,

More information

International Journal of Advance Engineering and Research Development. AN Optimal Matrix Approach for virtual load allocation and data sharing

International Journal of Advance Engineering and Research Development. AN Optimal Matrix Approach for virtual load allocation and data sharing Scientific Journal of Impact Factor (SJIF): 5.71 International Journal of Advance Engineering and Research Development Volume 5, Issue 02, February -2018 e-issn (O): 2348-4470 p-issn (P): 2348-6406 AN

More information

Available online at ScienceDirect. Procedia Computer Science 48 (2015 ) (ICCC-2014) (ICCC-2015)

Available online at   ScienceDirect. Procedia Computer Science 48 (2015 ) (ICCC-2014) (ICCC-2015) Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 48 (2015 ) 347 352 International Conference on Intelligent Computing, Communication & Convergence (ICCC-2015) (ICCC-2014)

More information

Survey Paper on Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud

Survey Paper on Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,

More information

Dynamic and Flexible Group Key Generation Based on User Behaviour Monitoring

Dynamic and Flexible Group Key Generation Based on User Behaviour Monitoring International Journal of Computing Academic Research (IJCAR) ISSN 2305-9184, Volume 5, Number 1 (February 2016), pp.27-32 MEACSE Publications http://www.meacse.org/ijcar Dynamic and Flexible Group Key

More information

Key Terms: Cloud Computing, cloud Service Provider, Provable Data Possession, Dynamic File Block, Map Version Table.

Key Terms: Cloud Computing, cloud Service Provider, Provable Data Possession, Dynamic File Block, Map Version Table. Volume 6, Issue 6, June 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Dynamic File Block

More information

ABSTRACT. Keywords: Cloud Computing, Storage, Authentication,Third Party Author, Encryption & Blocks.

ABSTRACT. Keywords: Cloud Computing, Storage, Authentication,Third Party Author, Encryption & Blocks. P P IJISET - International Journal of Innovative Science, Engineering & Technology, Vol. 3 Issue 8, August 2016 Secure User Data Using Encryption for Preserving Private Data in Cloud 1, 3 1 3 M Purnachandra

More information

International Journal Of Global Innovations -Vol.5, Issue.I Paper Id: SP-V5-I1-P07 ISSN Online:

International Journal Of Global Innovations -Vol.5, Issue.I Paper Id: SP-V5-I1-P07 ISSN Online: TOWARDS SECURE AND DEPENDABLE AUDITING FOR REGENRATING-CODE -BASED CLOUD STORAGE #1 GADDAM VASUDHA, M.Tech Student, #2 S.NAVEEN KUMAR, Associate Professor, Department of CSE, SREE CHAITANYA INSTITUTE OF

More information

Preserving Data Integrity in Cloud Storage

Preserving Data Integrity in Cloud Storage Preserving Data Integrity in Cloud Storage Jegadeesan.K 1, Sivakumar.K 2 M.E, Department of CCE, Erode Builder Educational Trust s Group of Institutions, Kangayam, Tamilnadu, India 1 M.E, Department of

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK TECHNIQUES FOR ENSURING DATA STORAGE SECURITY IN CLOUD COMPUTING GANESH B. CHAVAN

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 4, Jul Aug 2017

International Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 4, Jul Aug 2017 RESEARCH ARTICLE A Survey on Data Integrity Auditing Schemes in Cloud Computing Purnima [1], Deepak Kumar Verma [2] Student of MTech. [1] Computer Science Department [2] IEC College of Engineering and

More information

Ensuring Data Storage Security in Cloud Computing using Sobol Sequence

Ensuring Data Storage Security in Cloud Computing using Sobol Sequence 2010 1st International Conference on Parallel, Distributed and Grid Computing (PDGC - 2010) Ensuring Data Storage Security in Cloud Computing using Sobol Sequence P. Syam Kumar, R. Subramanian and D. Thamizh

More information

A Quasi group Encryption based Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing

A Quasi group Encryption based Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing Volume 4, No. 2, Jan-Feb 2013 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at www.ijarcs.info ISSN No. 0976-5697 A Quasi group Encryption based Privacy-Preserving

More information

Efficient Data Storage Security with Multiple Batch Auditing in Cloud Computing

Efficient Data Storage Security with Multiple Batch Auditing in Cloud Computing Efficient Data Storage Security with Multiple Batch Auditing in Cloud Computing P. Sukumar [1] Department of Computer Science Sri Venkateswara College of Engineering, Chennai B. Sathiya [2] Department

More information

International Journal of Advance Engineering and Research Development

International Journal of Advance Engineering and Research Development Scientific Journal of Impact Factor (SJIF): 3.134 International Journal of Advance Engineering and Research Development Volume 3, Issue 2, February -2016 e-issn (O): 2348-4470 p-issn (P): 2348-6406 Enabling

More information

Provable Dynamic Data Possession by Datalog Rules

Provable Dynamic Data Possession by Datalog Rules 958 JOURNAL OF SOFTWARE, VOL. 9, NO. 4, APRIL 2014 Provable Dynamic Data Possession by Datalog Rules Jing Lu School of Optical Electrical and Computing Engineering University of Shanghai for Science and

More information

ISSN Vol.08,Issue.16, October-2016, Pages:

ISSN Vol.08,Issue.16, October-2016, Pages: ISSN 2348 2370 Vol.08,Issue.16, October-2016, Pages:3146-3152 www.ijatir.org Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation VEDIRE AJAYANI 1, K. TULASI 2, DR P. SUNITHA

More information

Research Article. August 2017

Research Article. August 2017 International Journals of Advanced Research in Computer Science and Software Engineering ISSN: 2277-128X (Volume-7, Issue-8) a Research Article August 2017 Data Integrity Techniques in Cloud Computing:

More information

Fine-Grained Data Updates on Cloud with Authorized Public Auditing

Fine-Grained Data Updates on Cloud with Authorized Public Auditing IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 03, 2015 ISSN (online): 2321-0613 Fine-Grained Data Updates on Cloud with Authorized Public Auditing Sindhu L 1 Ms Leelavathi

More information

ISSN: [Shubhangi* et al., 6(8): August, 2017] Impact Factor: 4.116

ISSN: [Shubhangi* et al., 6(8): August, 2017] Impact Factor: 4.116 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY DE-DUPLICABLE EFFECTIVE VALIDATION of CAPACITY for DYNAMIC USER ENVIRONMENT Dr. Shubhangi D C *1 & Pooja 2 *1 HOD, Department

More information

Potential and Public Auditing with Fair Interposition for Cloud Data

Potential and Public Auditing with Fair Interposition for Cloud Data Potential and Public Auditing with Fair Interposition for Cloud Data Mrs. R. Lakshmi 1 M.Sc.,M.Phil., Assistant Prof,Mangayarkarasi College of Arts&science for Women R.Kalaiselvi 2, B.Nandhini 3, K.Meenakshi

More information

PERFORMANCE OF CLOUD DATA INTEGRITY PROOFS IN CLOUD STORAGE SYSTEM USING CRYPTOGRAPHIC KEY

PERFORMANCE OF CLOUD DATA INTEGRITY PROOFS IN CLOUD STORAGE SYSTEM USING CRYPTOGRAPHIC KEY PERFORMANCE OF CLOUD DATA INTEGRITY PROOFS IN CLOUD STORAGE SYSTEM USING CRYPTOGRAPHIC KEY B.M.RAJESH 1 Asst Prof, Department of Information Technology, SNMV College of Arts and Science, Tamil Nadu, India

More information

Improved Third Party Auditing Approach For Shared Data In The Cloud With Efficient Revocation Of User

Improved Third Party Auditing Approach For Shared Data In The Cloud With Efficient Revocation Of User Improved Third Party Auditing Approach For Shared Data In The Cloud With Efficient Revocation Of User Miss Madhuri Kulkarni PG Student, Dept. Of Computer Engineering, Alard Collage of Engineering and Management,

More information

Public Auditing on Shared Data in the Cloud Using Ring Signature Mechanism

Public Auditing on Shared Data in the Cloud Using Ring Signature Mechanism Public Auditing on Shared Data in the Cloud Using Ring Signature Mechanism MS. Gayatri D Patwardhan Prof.B. W. Balkhande Abstract: Cloud computing is the long dreamed vision of computing as a utility,

More information

Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing

Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing IEEE INFOCOM 2010, San Diego, CA, March 2010 Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing Cong Wang 1, Qian Wang 1, Kui Ren 1, and Wenjing Lou 2 1 Illinois Institute

More information

ABSTRACT. Keywords: Cloud Storage, Regenerating Code, Public Auditing, Dynamic Auditing, Privacy Preserving, Proxy I. INTRODUCTION

ABSTRACT. Keywords: Cloud Storage, Regenerating Code, Public Auditing, Dynamic Auditing, Privacy Preserving, Proxy I. INTRODUCTION 216 IJSRSET Volume 2 Issue 4 Print ISSN : 2395-199 Online ISSN : 2394-499 Themed Section: Engineering and Technology Privacy Preserving and Dynamic Auditing for Outsourced Storages in Cloud Satish Shelar*,

More information

An Efficient Dynamic Proof of Retrievability (PoR) Scheme

An Efficient Dynamic Proof of Retrievability (PoR) Scheme An Efficient Dynamic Proof of Retrievability (PoR) Scheme Zhen Mo Yian Zhou Shigang Chen Department of Computer & Information Science & Engineering University of Florida, Gainesville, FL 32611, USA Abstract

More information

Result Paper on Public Auditing by using KERBEROS to Secure Cloud Storage

Result Paper on Public Auditing by using KERBEROS to Secure Cloud Storage Result Paper on Public Auditing by using KERBEROS to Secure Cloud Storage Ved M. Kshirsagar, Prof. V.S.Gulhane Information Technology, Computer Science, SGBAU University Amravati, Maharashtra, India Abstract

More information

A Dynamic Proof of Retrievability (PoR) Scheme with O(logn) Complexity

A Dynamic Proof of Retrievability (PoR) Scheme with O(logn) Complexity A Dynamic Proof of Retrievability (PoR) Scheme with O(logn) Complexity Zhen Mo Yian Zhou Shigang Chen Department of Computer & Information Science & Engineering University of Florida, Gainesville, FL 32611,

More information

Enhancing Reliability and Scalability in Dynamic Group System Using Three Level Security Mechanisms

Enhancing Reliability and Scalability in Dynamic Group System Using Three Level Security Mechanisms Enhancing Reliability and Scalability in Dynamic Group System Using Three Level Security Mechanisms A.Sarika*1, Smt.J.Raghaveni*2 M.Tech Student, Dept of CSE, S.R.K.R Engineering college, Bhimavaram, AP,

More information

Scalability Services in Cloud Computing Using Eyeos

Scalability Services in Cloud Computing Using Eyeos Journal of Computer Science Original Research Paper Scalability Services in Cloud Computing Using Eyeos 1 Deivendran, P. and 2 E.R. Naganathan 1 Manonmaniam Sundaranar University, Tirunelveli, India 2

More information

Efficient integrity verification of replicated data in cloud

Efficient integrity verification of replicated data in cloud Scholars' Mine Masters Theses Student Research & Creative Works Fall 2013 Efficient integrity verification of replicated data in cloud Raghul Mukundan Follow this and additional works at: http://scholarsmine.mst.edu/masters_theses

More information

Third Party Auditing (TPA) For Secure Cloud Storage With Secret Sharing Algorithm. SHEETAL THITE[1], M TECH,Computer Engineering, BVDUCOE, Pune,india

Third Party Auditing (TPA) For Secure Cloud Storage With Secret Sharing Algorithm. SHEETAL THITE[1], M TECH,Computer Engineering, BVDUCOE, Pune,india , Impact Factor- 5.343 Third Party Auditing (TPA) For Secure Cloud Storage With Secret Sharing Algorithm SHEETAL THITE[1], M TECH,Computer Engineering, BVDUCOE, Pune,india Prof. S.S.DHOTRE Associate Professor,Department

More information

MANAGING OF CLOUD STORAGE AUDITING FOR DATA INTEGRITY

MANAGING OF CLOUD STORAGE AUDITING FOR DATA INTEGRITY MANAGING OF CLOUD STORAGE AUDITING FOR DATA INTEGRITY GARNEPALLI MOUNIKA 1, N.SANTHOSH RAMCHANDER 2 M. Tech Student, CSE, SVS Group of Institutions, Warangal, TS 1 M.Tech (Ph.D) Assoc. Prof, CSE Dept,

More information

Dec-2017, Issue- V-5, I-8, SW-03 ISSN (Online) ISSN (Print)

Dec-2017, Issue- V-5, I-8, SW-03 ISSN (Online) ISSN (Print) IJDCST @ Dec-2017, Issue- V-5, I-8, SW-03 ISSN-2320-7884 (Online) ISSN-2321-0257 (Print) Dynamic and Public Open Examination with Reasonable Mediation for Cloud Information A.Swathi 1, G. Shameshwari 2

More information

A Result Analysis on Privacy-Preserving Public Auditing System of Data Storage Security in Cloud Computing through Trusted TPA

A Result Analysis on Privacy-Preserving Public Auditing System of Data Storage Security in Cloud Computing through Trusted TPA A Result Analysis on Privacy-Preserving Public Auditing System of Data Storage Security in Cloud Computing through Trusted TPA Nupoor M. Yawale, Prof. V. B. Gadicha # M.E. Second year CSE P R Patil COET,

More information

Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage: Theory and Implementation (Supplementary File)

Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage: Theory and Implementation (Supplementary File) 1 Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage: Theory and Implementation (Supplementary File) Henry C. H. Chen and Patrick P. C. Lee 1 ADDITIONAL RELATED WORK This section

More information

Enabling Efficiency in Data Dynamics for Storage Security in Cloud Computing

Enabling Efficiency in Data Dynamics for Storage Security in Cloud Computing Enabling Efficiency in Data Dynamics for Storage Security in Cloud Computing K.Gayathri 1, P.Umamaheswari 2, P.Senthilkumar 3 Assistant Professor, Anna University, Tamilnadu, India 1,2 Assistant Professor,

More information

A Secured Public Auditing for Regenerating-Code-Based Cloud Storage

A Secured Public Auditing for Regenerating-Code-Based Cloud Storage P P A Secured Public Auditing for Regenerating-Code-Based Cloud Storage 1 Miss. Nirupamashree CP 1 2 P, Mrs. Pushpa RP PG Student, Department of Computer Science and Engineering, PAssistentProfessor, Department

More information

6367(Print), ISSN (Online) Volume 4, Issue 3, May June (2013), IAEME & TECHNOLOGY (IJCET)

6367(Print), ISSN (Online) Volume 4, Issue 3, May June (2013), IAEME & TECHNOLOGY (IJCET) INTERNATIONAL International Journal of Computer JOURNAL Engineering OF COMPUTER and Technology ENGINEERING (IJCET), ISSN 0976- & TECHNOLOGY (IJCET) ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4,

More information

Homomorphic Token and Distributed Erasure-Code for cloud

Homomorphic Token and Distributed Erasure-Code for cloud Homomorphic Token and Distributed Erasure-Code for cloud 1B.Anjani Kumar, 2K.Hari Prasad, 3C.Subash Chandra 1,3Dept. of CSE, Kakinada Institute of Engineering & Technology, Korangi, AP, India 2P.G.Department

More information

Data Integrity Verification in Cloud Storage without using Trusted Third Party Auditor

Data Integrity Verification in Cloud Storage without using Trusted Third Party Auditor Data Integrity Verification in Cloud Storage without using Trusted Third Party Auditor Rana M Pir Lecturer Leading university, sylhet Bangladesh Ranapir@yahoo.com Abstract Data security is biggest problem.

More information

Efficient integrity checking technique for securing client data in cloud computing

Efficient integrity checking technique for securing client data in cloud computing International Journal of Electrical & Computer Sciences IJECS-IJENS Vol: 11 No: 05 43 Efficient integrity checking technique for securing client data in cloud computing Dalia Attas and Omar Batrafi Computer

More information

Provable dynamic auditing in mobile cloud computing for secure storage of e- health data.

Provable dynamic auditing in mobile cloud computing for secure storage of e- health data. Biomedical Research 2018; Special Issue: S88-S94 ISSN 0970-938X www.biomedres.info Provable dynamic auditing in mobile cloud computing for secure storage of e- health data. Suguna M *, Mercy Shalinie S

More information

IMPROVING DATA DYNAMICS AND STORAGE SECURITY IN CLOUD COMPUTING

IMPROVING DATA DYNAMICS AND STORAGE SECURITY IN CLOUD COMPUTING International Journal of Advancements in Research & Technology, Volume 2, Issue4, April 2013 327 IMPROVING DATA DYNAMICS AND STORAGE SECURITY IN CLOUD COMPUTING Badi Alekhya Department of CSE T.J.S Engineering

More information

Techniques for Efficiently Ensuring Data Storage Security in Cloud Computing

Techniques for Efficiently Ensuring Data Storage Security in Cloud Computing Techniques for Efficiently Ensuring Data Storage Security in Cloud Computing Vasu Raju, Raj Kumar, and Anand Raj vasuraju_1255@yahoo.com naaniraj@gmail.com, anandsofttech@gmail.com M.Tech (C.S.E), S.r.Engg

More information

Secured Public Auditing for Shared Data in the Cloud

Secured Public Auditing for Shared Data in the Cloud International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume 2, Issue 8, August 2015, PP 10-15 ISSN 2349-4840 (Print) & ISSN 2349-4859 (Online) www.arcjournals.org Secured

More information

AES and DES Using Secure and Dynamic Data Storage in Cloud

AES and DES Using Secure and Dynamic Data Storage in Cloud Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,

More information

Secure Evaluation of Public Auditing For Personal and Shared Data with Efficient User Revocation in Cloud Computing

Secure Evaluation of Public Auditing For Personal and Shared Data with Efficient User Revocation in Cloud Computing Secure Evaluation of Public Auditing For Personal and Shared Data with Efficient User Revocation in Cloud Computing Chinta Mounika M.Tech Student, Department of Computer Science and Engineering, B.V.C

More information

1. Introduction. Ajinkya Sabale 1 IJECS Volume 04 Issue 11 November, 2015 Page No Page 14987

1. Introduction. Ajinkya Sabale 1 IJECS Volume 04 Issue 11 November, 2015 Page No Page 14987 www.ijecs.in International Journal Of Engineering And Computer Science ISSN: 2319-7242 Volume 4 Issue 11 Nov 2015, Page No. 14987-14992 Third Party Auditing of Data on Cloud With Fine Grained Updates Ajinkya

More information

Proofs of Storage SENY KAMARA MICROSOFT RESEARCH

Proofs of Storage SENY KAMARA MICROSOFT RESEARCH Proofs of Storage SENY KAMARA MICROSOFT RESEARCH Computing as a Service 2 Computing is a vital resource Enterprises, governments, scientists, consumers, Computing is manageable at small scales e.g., PCs,

More information

THIRD PARTY AUDITING FOR SECURE DATA STORAGE IN CLOUD THROUGH DIGITAL SIGNATURE USING RSA

THIRD PARTY AUDITING FOR SECURE DATA STORAGE IN CLOUD THROUGH DIGITAL SIGNATURE USING RSA THIRD PARTY AUDITING FOR SECURE DATA STORAGE IN CLOUD THROUGH DIGITAL SIGNATURE USING RSA ABSTRACT K.Govinda #1, V.Gurunathaprasad #2, H.Sathishkumar #3 Cloud computing is the way of providing computing

More information

Integrity Check Mechanism in Cloud Using SHA-512 Algorithm

Integrity Check Mechanism in Cloud Using SHA-512 Algorithm www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 5 may, 2014 Page No. 6033-6037 Integrity Check Mechanism in Cloud Using SHA-512 Algorithm Mrs.Shantala

More information

International Journal of Advance Engineering and Research Development. Carefree Data Access Solution for Public Cloud Storage

International Journal of Advance Engineering and Research Development. Carefree Data Access Solution for Public Cloud Storage Scientific Journal of Impact Factor (SJIF): 4.14 International Journal of Advance Engineering and Research Development Volume 3, Issue 3, March -2016 Carefree Data Access Solution for Public Cloud Storage

More information

A Comparative Analysis of Provable Data Possession Schemes in Cloud

A Comparative Analysis of Provable Data Possession Schemes in Cloud A Comparative Analysis of Provable Data Possession Schemes in Cloud Pooja Natu #, Prof. Shikha Pachouly * # PG scholar AISSMS COE, Department of Computer Engineering, Savitribai Phule Pune University,

More information

SECURE SHARING OF DATA IN PRIVATE CLOUD BY RSA OAEP ALGORITHM. SRM University, Chennai

SECURE SHARING OF DATA IN PRIVATE CLOUD BY RSA OAEP ALGORITHM. SRM University, Chennai Volume 115 No. 6 2017, 689-695 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu SECURE SHARING OF DATA IN PRIVATE CLOUD BY RSA OAEP ALGORITHM S. Selvakumar

More information

ADVANCES in NATURAL and APPLIED SCIENCES

ADVANCES in NATURAL and APPLIED SCIENCES ADVANCES in NATURAL and APPLIED SCIENCES ISSN: 1995-0772 Published BY AENSI Publication EISSN: 1998-1090 http://www.aensiweb.com/anas 2016 May 10(5): pages 223-227 Open Access Journal An Efficient Proxy

More information

International Journal of Informative & Futuristic Research

International Journal of Informative & Futuristic Research International Journal of Informative & Futuristic Research www.ijifr.com Volume 6 Issue 2 October 2018 ISSN : 2347-1697 REVIEW OF AUTHORIZED AUDITING OF DYNAMIC BIG-DATA ON CLOUD Paper ID IJIFR/V6/ E2/

More information

Auditing-as-a-Service for Cloud Storage

Auditing-as-a-Service for Cloud Storage Auditing-as-a-Service for Cloud Storage Alshaimaa Abo-alian, N. L. Badr, M. F. Tolba, Faculty of Information and Computer Sciences, Ain shams University, Cairo, Egypt shimo.fcis83@gmail.com, dr.nagwabadr@gmail.com,

More information

Thakare B. Monika, Dhande M. N.; International Journal of Advance Research, Ideas and Innovations in Technology.

Thakare B. Monika, Dhande M. N.; International Journal of Advance Research, Ideas and Innovations in Technology. ISSN: 2454-132X Impact factor: 4.295 (Volume3, Issue2) Available online at www.ijariit.com Privacy Preserving and Secure Data Integrity Protection security in Regenerating Coding Based Public Cloud Storage

More information

A Methodology for Assigning Access Control to Public Clouds

A Methodology for Assigning Access Control to Public Clouds Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 12, December 2014,

More information

Cloud Data Integrity Auditing Over Dynamic Data for Multiple Users

Cloud Data Integrity Auditing Over Dynamic Data for Multiple Users Received: June 13, 2017 239 Cloud Data Integrity Auditing Over Dynamic Data for Multiple Users Santhosh Kumar 1* Latha Parthiban 2 1 Sathyabama University, Tamilnadu, India 2 Pondicherry Community College,

More information

On the Security of a Lightweight Cloud Data Auditing Scheme

On the Security of a Lightweight Cloud Data Auditing Scheme On the Security of a Lightweight Cloud Data Auditing Scheme Reyhaneh Rabaninead a, Maryam Raabzadeh Asaar b, Mahmoud Ahmadian Attari a, Mohammad Reza Aref c a Department of Electrical Engineering, K. N.

More information

Cloud security is an evolving sub-domain of computer and. Cloud platform utilizes third-party data centers model. An

Cloud security is an evolving sub-domain of computer and. Cloud platform utilizes third-party data centers model. An Abstract Cloud security is an evolving sub-domain of computer and network security. Cloud platform utilizes third-party data centers model. An example of cloud platform as a service (PaaS) is Heroku. In

More information

THIRD PARTY AUDITING FOR CLOUD STORAGE

THIRD PARTY AUDITING FOR CLOUD STORAGE Int. J. Engg. Res. & Sci. & Tech. 2015 Kedar Jayesh Rasal and Sandip A Kahate, 2015 Research Paper ISSN 2319-5991 www.ijerst.com Vol. 4, No. 2, May 2015 2015 IJERST. All Rights Reserved THIRD PARTY AUDITING

More information

DATA STORAGE IN CLOUD COMPUTING TO ENSURE EFFECTIVE INTEGRITY AND SECURITY IN MULTI CLOUD STORAGE

DATA STORAGE IN CLOUD COMPUTING TO ENSURE EFFECTIVE INTEGRITY AND SECURITY IN MULTI CLOUD STORAGE DATA STORAGE IN CLOUD COMPUTING TO ENSURE EFFECTIVE INTEGRITY AND SECURITY IN MULTI CLOUD STORAGE 1 Srikanth Murapaka, 2 D. Adinarayana, 3 Y.Ramesh Kumar, 4 M.V Ramarao 1 Final year M.tech Student, 2,

More information

A Review on Remote Data Auditing in Cloud Computing

A Review on Remote Data Auditing in Cloud Computing A Review on Remote Data Auditing in Cloud Computing [1] Arjun U, [2] Vinay S [1] Asst. Professor, [2] Professor [1] Dept. of ISE, PESITM Shivamogga, [2] Dept. of CSE, PESCE, Mandya Abstract: Cloud computing

More information

Towards Server-side Repair for Erasure Coding-based Distributed Storage Systems

Towards Server-side Repair for Erasure Coding-based Distributed Storage Systems Towards Server-side Repair for Erasure Coding-based Distributed Storage Systems Bo Chen Computer Science Department Stony Brook University bochen1@cs.stonybrook.edu Anil Kumar Ammula, Reza Curtmola Department

More information

On the Security of a Mutual Verifiable Provable Data Auditing in Public Cloud Storage

On the Security of a Mutual Verifiable Provable Data Auditing in Public Cloud Storage International Journal of Network Security, Vol.19, No.4, PP.605-612, July 2017 (DOI: 10.6633/IJNS.201707.19(4).14) 605 On the Security of a Mutual Verifiable Provable Data Auditing in Public Cloud Storage

More information

Public Verifiability of Stored Data in Cloud using Disassembly of Data Segment

Public Verifiability of Stored Data in Cloud using Disassembly of Data Segment Public Verifiability of Stored Data in Cloud using Disassembly of Data Segment Adhikrao.Y.Jadhav Department of Computer Science & Engg. Sachin P. Patil Department of Information Technology, Annasaheb Dange

More information

Cloud Storage Auditing Using Key Xposure

Cloud Storage Auditing Using Key Xposure Cloud Storage Auditing Using Key Xposure Suresh Kuamr Podomoni MCA Student, CMR College of Engineering and Technology. ABSTRACT: Cloud storage auditing is viewed as an imperative service to corroborate

More information

A Survey on Cloud Computing Storage and Security

A Survey on Cloud Computing Storage and Security Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 1, January 2015,

More information

An Efficient Provable Data Possession Scheme based on Counting Bloom Filter for Dynamic Data in the Cloud Storage

An Efficient Provable Data Possession Scheme based on Counting Bloom Filter for Dynamic Data in the Cloud Storage , pp. 9-16 http://dx.doi.org/10.14257/ijmue.2016.11.4.02 An Efficient Provable Data Possession Scheme based on Counting Bloom Filter for Dynamic Data in the Cloud Storage Eunmi Jung 1 and Junho Jeong 2

More information

Analysis of Attribute Set-Based Encryption Solution for Access Control in Cloud Computing

Analysis of Attribute Set-Based Encryption Solution for Access Control in Cloud Computing Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 2, Issue. 9, September 2013,

More information

Homomorphic encryption (whiteboard)

Homomorphic encryption (whiteboard) Crypto Tutorial Homomorphic encryption Proofs of retrievability/possession Attribute based encryption Hidden vector encryption, predicate encryption Identity based encryption Zero knowledge proofs, proofs

More information

SecCloud: Bridging Secure Storage and Computation in Cloud

SecCloud: Bridging Secure Storage and Computation in Cloud 2010 2010 IEEE International 30th International Conference Conference Distributed on Distributed Computing Computing Systems Systems Workshops Workshops SecCloud: Bridging Secure Storage and Computation

More information

SECURING DISTRIBUTED ACCOUNTABILITY FOR DATA SHARING IN CLOUD COMPUTING

SECURING DISTRIBUTED ACCOUNTABILITY FOR DATA SHARING IN CLOUD COMPUTING SECURING DISTRIBUTED ACCOUNTABILITY FOR DATA SHARING IN CLOUD COMPUTING N. RAMESH 1, D. ANIL M.E 2, M. KIRAN 3 1, M.TECH Scholar, VEC, Kavali 2, Assistant Professor, VEC, Kavali 3, Assistant Professor,

More information

Remote Data Checking for Network Codingbased. Distributed Storage Systems

Remote Data Checking for Network Codingbased. Distributed Storage Systems CCSW 0 Remote Data Checking for Network Coding-based Bo Chen, Reza Curtmola, Giuseppe Ateniese, Randal Burns New Jersey Institute of Technology Johns Hopkins University Motivation Cloud storage can release

More information

Group User Revocation in Cloud for Shared Data

Group User Revocation in Cloud for Shared Data Group User Revocation in Cloud for Shared Data Mahesh Salunke, Harshal Meher, Ajay Tambe, Sudir Deshmukh,Prof.Sanjay Agarwal Abstract With the excessive use of internet cloud has received much of the attention.

More information

Enhanced privacy of a remote data integritychecking protocol for secure cloud storage

Enhanced privacy of a remote data integritychecking protocol for secure cloud storage University of Wollongong Research Online Faculty of Engineering and Information Sciences - Papers: Part A Faculty of Engineering and Information Sciences 2014 Enhanced privacy of a remote data integritychecking

More information

Trusted Third Party Framework for Data Security in Cloud Computing Environment

Trusted Third Party Framework for Data Security in Cloud Computing Environment Trusted Third Party Framework for Data Security in Cloud Computing Environment Ravuri. Venkata Bhargavi 1, K. Narayana Rao 2 1 Computer Science Engineering, RISE Krishna Sai Prakasam Group of Institutions,

More information

A Review on Secure Multi Owner Multi-keyword Ranked Search Scheme Over Encrypted Cloud Data By Using 3DES Approach

A Review on Secure Multi Owner Multi-keyword Ranked Search Scheme Over Encrypted Cloud Data By Using 3DES Approach A Review on Secure Multi Owner Multi-keyword Ranked Search Scheme Over Encrypted Cloud Data By Using 3DES Approach Mr Vaibhav Sawalkar 1,Prof.Megha Singh 2 1 MTECH Student,Dept of Computer Science, CIIIT

More information

A Survey on Secure Storage in Cloud Computing

A Survey on Secure Storage in Cloud Computing Indian Journal of Science and Technology A Survey on Secure Storage in Cloud Computing A. Rajathi 1* and N. Saravanan 2 1 PG Student, School of Computing, SASTRA University, 613401, Thanjavur, Tamilnadu,

More information

Research Article An Efficient RSA Based Data Integrity Schema in Secured Cloud Storage

Research Article An Efficient RSA Based Data Integrity Schema in Secured Cloud Storage Research Journal of Applied Sciences, Engineering and Technology 8(20): 2103-2109, 2014 DOI:10.19026/rjaset.8.1204 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitted:

More information

DATA SECURITY IN CLOUD

DATA SECURITY IN CLOUD International Journal of Scientific and Research Publications, Volume 2, Issue 5, May 2012 1 DATA SECURITY IN CLOUD Leena, Mrs A. Kakoli Rao, Chitra Kapoor CSE Department of Galgotia College of Engineering

More information