SlideShare a Scribd company logo
1 of 9
Download to read offline
IDL - International Digital Library Of
Technology & Research
Volume 1, Issue 5, May 2017 Available at: www.dbpublications.org
International e-Journal For Technology And Research-2017
IDL - International Digital Library 1 | P a g e Copyright@IDL-2017
Privacy preserving public auditing for secured
cloud storage
VIKAS HUGAR
MSRIT College, M. Tech
Abstract: As the cloud computing technology
develops during the last decade, outsourcing data to
cloud service for storage becomes an attractive trend,
which benefits in sparing efforts on heavy data
maintenance and management. Nevertheless, since the
outsourced cloud storage is not fully trustworthy, it
raises security concerns on how to realize data
deduplication in cloud while achieving integrity
auditing. In this work, we study the problem of
integrity auditing and secure deduplication on cloud
data. Specifically, aiming at achieving both data
integrity and deduplication in cloud, we propose two
secure systems, namely SecCloud and SecCloud+.
SecCloud introduces an auditing entity with a
maintenance of a MapReduce cloud, which helps
clients generate data tags before uploading as well as
audit the integrity of data having been stored in cloud.
Compared with previous work, the computation by
user in SecCloud is greatly reduced during the file
uploading and auditing phases. SecCloud+ is designed
motivated by the fact that customers always want to
encrypt their data before uploading, and enables
integrity auditing and secure deduplication on
encrypted data.
INTRODUCTION
What is cloud computing?
Cloud computing is the use of computing resources
(hardware and software) that are delivered as a service
over a network (typically the Internet). The name
comes from the common use of a cloud-shaped
symbol as an abstraction for the complex
infrastructure it contains in system diagrams. Cloud
computing entrusts remote services with a user's data,
software and computation. Cloud computing consists
of hardware and software resources made available on
the Internet as managed third-party services. These
services typically provide access to advanced software
applications and high-end networks of server
computers.
. Structure of cloud computing
How Cloud Computing Works?
The goal of cloud computing is to apply
traditional supercomputing, or high-performance
computing power, normally used by military and
research facilities, to perform tens of trillions of
computations per second, in consumer-oriented
applications such as financial portfolios, to deliver
personalized information, to provide data storage or to
power large, immersive computer games.
The cloud computing uses networks of large groups
of servers typically running low-cost consumer PC
technology with specialized connections to spread
data-processing chores across them. This
shared IT infrastructure contains large pools of
IDL - International Digital Library Of
Technology & Research
Volume 1, Issue 5, May 2017 Available at: www.dbpublications.org
International e-Journal For Technology And Research-2017
IDL - International Digital Library 2 | P a g e Copyright@IDL-2017
systems that are linked together. Often, virtualization
techniques are used to maximize the power of cloud
computing.
Characteristics and Services Models
The salient characteristics of cloud computing based
on the definitions provided by the National Institute of
Standards and Terminology (NIST) are outlined
below:
 On-demand self-service: A consumer can
unilaterally provision computing capabilities,
such as server time and network storage, as
needed automatically without requiring
human interaction with each service’s
provider.
 Broad network access: Capabilities are
available over the network and accessed
through standard mechanisms that promote
use by heterogeneous thin or thick client
platforms (e.g., mobile phones, laptops, and
PDAs).
 Resource pooling: The provider’s computing
resources are pooled to serve multiple
consumers using a multi-tenant model, with
different physical and virtual resources
dynamically assigned and reassigned
according to consumer demand. There is a
sense of location-independence in that the
customer generally has no control or
knowledge over the exact location of the
provided resources but may be able to specify
location at a higher level of abstraction (e.g.,
country, state, or data center). Examples of
resources include storage, processing,
memory, network bandwidth, and virtual
machines.
 Rapid elasticity: Capabilities can be rapidly
and elastically provisioned, in some cases
automatically, to quickly scale out and
rapidly released to quickly scale in. To the
consumer, the capabilities available for
provisioning often appear to be unlimited and
can be purchased in any quantity at any time.
 Measured service: Cloud systems
automatically control and optimize resource
use by leveraging a metering capability at
some level of abstraction appropriate to the
type of service (e.g., storage, processing,
bandwidth, and active user accounts).
Resource usage can be managed, controlled,
and reported providing transparency for both
the provider and consumer of the utilized
service.
Characteristics of cloud computing
IDL - International Digital Library Of
Technology & Research
Volume 1, Issue 5, May 2017 Available at: www.dbpublications.org
International e-Journal For Technology And Research-2017
IDL - International Digital Library 3 | P a g e Copyright@IDL-2017
Services Models:
Cloud Computing comprises three different service
models, namely Infrastructure-as-a-Service (IaaS),
Platform-as-a-Service (PaaS), and Software-as-a-
Service (SaaS). The three service models or layer are
completed by an end user layer that encapsulates the
end user perspective on cloud services. The model is
shown in figure below. If a cloud user accesses
services on the infrastructure layer, for instance, she
can run her own applications on the resources of a
cloud infrastructure and remain responsible for the
support, maintenance, and security of these
applications herself. If she accesses a service on the
application layer, these tasks are normally taken care
of by the cloud service provider.
Structure of service models
Benefits of cloud computing:
1. Achieve economies of scale – increase
volume output or productivity with fewer
people. Your cost per unit, project or product
plummets.
2. Reduce spending on technology
infrastructure. Maintain easy access to
your information with minimal upfront
spending. Pay as you go (weekly, quarterly
or yearly), based on demand.
3. Globalize your workforce on the cheap.
People worldwide can access the cloud,
provided they have an Internet connection.
4. Streamline processes. Get more work
done in less time with less people.
5. Reduce capital costs. There’s no need to
spend big money on hardware, software or
licensing fees.
6. Improve accessibility. You have access
anytime, anywhere, making your life so
much easier!
7. Monitor projects more effectively. Stay
within budget and ahead of completion
cycle times.
8. Less personnel training is needed. It
takes fewer people to do more work on a
cloud, with a minimal learning curve on
hardware and software issues.
9. Minimize licensing new software. Stretch
and grow without the need to buy
expensive software licenses or programs.
10. Improve flexibility. You can change
direction without serious “people” or
“financial” issues at stake.
Advantages:
1. Price: Pay for only the resources used.
2. Security: Cloud instances are isolated in the
network from other instances for improved
security.
3. Performance: Instances can be added
instantly for improved performance. Clients
IDL - International Digital Library Of
Technology & Research
Volume 1, Issue 5, May 2017 Available at: www.dbpublications.org
International e-Journal For Technology And Research-2017
IDL - International Digital Library 4 | P a g e Copyright@IDL-2017
have access to the total resources of the
Cloud’s core hardware.
4. Scalability: Auto-deploy cloud instances
when needed.
5. Uptime: Uses multiple servers for maximum
redundancies. In case of server failure,
instances can be automatically created on
another server.
6. Control: Able to login from any location.
Server snapshot and a software library lets
you deploy custom instances.
7. Traffic: Deals with spike in traffic with
quick deployment of additional instances to
handle the load.
SYSTEM ARCHITECTURE:
SYSTEM ANALYSIS
EXISTING SYSTEM:
 Ateniese et al. proposed a dynamic PDP
schema but without insertion operation.
 Erway et al. improved Ateniese et al.’s work
and supported insertion by introducing
authenticated flip table.
 Wang et al.proposed proxy PDP in public
clouds.
 Zhu et al. proposed the cooperative PDP in
multi-cloud storage.
 Wang et al. improved the POR model by
manipulating the classic Merkle hash tree
construction for block tag authentication.
 Xu and Chang proposed to improve the POR
schema with polynomial commitment for
reducing communication cost.
 Stefanov et al. proposed a POR protocol over
authenticated file system subject to frequent
changes.
 Azraoui et al. combined the privacy-
preserving word search algorithm with the
insertion in data segments of randomly
generated short bit sequences, and developed
a new POR protocol.
 Li et al. considered a new cloud storage
architecture with two independent cloud
servers for integrity auditing to reduce the
computation load at client side.
DISADVANTAGES OF EXISTING SYSTEM:
 The first problem is integrity auditing. The
cloud server is able to relieve clients from the
heavy burden of storage management and
maintenance. The most difference of cloud
storage from traditional in-house storage is
that the data is transferred via Internet and
stored in an uncertain domain, not under
control of the clients at all, which inevitably
raises clients great concerns on the integrity
of their data.
 The second problem is secure deduplication.
The rapid adoption of cloud services is
accompanied by increasing volumes of data
stored at remote cloud servers. Among these
remote stored files, most of them are
duplicated: according to a recent survey by
EMC, 75% of recent digital data is duplicated
copies.
 Unfortunately, this action of deduplication
would lead to a number of threats potentially
affecting the storage system, for example, a
server telling a client that it (i.e., the client)
does not need to send the file reveals that
IDL - International Digital Library Of
Technology & Research
Volume 1, Issue 5, May 2017 Available at: www.dbpublications.org
International e-Journal For Technology And Research-2017
IDL - International Digital Library 5 | P a g e Copyright@IDL-2017
some other client has the exact same file,
which could be sensitive sometimes. These
attacks originate from the reason that the
proof that the client owns a given file (or
block of data) is solely based on a static, short
value (in most cases the hash of the file).
PROPOSED SYSTEM:
 In this paper, aiming at achieving data
integrity and deduplication in cloud, we
propose two secure systems namely
SecCloud and SecCloud+.
 SecCloud introduces an auditing entity with
maintenance of a MapReduce cloud, which
helps clients generate data tags before
uploading as well as audit the integrity of
data having been stored in cloud.
 Besides supporting integrity auditing and
secure deduplication, SecCloud+ enables the
guarantee of file confidentiality.
 We propose a method of directly auditing
integrity on encrypted data.
ADVANTAGES OF PROPOSED SYSTEM:
 This design fixes the issue of previous work
that the computational load at user or auditor
is too huge for tag generation. For
completeness of fine-grained, the
functionality of auditing designed in SecCoud
is supported on both block level and sector
level. In addition, SecCoud also enables
secure deduplication.
 The challenge of deduplication on encrypted
is the prevention of dictionary attack.
 Our proposed SecCloud system has achieved
both integrity auditing and file deduplication.
IMPLEMENTATION
MODULES:-
 Cloud Servers
 Data Users Module
 Auditor
 Secure De-duplication System
MODULES DESCRIPTON:-
Cloud Service Provider
 In this module, we develop Cloud Service
Provider module. This is an entity that
provides a data storage service in public
cloud.
 The CS provides the data outsourcing service
and stores data on behalf of the users.
 To reduce the storage cost, the CS eliminates
the storage of redundant data via
deduplication and keeps only unique data.
 In this paper, we assume that CS is always
online and has abundant storage capacity and
computation power.
Data Users Module
 A user is an entity that wants to outsource
data storage to the S-CSP and access the data
later.
 In a storage system supporting deduplication,
the user only uploads unique data but does
not upload any duplicate data to save the
upload bandwidth, which may be owned by
the same user or different users.
 In the authorized deduplication system, each
user is issued a set of privileges in the setup
of the system. Each file is protected with the
convergent encryption key and privilege keys
to realize the authorized deduplication with
differential privileges.
Auditor
Auditor which helps clients upload and audit their
outsourced data maintains a MapReduce cloud and
acts like a certificate authority. This assumption
presumes that the auditor is associated with a pair of
public and private keys. Its public key is made
IDL - International Digital Library Of
Technology & Research
Volume 1, Issue 5, May 2017 Available at: www.dbpublications.org
International e-Journal For Technology And Research-2017
IDL - International Digital Library 6 | P a g e Copyright@IDL-2017
available to the other entities in the system. The first
design goal of this work is to provide the capability of
verifying correctness of the remotely stored data.
public verification, which allows anyone, not just the
clients originally stored the file, to perform
verification.
Secure De-duplication System
 We consider several types of privacy we need
protect, that is, i) unforgeability of duplicate-
check token: There are two types of
adversaries, that is, external adversary and
internal adversary.
 As shown below, the external adversary can
be viewed as an internal adversary without
any privilege.
 If a user has privilege p, it requires that the
adversary cannot forge and output a valid
duplicate token with any other privilege p′ on
any file F, where p does not match p′.
Furthermore, it also requires that if the
adversary does not make a request of token
with its own privilege from private cloud
server, it cannot forge and output a valid
duplicate token with p on any F that has been
queried.
INPUT DESIGN
The input design is the link between the information
system and the user. It comprises the developing
specification and procedures for data preparation and
those steps are necessary to put transaction data in to a
usable form for processing can be achieved by
inspecting the computer to read data from a written or
printed document or it can occur by having people
keying the data directly into the system. The design of
input focuses on controlling the amount of input
required, controlling the errors, avoiding delay,
avoiding extra steps and keeping the process simple.
The input is designed in such a way so that it provides
security and ease of use with retaining the privacy.
Input Design considered the following things:
 What data should be given as input?
 How the data should be arranged or
coded?
 The dialog to guide the operating
personnel in providing input.
 Methods for preparing input validations
and steps to follow when error occur.

OBJECTIVES
1.Input Design is the process of converting a user-
oriented description of the input into a computer-based
system. This design is important to avoid errors in the
data input process and show the correct direction to
the management for getting correct information from
the computerized system.
2. It is achieved by creating user-friendly screens for
the data entry to handle large volume of data. The goal
of designing input is to make data entry easier and to
be free from errors. The data entry screen is designed
in such a way that all the data manipulates can be
performed. It also provides record viewing facilities.
3.When the data is entered it will check for its validity.
Data can be entered with the help of screens.
Appropriate messages are provided as when needed so
that the user
will not be in maize of instant. Thus the objective of
input design is to create an input layout that is easy to
follow
IDL - International Digital Library Of
Technology & Research
Volume 1, Issue 5, May 2017 Available at: www.dbpublications.org
International e-Journal For Technology And Research-2017
IDL - International Digital Library 7 | P a g e Copyright@IDL-2017
OUTPUT DESIGN
A quality output is one, which meets the requirements
of the end user and presents the information clearly. In
any system results of processing are communicated to
the users and to other system through outputs. In
output design it is determined how the information is
to be displaced for immediate need and also the hard
copy output. It is the most important and direct source
information to the user. Efficient and intelligent output
design improves the system’s relationship to help user
decision-making.
1. Designing computer output should proceed in an
organized, well thought out manner; the right output
must be developed while ensuring that each output
element is designed so that people will find the system
can use easily and effectively. When analysis design
computer output, they should Identify the specific
output that is needed to meet the requirements.
2.Select methods for presenting information.
3.Create document, report, or other formats that
contain information produced by the system.
The output form of an information system should
accomplish one or more of the following objectives.
 Convey information about past activities,
current status or projections of the
 Future.
 Signal important events, opportunities,
problems, or warnings.
 Trigger an action.
 Confirm an action.
CONCLUSION
Aiming at achieving both data integrity and
deduplication in cloud, we propose SecCloud and
SecCloud+. SecCloud introduces an auditing entity
with maintenance of a MapReduce cloud, which helps
clients generate data tags before uploading as well as
audit the integrity of data having been stored in cloud.
In addition, SecCoud enables secure deduplication
through introducing a Proof of Ownership protocol
and preventing the leakage of side channel information
in data deduplication. Compared with previous work,
the computation by user in SecCloud is greatly
reduced during the file uploading and auditing phases.
SecCloud+ is an advanced construction motivated by
the fact that customers always want to encrypt their
data before uploading, and allows for integrity
auditing and secure deduplication directly on
encrypted data.
REFERENCES
[1] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R.
Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin,
I. Stoica, and M. Zaharia, “A view of cloud
computing,” Communication of the ACM, vol. 53, no.
4, pp. 50–58, 2010.
[2] J. Yuan and S. Yu, “Secure and constant cost
public cloud storage auditing with deduplication,” in
IEEE Conference on Communications and Network
Security (CNS), 2013, pp. 145–153.
[3] S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-
Peleg, “Proofs of ownership in remote storage
systems,” in Proceedings of the 18th ACM Conference
IDL - International Digital Library Of
Technology & Research
Volume 1, Issue 5, May 2017 Available at: www.dbpublications.org
International e-Journal For Technology And Research-2017
IDL - International Digital Library 8 | P a g e Copyright@IDL-2017
on Computer and Communications Security. ACM,
2011, pp. 491–500.
[4] S. Keelveedhi, M. Bellare, and T. Ristenpart,
“Dupless: Serveraided encryption for deduplicated
storage,” in Proceedings of the 22Nd USENIX
Conference on Security, ser. SEC’13. Washington,
D.C.: USENIX Association, 2013, pp. 179–194.
[Online]. Available:
https://www.usenix.org/conference/usenixsecurity13/t
echnicalsessions/presentation/bellare
[5] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L.
Kissner, Z. Peterson, and D. Song, “Provable data
possession at untrusted stores,” in Proceedings of the
14th ACM Conference on Computer and
Communications Security, ser. CCS ’07. New York,
NY, USA: ACM, 2007, pp. 598–609.
[6] G. Ateniese, R. Burns, R. Curtmola, J. Herring, O.
Khan, L. Kissner, Z. Peterson, and D. Song, “Remote
data checking using provable data possession,” ACM
Trans. Inf. Syst. Secur., vol. 14, no. 1, pp. 12:1–12:34,
2011.
[7] G. Ateniese, R. Di Pietro, L. V. Mancini, and G.
Tsudik, “Scalable and efficient provable data
possession,” in Proceedings of the 4th
International
Conference on Security and Privacy in
Communication Netowrks, ser. SecureComm ’08. New
York, NY, USA: ACM, 2008, pp. 9:1–9:10.
[8] C. Erway, A. K¨upc¸ ¨u, C. Papamanthou, and R.
Tamassia, “Dynamic provable data possession,” in
Proceedings of the 16th ACM Conference on
Computer and Communications Security, ser. CCS
’09. New York, NY, USA: ACM, 2009, pp. 213–222.
[9] F. Seb´e, J. Domingo-Ferrer, A. Martinez-Balleste,
Y. Deswarte, and J.-J. Quisquater, “Efficient remote
data possession checking in critical information
infrastructures,” IEEE Trans. on Knowl. and Data
Eng., vol. 20, no. 8, pp. 1034–1038, 2008.
[10] H. Wang, “Proxy provable data possession in
public clouds,” IEEE Transactions on Services
Computing, vol. 6, no. 4, pp. 551–559, 2013.
[11] Y. Zhu, H. Hu, G.-J. Ahn, and M. Yu,
“Cooperative provable data possession for integrity
verification in multicloud storage,” IEEE Transactions
on Parallel and Distributed Systems, vol. 23, no. 12,
pp. 2231–2244, 2012.
[12] H. Shacham and B. Waters, “Compact proofs of
retrievability,” in Proceedings of the 14th
International Conference on the Theory and
Application of Cryptology and Information Security:
Advances in Cryptology, ser. ASIACRYPT ’08.
Springer Berlin Heidelberg, 2008, pp. 90–107.
[13] Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou,
“Enabling public verifiability and data dynamics for
storage security in cloud computing,” in Computer
Security – ESORICS 2009, M. Backes and P. Ning,
Eds., vol. 5789. Springer Berlin Heidelberg, 2009, pp.
355–370.
IDL - International Digital Library Of
Technology & Research
Volume 1, Issue 5, May 2017 Available at: www.dbpublications.org
International e-Journal For Technology And Research-2017
IDL - International Digital Library 9 | P a g e Copyright@IDL-2017
[14] J. Xu and E.-C. Chang, “Towards efficient proofs
of retrievability,” in Proceedings of the 7th ACM
Symposium on Information, Computer and
Communications Security, ser. ASIACCS ’12. New
York, NY, USA: ACM, 2012, pp. 79–80.
[15] E. Stefanov, M. van Dijk, A. Juels, and A. Oprea,
“Iris: A scalable cloud file system with efficient
integrity checks,” in Proceedings of the 28th Annual
Computer Security Applications Conference, ser.
ACSAC ’12. New York, NY, USA: ACM, 2012, pp.
229–238.
[16] M. Azraoui, K. Elkhiyaoui, R. Molva, and M. O¨
nen, “Stealthguard: Proofs of retrievability with
hidden watchdogs,” in Computer Security - ESORICS
2014, ser. Lecture Notes in Computer Science, M.
Kutyłowski and J. Vaidya, Eds., vol. 8712. Springer
International Publishing, 2014, pp. 239–256.
[17] J. Li, X. Tan, X. Chen, and D. Wong, “An
efficient proof of retrievability with public auditing in
cloud computing,” in 5th International Conference on
Intelligent Networking and Collaborative Systems
(INCoS), 2013, pp. 93–98.
[18] J. Li, X. Chen, M. Li, J. Li, P. Lee, and W. Lou,
“Secure deduplication with efficient and reliable
convergent key management,” IEEE Transactions on
Parallel and Distributed Systems, vol. 25, no. 6, pp.
1615–1625, June 2014.
[19] R. Di Pietro and A. Sorniotti, “Boosting
efficiency and security in proof of ownership for
deduplication,” in Proceedings of the 7th ACM
Symposium on Information, Computer and
Communications Security, ser. ASIACCS ’12. New
York, NY, USA: ACM, 2012, pp. 81–82.
[20] W. K. Ng, Y. Wen, and H. Zhu, “Private data
deduplication protocols in cloud storage,” in
Proceedings of the 27th Annual ACM Symposium on
Applied Computing, ser. SAC ’12. New York, NY,
USA: ACM, 2012, pp. 441–446.
[21] J. Douceur, A. Adya, W. Bolosky, P. Simon, and
M. Theimer, “Reclaiming space from duplicate files in
a serverless distributed file system,” in 22nd
International Conference on Distributed Computing
Systems, 2002, pp. 617–624.
[22] M. Bellare, S. Keelveedhi, and T. Ristenpart,
“Message-locked encryption and secure
deduplication,” in Advances in Cryptology –
EUROCRYPT 2013, ser. Lecture Notes in Computer
Science, T. Johansson and P. Nguyen, Eds. Springer
Berlin Heidelberg, 2013, vol. 7881, pp. 296–312.
[23] M. Abadi, D. Boneh, I. Mironov, A.
Raghunathan, and G. Segev, “Message-locked
encryption for lock-dependent messages,” in Advances
in Cryptology – CRYPTO 2013, ser. Lecture Notes in
Computer Science, R. Canetti and J. Garay, Eds.
Springer Berlin Heidelberg, 2013, vol. 8042, pp. 374–
391.

More Related Content

What's hot

SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTINGSECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTINGIJNSA Journal
 
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud StorageEnhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud StorageIRJET Journal
 
Maintaining Secure Cloud by Continuous Auditing
Maintaining Secure Cloud by Continuous AuditingMaintaining Secure Cloud by Continuous Auditing
Maintaining Secure Cloud by Continuous Auditingijtsrd
 
An Efficient Cloud Scheduling Algorithm for the Conservation of Energy throug...
An Efficient Cloud Scheduling Algorithm for the Conservation of Energy throug...An Efficient Cloud Scheduling Algorithm for the Conservation of Energy throug...
An Efficient Cloud Scheduling Algorithm for the Conservation of Energy throug...IJECEIAES
 
Data Integrity proofs in cloud storage
Data Integrity proofs in cloud storageData Integrity proofs in cloud storage
Data Integrity proofs in cloud storageSameer Mohd
 
Guaranteed Availability of Cloud Data with Efficient Cost
Guaranteed Availability of Cloud Data with Efficient CostGuaranteed Availability of Cloud Data with Efficient Cost
Guaranteed Availability of Cloud Data with Efficient CostIRJET Journal
 
Grid Computing (An Up-Coming Technology)
Grid Computing (An Up-Coming Technology)Grid Computing (An Up-Coming Technology)
Grid Computing (An Up-Coming Technology)LJ PROJECTS
 
Ijarcet vol-2-issue-3-951-956
Ijarcet vol-2-issue-3-951-956Ijarcet vol-2-issue-3-951-956
Ijarcet vol-2-issue-3-951-956Editor IJARCET
 
Asyma E3 2014 The Impact of Cloud Computing on SME's
Asyma E3 2014   The Impact of Cloud Computing on SME'sAsyma E3 2014   The Impact of Cloud Computing on SME's
Asyma E3 2014 The Impact of Cloud Computing on SME'sasyma
 
Grid computing notes
Grid computing notesGrid computing notes
Grid computing notesSyed Mustafa
 
Smart, Secure and Efficient Data Sharing in IoT
Smart, Secure and Efficient Data Sharing in IoTSmart, Secure and Efficient Data Sharing in IoT
Smart, Secure and Efficient Data Sharing in IoTAngelo Corsaro
 
Grid computing ppt 2003(done)
Grid computing ppt 2003(done)Grid computing ppt 2003(done)
Grid computing ppt 2003(done)TASNEEM88
 
A Virtualization Model for Cloud Computing
A Virtualization Model for Cloud ComputingA Virtualization Model for Cloud Computing
A Virtualization Model for Cloud ComputingSouvik Pal
 

What's hot (20)

40 41
40 4140 41
40 41
 
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTINGSECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
 
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud StorageEnhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
 
Grid computing
Grid computingGrid computing
Grid computing
 
Cloud vs grid
Cloud vs gridCloud vs grid
Cloud vs grid
 
Maintaining Secure Cloud by Continuous Auditing
Maintaining Secure Cloud by Continuous AuditingMaintaining Secure Cloud by Continuous Auditing
Maintaining Secure Cloud by Continuous Auditing
 
An Efficient Cloud Scheduling Algorithm for the Conservation of Energy throug...
An Efficient Cloud Scheduling Algorithm for the Conservation of Energy throug...An Efficient Cloud Scheduling Algorithm for the Conservation of Energy throug...
An Efficient Cloud Scheduling Algorithm for the Conservation of Energy throug...
 
Data Integrity proofs in cloud storage
Data Integrity proofs in cloud storageData Integrity proofs in cloud storage
Data Integrity proofs in cloud storage
 
Grid computing by ahlam ansari
Grid computing by  ahlam ansariGrid computing by  ahlam ansari
Grid computing by ahlam ansari
 
A REVIEW ON RESOURCE ALLOCATION MECHANISM IN CLOUD ENVIORNMENT
A REVIEW ON RESOURCE ALLOCATION MECHANISM IN CLOUD ENVIORNMENTA REVIEW ON RESOURCE ALLOCATION MECHANISM IN CLOUD ENVIORNMENT
A REVIEW ON RESOURCE ALLOCATION MECHANISM IN CLOUD ENVIORNMENT
 
Guaranteed Availability of Cloud Data with Efficient Cost
Guaranteed Availability of Cloud Data with Efficient CostGuaranteed Availability of Cloud Data with Efficient Cost
Guaranteed Availability of Cloud Data with Efficient Cost
 
Grid computing
Grid computingGrid computing
Grid computing
 
Grid Computing (An Up-Coming Technology)
Grid Computing (An Up-Coming Technology)Grid Computing (An Up-Coming Technology)
Grid Computing (An Up-Coming Technology)
 
Ijarcet vol-2-issue-3-951-956
Ijarcet vol-2-issue-3-951-956Ijarcet vol-2-issue-3-951-956
Ijarcet vol-2-issue-3-951-956
 
Asyma E3 2014 The Impact of Cloud Computing on SME's
Asyma E3 2014   The Impact of Cloud Computing on SME'sAsyma E3 2014   The Impact of Cloud Computing on SME's
Asyma E3 2014 The Impact of Cloud Computing on SME's
 
Gcc notes unit 1
Gcc notes unit 1Gcc notes unit 1
Gcc notes unit 1
 
Grid computing notes
Grid computing notesGrid computing notes
Grid computing notes
 
Smart, Secure and Efficient Data Sharing in IoT
Smart, Secure and Efficient Data Sharing in IoTSmart, Secure and Efficient Data Sharing in IoT
Smart, Secure and Efficient Data Sharing in IoT
 
Grid computing ppt 2003(done)
Grid computing ppt 2003(done)Grid computing ppt 2003(done)
Grid computing ppt 2003(done)
 
A Virtualization Model for Cloud Computing
A Virtualization Model for Cloud ComputingA Virtualization Model for Cloud Computing
A Virtualization Model for Cloud Computing
 

Similar to Privacy preserving public auditing for secured cloud storage

An Overview To Cloud Computing
An Overview To Cloud ComputingAn Overview To Cloud Computing
An Overview To Cloud ComputingIJSRED
 
An Efficient and Safe Data Sharing Scheme for Mobile Cloud Computing
An Efficient and Safe Data Sharing Scheme for Mobile Cloud ComputingAn Efficient and Safe Data Sharing Scheme for Mobile Cloud Computing
An Efficient and Safe Data Sharing Scheme for Mobile Cloud Computingijtsrd
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud ComputingAnimesh Chaturvedi
 
IJSRED-V1I1P1
IJSRED-V1I1P1IJSRED-V1I1P1
IJSRED-V1I1P1IJSRED
 
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...IJERA Editor
 
IRJET - Secure Data Sharing in Cloud Computing using Revocable Storage Id...
IRJET -  	  Secure Data Sharing in Cloud Computing using Revocable Storage Id...IRJET -  	  Secure Data Sharing in Cloud Computing using Revocable Storage Id...
IRJET - Secure Data Sharing in Cloud Computing using Revocable Storage Id...IRJET Journal
 
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...IJIR JOURNALS IJIRUSA
 
Introduction Of Cloud Computing
Introduction Of Cloud ComputingIntroduction Of Cloud Computing
Introduction Of Cloud ComputingMonica Rivera
 
Flaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple cloudsFlaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple cloudsIRJET Journal
 
Introduction to aneka cloud
Introduction to aneka cloudIntroduction to aneka cloud
Introduction to aneka cloudssuser84183f
 
Cloud computing Review over various scheduling algorithms
Cloud computing Review over various scheduling algorithmsCloud computing Review over various scheduling algorithms
Cloud computing Review over various scheduling algorithmsIJEEE
 
IRJET- Improving Data Availability by using VPC Strategy in Cloud Environ...
IRJET-  	  Improving Data Availability by using VPC Strategy in Cloud Environ...IRJET-  	  Improving Data Availability by using VPC Strategy in Cloud Environ...
IRJET- Improving Data Availability by using VPC Strategy in Cloud Environ...IRJET Journal
 
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesCentralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesEditor IJMTER
 
Cloud computing
Cloud computingCloud computing
Cloud computingMithraasmi
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingAIRCC Publishing Corporation
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGAIRCC Publishing Corporation
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGijcsit
 
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...Editor IJCATR
 

Similar to Privacy preserving public auditing for secured cloud storage (20)

An Overview To Cloud Computing
An Overview To Cloud ComputingAn Overview To Cloud Computing
An Overview To Cloud Computing
 
An Efficient and Safe Data Sharing Scheme for Mobile Cloud Computing
An Efficient and Safe Data Sharing Scheme for Mobile Cloud ComputingAn Efficient and Safe Data Sharing Scheme for Mobile Cloud Computing
An Efficient and Safe Data Sharing Scheme for Mobile Cloud Computing
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
 
IJSRED-V1I1P1
IJSRED-V1I1P1IJSRED-V1I1P1
IJSRED-V1I1P1
 
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...
 
IRJET - Secure Data Sharing in Cloud Computing using Revocable Storage Id...
IRJET -  	  Secure Data Sharing in Cloud Computing using Revocable Storage Id...IRJET -  	  Secure Data Sharing in Cloud Computing using Revocable Storage Id...
IRJET - Secure Data Sharing in Cloud Computing using Revocable Storage Id...
 
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
 
Introduction Of Cloud Computing
Introduction Of Cloud ComputingIntroduction Of Cloud Computing
Introduction Of Cloud Computing
 
Flaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple cloudsFlaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple clouds
 
106248842 cc
106248842 cc106248842 cc
106248842 cc
 
Introduction to aneka cloud
Introduction to aneka cloudIntroduction to aneka cloud
Introduction to aneka cloud
 
Cloud computing Review over various scheduling algorithms
Cloud computing Review over various scheduling algorithmsCloud computing Review over various scheduling algorithms
Cloud computing Review over various scheduling algorithms
 
IRJET- Improving Data Availability by using VPC Strategy in Cloud Environ...
IRJET-  	  Improving Data Availability by using VPC Strategy in Cloud Environ...IRJET-  	  Improving Data Availability by using VPC Strategy in Cloud Environ...
IRJET- Improving Data Availability by using VPC Strategy in Cloud Environ...
 
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesCentralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data Services
 
An4201262267
An4201262267An4201262267
An4201262267
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
 

Recently uploaded

DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage examplePragyanshuParadkar1
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixingviprabot1
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIkoyaldeepu123
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 

Recently uploaded (20)

DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage example
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixing
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 

Privacy preserving public auditing for secured cloud storage

  • 1. IDL - International Digital Library Of Technology & Research Volume 1, Issue 5, May 2017 Available at: www.dbpublications.org International e-Journal For Technology And Research-2017 IDL - International Digital Library 1 | P a g e Copyright@IDL-2017 Privacy preserving public auditing for secured cloud storage VIKAS HUGAR MSRIT College, M. Tech Abstract: As the cloud computing technology develops during the last decade, outsourcing data to cloud service for storage becomes an attractive trend, which benefits in sparing efforts on heavy data maintenance and management. Nevertheless, since the outsourced cloud storage is not fully trustworthy, it raises security concerns on how to realize data deduplication in cloud while achieving integrity auditing. In this work, we study the problem of integrity auditing and secure deduplication on cloud data. Specifically, aiming at achieving both data integrity and deduplication in cloud, we propose two secure systems, namely SecCloud and SecCloud+. SecCloud introduces an auditing entity with a maintenance of a MapReduce cloud, which helps clients generate data tags before uploading as well as audit the integrity of data having been stored in cloud. Compared with previous work, the computation by user in SecCloud is greatly reduced during the file uploading and auditing phases. SecCloud+ is designed motivated by the fact that customers always want to encrypt their data before uploading, and enables integrity auditing and secure deduplication on encrypted data. INTRODUCTION What is cloud computing? Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over a network (typically the Internet). The name comes from the common use of a cloud-shaped symbol as an abstraction for the complex infrastructure it contains in system diagrams. Cloud computing entrusts remote services with a user's data, software and computation. Cloud computing consists of hardware and software resources made available on the Internet as managed third-party services. These services typically provide access to advanced software applications and high-end networks of server computers. . Structure of cloud computing How Cloud Computing Works? The goal of cloud computing is to apply traditional supercomputing, or high-performance computing power, normally used by military and research facilities, to perform tens of trillions of computations per second, in consumer-oriented applications such as financial portfolios, to deliver personalized information, to provide data storage or to power large, immersive computer games. The cloud computing uses networks of large groups of servers typically running low-cost consumer PC technology with specialized connections to spread data-processing chores across them. This shared IT infrastructure contains large pools of
  • 2. IDL - International Digital Library Of Technology & Research Volume 1, Issue 5, May 2017 Available at: www.dbpublications.org International e-Journal For Technology And Research-2017 IDL - International Digital Library 2 | P a g e Copyright@IDL-2017 systems that are linked together. Often, virtualization techniques are used to maximize the power of cloud computing. Characteristics and Services Models The salient characteristics of cloud computing based on the definitions provided by the National Institute of Standards and Terminology (NIST) are outlined below:  On-demand self-service: A consumer can unilaterally provision computing capabilities, such as server time and network storage, as needed automatically without requiring human interaction with each service’s provider.  Broad network access: Capabilities are available over the network and accessed through standard mechanisms that promote use by heterogeneous thin or thick client platforms (e.g., mobile phones, laptops, and PDAs).  Resource pooling: The provider’s computing resources are pooled to serve multiple consumers using a multi-tenant model, with different physical and virtual resources dynamically assigned and reassigned according to consumer demand. There is a sense of location-independence in that the customer generally has no control or knowledge over the exact location of the provided resources but may be able to specify location at a higher level of abstraction (e.g., country, state, or data center). Examples of resources include storage, processing, memory, network bandwidth, and virtual machines.  Rapid elasticity: Capabilities can be rapidly and elastically provisioned, in some cases automatically, to quickly scale out and rapidly released to quickly scale in. To the consumer, the capabilities available for provisioning often appear to be unlimited and can be purchased in any quantity at any time.  Measured service: Cloud systems automatically control and optimize resource use by leveraging a metering capability at some level of abstraction appropriate to the type of service (e.g., storage, processing, bandwidth, and active user accounts). Resource usage can be managed, controlled, and reported providing transparency for both the provider and consumer of the utilized service. Characteristics of cloud computing
  • 3. IDL - International Digital Library Of Technology & Research Volume 1, Issue 5, May 2017 Available at: www.dbpublications.org International e-Journal For Technology And Research-2017 IDL - International Digital Library 3 | P a g e Copyright@IDL-2017 Services Models: Cloud Computing comprises three different service models, namely Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), and Software-as-a- Service (SaaS). The three service models or layer are completed by an end user layer that encapsulates the end user perspective on cloud services. The model is shown in figure below. If a cloud user accesses services on the infrastructure layer, for instance, she can run her own applications on the resources of a cloud infrastructure and remain responsible for the support, maintenance, and security of these applications herself. If she accesses a service on the application layer, these tasks are normally taken care of by the cloud service provider. Structure of service models Benefits of cloud computing: 1. Achieve economies of scale – increase volume output or productivity with fewer people. Your cost per unit, project or product plummets. 2. Reduce spending on technology infrastructure. Maintain easy access to your information with minimal upfront spending. Pay as you go (weekly, quarterly or yearly), based on demand. 3. Globalize your workforce on the cheap. People worldwide can access the cloud, provided they have an Internet connection. 4. Streamline processes. Get more work done in less time with less people. 5. Reduce capital costs. There’s no need to spend big money on hardware, software or licensing fees. 6. Improve accessibility. You have access anytime, anywhere, making your life so much easier! 7. Monitor projects more effectively. Stay within budget and ahead of completion cycle times. 8. Less personnel training is needed. It takes fewer people to do more work on a cloud, with a minimal learning curve on hardware and software issues. 9. Minimize licensing new software. Stretch and grow without the need to buy expensive software licenses or programs. 10. Improve flexibility. You can change direction without serious “people” or “financial” issues at stake. Advantages: 1. Price: Pay for only the resources used. 2. Security: Cloud instances are isolated in the network from other instances for improved security. 3. Performance: Instances can be added instantly for improved performance. Clients
  • 4. IDL - International Digital Library Of Technology & Research Volume 1, Issue 5, May 2017 Available at: www.dbpublications.org International e-Journal For Technology And Research-2017 IDL - International Digital Library 4 | P a g e Copyright@IDL-2017 have access to the total resources of the Cloud’s core hardware. 4. Scalability: Auto-deploy cloud instances when needed. 5. Uptime: Uses multiple servers for maximum redundancies. In case of server failure, instances can be automatically created on another server. 6. Control: Able to login from any location. Server snapshot and a software library lets you deploy custom instances. 7. Traffic: Deals with spike in traffic with quick deployment of additional instances to handle the load. SYSTEM ARCHITECTURE: SYSTEM ANALYSIS EXISTING SYSTEM:  Ateniese et al. proposed a dynamic PDP schema but without insertion operation.  Erway et al. improved Ateniese et al.’s work and supported insertion by introducing authenticated flip table.  Wang et al.proposed proxy PDP in public clouds.  Zhu et al. proposed the cooperative PDP in multi-cloud storage.  Wang et al. improved the POR model by manipulating the classic Merkle hash tree construction for block tag authentication.  Xu and Chang proposed to improve the POR schema with polynomial commitment for reducing communication cost.  Stefanov et al. proposed a POR protocol over authenticated file system subject to frequent changes.  Azraoui et al. combined the privacy- preserving word search algorithm with the insertion in data segments of randomly generated short bit sequences, and developed a new POR protocol.  Li et al. considered a new cloud storage architecture with two independent cloud servers for integrity auditing to reduce the computation load at client side. DISADVANTAGES OF EXISTING SYSTEM:  The first problem is integrity auditing. The cloud server is able to relieve clients from the heavy burden of storage management and maintenance. The most difference of cloud storage from traditional in-house storage is that the data is transferred via Internet and stored in an uncertain domain, not under control of the clients at all, which inevitably raises clients great concerns on the integrity of their data.  The second problem is secure deduplication. The rapid adoption of cloud services is accompanied by increasing volumes of data stored at remote cloud servers. Among these remote stored files, most of them are duplicated: according to a recent survey by EMC, 75% of recent digital data is duplicated copies.  Unfortunately, this action of deduplication would lead to a number of threats potentially affecting the storage system, for example, a server telling a client that it (i.e., the client) does not need to send the file reveals that
  • 5. IDL - International Digital Library Of Technology & Research Volume 1, Issue 5, May 2017 Available at: www.dbpublications.org International e-Journal For Technology And Research-2017 IDL - International Digital Library 5 | P a g e Copyright@IDL-2017 some other client has the exact same file, which could be sensitive sometimes. These attacks originate from the reason that the proof that the client owns a given file (or block of data) is solely based on a static, short value (in most cases the hash of the file). PROPOSED SYSTEM:  In this paper, aiming at achieving data integrity and deduplication in cloud, we propose two secure systems namely SecCloud and SecCloud+.  SecCloud introduces an auditing entity with maintenance of a MapReduce cloud, which helps clients generate data tags before uploading as well as audit the integrity of data having been stored in cloud.  Besides supporting integrity auditing and secure deduplication, SecCloud+ enables the guarantee of file confidentiality.  We propose a method of directly auditing integrity on encrypted data. ADVANTAGES OF PROPOSED SYSTEM:  This design fixes the issue of previous work that the computational load at user or auditor is too huge for tag generation. For completeness of fine-grained, the functionality of auditing designed in SecCoud is supported on both block level and sector level. In addition, SecCoud also enables secure deduplication.  The challenge of deduplication on encrypted is the prevention of dictionary attack.  Our proposed SecCloud system has achieved both integrity auditing and file deduplication. IMPLEMENTATION MODULES:-  Cloud Servers  Data Users Module  Auditor  Secure De-duplication System MODULES DESCRIPTON:- Cloud Service Provider  In this module, we develop Cloud Service Provider module. This is an entity that provides a data storage service in public cloud.  The CS provides the data outsourcing service and stores data on behalf of the users.  To reduce the storage cost, the CS eliminates the storage of redundant data via deduplication and keeps only unique data.  In this paper, we assume that CS is always online and has abundant storage capacity and computation power. Data Users Module  A user is an entity that wants to outsource data storage to the S-CSP and access the data later.  In a storage system supporting deduplication, the user only uploads unique data but does not upload any duplicate data to save the upload bandwidth, which may be owned by the same user or different users.  In the authorized deduplication system, each user is issued a set of privileges in the setup of the system. Each file is protected with the convergent encryption key and privilege keys to realize the authorized deduplication with differential privileges. Auditor Auditor which helps clients upload and audit their outsourced data maintains a MapReduce cloud and acts like a certificate authority. This assumption presumes that the auditor is associated with a pair of public and private keys. Its public key is made
  • 6. IDL - International Digital Library Of Technology & Research Volume 1, Issue 5, May 2017 Available at: www.dbpublications.org International e-Journal For Technology And Research-2017 IDL - International Digital Library 6 | P a g e Copyright@IDL-2017 available to the other entities in the system. The first design goal of this work is to provide the capability of verifying correctness of the remotely stored data. public verification, which allows anyone, not just the clients originally stored the file, to perform verification. Secure De-duplication System  We consider several types of privacy we need protect, that is, i) unforgeability of duplicate- check token: There are two types of adversaries, that is, external adversary and internal adversary.  As shown below, the external adversary can be viewed as an internal adversary without any privilege.  If a user has privilege p, it requires that the adversary cannot forge and output a valid duplicate token with any other privilege p′ on any file F, where p does not match p′. Furthermore, it also requires that if the adversary does not make a request of token with its own privilege from private cloud server, it cannot forge and output a valid duplicate token with p on any F that has been queried. INPUT DESIGN The input design is the link between the information system and the user. It comprises the developing specification and procedures for data preparation and those steps are necessary to put transaction data in to a usable form for processing can be achieved by inspecting the computer to read data from a written or printed document or it can occur by having people keying the data directly into the system. The design of input focuses on controlling the amount of input required, controlling the errors, avoiding delay, avoiding extra steps and keeping the process simple. The input is designed in such a way so that it provides security and ease of use with retaining the privacy. Input Design considered the following things:  What data should be given as input?  How the data should be arranged or coded?  The dialog to guide the operating personnel in providing input.  Methods for preparing input validations and steps to follow when error occur.  OBJECTIVES 1.Input Design is the process of converting a user- oriented description of the input into a computer-based system. This design is important to avoid errors in the data input process and show the correct direction to the management for getting correct information from the computerized system. 2. It is achieved by creating user-friendly screens for the data entry to handle large volume of data. The goal of designing input is to make data entry easier and to be free from errors. The data entry screen is designed in such a way that all the data manipulates can be performed. It also provides record viewing facilities. 3.When the data is entered it will check for its validity. Data can be entered with the help of screens. Appropriate messages are provided as when needed so that the user will not be in maize of instant. Thus the objective of input design is to create an input layout that is easy to follow
  • 7. IDL - International Digital Library Of Technology & Research Volume 1, Issue 5, May 2017 Available at: www.dbpublications.org International e-Journal For Technology And Research-2017 IDL - International Digital Library 7 | P a g e Copyright@IDL-2017 OUTPUT DESIGN A quality output is one, which meets the requirements of the end user and presents the information clearly. In any system results of processing are communicated to the users and to other system through outputs. In output design it is determined how the information is to be displaced for immediate need and also the hard copy output. It is the most important and direct source information to the user. Efficient and intelligent output design improves the system’s relationship to help user decision-making. 1. Designing computer output should proceed in an organized, well thought out manner; the right output must be developed while ensuring that each output element is designed so that people will find the system can use easily and effectively. When analysis design computer output, they should Identify the specific output that is needed to meet the requirements. 2.Select methods for presenting information. 3.Create document, report, or other formats that contain information produced by the system. The output form of an information system should accomplish one or more of the following objectives.  Convey information about past activities, current status or projections of the  Future.  Signal important events, opportunities, problems, or warnings.  Trigger an action.  Confirm an action. CONCLUSION Aiming at achieving both data integrity and deduplication in cloud, we propose SecCloud and SecCloud+. SecCloud introduces an auditing entity with maintenance of a MapReduce cloud, which helps clients generate data tags before uploading as well as audit the integrity of data having been stored in cloud. In addition, SecCoud enables secure deduplication through introducing a Proof of Ownership protocol and preventing the leakage of side channel information in data deduplication. Compared with previous work, the computation by user in SecCloud is greatly reduced during the file uploading and auditing phases. SecCloud+ is an advanced construction motivated by the fact that customers always want to encrypt their data before uploading, and allows for integrity auditing and secure deduplication directly on encrypted data. REFERENCES [1] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “A view of cloud computing,” Communication of the ACM, vol. 53, no. 4, pp. 50–58, 2010. [2] J. Yuan and S. Yu, “Secure and constant cost public cloud storage auditing with deduplication,” in IEEE Conference on Communications and Network Security (CNS), 2013, pp. 145–153. [3] S. Halevi, D. Harnik, B. Pinkas, and A. Shulman- Peleg, “Proofs of ownership in remote storage systems,” in Proceedings of the 18th ACM Conference
  • 8. IDL - International Digital Library Of Technology & Research Volume 1, Issue 5, May 2017 Available at: www.dbpublications.org International e-Journal For Technology And Research-2017 IDL - International Digital Library 8 | P a g e Copyright@IDL-2017 on Computer and Communications Security. ACM, 2011, pp. 491–500. [4] S. Keelveedhi, M. Bellare, and T. Ristenpart, “Dupless: Serveraided encryption for deduplicated storage,” in Proceedings of the 22Nd USENIX Conference on Security, ser. SEC’13. Washington, D.C.: USENIX Association, 2013, pp. 179–194. [Online]. Available: https://www.usenix.org/conference/usenixsecurity13/t echnicalsessions/presentation/bellare [5] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable data possession at untrusted stores,” in Proceedings of the 14th ACM Conference on Computer and Communications Security, ser. CCS ’07. New York, NY, USA: ACM, 2007, pp. 598–609. [6] G. Ateniese, R. Burns, R. Curtmola, J. Herring, O. Khan, L. Kissner, Z. Peterson, and D. Song, “Remote data checking using provable data possession,” ACM Trans. Inf. Syst. Secur., vol. 14, no. 1, pp. 12:1–12:34, 2011. [7] G. Ateniese, R. Di Pietro, L. V. Mancini, and G. Tsudik, “Scalable and efficient provable data possession,” in Proceedings of the 4th International Conference on Security and Privacy in Communication Netowrks, ser. SecureComm ’08. New York, NY, USA: ACM, 2008, pp. 9:1–9:10. [8] C. Erway, A. K¨upc¸ ¨u, C. Papamanthou, and R. Tamassia, “Dynamic provable data possession,” in Proceedings of the 16th ACM Conference on Computer and Communications Security, ser. CCS ’09. New York, NY, USA: ACM, 2009, pp. 213–222. [9] F. Seb´e, J. Domingo-Ferrer, A. Martinez-Balleste, Y. Deswarte, and J.-J. Quisquater, “Efficient remote data possession checking in critical information infrastructures,” IEEE Trans. on Knowl. and Data Eng., vol. 20, no. 8, pp. 1034–1038, 2008. [10] H. Wang, “Proxy provable data possession in public clouds,” IEEE Transactions on Services Computing, vol. 6, no. 4, pp. 551–559, 2013. [11] Y. Zhu, H. Hu, G.-J. Ahn, and M. Yu, “Cooperative provable data possession for integrity verification in multicloud storage,” IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 12, pp. 2231–2244, 2012. [12] H. Shacham and B. Waters, “Compact proofs of retrievability,” in Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology, ser. ASIACRYPT ’08. Springer Berlin Heidelberg, 2008, pp. 90–107. [13] Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, “Enabling public verifiability and data dynamics for storage security in cloud computing,” in Computer Security – ESORICS 2009, M. Backes and P. Ning, Eds., vol. 5789. Springer Berlin Heidelberg, 2009, pp. 355–370.
  • 9. IDL - International Digital Library Of Technology & Research Volume 1, Issue 5, May 2017 Available at: www.dbpublications.org International e-Journal For Technology And Research-2017 IDL - International Digital Library 9 | P a g e Copyright@IDL-2017 [14] J. Xu and E.-C. Chang, “Towards efficient proofs of retrievability,” in Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, ser. ASIACCS ’12. New York, NY, USA: ACM, 2012, pp. 79–80. [15] E. Stefanov, M. van Dijk, A. Juels, and A. Oprea, “Iris: A scalable cloud file system with efficient integrity checks,” in Proceedings of the 28th Annual Computer Security Applications Conference, ser. ACSAC ’12. New York, NY, USA: ACM, 2012, pp. 229–238. [16] M. Azraoui, K. Elkhiyaoui, R. Molva, and M. O¨ nen, “Stealthguard: Proofs of retrievability with hidden watchdogs,” in Computer Security - ESORICS 2014, ser. Lecture Notes in Computer Science, M. Kutyłowski and J. Vaidya, Eds., vol. 8712. Springer International Publishing, 2014, pp. 239–256. [17] J. Li, X. Tan, X. Chen, and D. Wong, “An efficient proof of retrievability with public auditing in cloud computing,” in 5th International Conference on Intelligent Networking and Collaborative Systems (INCoS), 2013, pp. 93–98. [18] J. Li, X. Chen, M. Li, J. Li, P. Lee, and W. Lou, “Secure deduplication with efficient and reliable convergent key management,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 6, pp. 1615–1625, June 2014. [19] R. Di Pietro and A. Sorniotti, “Boosting efficiency and security in proof of ownership for deduplication,” in Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, ser. ASIACCS ’12. New York, NY, USA: ACM, 2012, pp. 81–82. [20] W. K. Ng, Y. Wen, and H. Zhu, “Private data deduplication protocols in cloud storage,” in Proceedings of the 27th Annual ACM Symposium on Applied Computing, ser. SAC ’12. New York, NY, USA: ACM, 2012, pp. 441–446. [21] J. Douceur, A. Adya, W. Bolosky, P. Simon, and M. Theimer, “Reclaiming space from duplicate files in a serverless distributed file system,” in 22nd International Conference on Distributed Computing Systems, 2002, pp. 617–624. [22] M. Bellare, S. Keelveedhi, and T. Ristenpart, “Message-locked encryption and secure deduplication,” in Advances in Cryptology – EUROCRYPT 2013, ser. Lecture Notes in Computer Science, T. Johansson and P. Nguyen, Eds. Springer Berlin Heidelberg, 2013, vol. 7881, pp. 296–312. [23] M. Abadi, D. Boneh, I. Mironov, A. Raghunathan, and G. Segev, “Message-locked encryption for lock-dependent messages,” in Advances in Cryptology – CRYPTO 2013, ser. Lecture Notes in Computer Science, R. Canetti and J. Garay, Eds. Springer Berlin Heidelberg, 2013, vol. 8042, pp. 374– 391.