SlideShare a Scribd company logo
1 of 10
Download to read offline
Journal of Computer Engineering & Technology (JCET) ISSN 2347-3908 (Print), ISSN
2347-3916 (Online), Volume 1, Issue 1, July-December (2013)
26
ASSURE SECURE DEPOT ASSISTANCE IN CLOUD
M.Balasubramani
Asst.Professor, Department of CSE/IT,
Bharathidasan Engineering College, Nattrampalli
ABSTRACT
Cloud storage enables users to remotely store their data and enjoy the on-demand high
quality cloud applications without the burden of local hardware and software management.
Though the benefits are clear, such a service is also relinquishing users’ Physical possession
of their outsourced data, which inevitably poses new security risks towards the correctness of
the data in cloud. In order to address this new problem and further achieve a secure and
dependable cloud storage service, we propose a flexible distributed storage integrity auditing
mechanism, utilizing the homomorphic token and distributed erasure-coded data. The
proposed design allows users to audit the cloud storage with very lightweight communication
and computation cost. The auditing result not only ensures strong cloud storage correctness
guarantee, but also simultaneously achieves fast data error localization, i.e., the identification
of misbehaving server. Considering the cloud data are dynamic in nature, the proposed
design further supports secure and efficient dynamic operations on outsourced data, including
block modification, deletion, and append. Analysis shows the proposed scheme is highly
efficient and resilient against Byzantine failure, malicious data modification attack, and even
server colluding attacks.
Index Terms: Byzantine failure, homomorphic token, Security, Confidentiality
I. INTRODUCTION
Several trends are opening up the era of Cloud Computing, which is an Internet-based
development and use of computer technology. The ever cheaper and more powerful
processors, together with the software as a service (SaaS) computing architecture,are
transforming data centers into pools of computing service on a huge scale. The increasing
network bandwidth and reliable yet flexible network connections make it even possible that
users can now subscribe high quality services from data and software that reside solely on
remote data centers.
Moving data into the cloud offers great convenience to users since they don’t have to
care about the complexities of direct hardware management. The pioneer of Cloud
Computing vendors, Amazon Simple Storage Service (S3) and Amazon Elastic Compute
Cloud (EC2) [1] are both well known examples. While these internet-based online services
do provide huge amounts of storage space and customizable computing resources, this
JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY
(JCET)
ISSN 2347-3908 (Print)
ISSN 2347-3916 (Online)
Volume 1, Issue 1, July-December (2013), pp. 26-35
© IAEME: http://www.iaeme.com/JCET.asp
JCET
© I A E M E
Journal of Computer Engineering & Technology (JCET) ISSN 2347-3908 (Print), ISSN
2347-3916 (Online), Volume 1, Issue 1, July-December (2013)
27
computing platform shift, however, is eliminating the responsibility of local machines for
data maintenance at the same time. As a result, users are at the mercy of their cloud service
providers for the availability and integrity of their data. Recent downtime of Amazon’s S3 is
such an example [2].
From the perspective of data security, which has always been an important aspect of
quality of service, Cloud Computing inevitably poses new challenging security threats for
number of reasons. Firstly, traditional cryptographic primitives for the purpose of data
security protection cannot be directly adopted due to the users’ loss control of data under
Cloud Computing. Therefore, verification of correct data storage in the cloud must be
conducted without explicit knowledge of the whole data. Considering various kinds of data
for each user stored in the cloud and the demand of long term continuous assurance of their
data safety, the problem of verifying correctness of data storage in the cloud becomes even
more challenging. Secondly, Cloud Computing is not just a third party data warehouse. The
data stored in the cloud may be frequently updated by the users, including insertion deletion,
modification, appending, reordering, etc. To ensure storage correctness under dynamic data
update is hence of paramount importance. However, this dynamic feature also Makes
traditional integrity insurance techniques futile and entails new solutions. Last but not the
least, the deployment of Cloud Computing is powered by data centers running in a
simultaneous, cooperated and distributed manner. Individual user’s data is redundantly stored
in multiple physical locations to further reduce the data integrity threats. Therefore,
distributed protocols for storage correctness assurance will be of most importance in
achieving a robust and secure cloud data storage system in the real world. However, such
important area remains to be fully explored in the literature.
Recently, the importance of ensuring the remote data integrity has been highlighted by
the following research works [3]–[7]. These techniques, while can be useful to ensure the
storage correctness without having users possessing data,can not address all the security
threats in cloud data storage, since they are all focusing on single server scenario and most of
them do not consider dynamic data operations. As an complementary approach, researchers
have also proposed distributed protocols [8]–[10] for ensuring storage correctness across
multiple servers or peers. Again, none of these distributed schemes is aware of dynamic data
operations. As a result, their applicability in cloud data storage can be drastically limited.
In this paper, we propose an effective and flexible distributed scheme with explicit dynamic
data support to ensure the correctness of users’ data in the cloud. We rely on erasure
correcting code in the file distribution preparation to provide redundancies and guarantee the
data dependability. This construction drastically reduces the communication and storage
overhead as compared to the traditional replication-based file distribution techniques. By
utilizing the homomorphic token with distributed verification of erasure-coded data, our
scheme achieves the storage correctness insurance as well as data error localization:
whenever data corruption has been detected during the storage correctness verification, our
scheme can almost guarantee the simultaneous localization of data errors,i.e., the
identification of the misbehaving server(s).
Our work is among the first few ones in this field to consider distributed data storage
in Cloud Computing. Our contributions can be summarized as the following three aspects:
1) Compared to many of its predecessors, which only provide binary results about the storage
state across the distributed servers, the challenge-response protocol in our work further
provides the localization of data error.
Journal of Computer Engineering & Technology (JCET) ISSN 2347-3908 (Print), ISSN
2347-3916 (Online), Volume 1, Issue 1, July-December (2013)
28
2) Unlike most prior works for ensuring remote data integrity,
The new scheme supports secure and efficient dynamic operations on data blocks, including:
update, delete and append.
3) Extensive security and performance analysis shows that the proposed scheme is highly
efficient and resilient against Byzantine failure, malicious data modification attack, and even
server colluding attacks. The rest of the paper is organized as follows. Section II
Introduces the system model, adversary model, our design goal and notations. Then we
provide the detailed description of our scheme in Section III and IV. Section V gives the
security analysis and performance evaluations, followed by Section VI which overviews the
related work. Finally, Section VII gives the concluding remark of the whole paper.
II. PROBLEM STATEMENT
1. System Model
Representative network architecture for cloud data storage is illustrated in Figure 1. Three
different network entities can
Be identified as follows:
I) User: users, who have data to be stored in the cloud and rely on the cloud for data
computation, consist of both individual consumers and organizations.
ii) Cloud Service Provider (CSP): a CSP, who has significant
Resources and expertise in building and managing distributed cloud storage servers, owns
and operates live Cloud Computing systems.
iii) Third Party Auditor (TPA): an optional TPA, who has expertise and capabilities that
users may not have, is trusted to assess and expose risk of cloud storage services on behalf of
the users upon request.
In cloud data storage, a user stores his data through a CSP
Into a set of cloud servers, which are running in a simultaneous, cooperated and distributed
manner. Data redundancy can be employed with technique of erasure-correcting code to
further tolerate faults or server crash as user’s data grows in size and importance. Thereafter,
for application purposes, the user interacts with the cloud servers via CSP to access or
retrieve his data. In some cases, the user may need to perform block level operations on his
data. The most general forms of
Journal of Computer Engineering & Technology (JCET) ISSN 2347-3908 (Print), ISSN
2347-3916 (Online), Volume 1, Issue 1, July-December (2013)
29
These operations we are considering are block update, delete, Insert and append. As
users no longer possess their data locally, it is of critical importance to assure users that their
data are being correctly stored and maintained. That is, users should be equipped with
security means so that they can make continuous correctness assurance of their stored data
even without the existence of local copies. In case those users do not necessarily have the
time, feasibility or resources to monitor their data, they can delegate the tasks to an optional
trusted TPA of their respective choices. In our model, we assume that the point-to-point
communication channels between each cloud server and the user is authenticated and
reliable, which can be achieved in practice with little overhead. Note that we don’t address
the issue of data privacy in this paper, as in Cloud computing, data privacy is orthogonal to
the problem we study here.
2. Adversary Model
Security threats faced by cloud data storage can come from two different sources. On the
one hand, a CSP can be self-interested, untrusted and possibly malicious. Not only does it
desire to move data that has not been or is rarely accessed to a lower tier of storage than
agreed for monetary reasons, but it may also attempt to hide a data loss incident due to
management errors, Byzantine failures and so on. On the other hand, there may also exist an
economically motivated adversary, who has the capability to compromise a number of cloud
data storage servers in different time intervals and subsequently is able to modify or delete
users’ data while remaining undetected by CSPs for a certain period. Specifically, we
consider two types of adversary with different
Levels of capability in this paper:
Weak Adversary: The adversary is interested in corrupting the user’s data files stored on
individual servers. Once a server is comprised, an adversary can pollute the original data files
by modifying or introducing its own fraudulent data to prevent the original data from being
retrieved by the user.
Strong Adversary: This is the worst case scenario, in which we assume that the adversary
can compromise all the storage servers so that he can intentionally modify the data files as
long as they are internally consistent. In fact, this is equivalent to the case where all servers
are colluding together to hide a data loss or corruption incident.
III. Cloud Architecture
Cloud architecture, the systems architecture of the software systems involved in the
delivery of cloud computing, typically involves multiple cloud components communicating
with each other over loose coupling mechanism such as messaging queue. The two most
significant components of cloud computing architecture are known as the front end and the
back end. The front end is the part seen by the client, i.e., the computer user. This includes
the client’s network (or computer) and the applications used to access the cloud via a user
interface such as a web browser. The back end of the cloud computing architecture is the
cloud itself, comprising various computers, servers and data storage devices.
Journal of Computer Engineering & Technology (JCET)
2347-3916 (Online), Volume 1, Issue 1,
Fig. 2: Cloud dat
Representative network architecture for cloud data storage is illustrated in
Figure2.Three different network entities can be identified as follows: Users, who have data to
be stored in the cloud and rely on the cloud for data com
consumers and organizations. A CSP, who has significant resources and expertise in building
and managing distributed cloud storage servers, owns and operates live Cloud Computing
system, an optional TPA, who has expertise
trusted to assess and expose risk of cloud storage services on
request.
IV.DESIGN METHODOLOGIES
The data design transforms the information domain
the data structures that will be required to implement the software. The data objects and
relationships defined in the entity relationship diagram and the detailed data content depicted
in the data dictionary provide the
occur in conjunction with the design of software architecture. More detailed data design
occurs as each software component is designed. The architectural design defines the
relationship between major structural elements of the software, the design patterns that can
be used to achieve the requirements the system architecture, the interface representation, and
the component level detail. During each design activity, we apply basic concepts and
principles that lead to high quality.
f Computer Engineering & Technology (JCET) ISSN 2347-3908 (Print), ISSN
me 1, Issue 1, July-December (2013)
30
Fig. 2: Cloud data storage architecture
Representative network architecture for cloud data storage is illustrated in
Figure2.Three different network entities can be identified as follows: Users, who have data to
be stored in the cloud and rely on the cloud for data computation, consist of both individual
consumers and organizations. A CSP, who has significant resources and expertise in building
and managing distributed cloud storage servers, owns and operates live Cloud Computing
optional TPA, who has expertise And capabilities that users may not have, is
trusted to assess and expose risk of cloud storage services on behalf of the users upon
IV.DESIGN METHODOLOGIES
The data design transforms the information domain model created during analysis into
the data structures that will be required to implement the software. The data objects and
relationships defined in the entity relationship diagram and the detailed data content depicted
in the data dictionary provide the basis for the data design activity. Part of data design may
occur in conjunction with the design of software architecture. More detailed data design
occurs as each software component is designed. The architectural design defines the
jor structural elements of the software, the design patterns that can
be used to achieve the requirements the system architecture, the interface representation, and
the component level detail. During each design activity, we apply basic concepts and
ples that lead to high quality.
(Print), ISSN
Representative network architecture for cloud data storage is illustrated in
Figure2.Three different network entities can be identified as follows: Users, who have data to
putation, consist of both individual
consumers and organizations. A CSP, who has significant resources and expertise in building
and managing distributed cloud storage servers, owns and operates live Cloud Computing
capabilities that users may not have, is
the users upon
model created during analysis into
the data structures that will be required to implement the software. The data objects and
relationships defined in the entity relationship diagram and the detailed data content depicted
basis for the data design activity. Part of data design may
occur in conjunction with the design of software architecture. More detailed data design
occurs as each software component is designed. The architectural design defines the
jor structural elements of the software, the design patterns that can
be used to achieve the requirements the system architecture, the interface representation, and
the component level detail. During each design activity, we apply basic concepts and
Journal of Computer Engineering & Technology (JCET) ISSN 2347-3908 (Print), ISSN
2347-3916 (Online), Volume 1, Issue 1, July-December (2013)
31
Figure.3 Translating Analysis model into Design model
To ensure the security and fidelity for cloud data storage under the aforesaid antagonist
model, we aim to design efficient mechanisms for dynamic data verification and operation
and achieve the following goals: (1) Storage correctness: to ensure users that their data are
indeed stored appropriately and kept unharmed all the time in the cloud.(2) Fast localization
of data error: to effectively locate the faulty server when data corruption has been detected.
(3) Dynamic data support: to maintain the same level of storage correctness assurance even if
users modify, delete or append their data files in the cloud. (4) Dependability: to enhance
data availability against intricate failures, malevolent data modification and server colluding
attacks, i.e. minimizing the effect brought by data errors or server failures. (5) Lightweight:
to enable users to perform storage correctness checks with minimum overhead.
V. ENSURING CLOUD DATA STORAGE
In cloud data storage system, users store their data in the cloud and no longer possess the
data locally. Thus, the correctness and availability of the data files being stored on the
distributed cloud servers must be guaranteed. One of the key issues is to effectively detect
any unauthorized data modification and corruption, possibly due to server compromise
and/or random Byzantine failures. Besides, in the distributed case when such inconsistencies
are successfully detected, to find which server the data error lies in is also of great
significance, since it can be the first step to fast recover the storage errors. To address these
problems, our main scheme for ensuring cloud data storage is presented in this section. The
first part of the section is devoted to a review of basic tools from coding theory that is needed
in our scheme for file distribution across cloud servers. Then, the homomorphic token is
introduced. The token computation function we are considering belongs to a family of
universal hash function [11], chosen to reserve the homomorphic properties, which can be
perfectly integrated with the verification of erasure-coded data [8] [12].Subsequently, it is
also shown how to derive a challenge response protocol for verifying the storage correctness
as well as identifying misbehaving servers.
Journal of Computer Engineering & Technology (JCET) ISSN 2347-3908 (Print), ISSN
2347-3916 (Online), Volume 1, Issue 1, July-December (2013)
32
VI. SECURITY ANALYSIS AND PERFORMANCE EVALUATION
Our security analysis focuses on the adversary model as defined. We also evaluate the
efficiency of our scheme via implementation of both file distribution preparation and
verification token precipitation. In our scheme, servers are required to operate on specified
rows in each correctness, verification for the calculation of requested token. We will show
that this “sampling” strategy on selected rows instead of all can greatly reduce the
computational overhead on the server, while maintaining the detection of the data corruption
with high probability. Suppose nc servers are misbehaving due to the possible compromise or
Byzantine failure. In the following analysis, we do not limit the value of nc, i.e., nc ≤ n.
Assume the adversary modifies the data blocks in z rows out of the l rows in the encoded file
matrix. Let r be the number of different rows for which the user asks for check in a challenge.
Let X be a discrete random variable that is defined to be the number of rows chosen by the
user that matches the rows modified by the adversary.
Fig 4: performance analysis results
VII. Experimental Results
Fig 5: Login
Journal of Computer Engineering & Technology (JCET) ISSN 2347-3908 (Print), ISSN
2347-3916 (Online), Volume 1, Issue 1, July-December (2013)
33
Fig 6: Authorized User
Fig7: Stroage Verification
Fig 8: Data Verification
Journal of Computer Engineering & Technology (JCET) ISSN 2347-3908 (Print), ISSN
2347-3916 (Online), Volume 1, Issue 1, July-December (2013)
34
VII.CONCLUSION
In this paper, we investigated the problem of data security in cloud data depot, which is
essentially a distributed storage system. To assure the correctness of users’ data in cloud data
depot, we proposed an effective and flexible distributed scheme with explicit dynamic data
support, including block update, delete, and append. We rely on erasure-correcting code in
the file distribution preparation to provide redundancy parity vectors and guarantee the data
dependability. By utilizing the homomorphic token with distributed verification of
erasurecoded data, our scheme achieves the integration of storage correctness insurance and
data error localization, Through detailed security and performance analysis, we show that our
scheme is highly efficient and resilient to Byzantine failure, malicious data modification
attack, and even server colluding attacks.
VIII.FUTURE ENHANCEMENTS
We believe that data storage security in Cloud Computing, an area full of challenges and
of paramount importance, is still in its infancy now, and many research problems are yet to
be identified. We envision several possible directions for future research on this area. The
most promising one we believe is a model in which public verifiability is enforced. An
interesting question in this model is if we can construct a scheme to achieve both public
verifiability and storage correctness assurance of dynamic data. Besides, along with our
research on dynamic cloud data storage, we also plan to investigate the problem of fine-
grained data error localization.
IX. REFERENCES
[1] Amazon.com, “Amazon Web Services (AWS),” Online at http://aws.amazon.com,
2008.
[2] N. Gohring, “Amazon’s S3 down for several hours,” Online at
http://www.pcworld.com/businesscenter/article/
/142549/amazons s3 down for several hours.html, 2008
[3] A. Juels and J. Burton S. Kaliski, “PORs: Proofs of Retrievability for Large Files,”
Proc. of CCS ’07, pp. 584–597, 2007.
[4] H. Shacham and B. Waters, “Compact Proofs of Retrievability,” Proc.of Asiacrypt ’08,
Dec. 2008.
[5] K. D. Bowers, A. Juels, and A. Oprea, “Proofs of Retrievability: Theory and
Implementation,” Cryptology ePrint Archive, Report 2008/175,2008,
http://eprint.iacr.org/.
[6] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson,and D. Song,
“Provable Data Possession at Untrusted Stores,” Proc. Of CCS ’07, pp. 598–609, 2007.
[7] G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, “Scalable and Efficient
Provable Data Possession,” Proc. of SecureComm ’08, pp. 1–10, 2008.
[8] T. S. J. Schwarz and E. L. Miller, “Store, Forget, and Check: Using Algebraic
Signatures to Check Remotely Administered Storage,” Proc.of ICDCS ’06, pp. 12–12,
2006.
Journal of Computer Engineering & Technology (JCET) ISSN 2347-3908 (Print), ISSN
2347-3916 (Online), Volume 1, Issue 1, July-December (2013)
35
[9] M. Lillibridge, S. Elnikety, A. Birrell, M. Burrows, and M. Isard,“A Cooperative
Internet Backup Scheme,” Proc. of the 2003 USENIX Annual Technical Conference
(General Track), pp. 29–41, 2003.
[10] K. D. Bowers, A. Juels, and A. Oprea, “HAIL: A High-Availability and Integrity
Layer for Cloud Storage,” Cryptology ePrint Archive, Report 2008/489, 2008,
http://eprint.iacr.org/.
[11] L. Carter and M. Wegman, “Universal Hash Functions,” Journal of Computer and
System Sciences, vol. 18, no. 2, pp. 143–154, 1979.
[12] J. Hendricks, G. Ganger, and M. Reiter, “Verifying Distributed Erasurecoded Data,”
Proc. 26th ACM Symposium on Principles of Distributed Computing, pp. 139–146,
2007.
[13] J. S. Plank and Y. Ding, “Note: Correction to the 1997 Tutorial on Reed-Solomon
Coding,” University of Tennessee, Tech. Rep. CS-03-504, 2003.
[14] Q. Wang, K. Ren, W. Lou, and Y. Zhang, “Dependable and Secure Sensor Data
Storage with Dynamic Integrity Assurance,” Proc. of IEEE INFOCOM, 2009.
[15] R. Curtmola, O. Khan, R. Burns, and G. Ateniese, “MR-PDP: Multiple-Replica
Provable Data Possession,” Proc. of ICDCS ’08, pp. 411–420,2008.
[16] D. L. G. Filho and P. S. L. M. Barreto, “Demonstrating Data Possession and
Uncheatable Data Transfer,” Cryptology ePrint Archive, Report 2006/150, 2006,
http://eprint.iacr.org/.
[17] M. A. Shah, M. Baker, J. C. Mogul, and R. Swaminathan, “Auditing to Keep Online
Storage Services Honest,” Proc. 11th USENIX Workshop on Hot Topics in Operating
Systems (HOTOS ’07), pp. 1–6, 2007.

More Related Content

What's hot

Ieeepro techno solutions 2014 ieee java project - distributed, concurrent, ...
Ieeepro techno solutions   2014 ieee java project - distributed, concurrent, ...Ieeepro techno solutions   2014 ieee java project - distributed, concurrent, ...
Ieeepro techno solutions 2014 ieee java project - distributed, concurrent, ...hemanthbbc
 
Secure data sharing for dynamic groups in multi-owner using cloud
Secure data sharing for dynamic groups in multi-owner using cloudSecure data sharing for dynamic groups in multi-owner using cloud
Secure data sharing for dynamic groups in multi-owner using cloudSagar Dhanake
 
Dynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudDynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudAM Publications
 
Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...
Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...
Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...IJCSIS Research Publications
 
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. IJCERT JOURNAL
 
Iaetsd storage privacy protection against data
Iaetsd storage privacy protection against dataIaetsd storage privacy protection against data
Iaetsd storage privacy protection against dataIaetsd Iaetsd
 
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...IOSR Journals
 
Data Partitioning Technique In Cloud: A Survey On Limitation And Benefits
Data Partitioning Technique In Cloud: A Survey On Limitation And BenefitsData Partitioning Technique In Cloud: A Survey On Limitation And Benefits
Data Partitioning Technique In Cloud: A Survey On Limitation And BenefitsIJERA Editor
 
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET Journal
 
Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloud
Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using CloudSecure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloud
Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloudpaperpublications3
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storageMuthu Sybian
 
Privacy preserving public auditing for
Privacy preserving public auditing forPrivacy preserving public auditing for
Privacy preserving public auditing forkarthika kathirvel
 
Overview of cloud computing architecture service
Overview of cloud computing architecture serviceOverview of cloud computing architecture service
Overview of cloud computing architecture serviceeSAT Publishing House
 
Overview of cloud computing architecture
Overview of cloud computing architectureOverview of cloud computing architecture
Overview of cloud computing architectureeSAT Journals
 
Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944Editor IJARCET
 
Iaetsd an efficient secure scheme for multi user in cloud
Iaetsd an efficient secure scheme for multi user in cloudIaetsd an efficient secure scheme for multi user in cloud
Iaetsd an efficient secure scheme for multi user in cloudIaetsd Iaetsd
 

What's hot (17)

Ieeepro techno solutions 2014 ieee java project - distributed, concurrent, ...
Ieeepro techno solutions   2014 ieee java project - distributed, concurrent, ...Ieeepro techno solutions   2014 ieee java project - distributed, concurrent, ...
Ieeepro techno solutions 2014 ieee java project - distributed, concurrent, ...
 
Secure data sharing for dynamic groups in multi-owner using cloud
Secure data sharing for dynamic groups in multi-owner using cloudSecure data sharing for dynamic groups in multi-owner using cloud
Secure data sharing for dynamic groups in multi-owner using cloud
 
Iw qo s09 (1)
Iw qo s09 (1)Iw qo s09 (1)
Iw qo s09 (1)
 
Dynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudDynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for Cloud
 
Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...
Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...
Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...
 
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
 
Iaetsd storage privacy protection against data
Iaetsd storage privacy protection against dataIaetsd storage privacy protection against data
Iaetsd storage privacy protection against data
 
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
 
Data Partitioning Technique In Cloud: A Survey On Limitation And Benefits
Data Partitioning Technique In Cloud: A Survey On Limitation And BenefitsData Partitioning Technique In Cloud: A Survey On Limitation And Benefits
Data Partitioning Technique In Cloud: A Survey On Limitation And Benefits
 
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
 
Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloud
Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using CloudSecure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloud
Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloud
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storage
 
Privacy preserving public auditing for
Privacy preserving public auditing forPrivacy preserving public auditing for
Privacy preserving public auditing for
 
Overview of cloud computing architecture service
Overview of cloud computing architecture serviceOverview of cloud computing architecture service
Overview of cloud computing architecture service
 
Overview of cloud computing architecture
Overview of cloud computing architectureOverview of cloud computing architecture
Overview of cloud computing architecture
 
Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944
 
Iaetsd an efficient secure scheme for multi user in cloud
Iaetsd an efficient secure scheme for multi user in cloudIaetsd an efficient secure scheme for multi user in cloud
Iaetsd an efficient secure scheme for multi user in cloud
 

Viewers also liked

How Can You Make Your Bonfire Party More Explosive?
How Can You Make Your Bonfire Party More Explosive?How Can You Make Your Bonfire Party More Explosive?
How Can You Make Your Bonfire Party More Explosive?seojunkiesit
 
Simbiosis académica: Cómo utilizar la red social para aumentar el impacto de ...
Simbiosis académica: Cómo utilizar la red social para aumentar el impacto de ...Simbiosis académica: Cómo utilizar la red social para aumentar el impacto de ...
Simbiosis académica: Cómo utilizar la red social para aumentar el impacto de ...Nicole Skinner
 
Beverage (beer) nomenclature archetype creative stimulus
Beverage (beer) nomenclature archetype creative stimulusBeverage (beer) nomenclature archetype creative stimulus
Beverage (beer) nomenclature archetype creative stimulusBrand Acumen
 
Daily Planet Final
Daily Planet FinalDaily Planet Final
Daily Planet Finalmcwrightkj
 
chuyên dịch vụ giúp việc uy tín tại hcm
chuyên dịch vụ giúp việc uy tín tại hcmchuyên dịch vụ giúp việc uy tín tại hcm
chuyên dịch vụ giúp việc uy tín tại hcmsetsuko345
 
FCS-3500-Kennedy's real work resume
FCS-3500-Kennedy's real work resumeFCS-3500-Kennedy's real work resume
FCS-3500-Kennedy's real work resumeKennedy Gabel
 
The Village of Cumberland
The Village of CumberlandThe Village of Cumberland
The Village of CumberlandHeather Colman
 
Orbis Pictus, Sibert, YALSA
Orbis Pictus, Sibert, YALSAOrbis Pictus, Sibert, YALSA
Orbis Pictus, Sibert, YALSAFanny Dickinson
 
Tipos de energía
Tipos  de energíaTipos  de energía
Tipos de energíakarelorena
 
chuyên dịch vụ giúp việc trọn gói ở hcm
chuyên dịch vụ giúp việc trọn gói ở hcmchuyên dịch vụ giúp việc trọn gói ở hcm
chuyên dịch vụ giúp việc trọn gói ở hcmleslie797
 

Viewers also liked (19)

10520130101002
1052013010100210520130101002
10520130101002
 
50620130101005
5062013010100550620130101005
50620130101005
 
50620130101003
5062013010100350620130101003
50620130101003
 
How Can You Make Your Bonfire Party More Explosive?
How Can You Make Your Bonfire Party More Explosive?How Can You Make Your Bonfire Party More Explosive?
How Can You Make Your Bonfire Party More Explosive?
 
Mvp2
Mvp2Mvp2
Mvp2
 
Simbiosis académica: Cómo utilizar la red social para aumentar el impacto de ...
Simbiosis académica: Cómo utilizar la red social para aumentar el impacto de ...Simbiosis académica: Cómo utilizar la red social para aumentar el impacto de ...
Simbiosis académica: Cómo utilizar la red social para aumentar el impacto de ...
 
Acrostico
AcrosticoAcrostico
Acrostico
 
Beverage (beer) nomenclature archetype creative stimulus
Beverage (beer) nomenclature archetype creative stimulusBeverage (beer) nomenclature archetype creative stimulus
Beverage (beer) nomenclature archetype creative stimulus
 
Daily Planet Final
Daily Planet FinalDaily Planet Final
Daily Planet Final
 
Press Clippings
Press ClippingsPress Clippings
Press Clippings
 
chuyên dịch vụ giúp việc uy tín tại hcm
chuyên dịch vụ giúp việc uy tín tại hcmchuyên dịch vụ giúp việc uy tín tại hcm
chuyên dịch vụ giúp việc uy tín tại hcm
 
FCS-3500-Kennedy's real work resume
FCS-3500-Kennedy's real work resumeFCS-3500-Kennedy's real work resume
FCS-3500-Kennedy's real work resume
 
Test
TestTest
Test
 
The Village of Cumberland
The Village of CumberlandThe Village of Cumberland
The Village of Cumberland
 
Orbis Pictus, Sibert, YALSA
Orbis Pictus, Sibert, YALSAOrbis Pictus, Sibert, YALSA
Orbis Pictus, Sibert, YALSA
 
Concussion_Flyer
Concussion_FlyerConcussion_Flyer
Concussion_Flyer
 
Tipos de energía
Tipos  de energíaTipos  de energía
Tipos de energía
 
chuyên dịch vụ giúp việc trọn gói ở hcm
chuyên dịch vụ giúp việc trọn gói ở hcmchuyên dịch vụ giúp việc trọn gói ở hcm
chuyên dịch vụ giúp việc trọn gói ở hcm
 
Unidad viii
Unidad viiiUnidad viii
Unidad viii
 

Similar to 50620130101004

Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingAIRCC Publishing Corporation
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGAIRCC Publishing Corporation
 
S.A.kalaiselvan toward secure and dependable storage services
S.A.kalaiselvan toward secure and dependable storage servicesS.A.kalaiselvan toward secure and dependable storage services
S.A.kalaiselvan toward secure and dependable storage serviceskalaiselvanresearch
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Enhancement of the Cloud Data Storage Architectural Framework in Private Cloud
Enhancement of the Cloud Data Storage Architectural Framework in Private CloudEnhancement of the Cloud Data Storage Architectural Framework in Private Cloud
Enhancement of the Cloud Data Storage Architectural Framework in Private CloudINFOGAIN PUBLICATION
 
A survey on secured data outsourcing in cloud computing
A survey on secured data outsourcing in cloud computingA survey on secured data outsourcing in cloud computing
A survey on secured data outsourcing in cloud computingIAEME Publication
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environmentsijfcstjournal
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Editor IJMTER
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
 
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET Journal
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data securityeSAT Publishing House
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
 
Guaranteed Availability of Cloud Data with Efficient Cost
Guaranteed Availability of Cloud Data with Efficient CostGuaranteed Availability of Cloud Data with Efficient Cost
Guaranteed Availability of Cloud Data with Efficient CostIRJET Journal
 
A novel cloud storage system with support of sensitive data application
A novel cloud storage system with support of sensitive data applicationA novel cloud storage system with support of sensitive data application
A novel cloud storage system with support of sensitive data applicationijmnct
 
Flaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple cloudsFlaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple cloudsIRJET Journal
 
Crypto multi tenant an environment of secure computing using cloud sql
Crypto multi tenant an environment of secure computing using cloud sqlCrypto multi tenant an environment of secure computing using cloud sql
Crypto multi tenant an environment of secure computing using cloud sqlijdpsjournal
 
Ensuring data security in cloud computing. - Anusha Tuke
Ensuring data security in  cloud computing. - Anusha TukeEnsuring data security in  cloud computing. - Anusha Tuke
Ensuring data security in cloud computing. - Anusha TukeAnusha Chavan
 

Similar to 50620130101004 (20)

Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
S.A.kalaiselvan toward secure and dependable storage services
S.A.kalaiselvan toward secure and dependable storage servicesS.A.kalaiselvan toward secure and dependable storage services
S.A.kalaiselvan toward secure and dependable storage services
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Enhancement of the Cloud Data Storage Architectural Framework in Private Cloud
Enhancement of the Cloud Data Storage Architectural Framework in Private CloudEnhancement of the Cloud Data Storage Architectural Framework in Private Cloud
Enhancement of the Cloud Data Storage Architectural Framework in Private Cloud
 
A survey on secured data outsourcing in cloud computing
A survey on secured data outsourcing in cloud computingA survey on secured data outsourcing in cloud computing
A survey on secured data outsourcing in cloud computing
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environments
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 
Toward secure and dependable
Toward secure and dependableToward secure and dependable
Toward secure and dependable
 
Guaranteed Availability of Cloud Data with Efficient Cost
Guaranteed Availability of Cloud Data with Efficient CostGuaranteed Availability of Cloud Data with Efficient Cost
Guaranteed Availability of Cloud Data with Efficient Cost
 
V04405122126
V04405122126V04405122126
V04405122126
 
A novel cloud storage system with support of sensitive data application
A novel cloud storage system with support of sensitive data applicationA novel cloud storage system with support of sensitive data application
A novel cloud storage system with support of sensitive data application
 
Flaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple cloudsFlaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple clouds
 
Crypto multi tenant an environment of secure computing using cloud sql
Crypto multi tenant an environment of secure computing using cloud sqlCrypto multi tenant an environment of secure computing using cloud sql
Crypto multi tenant an environment of secure computing using cloud sql
 
Ensuring data security in cloud computing. - Anusha Tuke
Ensuring data security in  cloud computing. - Anusha TukeEnsuring data security in  cloud computing. - Anusha Tuke
Ensuring data security in cloud computing. - Anusha Tuke
 

More from IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

More from IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Recently uploaded

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 

50620130101004

  • 1. Journal of Computer Engineering & Technology (JCET) ISSN 2347-3908 (Print), ISSN 2347-3916 (Online), Volume 1, Issue 1, July-December (2013) 26 ASSURE SECURE DEPOT ASSISTANCE IN CLOUD M.Balasubramani Asst.Professor, Department of CSE/IT, Bharathidasan Engineering College, Nattrampalli ABSTRACT Cloud storage enables users to remotely store their data and enjoy the on-demand high quality cloud applications without the burden of local hardware and software management. Though the benefits are clear, such a service is also relinquishing users’ Physical possession of their outsourced data, which inevitably poses new security risks towards the correctness of the data in cloud. In order to address this new problem and further achieve a secure and dependable cloud storage service, we propose a flexible distributed storage integrity auditing mechanism, utilizing the homomorphic token and distributed erasure-coded data. The proposed design allows users to audit the cloud storage with very lightweight communication and computation cost. The auditing result not only ensures strong cloud storage correctness guarantee, but also simultaneously achieves fast data error localization, i.e., the identification of misbehaving server. Considering the cloud data are dynamic in nature, the proposed design further supports secure and efficient dynamic operations on outsourced data, including block modification, deletion, and append. Analysis shows the proposed scheme is highly efficient and resilient against Byzantine failure, malicious data modification attack, and even server colluding attacks. Index Terms: Byzantine failure, homomorphic token, Security, Confidentiality I. INTRODUCTION Several trends are opening up the era of Cloud Computing, which is an Internet-based development and use of computer technology. The ever cheaper and more powerful processors, together with the software as a service (SaaS) computing architecture,are transforming data centers into pools of computing service on a huge scale. The increasing network bandwidth and reliable yet flexible network connections make it even possible that users can now subscribe high quality services from data and software that reside solely on remote data centers. Moving data into the cloud offers great convenience to users since they don’t have to care about the complexities of direct hardware management. The pioneer of Cloud Computing vendors, Amazon Simple Storage Service (S3) and Amazon Elastic Compute Cloud (EC2) [1] are both well known examples. While these internet-based online services do provide huge amounts of storage space and customizable computing resources, this JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (JCET) ISSN 2347-3908 (Print) ISSN 2347-3916 (Online) Volume 1, Issue 1, July-December (2013), pp. 26-35 © IAEME: http://www.iaeme.com/JCET.asp JCET © I A E M E
  • 2. Journal of Computer Engineering & Technology (JCET) ISSN 2347-3908 (Print), ISSN 2347-3916 (Online), Volume 1, Issue 1, July-December (2013) 27 computing platform shift, however, is eliminating the responsibility of local machines for data maintenance at the same time. As a result, users are at the mercy of their cloud service providers for the availability and integrity of their data. Recent downtime of Amazon’s S3 is such an example [2]. From the perspective of data security, which has always been an important aspect of quality of service, Cloud Computing inevitably poses new challenging security threats for number of reasons. Firstly, traditional cryptographic primitives for the purpose of data security protection cannot be directly adopted due to the users’ loss control of data under Cloud Computing. Therefore, verification of correct data storage in the cloud must be conducted without explicit knowledge of the whole data. Considering various kinds of data for each user stored in the cloud and the demand of long term continuous assurance of their data safety, the problem of verifying correctness of data storage in the cloud becomes even more challenging. Secondly, Cloud Computing is not just a third party data warehouse. The data stored in the cloud may be frequently updated by the users, including insertion deletion, modification, appending, reordering, etc. To ensure storage correctness under dynamic data update is hence of paramount importance. However, this dynamic feature also Makes traditional integrity insurance techniques futile and entails new solutions. Last but not the least, the deployment of Cloud Computing is powered by data centers running in a simultaneous, cooperated and distributed manner. Individual user’s data is redundantly stored in multiple physical locations to further reduce the data integrity threats. Therefore, distributed protocols for storage correctness assurance will be of most importance in achieving a robust and secure cloud data storage system in the real world. However, such important area remains to be fully explored in the literature. Recently, the importance of ensuring the remote data integrity has been highlighted by the following research works [3]–[7]. These techniques, while can be useful to ensure the storage correctness without having users possessing data,can not address all the security threats in cloud data storage, since they are all focusing on single server scenario and most of them do not consider dynamic data operations. As an complementary approach, researchers have also proposed distributed protocols [8]–[10] for ensuring storage correctness across multiple servers or peers. Again, none of these distributed schemes is aware of dynamic data operations. As a result, their applicability in cloud data storage can be drastically limited. In this paper, we propose an effective and flexible distributed scheme with explicit dynamic data support to ensure the correctness of users’ data in the cloud. We rely on erasure correcting code in the file distribution preparation to provide redundancies and guarantee the data dependability. This construction drastically reduces the communication and storage overhead as compared to the traditional replication-based file distribution techniques. By utilizing the homomorphic token with distributed verification of erasure-coded data, our scheme achieves the storage correctness insurance as well as data error localization: whenever data corruption has been detected during the storage correctness verification, our scheme can almost guarantee the simultaneous localization of data errors,i.e., the identification of the misbehaving server(s). Our work is among the first few ones in this field to consider distributed data storage in Cloud Computing. Our contributions can be summarized as the following three aspects: 1) Compared to many of its predecessors, which only provide binary results about the storage state across the distributed servers, the challenge-response protocol in our work further provides the localization of data error.
  • 3. Journal of Computer Engineering & Technology (JCET) ISSN 2347-3908 (Print), ISSN 2347-3916 (Online), Volume 1, Issue 1, July-December (2013) 28 2) Unlike most prior works for ensuring remote data integrity, The new scheme supports secure and efficient dynamic operations on data blocks, including: update, delete and append. 3) Extensive security and performance analysis shows that the proposed scheme is highly efficient and resilient against Byzantine failure, malicious data modification attack, and even server colluding attacks. The rest of the paper is organized as follows. Section II Introduces the system model, adversary model, our design goal and notations. Then we provide the detailed description of our scheme in Section III and IV. Section V gives the security analysis and performance evaluations, followed by Section VI which overviews the related work. Finally, Section VII gives the concluding remark of the whole paper. II. PROBLEM STATEMENT 1. System Model Representative network architecture for cloud data storage is illustrated in Figure 1. Three different network entities can Be identified as follows: I) User: users, who have data to be stored in the cloud and rely on the cloud for data computation, consist of both individual consumers and organizations. ii) Cloud Service Provider (CSP): a CSP, who has significant Resources and expertise in building and managing distributed cloud storage servers, owns and operates live Cloud Computing systems. iii) Third Party Auditor (TPA): an optional TPA, who has expertise and capabilities that users may not have, is trusted to assess and expose risk of cloud storage services on behalf of the users upon request. In cloud data storage, a user stores his data through a CSP Into a set of cloud servers, which are running in a simultaneous, cooperated and distributed manner. Data redundancy can be employed with technique of erasure-correcting code to further tolerate faults or server crash as user’s data grows in size and importance. Thereafter, for application purposes, the user interacts with the cloud servers via CSP to access or retrieve his data. In some cases, the user may need to perform block level operations on his data. The most general forms of
  • 4. Journal of Computer Engineering & Technology (JCET) ISSN 2347-3908 (Print), ISSN 2347-3916 (Online), Volume 1, Issue 1, July-December (2013) 29 These operations we are considering are block update, delete, Insert and append. As users no longer possess their data locally, it is of critical importance to assure users that their data are being correctly stored and maintained. That is, users should be equipped with security means so that they can make continuous correctness assurance of their stored data even without the existence of local copies. In case those users do not necessarily have the time, feasibility or resources to monitor their data, they can delegate the tasks to an optional trusted TPA of their respective choices. In our model, we assume that the point-to-point communication channels between each cloud server and the user is authenticated and reliable, which can be achieved in practice with little overhead. Note that we don’t address the issue of data privacy in this paper, as in Cloud computing, data privacy is orthogonal to the problem we study here. 2. Adversary Model Security threats faced by cloud data storage can come from two different sources. On the one hand, a CSP can be self-interested, untrusted and possibly malicious. Not only does it desire to move data that has not been or is rarely accessed to a lower tier of storage than agreed for monetary reasons, but it may also attempt to hide a data loss incident due to management errors, Byzantine failures and so on. On the other hand, there may also exist an economically motivated adversary, who has the capability to compromise a number of cloud data storage servers in different time intervals and subsequently is able to modify or delete users’ data while remaining undetected by CSPs for a certain period. Specifically, we consider two types of adversary with different Levels of capability in this paper: Weak Adversary: The adversary is interested in corrupting the user’s data files stored on individual servers. Once a server is comprised, an adversary can pollute the original data files by modifying or introducing its own fraudulent data to prevent the original data from being retrieved by the user. Strong Adversary: This is the worst case scenario, in which we assume that the adversary can compromise all the storage servers so that he can intentionally modify the data files as long as they are internally consistent. In fact, this is equivalent to the case where all servers are colluding together to hide a data loss or corruption incident. III. Cloud Architecture Cloud architecture, the systems architecture of the software systems involved in the delivery of cloud computing, typically involves multiple cloud components communicating with each other over loose coupling mechanism such as messaging queue. The two most significant components of cloud computing architecture are known as the front end and the back end. The front end is the part seen by the client, i.e., the computer user. This includes the client’s network (or computer) and the applications used to access the cloud via a user interface such as a web browser. The back end of the cloud computing architecture is the cloud itself, comprising various computers, servers and data storage devices.
  • 5. Journal of Computer Engineering & Technology (JCET) 2347-3916 (Online), Volume 1, Issue 1, Fig. 2: Cloud dat Representative network architecture for cloud data storage is illustrated in Figure2.Three different network entities can be identified as follows: Users, who have data to be stored in the cloud and rely on the cloud for data com consumers and organizations. A CSP, who has significant resources and expertise in building and managing distributed cloud storage servers, owns and operates live Cloud Computing system, an optional TPA, who has expertise trusted to assess and expose risk of cloud storage services on request. IV.DESIGN METHODOLOGIES The data design transforms the information domain the data structures that will be required to implement the software. The data objects and relationships defined in the entity relationship diagram and the detailed data content depicted in the data dictionary provide the occur in conjunction with the design of software architecture. More detailed data design occurs as each software component is designed. The architectural design defines the relationship between major structural elements of the software, the design patterns that can be used to achieve the requirements the system architecture, the interface representation, and the component level detail. During each design activity, we apply basic concepts and principles that lead to high quality. f Computer Engineering & Technology (JCET) ISSN 2347-3908 (Print), ISSN me 1, Issue 1, July-December (2013) 30 Fig. 2: Cloud data storage architecture Representative network architecture for cloud data storage is illustrated in Figure2.Three different network entities can be identified as follows: Users, who have data to be stored in the cloud and rely on the cloud for data computation, consist of both individual consumers and organizations. A CSP, who has significant resources and expertise in building and managing distributed cloud storage servers, owns and operates live Cloud Computing optional TPA, who has expertise And capabilities that users may not have, is trusted to assess and expose risk of cloud storage services on behalf of the users upon IV.DESIGN METHODOLOGIES The data design transforms the information domain model created during analysis into the data structures that will be required to implement the software. The data objects and relationships defined in the entity relationship diagram and the detailed data content depicted in the data dictionary provide the basis for the data design activity. Part of data design may occur in conjunction with the design of software architecture. More detailed data design occurs as each software component is designed. The architectural design defines the jor structural elements of the software, the design patterns that can be used to achieve the requirements the system architecture, the interface representation, and the component level detail. During each design activity, we apply basic concepts and ples that lead to high quality. (Print), ISSN Representative network architecture for cloud data storage is illustrated in Figure2.Three different network entities can be identified as follows: Users, who have data to putation, consist of both individual consumers and organizations. A CSP, who has significant resources and expertise in building and managing distributed cloud storage servers, owns and operates live Cloud Computing capabilities that users may not have, is the users upon model created during analysis into the data structures that will be required to implement the software. The data objects and relationships defined in the entity relationship diagram and the detailed data content depicted basis for the data design activity. Part of data design may occur in conjunction with the design of software architecture. More detailed data design occurs as each software component is designed. The architectural design defines the jor structural elements of the software, the design patterns that can be used to achieve the requirements the system architecture, the interface representation, and the component level detail. During each design activity, we apply basic concepts and
  • 6. Journal of Computer Engineering & Technology (JCET) ISSN 2347-3908 (Print), ISSN 2347-3916 (Online), Volume 1, Issue 1, July-December (2013) 31 Figure.3 Translating Analysis model into Design model To ensure the security and fidelity for cloud data storage under the aforesaid antagonist model, we aim to design efficient mechanisms for dynamic data verification and operation and achieve the following goals: (1) Storage correctness: to ensure users that their data are indeed stored appropriately and kept unharmed all the time in the cloud.(2) Fast localization of data error: to effectively locate the faulty server when data corruption has been detected. (3) Dynamic data support: to maintain the same level of storage correctness assurance even if users modify, delete or append their data files in the cloud. (4) Dependability: to enhance data availability against intricate failures, malevolent data modification and server colluding attacks, i.e. minimizing the effect brought by data errors or server failures. (5) Lightweight: to enable users to perform storage correctness checks with minimum overhead. V. ENSURING CLOUD DATA STORAGE In cloud data storage system, users store their data in the cloud and no longer possess the data locally. Thus, the correctness and availability of the data files being stored on the distributed cloud servers must be guaranteed. One of the key issues is to effectively detect any unauthorized data modification and corruption, possibly due to server compromise and/or random Byzantine failures. Besides, in the distributed case when such inconsistencies are successfully detected, to find which server the data error lies in is also of great significance, since it can be the first step to fast recover the storage errors. To address these problems, our main scheme for ensuring cloud data storage is presented in this section. The first part of the section is devoted to a review of basic tools from coding theory that is needed in our scheme for file distribution across cloud servers. Then, the homomorphic token is introduced. The token computation function we are considering belongs to a family of universal hash function [11], chosen to reserve the homomorphic properties, which can be perfectly integrated with the verification of erasure-coded data [8] [12].Subsequently, it is also shown how to derive a challenge response protocol for verifying the storage correctness as well as identifying misbehaving servers.
  • 7. Journal of Computer Engineering & Technology (JCET) ISSN 2347-3908 (Print), ISSN 2347-3916 (Online), Volume 1, Issue 1, July-December (2013) 32 VI. SECURITY ANALYSIS AND PERFORMANCE EVALUATION Our security analysis focuses on the adversary model as defined. We also evaluate the efficiency of our scheme via implementation of both file distribution preparation and verification token precipitation. In our scheme, servers are required to operate on specified rows in each correctness, verification for the calculation of requested token. We will show that this “sampling” strategy on selected rows instead of all can greatly reduce the computational overhead on the server, while maintaining the detection of the data corruption with high probability. Suppose nc servers are misbehaving due to the possible compromise or Byzantine failure. In the following analysis, we do not limit the value of nc, i.e., nc ≤ n. Assume the adversary modifies the data blocks in z rows out of the l rows in the encoded file matrix. Let r be the number of different rows for which the user asks for check in a challenge. Let X be a discrete random variable that is defined to be the number of rows chosen by the user that matches the rows modified by the adversary. Fig 4: performance analysis results VII. Experimental Results Fig 5: Login
  • 8. Journal of Computer Engineering & Technology (JCET) ISSN 2347-3908 (Print), ISSN 2347-3916 (Online), Volume 1, Issue 1, July-December (2013) 33 Fig 6: Authorized User Fig7: Stroage Verification Fig 8: Data Verification
  • 9. Journal of Computer Engineering & Technology (JCET) ISSN 2347-3908 (Print), ISSN 2347-3916 (Online), Volume 1, Issue 1, July-December (2013) 34 VII.CONCLUSION In this paper, we investigated the problem of data security in cloud data depot, which is essentially a distributed storage system. To assure the correctness of users’ data in cloud data depot, we proposed an effective and flexible distributed scheme with explicit dynamic data support, including block update, delete, and append. We rely on erasure-correcting code in the file distribution preparation to provide redundancy parity vectors and guarantee the data dependability. By utilizing the homomorphic token with distributed verification of erasurecoded data, our scheme achieves the integration of storage correctness insurance and data error localization, Through detailed security and performance analysis, we show that our scheme is highly efficient and resilient to Byzantine failure, malicious data modification attack, and even server colluding attacks. VIII.FUTURE ENHANCEMENTS We believe that data storage security in Cloud Computing, an area full of challenges and of paramount importance, is still in its infancy now, and many research problems are yet to be identified. We envision several possible directions for future research on this area. The most promising one we believe is a model in which public verifiability is enforced. An interesting question in this model is if we can construct a scheme to achieve both public verifiability and storage correctness assurance of dynamic data. Besides, along with our research on dynamic cloud data storage, we also plan to investigate the problem of fine- grained data error localization. IX. REFERENCES [1] Amazon.com, “Amazon Web Services (AWS),” Online at http://aws.amazon.com, 2008. [2] N. Gohring, “Amazon’s S3 down for several hours,” Online at http://www.pcworld.com/businesscenter/article/ /142549/amazons s3 down for several hours.html, 2008 [3] A. Juels and J. Burton S. Kaliski, “PORs: Proofs of Retrievability for Large Files,” Proc. of CCS ’07, pp. 584–597, 2007. [4] H. Shacham and B. Waters, “Compact Proofs of Retrievability,” Proc.of Asiacrypt ’08, Dec. 2008. [5] K. D. Bowers, A. Juels, and A. Oprea, “Proofs of Retrievability: Theory and Implementation,” Cryptology ePrint Archive, Report 2008/175,2008, http://eprint.iacr.org/. [6] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson,and D. Song, “Provable Data Possession at Untrusted Stores,” Proc. Of CCS ’07, pp. 598–609, 2007. [7] G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, “Scalable and Efficient Provable Data Possession,” Proc. of SecureComm ’08, pp. 1–10, 2008. [8] T. S. J. Schwarz and E. L. Miller, “Store, Forget, and Check: Using Algebraic Signatures to Check Remotely Administered Storage,” Proc.of ICDCS ’06, pp. 12–12, 2006.
  • 10. Journal of Computer Engineering & Technology (JCET) ISSN 2347-3908 (Print), ISSN 2347-3916 (Online), Volume 1, Issue 1, July-December (2013) 35 [9] M. Lillibridge, S. Elnikety, A. Birrell, M. Burrows, and M. Isard,“A Cooperative Internet Backup Scheme,” Proc. of the 2003 USENIX Annual Technical Conference (General Track), pp. 29–41, 2003. [10] K. D. Bowers, A. Juels, and A. Oprea, “HAIL: A High-Availability and Integrity Layer for Cloud Storage,” Cryptology ePrint Archive, Report 2008/489, 2008, http://eprint.iacr.org/. [11] L. Carter and M. Wegman, “Universal Hash Functions,” Journal of Computer and System Sciences, vol. 18, no. 2, pp. 143–154, 1979. [12] J. Hendricks, G. Ganger, and M. Reiter, “Verifying Distributed Erasurecoded Data,” Proc. 26th ACM Symposium on Principles of Distributed Computing, pp. 139–146, 2007. [13] J. S. Plank and Y. Ding, “Note: Correction to the 1997 Tutorial on Reed-Solomon Coding,” University of Tennessee, Tech. Rep. CS-03-504, 2003. [14] Q. Wang, K. Ren, W. Lou, and Y. Zhang, “Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance,” Proc. of IEEE INFOCOM, 2009. [15] R. Curtmola, O. Khan, R. Burns, and G. Ateniese, “MR-PDP: Multiple-Replica Provable Data Possession,” Proc. of ICDCS ’08, pp. 411–420,2008. [16] D. L. G. Filho and P. S. L. M. Barreto, “Demonstrating Data Possession and Uncheatable Data Transfer,” Cryptology ePrint Archive, Report 2006/150, 2006, http://eprint.iacr.org/. [17] M. A. Shah, M. Baker, J. C. Mogul, and R. Swaminathan, “Auditing to Keep Online Storage Services Honest,” Proc. 11th USENIX Workshop on Hot Topics in Operating Systems (HOTOS ’07), pp. 1–6, 2007.