Enhancing Availability Using Identity Privacy Preserving Mechanism in Cloud Data Storage

Similar documents
Enhancing Reliability and Scalability in Dynamic Group System Using Three Level Security Mechanisms

Dynamic and Flexible Group Key Generation Based on User Behaviour Monitoring

A Simple Secure Auditing for Cloud Storage

Public Auditing on Shared Data in the Cloud Using Ring Signature Mechanism

Available online at ScienceDirect. Procedia Computer Science 48 (2015 ) (ICCC-2014) (ICCC-2015)

ADVANCES in NATURAL and APPLIED SCIENCES

SECURE SHARING OF DATA IN PRIVATE CLOUD BY RSA OAEP ALGORITHM. SRM University, Chennai

Improved Third Party Auditing Approach For Shared Data In The Cloud With Efficient Revocation Of User

ISSN: [Shubhangi* et al., 6(8): August, 2017] Impact Factor: 4.116

A Public Auditing Framework for Cloud Storage Security

Survey Paper on Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud

A Secure Cloud Storage System for Supporting Privacy-Preserving Public Auditing

International Journal of Advance Engineering and Research Development. AN Optimal Matrix Approach for virtual load allocation and data sharing

Secure Auditing For Outsourced Data in Cloud Using Homomorphic Token and Erasure Code

Secure Evaluation of Public Auditing For Personal and Shared Data with Efficient User Revocation in Cloud Computing

QUALITY OF SEVICE WITH DATA STORAGE SECURITY IN CLOUD COMPUTING

Improving data integrity on cloud storage services

Efficient Data Storage Security with Multiple Batch Auditing in Cloud Computing

ISSN Vol.08,Issue.16, October-2016, Pages:

Preserving Data Integrity in Cloud Storage

Third Party Auditing (TPA) For Secure Cloud Storage With Secret Sharing Algorithm. SHEETAL THITE[1], M TECH,Computer Engineering, BVDUCOE, Pune,india

EFFICIENT DATA SHARING WITH ATTRIBUTE REVOCATION FOR CLOUD STORAGE

MANAGING OF CLOUD STORAGE AUDITING FOR DATA INTEGRITY

STRUCTURED EMINENT DYNAMIC AUDITING FOR SECURE DATA STORAGE IN CLOUD COMPUTING

International Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 4, Jul Aug 2017

International Journal of Advance Engineering and Research Development

Privacy Preserving Public Auditing in Secured Cloud Storage Using Block Authentication Code

Secure Token Based Storage System to Preserve the Sensitive Data Using Proxy Re-Encryption Technique

Enhanced Decentralized Control and Attack Analysis Model for Virtual Network System

SECURING DISTRIBUTED ACCOUNTABILITY FOR DATA SHARING IN CLOUD COMPUTING

IMPROVING DATA DYNAMICS AND STORAGE SECURITY IN CLOUD COMPUTING

Secured Public Auditing for Shared Data in the Cloud

Three Levels of Access Control to Personal Health Records in a Healthcare Cloud

Delegating Auditing Task to TPA for Security in Cloud Computing

Group User Revocation in Cloud for Shared Data

Vijayawada, Andhrapradesh, India 2 Dhanekula Institute of Engineering & Technology, Ganguru, Vijayawada, Andhrapradesh, India

On the Security of a Lightweight Cloud Data Auditing Scheme

HLA BASED THIRD PARTY AUDITING FOR SECURE CLOUD STORAGE

Batch Verification Scheme for Economic Cloud Storage Services

Remote Data Checking: Auditing the Preservation Status of Massive Data Sets on Untrusted Store

DATA INTEGRITY TECHNIQUES IN CLOUD: AN ANALYSIS

Enabling Efficiency in Data Dynamics for Storage Security in Cloud Computing

Key Terms: Cloud Computing, cloud Service Provider, Provable Data Possession, Dynamic File Block, Map Version Table.

COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY

Attribute Based Encryption with Privacy Protection in Clouds

Dec-2017, Issue- V-5, I-8, SW-03 ISSN (Online) ISSN (Print)

Public-key Cryptography: Theory and Practice

HLA Based Third Party Auditing For Secure Cloud Storage

A Quasi group Encryption based Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing

A compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems.

Provable dynamic auditing in mobile cloud computing for secure storage of e- health data.

Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing

ISSN Vol.04,Issue.05, May-2016, Pages:

THIRD PARTY AUDITING FOR SECURE DATA STORAGE IN CLOUD THROUGH DIGITAL SIGNATURE USING RSA

ROBUST AND ANONYMOUS AUTHENTICATION OF DATA STORED IN CLOUDS WITH DECENTRALIZED ACCESS CONTROL

Source Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network

Improving the Security Performance of Public Clouds Using Attribute Based Access Control in Document Sharing

ABSTRACT. Keywords: Cloud Computing, Storage, Authentication,Third Party Author, Encryption & Blocks.

THIRD PARTY AUDITING FOR CLOUD STORAGE

A Review on Secure Multi Owner Multi-keyword Ranked Search Scheme Over Encrypted Cloud Data By Using 3DES Approach

SDD: A Novel Technique for Enhancing Cloud Security with Self Destructing Data

Fine-Grained Data Updates on Cloud with Authorized Public Auditing

Cloud Data Integrity Auditing Over Dynamic Data for Multiple Users

Classification of Page to the aspect of Crawl Web Forum and URL Navigation

AES and DES Using Secure and Dynamic Data Storage in Cloud

Internet Traffic Classification Using Machine Learning. Tanjila Ahmed Dec 6, 2017

A Novel Distributed Access Control of Data Stored Clouds through Anonymous Authentication

International Journal of Advance Research in Engineering, Science & Technology

PRIVACY PRESERVING RANKED MULTI KEYWORD SEARCH FOR MULTIPLE DATA OWNERS. SRM University, Kattankulathur, Chennai, IN.

ANONYMIZATION OF DATA USING MAPREDUCE ON CLOUD

Data Integrity Verification in Cloud Storage without using Trusted Third Party Auditor

Result Paper on Public Auditing by using KERBEROS to Secure Cloud Storage

International Journal of Science Engineering and Advance Technology, IJSEAT,Vol.3,Issue 8

Public Verifiability of Stored Data in Cloud using Disassembly of Data Segment

6367(Print), ISSN (Online) Volume 4, Issue 3, May June (2013), IAEME & TECHNOLOGY (IJCET)

A Survey on Cloud Computing Storage and Security

International Journal of Advance Engineering and Research Development

FINE-GRAINED QUERY RESULTS VERIFICATION FOR SECURE SEARCH SCHEME OVER ENCRYPTED CLOUD DATA

Techniques for Efficiently Ensuring Data Storage Security in Cloud Computing

IMPROVING DATA SECURITY USING ATTRIBUTE BASED BROADCAST ENCRYPTION IN CLOUD COMPUTING

A Procedural Based Encryption Technique for Accessing Data on Cloud

ABSTRACT. Keywords: Cloud Storage, Regenerating Code, Public Auditing, Dynamic Auditing, Privacy Preserving, Proxy I. INTRODUCTION

REPUTATION BASED TRUST MANAGEMENT FOR CLOUD SERVICES T. Sandeep 1, G. Priya* 2

Keywords Cloud Data Storage, Privacy Preserving, Public Auditability, Cryptographic Protocols, Cloud Computing.

ENSURING PRIVACY OF E-MEDICAL HEALTH RECORDS USING TRIPLE- DES ALGORITHM

ENSURING SECURITY USING EMF TECHNIQUE IN CLOUD COMPUTING

ABSTRACT I. INTRODUCTION. Telangana, India 2 Professor, Department of Computer Science & Engineering, Shadan College of Engineering & Technology,

International Journal of Advanced Research in Computer Science and Software Engineering

A LTERATURE SURVEY ON REVOCABLE MULTIAUTHORITY CIPHER TEXT-POLICY ATTRIBUTE-BASED ENCRYPTION (CP-ABE) SCHEME FOR CLOUD STORAGE

Blocking of Mischievous Users in Anonymizing Networks using Nymble System Srikanth Chintala, I.L. Narsimha Rao

Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing

Efficient Information Retrieval for Ranked Queries in Cost-Effective Cloud Environments

Thakare B. Monika, Dhande M. N.; International Journal of Advance Research, Ideas and Innovations in Technology.

1. Introduction. Ajinkya Sabale 1 IJECS Volume 04 Issue 11 November, 2015 Page No Page 14987

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Integrity Check Mechanism in Cloud Using SHA-512 Algorithm

LOCAWARD: A SECURITY AND PRIVACY AWARE LOCATION-BASED REWARDING SYSTEM

DETECTION OF INTRUSION AND PRESERVING PRIVACY FOR DATA IN CLOUD STORAGE SYSTEM

A Methodology for Assigning Access Control to Public Clouds

Implementation of Decentralized Access Control with Anonymous Authentication in Cloud

Transcription:

Enhancing Availability Using Identity Privacy Preserving Mechanism in Cloud Data Storage V.Anjani Kranthi *1, Smt.D.Hemalatha *2 M.Tech Student, Dept of CSE, S.R.K.R engineering college, Bhimavaram, AP, India, Assistant Professor, Dept of CSE, S.R.K.R engineering college, Bhimavaram, AP, India, ABSTRACT: Cloud computing is the backbone to the technology driving. Cloud computing technology provides services like access files and shared files. Data integrity is the major issue. Different mechanisms have been designed previously to support public auditing on shared data store in the cloud. Many public verifiers are available to verify under shared data for integrity. Cloud users were not received any integrity and data freshness results. Finally traceability recognized as an issue. This paper is designed with traceability mechanism. It can improve data privacy and achieving traceability and data freshness using identity privacy mechanism. Compare to p revious approach, enhanced approach improves availability and integrity. INDEX TERMS: cloud data storage, privacy preserving mechanism, availability, identity privacy, public verifier. I.INTRODUCTION Cloud computing is the computing of the large number of connected devices in terms of data storage and online access. The most important privacy related to security and how cloud provides its service assurance are major issues. Currently many third party service providers and security models ensure to handle security issues. These are not fit and efficient frameworks. Data protection is required in transit and in remaining environments it is good service. To solve the privacy issue on shared data new identity privacy mechanism has been proposed here. It improves data privacy on shared data. Using proposed concepts we achieve traceability, data freshness. Through data freshness feature users gets latest version of files information. Here rollback attackers and misconfiguration errors are reduced here. 1

II.RELATED WORK: Today all networking users are accessing cloud services from different remote locations. Private cloud data storage always needs to maintain data privacy and integrity for users. Cloud is ready to provide different categories of services. Under service distribution we can observe some kind of privacy issues. Privacy preserving mechanism allows public auditing of shared data stored in the cloud. Many of existing approaches are implemented for privacy purpose under storing and share data environment. preserving auditing techniques design with homomorphic authentication mechanism. Homomorphic authentication mechanism uses pseudo random function and group signature also. These techniques verifies each and every block. It reduces the space to store the verification data. After designing these techniques privacy issues are available in cloud. These are designed with five algorithms. 1. Key generation 2. Join algorithm 3. Sign 4. Proof generation 5. Proof verification Authenticated File System is also a privacy preserving mechanism. It is completely related to oruta. AFS have lack of data freshness functionality. It works on data file operations. Here two layers are available for data freshness. Lower layer store blocks, each and every block will have MAC and version number information. Upper layer consist of Markel tree information. Every block versions are update here based on time interval. Again some issues we can observe here in this current auditing mechanism. Fig1: Privacy Preserving Mechanism Privacy preserving auditing technique can work on group of users. Privacy 2 Another privacy preserving mechanism we can introduce here that is called homomorphic authenticator with random

masking. Random masking operation can perform on each and every block using pseudo random function. Here different steps are involved. Those steps are 1.setup 2. Audit This approach does not work efficiently up to the mark. Finally last existing third party procedure is called ORUTA. It does not reveal any identity of the user. Here many problems we observed like forge ability and less verifiability problems. All existing approaches issues can control in this paper. II.PROBLEM STATEMENT Data integrity is one of the major issue. This is lack of identity privacy. Public verifier audits shared data and checks integrity of shared data. Enhance the model in order to audit the data integrity and keeping identity privacy also. We can achieve different number of constraints related to privacy and security. 1. Correctness 2. Availability 3. Public auditing III.PROPOSED METHODOLOGY Fig2: Public auditing mechanism diagram Setup: generate signature for each and every block. Audit: we can except challenge message from third party auditor. Here we are going to design traceability framework for achieving availability. Traceability is classifying into two categories of users. 1. Fake users 2. Normal users 3

Traceability: tracking fake user from accessing the data from cloud. Public Auditing: public verifier checks the integrity of shared data. Correctness: public verifier verifies correctness of shared data integrity. the Identity Privacy: verify whether the user is fake user or normal user. Protect against mis- Data Freshness: configuration errors. Fig3: identity management Security Data owner store the data in cloud. Cloud owner gives public key to data owner and cloud user or group members. Combine of public key and private key it is possible to generate group signature. Group signature is distributed to all cloud private users. During auditing Public verifier verifies private key and public key and identity of the signer also. Any key is leaked then we have different characteristics here for detection. Those are 1. Traceability 2. Public auditing 3. Correctness 4. Identity privacy 5. Data freshness Fig4: Identity key distribution System model consist of three types of users. Those are cloud owner, data owner, cloud user or group of users. Different types of users are participated here. 1. Original user 2. Group of users Every member have permission to access and allow modify and shared data. After shared data operation we can perform 4

verification with signature. Signature verification gives report whether it is integrity or not. IV.EXPERIMENTAL RESULTS AND DISCUSSION Different trusted third party auditors learn unauthorized information through auditing mechanism. We can observe practical results of Existing and proposed approaches through authorization and authentication of shared data in cloud data storage. 90 80 70 60 50 40 30 20 10 0 ES PS Fig5: Performance Graph availability Graph explains about existing and proposed system availability results. Proposed system gives high availability results compare to existing system. V.CONCLUSION AND FUTURE WORK In this paper we designed identity privacy mechanism for shared data in the cloud. This new mechanism is adopted to achieve traceability and data privacy. Public verifier verifies shared data and achieves new updated data collection. It detects more number of fake users and enhanced cloud data storage availability. We observe many difficulties in current system; all those are control with future auditing system. VI.REFERENCES [1] Boyang Wang, Baochun Li, Hui Li, Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud in IEEE transactions on cloud computing, VOL. 2, NO. 1, 2014, page no:43-56. [2] B. Wang, B. Li, and H. Li, Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud, Proc. IEEE Fifth Int l Conf. Cloud Computing, pp. 295-302, 2012. [3] M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, A. Konwinski, G. Lee, D.A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, A View of Cloud Computing, Comm. ACM, vol. 53, no. 4, pp. 50-58, Apr. 2010. [4] K. Ren, C. Wang, and Q. Wang, Security Challenges for the Public Cloud, IEEE Internet Computing, vol. 16, no. 1, pp. 69-73, 2012. [5] D. Song, E. Shi, I. Fischer, and U. Shankar, Cloud Data Protection for the Masses, Computer, vol. 45, no. 1, pp. 39-45, 2012. [6] C. Wang, Q. Wang, K. Ren, and W. Lou, Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing, Proc. IEEE INFOCOM, pp. 525-533, 2010. 5

[7] B. Wang, M. Li, S.S. Chow, and H. Li, Computing Encrypted Cloud Data Efficiently under Multiple Keys, Proc. IEEE Conf. Comm. and Network Security (CNS 13), pp. 90-99, 2013. [8] R. Rivest, A. Shamir, and L. Adleman, A Method for Obtaining Digital Signatures and Public Key Cryptosystems, Comm. ACM, vol. 21, no. 2, pp. 120-126, 1978. [9] The MD5 Message-Digest Algorithm (RFC1321). https://tools. ietf.org/html/rfc1321, 2014. [10] G. Attendees, R. Burns, R. Carmela, J. Herring, L. Kissner, Z. Peterson, and D. Song, Provable Data Possession at Untrusted Stores, Proc. 14th ACM Conf. Computer and Comm. Security (CCS 07), pp. 598-610, 2007. [11] H. Shacham and B. Waters, Compact Proofs of Retrievability, Proc. 14th Int l Conf. Theory and Application of Cryptology and Information Security: Advances in Cryptology (ASIACRYPT 08), pp. 90-107, 2008. 6