SlideShare a Scribd company logo
1 of 5
Download to read offline
IMPLEMENTATION OF SECURE AUDIT PROCESS
FOR UNTRUSTED STORAGE SYSTEMS
SHAIK ISMAIL
M.Tech2ndyear, Dept.of CSE, ASCET, Gudur, India
Ismailcse17@gmail.com
_____________________________________________________________________________
Abstract – Cloud computing is the vast
computing utility, where users can remotely
store their data into the cloud so to have the
benefit of the on-demand availability of huge
and different applications and services from a
shared pool of configurable computing
resources.
Public auditing scheme allow users
to verify their outsourced data storage without
having to retrieve the whole data. However,
existing data auditing techniques suffer from
efficiency and security problems. First, thus
introducing very large communication cost for
dynamic data verification, because verification
process for each dynamic operation needs O(log
n) communication complexity and update all
replicas. Second, best our knowledge, there is no
existing integrity auditing scheme can provide
public verification and authentication of block
indices at the same time. To address these
problems, in this paper, we present a new public
auditing scheme named MuR-DPA. The new
scheme integrated with anew authenticated data
structure based on the Merkle hash tree, which is
name as MR-MHT. For the support of data
dynamic operations, authentication of block
indices and efficient auditing of updates for
multiple replicas at a time, the level values of
nodes in MR-MHT are generated in a top-down
order and all replica blocks each data block are
organized into a same replica sub-tree.
Index terms – Auditing, Replica Management,
Data privacy, Cloud computing.
I. INTRODUCTION
In recent years, the emerging cloud
computing is rapidly gaining thrust as an
alternative to traditional computing system.
Cloud computing provides a scalability
environment for growing amounts of data and
processes that work on various applications and
services by means of on-demand self-services.
But by seeing the popularities of cloud
computing services, its fast development and
advance technologies anyone can vote it as a
future of computing world. Cloud stores the
information that is locally stores in the computer,
it contains spreadsheets, presentations, audio,
photos, word processing documents, videos,
records, photos. But for sensitive and
confidential data there should be some security
mechanism, so as to provide protection for
private data.
INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ENGINEERING RESEARCH, ICDER - 2014
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in
77
In many applications data updates are
very common, such as in social networks and
business transactions. Therefore, it is very
important for cloud security mechanism.
Three main dimensions in security are
confidentiality, integrity and availability. For
integrity assurance, public auditing of cloud data
has been a widely investigated research problem
in recent years. As user data outsourced on cloud
servers are out of the user’s contact, auditing
from the client herself or a third party auditor is
a common request, no matter how powerful the
server side mechanisms claim to be. With
provable data possession (PDP) and proof of
retrieveability (POR), the data owner or a TPA
can verify integrity of their data without having
to retrieve their data. In that, the schemes stored
a small metadata called ‘homomorphism
authenticator’ are stored along with data block,
and data verification is done by the client or a
TPA through verifying the proof with the public
keys.
Existing public auditing schemes can
already support public auditing and various
kinds of full dynamic data updates at the same
time. However, there are a few problems that we
aim to work on this. First, thus introducing very
large communication cost for dynamic data
verification, because verification process for
each dynamic operation needs O (log n)
communication complexity and update all
replicas. Second, best our knowledge, there is no
existing integrity auditing scheme can provide
public verification and authentication of block
indices at the same time.
In this paper, we present a multi-replica
dynamic public auditing scheme that can bridge
the gaps mentioned above through a newly
designed authenticated data structure.
II. Existing System and Challenges
A. Multiple Replicas
For availability, storing multiple replicas
is a default setting for cloud service providers.
Storing replicas at various servers and/or
locations will make user data easily recoverable
from service failures. A straightforward way for
users to verify the integrity of multiple replicas
is to store them as separate files and verify them
one by one. More importantly, an update for
each data block will require update of the
matching block in each replica. Currently, the
most common technique used to support
dynamic data is authenticated data structure
(ADS). If all replicas are indexed in their own
different ADS, the client must verify these
updates one by one to maintain verifiability.
The ‘proof of update’ for each block
contains log (n) hash values as supplementary
authentication information. Therefore, the
communication cost in update verifications will
easily become a disaster for users whose cloud
data are highly dynamic. In previous schemes,
researchers have considered support for public
auditing, data dynamics and multiple replicas,
but none has considered them all together.
In the authors proposed a multi-replica
verification scheme with great efficiency by
associating only one authenticator (HLA) for
each block and all replica blocks. The
verification requires the privately kept padding
random. To combining our considerations,
preferred properties of multi-replica verification
scheme should include the following
INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ENGINEERING RESEARCH, ICDER - 2014
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in
78
1. Public auditability and support for dynamic
data enables a TPA to do the regular
verification for the client and allow the client
to verify data updates.
2. All-round auditing enables efficient
verification for all replicas at a time so that
the verifier will get better assurance.
3. Single-replicas auditing enables auditing for
an arbitrary replica for some specific blocks;
because the verifier may only wants to know
if at least one replica is intact for less
important data.
B. Secure Dynamic Public Auditing
As demonstrated in fig.1, the three
parties in public auditing game—the client, the
cloud service provider and TPA—are not fully
trusted. By each other, ADS such as MHT or
RASL can enable other parties to verify the
content and updates of data blocks. The
authentication for a block is accomplished with
the data node itself and its auxiliary
authentication information which is constructed
with node values on or near its path. Without
verification of block indices, a dishonest server
can easily take another intact block and its AAI
to fake a proof that cloud pass authentication.
Figure 1 the relationships between participating
parties.
III. Proposed System and Implementation
a) Preliminaries
i) Bilinear Pairing
Assume a group G is a gap diffie-
Hellman (GDH) with prime order p. A bilinear
map is map constructed as : × where is
a multiplicative cyclic group with prime order. A
useful should have the following properties:
1. Bilinearity - ∀	 , ∈ 	 ⟹ , =
	 ( , ) ;
2. Non-degeneracy - ∀	 	 ∈ 	 ≠ 0 ⟹
( , ) ≠ 1;
3. Computability –	 should be efficient
computable.
b) Merkle Hash Tree
The Merkle Hash Tree (MHT) has been
intensively studied in the past. Similarly to
binary tree, each node N will have a maximum
of 2 child nodes. In fact, according to the update
algorithm, every non-leaf node will constantly
have two child nodes. Information contained in
one node N in an MHT T is constructed.
c) MUR-DPA Multi-Replica Dynamic Public
Auditing
A Multi-replica Merkle hash tree(MR-
MHT) is a new authenticated data structure
designed for efficient audit of data updates, as
well as authentication for block indices. Each
MR-MHT is constructed based on not only
logically segmented file, but also all its replicas,
as well as a pre-defined cryptographic hash
function H. the MR-MHT, constructed based on
a file with 4 blocks and 3 replicas, is shown in
Fig.3.
INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ENGINEERING RESEARCH, ICDER - 2014
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in
79
Figure 3 an example of MR-MHT.
The differences from the MHT are as follows:
1. Value stored in the leaf nodes are hash values
of stored replica blocks. In MR-MHT, leaf nodes
represent replica blocks , , namely the jth
replica
of the ith
file block.
2. Value stored in a node v from a none-leaf
level is computed from the hash values of its
child nodes and two other indices l (v) and r (v),
l (v). Is the level of node v and r (v) .Is the
maximum number of nodes in the leaf (bottom)
level that can be reached from v.
IV. CONCLUSION
In this paper, we presented a novel public
auditing scheme named MuR-DPA. The new
scheme incorporated a novel authenticated data
structure based on the Merkle hash tree, which
we name as MR-MHT. For support of full
dynamic data updates, authentication of block
indices and efficient verification of updates for
multiple replicas at the same time, the level
values of nodes in MR-MHT are generated in a
top-down order, and all replica blocks.
REFERENCES
[1] Yan Zhua, b, Hongxin Huc, Gail-Joon Ahnc,
Stephen S.Yauc. “Efficient audit service
outsourcing for data integrity in clouds”. In
“The Journal of Systems and Software 85 (2012)
1083– 1095”.
[2] Available:
http://aws.amazon.com/apac/awssummit-au/,
accessed on 25 March, 2013.
[3] Hadoop Map Reduce. Available:
http://hadoop.apache.org, accessed on 25
March, 2013.
[4] KVM Hypervisor. Available: www.linux-
kvm.org/, accessed on 25 March, 2013.
[5] OpenStack Open Source Cloud Software.
Available: http://openstack.org/, accessed on
25 March, 2013.
[6] G. Ateniese, R. Burns, R. Carmela, J.
Herring, O. Khan, L. Kissner, Z. Peterson,
and D. Song, "Remote Data Checking Using
Provable Data Possession," ACM
Transactions on Information and System
Security, vol. 14, p. Article 12, 2011.
INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ENGINEERING RESEARCH, ICDER - 2014
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in
80
AUTHORS
Mr.SHAIK ISMAIL
received the AVS
College of Engineering
&Technology, Nellore,
B.Tech degree in
computer science &
engineering from the
Jawaharlal Nehru technological university
Anantapur, in 2012, and received the
Audisankara College of Engineering and
Technology, Nellore M.Tech degree in computer
science engineering from the Jawaharlal Nehru
technological university Anantapur in 2014,
respectively. He Participated National Level
Paper Symposiums in different Colleges. He
interests Computer Networks, Mobile
Computing, Network Programming, and System
Hardware. He is a member of the IEEE.
INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ENGINEERING RESEARCH, ICDER - 2014
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in
81

More Related Content

What's hot

IRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- Secure Database Management and Privacy Preserving in Cloud ServerIRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- Secure Database Management and Privacy Preserving in Cloud ServerIRJET Journal
 
A Generic Open Source Framework for Auto Generation of Data Manipulation Comm...
A Generic Open Source Framework for Auto Generation of Data Manipulation Comm...A Generic Open Source Framework for Auto Generation of Data Manipulation Comm...
A Generic Open Source Framework for Auto Generation of Data Manipulation Comm...iosrjce
 
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud StoragePrivacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage1crore projects
 
Parallel and distributed system projects for java and dot net
Parallel and distributed system projects for java and dot netParallel and distributed system projects for java and dot net
Parallel and distributed system projects for java and dot netredpel dot com
 
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloud
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with CloudEfficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloud
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloudiosrjce
 
M phil-computer-science-wireless-communication-projects
M phil-computer-science-wireless-communication-projectsM phil-computer-science-wireless-communication-projects
M phil-computer-science-wireless-communication-projectsVijay Karan
 
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...INFOGAIN PUBLICATION
 
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...IRJET Journal
 
M phil-computer-science-network-security-projects
M phil-computer-science-network-security-projectsM phil-computer-science-network-security-projects
M phil-computer-science-network-security-projectsVijay Karan
 
Parallel and Distributed System IEEE 2015 Projects
Parallel and Distributed System IEEE 2015 ProjectsParallel and Distributed System IEEE 2015 Projects
Parallel and Distributed System IEEE 2015 ProjectsVijay Karan
 
Parallel and Distributed System IEEE 2015 Projects
Parallel and Distributed System IEEE 2015 ProjectsParallel and Distributed System IEEE 2015 Projects
Parallel and Distributed System IEEE 2015 ProjectsVijay Karan
 
Dotnet 2015 2016 2017 ieee project list-with abstract
Dotnet 2015 2016 2017 ieee project list-with abstractDotnet 2015 2016 2017 ieee project list-with abstract
Dotnet 2015 2016 2017 ieee project list-with abstractAdz91 Digital Ads Pvt Ltd
 
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET Journal
 
Heterogeneous Networks of Remote Monitoring with High Availability and Resili...
Heterogeneous Networks of Remote Monitoring with High Availability and Resili...Heterogeneous Networks of Remote Monitoring with High Availability and Resili...
Heterogeneous Networks of Remote Monitoring with High Availability and Resili...IJCSIS Research Publications
 
Performance evaluation and estimation model using regression method for hadoo...
Performance evaluation and estimation model using regression method for hadoo...Performance evaluation and estimation model using regression method for hadoo...
Performance evaluation and estimation model using regression method for hadoo...redpel dot com
 
PROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMS
PROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMSPROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMS
PROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMSNexgen Technology
 

What's hot (18)

IRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- Secure Database Management and Privacy Preserving in Cloud ServerIRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
 
A Generic Open Source Framework for Auto Generation of Data Manipulation Comm...
A Generic Open Source Framework for Auto Generation of Data Manipulation Comm...A Generic Open Source Framework for Auto Generation of Data Manipulation Comm...
A Generic Open Source Framework for Auto Generation of Data Manipulation Comm...
 
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud StoragePrivacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
 
Parallel and distributed system projects for java and dot net
Parallel and distributed system projects for java and dot netParallel and distributed system projects for java and dot net
Parallel and distributed system projects for java and dot net
 
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloud
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with CloudEfficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloud
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloud
 
M phil-computer-science-wireless-communication-projects
M phil-computer-science-wireless-communication-projectsM phil-computer-science-wireless-communication-projects
M phil-computer-science-wireless-communication-projects
 
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
 
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
 
M phil-computer-science-network-security-projects
M phil-computer-science-network-security-projectsM phil-computer-science-network-security-projects
M phil-computer-science-network-security-projects
 
Parallel and Distributed System IEEE 2015 Projects
Parallel and Distributed System IEEE 2015 ProjectsParallel and Distributed System IEEE 2015 Projects
Parallel and Distributed System IEEE 2015 Projects
 
Cloud, Fog, or Edge: Where and When to Compute?
Cloud, Fog, or Edge: Where and When to Compute?Cloud, Fog, or Edge: Where and When to Compute?
Cloud, Fog, or Edge: Where and When to Compute?
 
Parallel and Distributed System IEEE 2015 Projects
Parallel and Distributed System IEEE 2015 ProjectsParallel and Distributed System IEEE 2015 Projects
Parallel and Distributed System IEEE 2015 Projects
 
[IJET-V2I2P9] Authors:Reshma A. Hegde1, Madhura Prakash
[IJET-V2I2P9] Authors:Reshma A. Hegde1, Madhura Prakash[IJET-V2I2P9] Authors:Reshma A. Hegde1, Madhura Prakash
[IJET-V2I2P9] Authors:Reshma A. Hegde1, Madhura Prakash
 
Dotnet 2015 2016 2017 ieee project list-with abstract
Dotnet 2015 2016 2017 ieee project list-with abstractDotnet 2015 2016 2017 ieee project list-with abstract
Dotnet 2015 2016 2017 ieee project list-with abstract
 
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
 
Heterogeneous Networks of Remote Monitoring with High Availability and Resili...
Heterogeneous Networks of Remote Monitoring with High Availability and Resili...Heterogeneous Networks of Remote Monitoring with High Availability and Resili...
Heterogeneous Networks of Remote Monitoring with High Availability and Resili...
 
Performance evaluation and estimation model using regression method for hadoo...
Performance evaluation and estimation model using regression method for hadoo...Performance evaluation and estimation model using regression method for hadoo...
Performance evaluation and estimation model using regression method for hadoo...
 
PROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMS
PROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMSPROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMS
PROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMS
 

Viewers also liked

Strategically Leveraging Social Media
Strategically Leveraging Social MediaStrategically Leveraging Social Media
Strategically Leveraging Social MediaKatja Reuter, PhD
 
C A M P A N A B A R B A C O A A U X I T E C
C A M P A N A  B A R B A C O A  A U X I T E CC A M P A N A  B A R B A C O A  A U X I T E C
C A M P A N A B A R B A C O A A U X I T E CAUXITEC
 
Firetrace Vehicle Protection 01
Firetrace Vehicle Protection 01Firetrace Vehicle Protection 01
Firetrace Vehicle Protection 01njgrant
 
Mi naturaleza y yo cris
Mi naturaleza y yo crisMi naturaleza y yo cris
Mi naturaleza y yo criscristinapaez14
 
Firemiks powerpoint presentation 2014-05-eng
Firemiks powerpoint presentation 2014-05-engFiremiks powerpoint presentation 2014-05-eng
Firemiks powerpoint presentation 2014-05-engBayu Nawungkrido
 
Islas maldivas 2
Islas maldivas 2Islas maldivas 2
Islas maldivas 2Ana Carina
 
DIT-StrategicPlan-FY15-18
DIT-StrategicPlan-FY15-18DIT-StrategicPlan-FY15-18
DIT-StrategicPlan-FY15-18Brent Messer
 
2do. capitulo \"el hipnotista\"
2do. capitulo \"el hipnotista\"2do. capitulo \"el hipnotista\"
2do. capitulo \"el hipnotista\"toto toto
 
Romance de la voz en la sangre 01
Romance de la voz en la sangre   01Romance de la voz en la sangre   01
Romance de la voz en la sangre 01Nieto1
 
Presentación inicio diplomatura community management upb interlat 2013
Presentación inicio diplomatura community management  upb interlat 2013Presentación inicio diplomatura community management  upb interlat 2013
Presentación inicio diplomatura community management upb interlat 2013Interlat
 
23.la ultimacena
23.la ultimacena23.la ultimacena
23.la ultimacenaKefas Jhs
 
Basic Net Online Training in Hyderabad
Basic Net Online Training in HyderabadBasic Net Online Training in Hyderabad
Basic Net Online Training in HyderabadUgs8008
 
Aloha (October 2005) - University School of Management Studies Newsletter
Aloha (October 2005) - University School of Management Studies NewsletterAloha (October 2005) - University School of Management Studies Newsletter
Aloha (October 2005) - University School of Management Studies NewsletterJaspal Singh
 
Consejos técnicos escolares signed
Consejos técnicos escolares signedConsejos técnicos escolares signed
Consejos técnicos escolares signedKALY SORIANO GUEVARA
 

Viewers also liked (20)

La hiperconexión
La hiperconexiónLa hiperconexión
La hiperconexión
 
Strategically Leveraging Social Media
Strategically Leveraging Social MediaStrategically Leveraging Social Media
Strategically Leveraging Social Media
 
C A M P A N A B A R B A C O A A U X I T E C
C A M P A N A  B A R B A C O A  A U X I T E CC A M P A N A  B A R B A C O A  A U X I T E C
C A M P A N A B A R B A C O A A U X I T E C
 
350z
350z350z
350z
 
Firetrace Vehicle Protection 01
Firetrace Vehicle Protection 01Firetrace Vehicle Protection 01
Firetrace Vehicle Protection 01
 
Mi naturaleza y yo cris
Mi naturaleza y yo crisMi naturaleza y yo cris
Mi naturaleza y yo cris
 
Firemiks powerpoint presentation 2014-05-eng
Firemiks powerpoint presentation 2014-05-engFiremiks powerpoint presentation 2014-05-eng
Firemiks powerpoint presentation 2014-05-eng
 
Islas maldivas 2
Islas maldivas 2Islas maldivas 2
Islas maldivas 2
 
Proyecto Emprendedor EOI - Ingenieros Alborada
Proyecto Emprendedor EOI - Ingenieros AlboradaProyecto Emprendedor EOI - Ingenieros Alborada
Proyecto Emprendedor EOI - Ingenieros Alborada
 
DIT-StrategicPlan-FY15-18
DIT-StrategicPlan-FY15-18DIT-StrategicPlan-FY15-18
DIT-StrategicPlan-FY15-18
 
2do. capitulo \"el hipnotista\"
2do. capitulo \"el hipnotista\"2do. capitulo \"el hipnotista\"
2do. capitulo \"el hipnotista\"
 
Romance de la voz en la sangre 01
Romance de la voz en la sangre   01Romance de la voz en la sangre   01
Romance de la voz en la sangre 01
 
Presentación inicio diplomatura community management upb interlat 2013
Presentación inicio diplomatura community management  upb interlat 2013Presentación inicio diplomatura community management  upb interlat 2013
Presentación inicio diplomatura community management upb interlat 2013
 
Froitos do outono
Froitos do outonoFroitos do outono
Froitos do outono
 
Dragon Cave - Nº09
Dragon Cave - Nº09Dragon Cave - Nº09
Dragon Cave - Nº09
 
23.la ultimacena
23.la ultimacena23.la ultimacena
23.la ultimacena
 
Basic Net Online Training in Hyderabad
Basic Net Online Training in HyderabadBasic Net Online Training in Hyderabad
Basic Net Online Training in Hyderabad
 
Amsterdam tan peculiar
Amsterdam tan peculiarAmsterdam tan peculiar
Amsterdam tan peculiar
 
Aloha (October 2005) - University School of Management Studies Newsletter
Aloha (October 2005) - University School of Management Studies NewsletterAloha (October 2005) - University School of Management Studies Newsletter
Aloha (October 2005) - University School of Management Studies Newsletter
 
Consejos técnicos escolares signed
Consejos técnicos escolares signedConsejos técnicos escolares signed
Consejos técnicos escolares signed
 

Similar to Iaetsd implementation of secure audit process

Centralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesCentralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesEditor IJMTER
 
Iaetsd enhancement of performance and security in bigdata processing
Iaetsd enhancement of performance and security in bigdata processingIaetsd enhancement of performance and security in bigdata processing
Iaetsd enhancement of performance and security in bigdata processingIaetsd Iaetsd
 
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud StorageIRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud StorageIRJET Journal
 
Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds IRJET Journal
 
Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic ...
Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic ...Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic ...
Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic ...IOSR Journals
 
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudIJTET Journal
 
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...
IRJET -  	  Identifying Information Relocate with Reliable Estimation and Sec...IRJET -  	  Identifying Information Relocate with Reliable Estimation and Sec...
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...IRJET Journal
 
Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...Pvrtechnologies Nellore
 
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEMSURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEMijiert bestjournal
 
IRJET- Enhancement of Security in Cloud Storage of Electronic Health Reco...
IRJET-  	  Enhancement of Security in Cloud Storage of Electronic Health Reco...IRJET-  	  Enhancement of Security in Cloud Storage of Electronic Health Reco...
IRJET- Enhancement of Security in Cloud Storage of Electronic Health Reco...IRJET Journal
 
Iaetsd storage privacy protection against data
Iaetsd storage privacy protection against dataIaetsd storage privacy protection against data
Iaetsd storage privacy protection against dataIaetsd Iaetsd
 
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revoc...
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revoc...Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revoc...
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revoc...1crore projects
 
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud MembersAn Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud MembersIRJET Journal
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationEditor IJMTER
 
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...IOSR Journals
 
Privacy preserving public auditing for secured cloud storage
Privacy preserving public auditing for secured cloud storagePrivacy preserving public auditing for secured cloud storage
Privacy preserving public auditing for secured cloud storagedbpublications
 
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET- Security Enhance using Hash and Chaostic Algorithm in CloudIRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET- Security Enhance using Hash and Chaostic Algorithm in CloudIRJET Journal
 

Similar to Iaetsd implementation of secure audit process (20)

Centralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesCentralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data Services
 
Iaetsd enhancement of performance and security in bigdata processing
Iaetsd enhancement of performance and security in bigdata processingIaetsd enhancement of performance and security in bigdata processing
Iaetsd enhancement of performance and security in bigdata processing
 
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud StorageIRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
 
Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds
 
Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic ...
Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic ...Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic ...
Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic ...
 
F01113945
F01113945F01113945
F01113945
 
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-Cloud
 
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...
IRJET -  	  Identifying Information Relocate with Reliable Estimation and Sec...IRJET -  	  Identifying Information Relocate with Reliable Estimation and Sec...
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...
 
Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...
 
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEMSURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
 
IRJET- Enhancement of Security in Cloud Storage of Electronic Health Reco...
IRJET-  	  Enhancement of Security in Cloud Storage of Electronic Health Reco...IRJET-  	  Enhancement of Security in Cloud Storage of Electronic Health Reco...
IRJET- Enhancement of Security in Cloud Storage of Electronic Health Reco...
 
An4201262267
An4201262267An4201262267
An4201262267
 
Iaetsd storage privacy protection against data
Iaetsd storage privacy protection against dataIaetsd storage privacy protection against data
Iaetsd storage privacy protection against data
 
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revoc...
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revoc...Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revoc...
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revoc...
 
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud MembersAn Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
 
publishable paper
publishable paperpublishable paper
publishable paper
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
 
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
 
Privacy preserving public auditing for secured cloud storage
Privacy preserving public auditing for secured cloud storagePrivacy preserving public auditing for secured cloud storage
Privacy preserving public auditing for secured cloud storage
 
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET- Security Enhance using Hash and Chaostic Algorithm in CloudIRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
 

More from Iaetsd Iaetsd

iaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissioniaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissionIaetsd Iaetsd
 
iaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdliaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdlIaetsd Iaetsd
 
iaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarmiaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarmIaetsd Iaetsd
 
iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...Iaetsd Iaetsd
 
iaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seatiaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seatIaetsd Iaetsd
 
iaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan applicationiaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan applicationIaetsd Iaetsd
 
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBSREVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBSIaetsd Iaetsd
 
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...Iaetsd Iaetsd
 
Fabrication of dual power bike
Fabrication of dual power bikeFabrication of dual power bike
Fabrication of dual power bikeIaetsd Iaetsd
 
Blue brain technology
Blue brain technologyBlue brain technology
Blue brain technologyIaetsd Iaetsd
 
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...Iaetsd Iaetsd
 
iirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic birdiirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic birdIaetsd Iaetsd
 
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growthiirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid GrowthIaetsd Iaetsd
 
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithmiirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT AlgorithmIaetsd Iaetsd
 
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...Iaetsd Iaetsd
 
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...Iaetsd Iaetsd
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocolIaetsd Iaetsd
 
iaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesiaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesIaetsd Iaetsd
 
iaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineriesiaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineriesIaetsd Iaetsd
 
iaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using paraboliciaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using parabolicIaetsd Iaetsd
 

More from Iaetsd Iaetsd (20)

iaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissioniaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmission
 
iaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdliaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdl
 
iaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarmiaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarm
 
iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...
 
iaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seatiaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seat
 
iaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan applicationiaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan application
 
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBSREVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
 
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
 
Fabrication of dual power bike
Fabrication of dual power bikeFabrication of dual power bike
Fabrication of dual power bike
 
Blue brain technology
Blue brain technologyBlue brain technology
Blue brain technology
 
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
 
iirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic birdiirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic bird
 
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growthiirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
 
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithmiirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
 
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
 
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocol
 
iaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesiaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databases
 
iaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineriesiaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineries
 
iaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using paraboliciaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using parabolic
 

Recently uploaded

MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 

Recently uploaded (20)

MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 

Iaetsd implementation of secure audit process

  • 1. IMPLEMENTATION OF SECURE AUDIT PROCESS FOR UNTRUSTED STORAGE SYSTEMS SHAIK ISMAIL M.Tech2ndyear, Dept.of CSE, ASCET, Gudur, India Ismailcse17@gmail.com _____________________________________________________________________________ Abstract – Cloud computing is the vast computing utility, where users can remotely store their data into the cloud so to have the benefit of the on-demand availability of huge and different applications and services from a shared pool of configurable computing resources. Public auditing scheme allow users to verify their outsourced data storage without having to retrieve the whole data. However, existing data auditing techniques suffer from efficiency and security problems. First, thus introducing very large communication cost for dynamic data verification, because verification process for each dynamic operation needs O(log n) communication complexity and update all replicas. Second, best our knowledge, there is no existing integrity auditing scheme can provide public verification and authentication of block indices at the same time. To address these problems, in this paper, we present a new public auditing scheme named MuR-DPA. The new scheme integrated with anew authenticated data structure based on the Merkle hash tree, which is name as MR-MHT. For the support of data dynamic operations, authentication of block indices and efficient auditing of updates for multiple replicas at a time, the level values of nodes in MR-MHT are generated in a top-down order and all replica blocks each data block are organized into a same replica sub-tree. Index terms – Auditing, Replica Management, Data privacy, Cloud computing. I. INTRODUCTION In recent years, the emerging cloud computing is rapidly gaining thrust as an alternative to traditional computing system. Cloud computing provides a scalability environment for growing amounts of data and processes that work on various applications and services by means of on-demand self-services. But by seeing the popularities of cloud computing services, its fast development and advance technologies anyone can vote it as a future of computing world. Cloud stores the information that is locally stores in the computer, it contains spreadsheets, presentations, audio, photos, word processing documents, videos, records, photos. But for sensitive and confidential data there should be some security mechanism, so as to provide protection for private data. INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ENGINEERING RESEARCH, ICDER - 2014 INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in 77
  • 2. In many applications data updates are very common, such as in social networks and business transactions. Therefore, it is very important for cloud security mechanism. Three main dimensions in security are confidentiality, integrity and availability. For integrity assurance, public auditing of cloud data has been a widely investigated research problem in recent years. As user data outsourced on cloud servers are out of the user’s contact, auditing from the client herself or a third party auditor is a common request, no matter how powerful the server side mechanisms claim to be. With provable data possession (PDP) and proof of retrieveability (POR), the data owner or a TPA can verify integrity of their data without having to retrieve their data. In that, the schemes stored a small metadata called ‘homomorphism authenticator’ are stored along with data block, and data verification is done by the client or a TPA through verifying the proof with the public keys. Existing public auditing schemes can already support public auditing and various kinds of full dynamic data updates at the same time. However, there are a few problems that we aim to work on this. First, thus introducing very large communication cost for dynamic data verification, because verification process for each dynamic operation needs O (log n) communication complexity and update all replicas. Second, best our knowledge, there is no existing integrity auditing scheme can provide public verification and authentication of block indices at the same time. In this paper, we present a multi-replica dynamic public auditing scheme that can bridge the gaps mentioned above through a newly designed authenticated data structure. II. Existing System and Challenges A. Multiple Replicas For availability, storing multiple replicas is a default setting for cloud service providers. Storing replicas at various servers and/or locations will make user data easily recoverable from service failures. A straightforward way for users to verify the integrity of multiple replicas is to store them as separate files and verify them one by one. More importantly, an update for each data block will require update of the matching block in each replica. Currently, the most common technique used to support dynamic data is authenticated data structure (ADS). If all replicas are indexed in their own different ADS, the client must verify these updates one by one to maintain verifiability. The ‘proof of update’ for each block contains log (n) hash values as supplementary authentication information. Therefore, the communication cost in update verifications will easily become a disaster for users whose cloud data are highly dynamic. In previous schemes, researchers have considered support for public auditing, data dynamics and multiple replicas, but none has considered them all together. In the authors proposed a multi-replica verification scheme with great efficiency by associating only one authenticator (HLA) for each block and all replica blocks. The verification requires the privately kept padding random. To combining our considerations, preferred properties of multi-replica verification scheme should include the following INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ENGINEERING RESEARCH, ICDER - 2014 INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in 78
  • 3. 1. Public auditability and support for dynamic data enables a TPA to do the regular verification for the client and allow the client to verify data updates. 2. All-round auditing enables efficient verification for all replicas at a time so that the verifier will get better assurance. 3. Single-replicas auditing enables auditing for an arbitrary replica for some specific blocks; because the verifier may only wants to know if at least one replica is intact for less important data. B. Secure Dynamic Public Auditing As demonstrated in fig.1, the three parties in public auditing game—the client, the cloud service provider and TPA—are not fully trusted. By each other, ADS such as MHT or RASL can enable other parties to verify the content and updates of data blocks. The authentication for a block is accomplished with the data node itself and its auxiliary authentication information which is constructed with node values on or near its path. Without verification of block indices, a dishonest server can easily take another intact block and its AAI to fake a proof that cloud pass authentication. Figure 1 the relationships between participating parties. III. Proposed System and Implementation a) Preliminaries i) Bilinear Pairing Assume a group G is a gap diffie- Hellman (GDH) with prime order p. A bilinear map is map constructed as : × where is a multiplicative cyclic group with prime order. A useful should have the following properties: 1. Bilinearity - ∀ , ∈ ⟹ , = ( , ) ; 2. Non-degeneracy - ∀ ∈ ≠ 0 ⟹ ( , ) ≠ 1; 3. Computability – should be efficient computable. b) Merkle Hash Tree The Merkle Hash Tree (MHT) has been intensively studied in the past. Similarly to binary tree, each node N will have a maximum of 2 child nodes. In fact, according to the update algorithm, every non-leaf node will constantly have two child nodes. Information contained in one node N in an MHT T is constructed. c) MUR-DPA Multi-Replica Dynamic Public Auditing A Multi-replica Merkle hash tree(MR- MHT) is a new authenticated data structure designed for efficient audit of data updates, as well as authentication for block indices. Each MR-MHT is constructed based on not only logically segmented file, but also all its replicas, as well as a pre-defined cryptographic hash function H. the MR-MHT, constructed based on a file with 4 blocks and 3 replicas, is shown in Fig.3. INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ENGINEERING RESEARCH, ICDER - 2014 INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in 79
  • 4. Figure 3 an example of MR-MHT. The differences from the MHT are as follows: 1. Value stored in the leaf nodes are hash values of stored replica blocks. In MR-MHT, leaf nodes represent replica blocks , , namely the jth replica of the ith file block. 2. Value stored in a node v from a none-leaf level is computed from the hash values of its child nodes and two other indices l (v) and r (v), l (v). Is the level of node v and r (v) .Is the maximum number of nodes in the leaf (bottom) level that can be reached from v. IV. CONCLUSION In this paper, we presented a novel public auditing scheme named MuR-DPA. The new scheme incorporated a novel authenticated data structure based on the Merkle hash tree, which we name as MR-MHT. For support of full dynamic data updates, authentication of block indices and efficient verification of updates for multiple replicas at the same time, the level values of nodes in MR-MHT are generated in a top-down order, and all replica blocks. REFERENCES [1] Yan Zhua, b, Hongxin Huc, Gail-Joon Ahnc, Stephen S.Yauc. “Efficient audit service outsourcing for data integrity in clouds”. In “The Journal of Systems and Software 85 (2012) 1083– 1095”. [2] Available: http://aws.amazon.com/apac/awssummit-au/, accessed on 25 March, 2013. [3] Hadoop Map Reduce. Available: http://hadoop.apache.org, accessed on 25 March, 2013. [4] KVM Hypervisor. Available: www.linux- kvm.org/, accessed on 25 March, 2013. [5] OpenStack Open Source Cloud Software. Available: http://openstack.org/, accessed on 25 March, 2013. [6] G. Ateniese, R. Burns, R. Carmela, J. Herring, O. Khan, L. Kissner, Z. Peterson, and D. Song, "Remote Data Checking Using Provable Data Possession," ACM Transactions on Information and System Security, vol. 14, p. Article 12, 2011. INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ENGINEERING RESEARCH, ICDER - 2014 INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in 80
  • 5. AUTHORS Mr.SHAIK ISMAIL received the AVS College of Engineering &Technology, Nellore, B.Tech degree in computer science & engineering from the Jawaharlal Nehru technological university Anantapur, in 2012, and received the Audisankara College of Engineering and Technology, Nellore M.Tech degree in computer science engineering from the Jawaharlal Nehru technological university Anantapur in 2014, respectively. He Participated National Level Paper Symposiums in different Colleges. He interests Computer Networks, Mobile Computing, Network Programming, and System Hardware. He is a member of the IEEE. INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ENGINEERING RESEARCH, ICDER - 2014 INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in 81