SlideShare a Scribd company logo
1 of 15
Panda: Public Auditing for 
Shared Data with 
Efficient User Revocation in 
the Cloud 
Boyang Wang, Baochun Li, Member, IEEE, and Hui Li, Member, IEEE
Abstract 
With data storage and sharing services in the cloud, users can easily modify and share data as a group. 
To ensure shared data integrity can be verified publicly, users in the group need to compute signatures 
on all the blocks in shared data. Different blocks in shared data are generally signed by different users 
due to data modifications performed by different users. For security reasons, once a user is revoked 
from the group, the blocks which were previously signed by this revoked user must be re-signed by an 
existing user. The straightforward method, which allows an existing user to download the 
corresponding part of shared data and re-sign it during user revocation, is inefficient due to the large 
size of shared data in the cloud. In this paper, we propose a novel public auditing mechanism for the 
integrity of shared data with efficient user revocation in mind. By utilizing the idea of proxy re-signatures, 
we allow the cloud to re-sign blocks on behalf of existing users during user revocation, so 
that existing users do not need to download and re-sign blocks by themselves. In addition, a public 
verifier is always able to audit the integrity of shared data without retrieving the entire data from the 
cloud, even if some part of shared data has been re-signed by the cloud. Moreover, our mechanism is 
able to support batch auditing by verifying multiple auditing tasks simultaneously. Experimental results 
show that our mechanism can significantly improve the efficiency of user revocation.
Existing System 
An existing system the file uploaded in cloud which not signed by user in each time of 
upload. So that integrity of shared data is not possible in existing system. However, 
since the cloud is not in the same trusted domain with each user in the group, 
outsourcing every user’s private key to the cloud would introduce significant security 
issue.
Disadvantages of Existing System 
 For security reasons, when a user leaves the group or misbehaves, this user must 
be revoked from the group. As a result, this revoked user should no longer be able 
to access and modify shared data, and the signatures generated by this revoked 
user are no longer valid to the group. 
 Since shared data is outsourced to the cloud and users no longer store it on local 
devices, a straightforward method to re-compute these signatures during user 
revocation.
Proposed System 
In our Proposed system may lie to verifiers about the incorrectness of shared data in 
order to save the reputation of its data services and avoid losing money on its data 
services. In addition, we also assume there is no collusion between the cloud and any 
user during the design of our mechanism. Generally, the incorrectness of share data 
under the above semi trusted model can be introduced by hardware/software failures 
or human errors happened in the cloud. Considering these factors, users do not fully 
trust the cloud with the integrity of shared data.
Advantages of Proposed System 
 Blocking User account . 
 Security question. 
 Login with secret key in each time.
Architecture
Modules 
User Module: 
User module can divided into the following sub modules: 
 Registration 
 File Upload 
 Download 
 Re-upload 
 Unblock 
Auditor Module: 
Auditor module can divided into the following sub modules: 
 File Verification 
 View File 
Admin Module: 
Admin module can divided into the following sub modules: 
 View Files 
 Block user
Module Description 
User Module 
 Registration: In this module each user register his user details for using files. Only 
registered user can able to login in cloud server . 
 File Upload: In this module user upload a block of files in the cloud with encryption 
by using his secret key. This ensure the files to be protected from unauthorized 
user.
 Download: This module allows the user to download the file using his secret key to decrypt the 
downloaded data of blocked user and verify the data and re-upload the block of file into cloud server 
with encryption .This ensure the files to be protected from unauthorized user. 
 Re-upload: This module allow the user to re-upload the downloaded files of blocked user 
into cloud server with resign the files (i.e) the files is uploaded with new signature like new secret with 
encryption to protected the data from unauthorized user. 
 Unblock: This module allow the user to unblock his user account by answering his security question 
regarding to answer that provided by his at the time of registration. Once the answer is matched to the 
answer of registration time answer then only account will be unlocked.
 Auditor Module 
 File Verification: The public verifier is able to correctly check the integrity of shared 
data. The public verifier can audit the integrity of shared data without retrieving the 
entire data from the cloud, even if some blocks in shared data have been re-signed 
by the cloud. 
 Files View: In this module public auditor view the all details of upload, download, 
blocked user, re-upload.
 Admin Module 
 View Files: In this module public auditor view the all details of upload, download, 
blocked user, re-upload. 
 Block User: In this module admin block the misbehave user account to protect the 
integrity of shared data.
Minimum Hardware Configuration of the 
Proposed System 
 Processor : Intel/AMD 
 Hard Disk : 40 GB 
 Monitor : 14’ Colour Monitor 
 Mouse : Optical Mouse 
 RAM : 512 MB
Software Configuration of the Proposed 
System 
 Operating system : Windows 7 and above 
 Coding Language : ASP.Net with C# 
 Data Base : SQL Server 2008
References 
 B. Wang, B. Li, and H. Li, “Public Auditing for Shared Data with Efficient User Revoation 
in the Cloud,” in the Proceedings of IEEE INFOCOM 2013, 2013, pp. 2904–2912. 
 M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. 
Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “A View of Cloud Computing,” 
Communications of the ACM, vol. 53, no. 4, pp. 50–58, Apirl 2010. 
 G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, 
“Provable Data Possession at Untrusted Stores,” in the Proceedings of ACM CCS 2007, 
2007, pp. 598–610. 
 H. Shacham and B. Waters, “Compact Proofs of Retrievability,” in the Proceedings of 
ASIACRYPT 2008. Springer-Verlag,2008,pp. 90–107. 
 C. Wang, Q. Wang, K. Ren, and W. Lou, “Ensuring Data Storage Security in Cloud 
Computing,” in the Proceedings of ACM/IEEE IWQoS 2009, 2009, pp. 1–9.

More Related Content

What's hot

Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storage
Mustaq Syed
 
Ensuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloudEnsuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloud
Sathya Moorthy
 
Towards secure and dependable storage service in cloud
Towards secure and dependable storage service in cloudTowards secure and dependable storage service in cloud
Towards secure and dependable storage service in cloud
sibidlegend
 

What's hot (20)

Oruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloud Oruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloud
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storage
 
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGESECURITY IN CLOUD COMPUTINGPRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGESECURITY IN CLOUD COMPUTING
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
 
Oruta ppt
Oruta pptOruta ppt
Oruta ppt
 
cloud computing preservity
cloud computing preservitycloud computing preservity
cloud computing preservity
 
Oruta project report
Oruta project reportOruta project report
Oruta project report
 
Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud
 
Ppt 1
Ppt 1Ppt 1
Ppt 1
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storage
 
Privacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storagePrivacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storage
 
Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)
 
Oruta
OrutaOruta
Oruta
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storage
 
secure data transfer and deletion from counting bloom filter in cloud computing.
secure data transfer and deletion from counting bloom filter in cloud computing.secure data transfer and deletion from counting bloom filter in cloud computing.
secure data transfer and deletion from counting bloom filter in cloud computing.
 
Ensuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloudEnsuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloud
 
A Novel privacy preserving public auditing for shared data in cloud
A Novel privacy preserving public auditing for shared data in cloudA Novel privacy preserving public auditing for shared data in cloud
A Novel privacy preserving public auditing for shared data in cloud
 
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.pptPrivacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
 
Towards secure and dependable storage service in cloud
Towards secure and dependable storage service in cloudTowards secure and dependable storage service in cloud
Towards secure and dependable storage service in cloud
 
Ensuring Distributed Accountability for Data Sharing in the Cloud
Ensuring Distributed Accountability for Data Sharing in the CloudEnsuring Distributed Accountability for Data Sharing in the Cloud
Ensuring Distributed Accountability for Data Sharing in the Cloud
 
Maintaining Data Integrity for Shared Data in Cloud
Maintaining Data Integrity for Shared Data in Cloud Maintaining Data Integrity for Shared Data in Cloud
Maintaining Data Integrity for Shared Data in Cloud
 

Viewers also liked

Principles of auditing
Principles of auditingPrinciples of auditing
Principles of auditing
heir
 
Citrix Synergy 2014 - Syn232 Building a Cloud Architecture and Self- Service ...
Citrix Synergy 2014 - Syn232 Building a Cloud Architecture and Self- Service ...Citrix Synergy 2014 - Syn232 Building a Cloud Architecture and Self- Service ...
Citrix Synergy 2014 - Syn232 Building a Cloud Architecture and Self- Service ...
Citrix
 

Viewers also liked (9)

Dimancom
DimancomDimancom
Dimancom
 
Provably Secure Three Party Authenticated Quantum Key Distribution Protocols
Provably Secure Three Party Authenticated Quantum Key Distribution ProtocolsProvably Secure Three Party Authenticated Quantum Key Distribution Protocols
Provably Secure Three Party Authenticated Quantum Key Distribution Protocols
 
Principles of auditing
Principles of auditingPrinciples of auditing
Principles of auditing
 
Accountingfor Income Tax Uncertainties 2010 K Morris Sh
Accountingfor Income Tax Uncertainties 2010 K Morris ShAccountingfor Income Tax Uncertainties 2010 K Morris Sh
Accountingfor Income Tax Uncertainties 2010 K Morris Sh
 
Privacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storagePrivacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storage
 
Public Cloud Provider
Public Cloud ProviderPublic Cloud Provider
Public Cloud Provider
 
Citrix Synergy 2014 - Syn232 Building a Cloud Architecture and Self- Service ...
Citrix Synergy 2014 - Syn232 Building a Cloud Architecture and Self- Service ...Citrix Synergy 2014 - Syn232 Building a Cloud Architecture and Self- Service ...
Citrix Synergy 2014 - Syn232 Building a Cloud Architecture and Self- Service ...
 
Cloud service architecture
Cloud service architectureCloud service architecture
Cloud service architecture
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 

Similar to Panda public auditing for shared data with efficient user revocation in the cloud

Panda: Public Auditing for Shared Data with Efficient User Revocation in the ...
Panda: Public Auditing for Shared Data with Efficient User Revocation in the ...Panda: Public Auditing for Shared Data with Efficient User Revocation in the ...
Panda: Public Auditing for Shared Data with Efficient User Revocation in the ...
1crore projects
 
831 panda public-auditing-for-shared-data-with-efficient-user-revocation-in-t...
831 panda public-auditing-for-shared-data-with-efficient-user-revocation-in-t...831 panda public-auditing-for-shared-data-with-efficient-user-revocation-in-t...
831 panda public-auditing-for-shared-data-with-efficient-user-revocation-in-t...
Raja Ram
 
A secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloudA secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloud
1crore projects
 
A secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloudA secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloud
Ninad Samel
 
E031102034039
E031102034039E031102034039
E031102034039
theijes
 

Similar to Panda public auditing for shared data with efficient user revocation in the cloud (20)

Panda: Public Auditing for Shared Data with Efficient User Revocation in the ...
Panda: Public Auditing for Shared Data with Efficient User Revocation in the ...Panda: Public Auditing for Shared Data with Efficient User Revocation in the ...
Panda: Public Auditing for Shared Data with Efficient User Revocation in the ...
 
Ieeepro techno solutions 2014 ieee java project -panda public auditing for ...
Ieeepro techno solutions   2014 ieee java project -panda public auditing for ...Ieeepro techno solutions   2014 ieee java project -panda public auditing for ...
Ieeepro techno solutions 2014 ieee java project -panda public auditing for ...
 
Maintaining Data Integrity for Shared Data in Cloud
Maintaining Data Integrity for Shared Data in CloudMaintaining Data Integrity for Shared Data in Cloud
Maintaining Data Integrity for Shared Data in Cloud
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
 
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Oruta privacy preserving public audit...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Oruta privacy preserving public audit...IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Oruta privacy preserving public audit...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Oruta privacy preserving public audit...
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
 
Mona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudMona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloud
 
831 panda public-auditing-for-shared-data-with-efficient-user-revocation-in-t...
831 panda public-auditing-for-shared-data-with-efficient-user-revocation-in-t...831 panda public-auditing-for-shared-data-with-efficient-user-revocation-in-t...
831 panda public-auditing-for-shared-data-with-efficient-user-revocation-in-t...
 
Secure Authorised De-duplication using Convergent Encryption Technique
Secure Authorised De-duplication using Convergent Encryption TechniqueSecure Authorised De-duplication using Convergent Encryption Technique
Secure Authorised De-duplication using Convergent Encryption Technique
 
PANDA: PUBLIC AUDITING FOR SHARED DATA WITH EFFICIENT USER REVOCATION IN THE ...
PANDA: PUBLIC AUDITING FOR SHARED DATA WITH EFFICIENT USER REVOCATION IN THE ...PANDA: PUBLIC AUDITING FOR SHARED DATA WITH EFFICIENT USER REVOCATION IN THE ...
PANDA: PUBLIC AUDITING FOR SHARED DATA WITH EFFICIENT USER REVOCATION IN THE ...
 
A secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloudA secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloud
 
A secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloudA secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloud
 
Secure data sharing for dynamic groups in multi-owner using cloud
Secure data sharing for dynamic groups in multi-owner using cloudSecure data sharing for dynamic groups in multi-owner using cloud
Secure data sharing for dynamic groups in multi-owner using cloud
 
Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds
 
Mona final review
Mona final reviewMona final review
Mona final review
 
Integrity Privacy to Public Auditing for Shared Data in Cloud Computing
Integrity Privacy to Public Auditing for Shared Data in Cloud ComputingIntegrity Privacy to Public Auditing for Shared Data in Cloud Computing
Integrity Privacy to Public Auditing for Shared Data in Cloud Computing
 
Mona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudMona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloud
 
Secured Authorized Deduplication Based Hybrid Cloud
Secured Authorized Deduplication Based Hybrid CloudSecured Authorized Deduplication Based Hybrid Cloud
Secured Authorized Deduplication Based Hybrid Cloud
 
E031102034039
E031102034039E031102034039
E031102034039
 
A self destruction system for dynamic group data sharing in cloud
A self destruction system for dynamic group data sharing in cloudA self destruction system for dynamic group data sharing in cloud
A self destruction system for dynamic group data sharing in cloud
 

More from IGEEKS TECHNOLOGIES

More from IGEEKS TECHNOLOGIES (20)

BE CS,IS FINAL YEAR PROJECT LIST FOR ACADEMIC YEAR 2019-2020
BE CS,IS FINAL YEAR PROJECT LIST FOR ACADEMIC YEAR 2019-2020BE CS,IS FINAL YEAR PROJECT LIST FOR ACADEMIC YEAR 2019-2020
BE CS,IS FINAL YEAR PROJECT LIST FOR ACADEMIC YEAR 2019-2020
 
CIVIL ENGINEERING PROJECT LIST FOR 2019-2020
CIVIL ENGINEERING PROJECT LIST FOR 2019-2020CIVIL ENGINEERING PROJECT LIST FOR 2019-2020
CIVIL ENGINEERING PROJECT LIST FOR 2019-2020
 
BE,ME MECHANICAL DESIGN AND THERMAL BASED PROJECTS 2019-2020
BE,ME MECHANICAL DESIGN AND THERMAL BASED PROJECTS 2019-2020BE,ME MECHANICAL DESIGN AND THERMAL BASED PROJECTS 2019-2020
BE,ME MECHANICAL DESIGN AND THERMAL BASED PROJECTS 2019-2020
 
BE ECE,EEE,BIO MEDICAL,INSTRUMENTATION PROJECT TITLES FOR 2019-20220
BE ECE,EEE,BIO MEDICAL,INSTRUMENTATION PROJECT TITLES FOR 2019-20220BE ECE,EEE,BIO MEDICAL,INSTRUMENTATION PROJECT TITLES FOR 2019-20220
BE ECE,EEE,BIO MEDICAL,INSTRUMENTATION PROJECT TITLES FOR 2019-20220
 
IEEE 2017-18 Final Year Project List
IEEE 2017-18 Final Year Project ListIEEE 2017-18 Final Year Project List
IEEE 2017-18 Final Year Project List
 
Diploma 2016 17 electronics & electrical titles
Diploma 2016 17 electronics & electrical titlesDiploma 2016 17 electronics & electrical titles
Diploma 2016 17 electronics & electrical titles
 
Final year project titles 2017 2018
Final year project titles 2017 2018Final year project titles 2017 2018
Final year project titles 2017 2018
 
Final year project titles 2017 2018
Final year project titles 2017 2018Final year project titles 2017 2018
Final year project titles 2017 2018
 
BE Mechanical Engineering Final Year Academic Projects Bangalore
BE Mechanical Engineering Final Year Academic Projects BangaloreBE Mechanical Engineering Final Year Academic Projects Bangalore
BE Mechanical Engineering Final Year Academic Projects Bangalore
 
final year diploma projects training institutes bangalore
final year diploma projects training institutes bangalorefinal year diploma projects training institutes bangalore
final year diploma projects training institutes bangalore
 
Secure data retrieval for decentralized disruption tolerant military networks
Secure data retrieval for decentralized disruption tolerant military networksSecure data retrieval for decentralized disruption tolerant military networks
Secure data retrieval for decentralized disruption tolerant military networks
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
 
Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...
 
Lbp based edge-texture features for object recoginition
Lbp based edge-texture features for object recoginitionLbp based edge-texture features for object recoginition
Lbp based edge-texture features for object recoginition
 
Supporting privacy protection in personalized web search
Supporting privacy protection in personalized web searchSupporting privacy protection in personalized web search
Supporting privacy protection in personalized web search
 
Privacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devicesPrivacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devices
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
 
Lbp based edge-texture features for object recoginition
Lbp based edge-texture features for object recoginitionLbp based edge-texture features for object recoginition
Lbp based edge-texture features for object recoginition
 
Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computingEfficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
 

Recently uploaded

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 

Recently uploaded (20)

Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 

Panda public auditing for shared data with efficient user revocation in the cloud

  • 1. Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud Boyang Wang, Baochun Li, Member, IEEE, and Hui Li, Member, IEEE
  • 2. Abstract With data storage and sharing services in the cloud, users can easily modify and share data as a group. To ensure shared data integrity can be verified publicly, users in the group need to compute signatures on all the blocks in shared data. Different blocks in shared data are generally signed by different users due to data modifications performed by different users. For security reasons, once a user is revoked from the group, the blocks which were previously signed by this revoked user must be re-signed by an existing user. The straightforward method, which allows an existing user to download the corresponding part of shared data and re-sign it during user revocation, is inefficient due to the large size of shared data in the cloud. In this paper, we propose a novel public auditing mechanism for the integrity of shared data with efficient user revocation in mind. By utilizing the idea of proxy re-signatures, we allow the cloud to re-sign blocks on behalf of existing users during user revocation, so that existing users do not need to download and re-sign blocks by themselves. In addition, a public verifier is always able to audit the integrity of shared data without retrieving the entire data from the cloud, even if some part of shared data has been re-signed by the cloud. Moreover, our mechanism is able to support batch auditing by verifying multiple auditing tasks simultaneously. Experimental results show that our mechanism can significantly improve the efficiency of user revocation.
  • 3. Existing System An existing system the file uploaded in cloud which not signed by user in each time of upload. So that integrity of shared data is not possible in existing system. However, since the cloud is not in the same trusted domain with each user in the group, outsourcing every user’s private key to the cloud would introduce significant security issue.
  • 4. Disadvantages of Existing System  For security reasons, when a user leaves the group or misbehaves, this user must be revoked from the group. As a result, this revoked user should no longer be able to access and modify shared data, and the signatures generated by this revoked user are no longer valid to the group.  Since shared data is outsourced to the cloud and users no longer store it on local devices, a straightforward method to re-compute these signatures during user revocation.
  • 5. Proposed System In our Proposed system may lie to verifiers about the incorrectness of shared data in order to save the reputation of its data services and avoid losing money on its data services. In addition, we also assume there is no collusion between the cloud and any user during the design of our mechanism. Generally, the incorrectness of share data under the above semi trusted model can be introduced by hardware/software failures or human errors happened in the cloud. Considering these factors, users do not fully trust the cloud with the integrity of shared data.
  • 6. Advantages of Proposed System  Blocking User account .  Security question.  Login with secret key in each time.
  • 8. Modules User Module: User module can divided into the following sub modules:  Registration  File Upload  Download  Re-upload  Unblock Auditor Module: Auditor module can divided into the following sub modules:  File Verification  View File Admin Module: Admin module can divided into the following sub modules:  View Files  Block user
  • 9. Module Description User Module  Registration: In this module each user register his user details for using files. Only registered user can able to login in cloud server .  File Upload: In this module user upload a block of files in the cloud with encryption by using his secret key. This ensure the files to be protected from unauthorized user.
  • 10.  Download: This module allows the user to download the file using his secret key to decrypt the downloaded data of blocked user and verify the data and re-upload the block of file into cloud server with encryption .This ensure the files to be protected from unauthorized user.  Re-upload: This module allow the user to re-upload the downloaded files of blocked user into cloud server with resign the files (i.e) the files is uploaded with new signature like new secret with encryption to protected the data from unauthorized user.  Unblock: This module allow the user to unblock his user account by answering his security question regarding to answer that provided by his at the time of registration. Once the answer is matched to the answer of registration time answer then only account will be unlocked.
  • 11.  Auditor Module  File Verification: The public verifier is able to correctly check the integrity of shared data. The public verifier can audit the integrity of shared data without retrieving the entire data from the cloud, even if some blocks in shared data have been re-signed by the cloud.  Files View: In this module public auditor view the all details of upload, download, blocked user, re-upload.
  • 12.  Admin Module  View Files: In this module public auditor view the all details of upload, download, blocked user, re-upload.  Block User: In this module admin block the misbehave user account to protect the integrity of shared data.
  • 13. Minimum Hardware Configuration of the Proposed System  Processor : Intel/AMD  Hard Disk : 40 GB  Monitor : 14’ Colour Monitor  Mouse : Optical Mouse  RAM : 512 MB
  • 14. Software Configuration of the Proposed System  Operating system : Windows 7 and above  Coding Language : ASP.Net with C#  Data Base : SQL Server 2008
  • 15. References  B. Wang, B. Li, and H. Li, “Public Auditing for Shared Data with Efficient User Revoation in the Cloud,” in the Proceedings of IEEE INFOCOM 2013, 2013, pp. 2904–2912.  M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “A View of Cloud Computing,” Communications of the ACM, vol. 53, no. 4, pp. 50–58, Apirl 2010.  G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable Data Possession at Untrusted Stores,” in the Proceedings of ACM CCS 2007, 2007, pp. 598–610.  H. Shacham and B. Waters, “Compact Proofs of Retrievability,” in the Proceedings of ASIACRYPT 2008. Springer-Verlag,2008,pp. 90–107.  C. Wang, Q. Wang, K. Ren, and W. Lou, “Ensuring Data Storage Security in Cloud Computing,” in the Proceedings of ACM/IEEE IWQoS 2009, 2009, pp. 1–9.