SlideShare a Scribd company logo
1 of 3
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________________
Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 323
SECURE FILE SHARING OF DYNAMIC AUDIT SERVICES IN CLOUD
STORAGE
N.Vidhya1
, P.Jegathesh2
1
Student M.E (CSE), Oxford Engineering College, Trichy, India
2
Assistant professor (CSE), Oxford Engineering College, Trichy, India
Abstract
Data integrity and storage efficiency are the two important requirements for cloud storage. Authorized users access the data and
share the files in secure manner. The cloud storage service (CSS) relieves the burden for storage management and maintenance.
Fragment Structure, random sampling and index table is used to construct the Audit service. These techniques are supported provable
updates to cloud outsourced data. The third party auditing allow to save time and computation resources with reduced online burden
of the user. Probabilistic query and periodic verification for improving the performance of audit services and also audit system
verifies the integrity.
Keywords: Cloud Storage Service, Proof of Data Possession, Cloud Service Provider, Third Party Audit, Public
Verification Parameter.
----------------------------------------------------------------------***---------------------------------------------------------------------
1. INTRODUCTION
Cloud computing provides computing resources, utilities are
provided to the users via internet. Cloud is a model for
accessing user data’s, on demand network services to access
the secure data. It maintains the shared pool of configurable
computing resources. Now a day’s many software industries
used the cloud computing services to secure their data’s. It is
used to pay per uses and it does not need any software to
install the user. Cloud computing services are classified into
three parts: IaaS(infrastructure as a service), SaaS(software as
a service) and PaaS(platform as a service). First service
provides access to computation resources as per user basis.
Second service is a simple application; it is delivered to
thousands of users from the resource pool. Third service uses
the building blocks of the vendor’s deployment environment.
If the user need to access the data from shared pool, the
administrator verifies the user is authorized person to take the
data.
Cloud data storage services involves four
entities.(i)Administrator controls the user details, file
insertion, file access, file deletion and the time of user presents
in the network to access the cloud data’s. (ii)Third party
auditor checks the correctness of cloud data. Some techniques
are used to establish the auditing concepts. (iii) Users access
the cloud data as per demand services. Users retrieve more
useful information from multiple repositories and no limitation
to access the particular storage part in the shared pool.
2. BACKGROUND & RELATED WORKS
Cloud-based outsourced storage [1]
reduced the client’s burden
for storage management and maintenance by providing a
comparably low-cost, scalable, location-independent platform.
To avoid the security risks, audit services are critical to ensure
the integrity and availability of outsourced data and to achieve
digital forensics and credibility on cloud computing. Provable
data possession (PDP) is a cryptographic technique to verify
the integrity of data without retrieving it from unauthorized
servers. Probabilistic queries and periodic verification, as well
as an optimization method of parameters of cloud audit
services are implemented to provide secure access. This
technique reduced the workload on the cloud storage servers.
The third party auditor (TPA) [2]
verifies the integrity of the
dynamic data stored in the cloud. The TPA reduces the
involvement of the client through the auditing of whether his
data stored in the cloud storage. It is an efficient method to
secure the user’s data using Third party auditor but it may leak
the data to send the linear combinations of data blocks to the
auditor. The data may be stored temporarily while being
authorization process. Store and forward transactions
processed after complete the authorization.
POR[5]
protocol is designed to protect a static archived file in
cloud storage. Critical information stored as storage-as-a-
service in encrypted format. It is more flexible and cost
effective storage environments. PORs lead to a number of
possible researches in the future. The classic merkle hash tree
constructed for block tag authentication to achieve secure
cloud storage and data dynamics.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________________
Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 324
3. PROPOSED SYSTEM
User easily access the secure cloud storage system is
constructed with administrator, Third party auditor and cloud
servers. Auditing technique verifies the integrity verification
of cloud data storage. Administrator controls the user access of
unauthorized party.
System Architecture
Fig 3.1 System architecture of the proposed system
3.1 Module 1: Key Generation
The owner generates the public/secret key pair (pk, sk) by
system manager. The secret key is not visible and then sends
the public key (pk) to TPA. Data owner provides the access to
authorized users and shares the public key.
3.2 Module 2: Tag Generation
The user’s/clients use the secret key (sk) to pre-process a file
in cloud storage. It consists of a collection of n blocks,
generates a set of public verification parameters and index-
hash table. User data’s are stored in TPA (Third party auditor)
and transmits the file with some verification tags to CSP
(Cloud service provider).
Fig 3.2 Tag generation
3.3 Module 3: Periodic Sampling Audit:
TPA (Third party auditor) challenges to audit the integrity and
availability of outsourced data stored in TPA. Audit process
detects some errors in secure storage of unauthorized
modification. It consists of two concepts: Verification and
Authorization. Administrator collects all the user details
within the cloud server. Verification process is constructed
with interactive proof protocol of cloud storage.
Fig 3.3 Periodic Sampling Audit Flow
3.4 Module 4: Audit for Dynamic Operations:
Authorized application holds the secret key (sk) and it can
manipulate the index hash table stored in TPA. TPA cannot
cheat the authorized application and audit records. User inserts
the files in cloud storage with authorized permission from
administrator.
Dynamic Data Operations:
Insert operation: User inserts the file in cloud storage. The
file is stored in Encrypted data format. Audit process audits
the file in secure techniques.
Update operation: It is an algorithm of Authorized
applications update the block of a file. It updates the data’s
only trusted parties.
Delete operation: After verify the user is authorized the TPA
gives the permission to delete the file in cloud storage.
Insert (sk, Xi, mi) is an algorithm run by AA to insert the
block of a file mi at the index i by using sk, and it returns a
new verification metadata.
Fig 3.4 Flow of dynamic data operation
Checking algorithm tests the audit process is controlled by
Administrator. The User data application invokes the Update,
Delete, and Insert algorithms, and then sends to TPA and CSP,
respectively. It is important to ensure the audit process of
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________________
Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 325
TPA. Finally, Admin gives the permission to modify audit
records after the confirmation message from CSP is received.
4. CONCLUSIONS
Cloud Storage requirements of data integrity and storage
efficiency proposed based on these auditing techniques. Audit
service constructed based on secure technique of PDP and
verification process achieved. Comparing other techniques to
construct the audit search is less than this technique. It
increased the data integrity of the cloud storage and avoids the
hackers to access the storage process. File insertion, File
updating, File deletion is possibly used to authorized users.
Cloud service provider offered an audit service to audit the
integrity and availability of Secure Storage Pool.
REFERENCES
[1]. Yan Zhua,b, Hongxin Huc, Gail-Joon Ahnc, Stephen S.
Yauc ,“Efficient Audit Service Outsourcing For Data
Integrity In Clouds”,In The Journal of Systems and Software
85 (2012) .
[2]. Wang.Q, C. Wang, K. Ren, W. Lou, and J. Li, “Enabling
Public Audit Ability And Data Dynamics For Storage
Security In Cloud Computing”, In IEEE Trans. Parallel
Distributed Systems, vol. 22, no. 5, pp. 847-859, May 2011.
[3]. Cong Wang, Student Member, IEEE, Sherman S.M.
Chow, Qian Wang, Student Member, IEEE, Kui Ren,
Member, IEEE, and Wenjing Lou, Member, IEEE, “Privacy-
Preserving Public Auditing For Secure Cloud Storage”.
[4]. Abhishek Mohta* ,Ravi Kant Sahu,Lalit Kumar Awasthi
,Dept. of CSE, NIT Hamirpur (H.P.) India,“Robust Data
Security For Cloud While Using Third Partyauditor”
[5]. Juels.A and J. Burton, S. Kaliski, “Pors: Proofs Of
Retrievability For Large Files”,In Proc. ACM Conf.
Computer and Comm. Security (CCS’07), pp. 584-597, Oct.
2007.
[6]. Ateniese.G, R. Burns, R. Curtmola, J. Herring, L. Kissner,
Z.Peterson, and D. Song, “Provable Data Possession At
Untrusted Stores” ,In Proc. 14th ACM Conf. Computer and
Comm. Security (CCS’07), pp. 598-609, 2007.
[7]. Govinda.K, V.Gurunathaprasad, H.Sathishkumar,”Third
Party Auditing For Secure Data Storage In Cloud
Through Digital Signature Using RSA”, In International
Journal Of Advanced Scientific And Technical Research(Issue
2, Volume 4- August 2012) Issn 2249-9954.
[8]. Ezhil Arasu.S, B.Gowri, S.Ananthi ,”Privacy-Preserving
Public Auditing In Cloud Using HMAC Algorithm “,In
International Journal of Recent Technology and Engineering
(IJRTE) ISSN: 2277-3878, Volume-2, Issue-1, March 2013 .
[9]. Shingare Vidya Marshal ,”Secure Audit Service by
Using TPA for Data Integrity in Cloud System”,In
International Journal of Innovative Technology and Exploring
Engineering (IJITEE)ISSN: 2278-3075, Volume-3, Issue-4,
September 2013.
[10]. Jiawei Yuan,Shucheng Yu “Secure and Constant Cost
Public Cloud Storage Auditing with Deduplication”,
University of Arkansas at Little Rock, USA.
[11]. Jiawei Yuan, Shucheng Yu,“Proofs of Retrievability
with Public Verifiability and Constant Communication
Cost in Cloud”,University of Arkansas at Little Rock ,USA.
[12]. Jeyadevan.S, Dr.S.Basavaraj Patil, S.Saravanan, Naina
Kumari, “Introducing Various Algorithms To Make The
Data-Storage In Clouds Secure”,In International Conference
on Computing and Control Engineering (ICCCE 2012), 12 &
13 April, 2012.
[13]. Vijeyta Devi & Vadlamani Nagalakshmi,”A Prospective
Approach On Security With RSA Algorithm And Cloud
SQL In Cloud Computing”, In International Journal Of
Computer Science And Engineering (Ijcse) Issn 2278-9960
Vol. 2, Issue 2, May.
[14]. Vidhisha.S, C.Surekha, S.Sanjeeva Rayudu, U.Seshadri,”
Preserving privacy for secure and outsourcing for Linear
Programming in cloud computing”, Jawaharlal Nehru
Technological University Ananatapur.
[15]. V.Venkatesh, P.Parthasarathi,” Enhanced audit services
for the correctness of outsourced data in cloud storage “,In
International Journal of Advanced Research in Computer
Engineering & Technology (IJARCET) Volume 2.
[16]. Wang, Qian Wang, Kui Ren, Ning Cao, And Wenjing
Lou, “Toward Secure And Dependable Storage Services In
Cloud Computing”,In IEEE Transactions On Services
Computing, Vol. 5, No. 2, April-June 2012.
[17]. Q. Wang, K. Ren, W. Lou, and Y. Zhang, “Dependable
and secure sensor data storage with dynamic integrity
assurance,” in Proc. Of IEEE INFOCOM’09, Rio de Janeiro,
Brazil, April 2009, pp. 954–962
[18]. K. D. Bowers, A. Juels, and A. Oprea, “Hail: A high-
availability and integrity layer for cloud storage,” in Proc.
of CCS’09. Chicago, IL, USA: ACM, 2009, pp. 187–198.

More Related Content

What's hot

Access Control and Revocation for Digital Assets on Cloud with Consideration ...
Access Control and Revocation for Digital Assets on Cloud with Consideration ...Access Control and Revocation for Digital Assets on Cloud with Consideration ...
Access Control and Revocation for Digital Assets on Cloud with Consideration ...IJERA Editor
 
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
PUBLIC AUDITING 	             FOR SECURE CLOUD STORAGE                       ...PUBLIC AUDITING 	             FOR SECURE CLOUD STORAGE                       ...
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...Bharath Nair
 
Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud Girish Chandra
 
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud StorageIRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud StorageIRJET Journal
 
Cloud Computing Environment using Secured Access Control Technique
Cloud Computing Environment using Secured Access Control TechniqueCloud Computing Environment using Secured Access Control Technique
Cloud Computing Environment using Secured Access Control TechniqueIRJET Journal
 
A comparative study of secure search protocols in pay as-you-go clouds
A comparative study of secure search protocols in pay as-you-go cloudsA comparative study of secure search protocols in pay as-you-go clouds
A comparative study of secure search protocols in pay as-you-go cloudseSAT Publishing House
 
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEMSURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEMijiert bestjournal
 
Dont look at this
Dont look at thisDont look at this
Dont look at thismylawyer1
 
Privacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storagePrivacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storageparry prabhu
 
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentInsuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentEditor IJCATR
 

What's hot (12)

Access Control and Revocation for Digital Assets on Cloud with Consideration ...
Access Control and Revocation for Digital Assets on Cloud with Consideration ...Access Control and Revocation for Digital Assets on Cloud with Consideration ...
Access Control and Revocation for Digital Assets on Cloud with Consideration ...
 
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
PUBLIC AUDITING 	             FOR SECURE CLOUD STORAGE                       ...PUBLIC AUDITING 	             FOR SECURE CLOUD STORAGE                       ...
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
 
Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud
 
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud StorageIRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
 
Cloud Computing Environment using Secured Access Control Technique
Cloud Computing Environment using Secured Access Control TechniqueCloud Computing Environment using Secured Access Control Technique
Cloud Computing Environment using Secured Access Control Technique
 
A comparative study of secure search protocols in pay as-you-go clouds
A comparative study of secure search protocols in pay as-you-go cloudsA comparative study of secure search protocols in pay as-you-go clouds
A comparative study of secure search protocols in pay as-you-go clouds
 
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEMSURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
 
Dont look at this
Dont look at thisDont look at this
Dont look at this
 
L04302088092
L04302088092L04302088092
L04302088092
 
Privacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storagePrivacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storage
 
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentInsuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud Environment
 
Ppt 1
Ppt 1Ppt 1
Ppt 1
 

Viewers also liked

Three dimensional finite element modeling of pervious
Three dimensional finite element modeling of perviousThree dimensional finite element modeling of pervious
Three dimensional finite element modeling of perviouseSAT Publishing House
 
Scour investigation around single and two piers
Scour investigation around single and two piersScour investigation around single and two piers
Scour investigation around single and two pierseSAT Publishing House
 
Design of fuzzy logic controller for starch
Design of fuzzy logic controller for starchDesign of fuzzy logic controller for starch
Design of fuzzy logic controller for starcheSAT Publishing House
 
No sql databases new millennium database for big data, big users, cloud compu...
No sql databases new millennium database for big data, big users, cloud compu...No sql databases new millennium database for big data, big users, cloud compu...
No sql databases new millennium database for big data, big users, cloud compu...eSAT Publishing House
 
Study on soundness of reinforced concrete structures by ndt approach
Study on soundness of reinforced concrete structures by ndt approachStudy on soundness of reinforced concrete structures by ndt approach
Study on soundness of reinforced concrete structures by ndt approacheSAT Publishing House
 
Securing the cloud computing systems with matrix vector and multi-key using l...
Securing the cloud computing systems with matrix vector and multi-key using l...Securing the cloud computing systems with matrix vector and multi-key using l...
Securing the cloud computing systems with matrix vector and multi-key using l...eSAT Publishing House
 
Monitoring wind turbine using wi fi network for reliable communication
Monitoring wind turbine using wi fi network for reliable communicationMonitoring wind turbine using wi fi network for reliable communication
Monitoring wind turbine using wi fi network for reliable communicationeSAT Publishing House
 
Optimization of friction stir welding process
Optimization of friction stir welding processOptimization of friction stir welding process
Optimization of friction stir welding processeSAT Publishing House
 
Resource potential appraisal assessment and to
Resource potential appraisal  assessment and toResource potential appraisal  assessment and to
Resource potential appraisal assessment and toeSAT Publishing House
 
An experimental study of square footing resting on geo grid reinforced sand
An experimental study of square footing resting on geo grid reinforced sandAn experimental study of square footing resting on geo grid reinforced sand
An experimental study of square footing resting on geo grid reinforced sandeSAT Publishing House
 
The effect of watercement ratio on the sulfate
The effect of watercement ratio on the sulfateThe effect of watercement ratio on the sulfate
The effect of watercement ratio on the sulfateeSAT Publishing House
 
An overview of plastic card frauds and solutions for
An overview of plastic card frauds and solutions forAn overview of plastic card frauds and solutions for
An overview of plastic card frauds and solutions foreSAT Publishing House
 
A virtual analysis on various techniques using ann with
A virtual analysis on various techniques using ann withA virtual analysis on various techniques using ann with
A virtual analysis on various techniques using ann witheSAT Publishing House
 
Low power and high performance detff using common
Low power and high performance detff using commonLow power and high performance detff using common
Low power and high performance detff using commoneSAT Publishing House
 
Determinants of global competitiveness on industrial performance an applicati...
Determinants of global competitiveness on industrial performance an applicati...Determinants of global competitiveness on industrial performance an applicati...
Determinants of global competitiveness on industrial performance an applicati...eSAT Publishing House
 
Dehulling characteristics of oat (ol 9 variety) as affected by grain moisture...
Dehulling characteristics of oat (ol 9 variety) as affected by grain moisture...Dehulling characteristics of oat (ol 9 variety) as affected by grain moisture...
Dehulling characteristics of oat (ol 9 variety) as affected by grain moisture...eSAT Publishing House
 
Location updation for energy efficient geographic routing in
Location updation for energy efficient geographic routing inLocation updation for energy efficient geographic routing in
Location updation for energy efficient geographic routing ineSAT Publishing House
 
Identification of dynamic rigidity for high speed
Identification of dynamic rigidity for high speedIdentification of dynamic rigidity for high speed
Identification of dynamic rigidity for high speedeSAT Publishing House
 
Effect of fly ash on the properties of cement
Effect of fly ash on the properties of cementEffect of fly ash on the properties of cement
Effect of fly ash on the properties of cementeSAT Publishing House
 
Cancer cell segmentation and detection using nc ratio
Cancer cell segmentation and detection using nc ratioCancer cell segmentation and detection using nc ratio
Cancer cell segmentation and detection using nc ratioeSAT Publishing House
 

Viewers also liked (20)

Three dimensional finite element modeling of pervious
Three dimensional finite element modeling of perviousThree dimensional finite element modeling of pervious
Three dimensional finite element modeling of pervious
 
Scour investigation around single and two piers
Scour investigation around single and two piersScour investigation around single and two piers
Scour investigation around single and two piers
 
Design of fuzzy logic controller for starch
Design of fuzzy logic controller for starchDesign of fuzzy logic controller for starch
Design of fuzzy logic controller for starch
 
No sql databases new millennium database for big data, big users, cloud compu...
No sql databases new millennium database for big data, big users, cloud compu...No sql databases new millennium database for big data, big users, cloud compu...
No sql databases new millennium database for big data, big users, cloud compu...
 
Study on soundness of reinforced concrete structures by ndt approach
Study on soundness of reinforced concrete structures by ndt approachStudy on soundness of reinforced concrete structures by ndt approach
Study on soundness of reinforced concrete structures by ndt approach
 
Securing the cloud computing systems with matrix vector and multi-key using l...
Securing the cloud computing systems with matrix vector and multi-key using l...Securing the cloud computing systems with matrix vector and multi-key using l...
Securing the cloud computing systems with matrix vector and multi-key using l...
 
Monitoring wind turbine using wi fi network for reliable communication
Monitoring wind turbine using wi fi network for reliable communicationMonitoring wind turbine using wi fi network for reliable communication
Monitoring wind turbine using wi fi network for reliable communication
 
Optimization of friction stir welding process
Optimization of friction stir welding processOptimization of friction stir welding process
Optimization of friction stir welding process
 
Resource potential appraisal assessment and to
Resource potential appraisal  assessment and toResource potential appraisal  assessment and to
Resource potential appraisal assessment and to
 
An experimental study of square footing resting on geo grid reinforced sand
An experimental study of square footing resting on geo grid reinforced sandAn experimental study of square footing resting on geo grid reinforced sand
An experimental study of square footing resting on geo grid reinforced sand
 
The effect of watercement ratio on the sulfate
The effect of watercement ratio on the sulfateThe effect of watercement ratio on the sulfate
The effect of watercement ratio on the sulfate
 
An overview of plastic card frauds and solutions for
An overview of plastic card frauds and solutions forAn overview of plastic card frauds and solutions for
An overview of plastic card frauds and solutions for
 
A virtual analysis on various techniques using ann with
A virtual analysis on various techniques using ann withA virtual analysis on various techniques using ann with
A virtual analysis on various techniques using ann with
 
Low power and high performance detff using common
Low power and high performance detff using commonLow power and high performance detff using common
Low power and high performance detff using common
 
Determinants of global competitiveness on industrial performance an applicati...
Determinants of global competitiveness on industrial performance an applicati...Determinants of global competitiveness on industrial performance an applicati...
Determinants of global competitiveness on industrial performance an applicati...
 
Dehulling characteristics of oat (ol 9 variety) as affected by grain moisture...
Dehulling characteristics of oat (ol 9 variety) as affected by grain moisture...Dehulling characteristics of oat (ol 9 variety) as affected by grain moisture...
Dehulling characteristics of oat (ol 9 variety) as affected by grain moisture...
 
Location updation for energy efficient geographic routing in
Location updation for energy efficient geographic routing inLocation updation for energy efficient geographic routing in
Location updation for energy efficient geographic routing in
 
Identification of dynamic rigidity for high speed
Identification of dynamic rigidity for high speedIdentification of dynamic rigidity for high speed
Identification of dynamic rigidity for high speed
 
Effect of fly ash on the properties of cement
Effect of fly ash on the properties of cementEffect of fly ash on the properties of cement
Effect of fly ash on the properties of cement
 
Cancer cell segmentation and detection using nc ratio
Cancer cell segmentation and detection using nc ratioCancer cell segmentation and detection using nc ratio
Cancer cell segmentation and detection using nc ratio
 

Similar to Secure file sharing of dynamic audit services in cloud storage

Privacy preserving external auditing for data storage security in cloud
Privacy preserving external auditing for data storage security in cloudPrivacy preserving external auditing for data storage security in cloud
Privacy preserving external auditing for data storage security in cloudeSAT Publishing House
 
Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...
Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...
Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...IIRindia
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...IRJET Journal
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data securityeSAT Publishing House
 
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...IRJET Journal
 
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET Journal
 
An efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environmentAn efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environmenteSAT Journals
 
Periodic Auditing of Data in Cloud Using Random Bits
Periodic Auditing of Data in Cloud Using Random BitsPeriodic Auditing of Data in Cloud Using Random Bits
Periodic Auditing of Data in Cloud Using Random BitsIJTET Journal
 
A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...eSAT Journals
 
IRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud DataIRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud DataIRJET Journal
 
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...IRJET Journal
 
Development of Effective Audit Service to Maintain Integrity of Migrated Data...
Development of Effective Audit Service to Maintain Integrity of Migrated Data...Development of Effective Audit Service to Maintain Integrity of Migrated Data...
Development of Effective Audit Service to Maintain Integrity of Migrated Data...IRJET Journal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET Journal
 
Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudEfficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudIRJET Journal
 

Similar to Secure file sharing of dynamic audit services in cloud storage (20)

Privacy preserving external auditing for data storage security in cloud
Privacy preserving external auditing for data storage security in cloudPrivacy preserving external auditing for data storage security in cloud
Privacy preserving external auditing for data storage security in cloud
 
Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...
Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...
Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...
 
An4201262267
An4201262267An4201262267
An4201262267
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
 
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
 
[IJET-V2I2P9] Authors:Reshma A. Hegde1, Madhura Prakash
[IJET-V2I2P9] Authors:Reshma A. Hegde1, Madhura Prakash[IJET-V2I2P9] Authors:Reshma A. Hegde1, Madhura Prakash
[IJET-V2I2P9] Authors:Reshma A. Hegde1, Madhura Prakash
 
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
 
An efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environmentAn efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environment
 
H1803035056
H1803035056H1803035056
H1803035056
 
Periodic Auditing of Data in Cloud Using Random Bits
Periodic Auditing of Data in Cloud Using Random BitsPeriodic Auditing of Data in Cloud Using Random Bits
Periodic Auditing of Data in Cloud Using Random Bits
 
A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...
 
IRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud DataIRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud Data
 
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
 
Development of Effective Audit Service to Maintain Integrity of Migrated Data...
Development of Effective Audit Service to Maintain Integrity of Migrated Data...Development of Effective Audit Service to Maintain Integrity of Migrated Data...
Development of Effective Audit Service to Maintain Integrity of Migrated Data...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key Exposure
 
Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudEfficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using Cloud
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Recently uploaded

Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 

Recently uploaded (20)

Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 

Secure file sharing of dynamic audit services in cloud storage

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________________ Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 323 SECURE FILE SHARING OF DYNAMIC AUDIT SERVICES IN CLOUD STORAGE N.Vidhya1 , P.Jegathesh2 1 Student M.E (CSE), Oxford Engineering College, Trichy, India 2 Assistant professor (CSE), Oxford Engineering College, Trichy, India Abstract Data integrity and storage efficiency are the two important requirements for cloud storage. Authorized users access the data and share the files in secure manner. The cloud storage service (CSS) relieves the burden for storage management and maintenance. Fragment Structure, random sampling and index table is used to construct the Audit service. These techniques are supported provable updates to cloud outsourced data. The third party auditing allow to save time and computation resources with reduced online burden of the user. Probabilistic query and periodic verification for improving the performance of audit services and also audit system verifies the integrity. Keywords: Cloud Storage Service, Proof of Data Possession, Cloud Service Provider, Third Party Audit, Public Verification Parameter. ----------------------------------------------------------------------***--------------------------------------------------------------------- 1. INTRODUCTION Cloud computing provides computing resources, utilities are provided to the users via internet. Cloud is a model for accessing user data’s, on demand network services to access the secure data. It maintains the shared pool of configurable computing resources. Now a day’s many software industries used the cloud computing services to secure their data’s. It is used to pay per uses and it does not need any software to install the user. Cloud computing services are classified into three parts: IaaS(infrastructure as a service), SaaS(software as a service) and PaaS(platform as a service). First service provides access to computation resources as per user basis. Second service is a simple application; it is delivered to thousands of users from the resource pool. Third service uses the building blocks of the vendor’s deployment environment. If the user need to access the data from shared pool, the administrator verifies the user is authorized person to take the data. Cloud data storage services involves four entities.(i)Administrator controls the user details, file insertion, file access, file deletion and the time of user presents in the network to access the cloud data’s. (ii)Third party auditor checks the correctness of cloud data. Some techniques are used to establish the auditing concepts. (iii) Users access the cloud data as per demand services. Users retrieve more useful information from multiple repositories and no limitation to access the particular storage part in the shared pool. 2. BACKGROUND & RELATED WORKS Cloud-based outsourced storage [1] reduced the client’s burden for storage management and maintenance by providing a comparably low-cost, scalable, location-independent platform. To avoid the security risks, audit services are critical to ensure the integrity and availability of outsourced data and to achieve digital forensics and credibility on cloud computing. Provable data possession (PDP) is a cryptographic technique to verify the integrity of data without retrieving it from unauthorized servers. Probabilistic queries and periodic verification, as well as an optimization method of parameters of cloud audit services are implemented to provide secure access. This technique reduced the workload on the cloud storage servers. The third party auditor (TPA) [2] verifies the integrity of the dynamic data stored in the cloud. The TPA reduces the involvement of the client through the auditing of whether his data stored in the cloud storage. It is an efficient method to secure the user’s data using Third party auditor but it may leak the data to send the linear combinations of data blocks to the auditor. The data may be stored temporarily while being authorization process. Store and forward transactions processed after complete the authorization. POR[5] protocol is designed to protect a static archived file in cloud storage. Critical information stored as storage-as-a- service in encrypted format. It is more flexible and cost effective storage environments. PORs lead to a number of possible researches in the future. The classic merkle hash tree constructed for block tag authentication to achieve secure cloud storage and data dynamics.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________________ Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 324 3. PROPOSED SYSTEM User easily access the secure cloud storage system is constructed with administrator, Third party auditor and cloud servers. Auditing technique verifies the integrity verification of cloud data storage. Administrator controls the user access of unauthorized party. System Architecture Fig 3.1 System architecture of the proposed system 3.1 Module 1: Key Generation The owner generates the public/secret key pair (pk, sk) by system manager. The secret key is not visible and then sends the public key (pk) to TPA. Data owner provides the access to authorized users and shares the public key. 3.2 Module 2: Tag Generation The user’s/clients use the secret key (sk) to pre-process a file in cloud storage. It consists of a collection of n blocks, generates a set of public verification parameters and index- hash table. User data’s are stored in TPA (Third party auditor) and transmits the file with some verification tags to CSP (Cloud service provider). Fig 3.2 Tag generation 3.3 Module 3: Periodic Sampling Audit: TPA (Third party auditor) challenges to audit the integrity and availability of outsourced data stored in TPA. Audit process detects some errors in secure storage of unauthorized modification. It consists of two concepts: Verification and Authorization. Administrator collects all the user details within the cloud server. Verification process is constructed with interactive proof protocol of cloud storage. Fig 3.3 Periodic Sampling Audit Flow 3.4 Module 4: Audit for Dynamic Operations: Authorized application holds the secret key (sk) and it can manipulate the index hash table stored in TPA. TPA cannot cheat the authorized application and audit records. User inserts the files in cloud storage with authorized permission from administrator. Dynamic Data Operations: Insert operation: User inserts the file in cloud storage. The file is stored in Encrypted data format. Audit process audits the file in secure techniques. Update operation: It is an algorithm of Authorized applications update the block of a file. It updates the data’s only trusted parties. Delete operation: After verify the user is authorized the TPA gives the permission to delete the file in cloud storage. Insert (sk, Xi, mi) is an algorithm run by AA to insert the block of a file mi at the index i by using sk, and it returns a new verification metadata. Fig 3.4 Flow of dynamic data operation Checking algorithm tests the audit process is controlled by Administrator. The User data application invokes the Update, Delete, and Insert algorithms, and then sends to TPA and CSP, respectively. It is important to ensure the audit process of
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________________ Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 325 TPA. Finally, Admin gives the permission to modify audit records after the confirmation message from CSP is received. 4. CONCLUSIONS Cloud Storage requirements of data integrity and storage efficiency proposed based on these auditing techniques. Audit service constructed based on secure technique of PDP and verification process achieved. Comparing other techniques to construct the audit search is less than this technique. It increased the data integrity of the cloud storage and avoids the hackers to access the storage process. File insertion, File updating, File deletion is possibly used to authorized users. Cloud service provider offered an audit service to audit the integrity and availability of Secure Storage Pool. REFERENCES [1]. Yan Zhua,b, Hongxin Huc, Gail-Joon Ahnc, Stephen S. Yauc ,“Efficient Audit Service Outsourcing For Data Integrity In Clouds”,In The Journal of Systems and Software 85 (2012) . [2]. Wang.Q, C. Wang, K. Ren, W. Lou, and J. Li, “Enabling Public Audit Ability And Data Dynamics For Storage Security In Cloud Computing”, In IEEE Trans. Parallel Distributed Systems, vol. 22, no. 5, pp. 847-859, May 2011. [3]. Cong Wang, Student Member, IEEE, Sherman S.M. Chow, Qian Wang, Student Member, IEEE, Kui Ren, Member, IEEE, and Wenjing Lou, Member, IEEE, “Privacy- Preserving Public Auditing For Secure Cloud Storage”. [4]. Abhishek Mohta* ,Ravi Kant Sahu,Lalit Kumar Awasthi ,Dept. of CSE, NIT Hamirpur (H.P.) India,“Robust Data Security For Cloud While Using Third Partyauditor” [5]. Juels.A and J. Burton, S. Kaliski, “Pors: Proofs Of Retrievability For Large Files”,In Proc. ACM Conf. Computer and Comm. Security (CCS’07), pp. 584-597, Oct. 2007. [6]. Ateniese.G, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z.Peterson, and D. Song, “Provable Data Possession At Untrusted Stores” ,In Proc. 14th ACM Conf. Computer and Comm. Security (CCS’07), pp. 598-609, 2007. [7]. Govinda.K, V.Gurunathaprasad, H.Sathishkumar,”Third Party Auditing For Secure Data Storage In Cloud Through Digital Signature Using RSA”, In International Journal Of Advanced Scientific And Technical Research(Issue 2, Volume 4- August 2012) Issn 2249-9954. [8]. Ezhil Arasu.S, B.Gowri, S.Ananthi ,”Privacy-Preserving Public Auditing In Cloud Using HMAC Algorithm “,In International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-2, Issue-1, March 2013 . [9]. Shingare Vidya Marshal ,”Secure Audit Service by Using TPA for Data Integrity in Cloud System”,In International Journal of Innovative Technology and Exploring Engineering (IJITEE)ISSN: 2278-3075, Volume-3, Issue-4, September 2013. [10]. Jiawei Yuan,Shucheng Yu “Secure and Constant Cost Public Cloud Storage Auditing with Deduplication”, University of Arkansas at Little Rock, USA. [11]. Jiawei Yuan, Shucheng Yu,“Proofs of Retrievability with Public Verifiability and Constant Communication Cost in Cloud”,University of Arkansas at Little Rock ,USA. [12]. Jeyadevan.S, Dr.S.Basavaraj Patil, S.Saravanan, Naina Kumari, “Introducing Various Algorithms To Make The Data-Storage In Clouds Secure”,In International Conference on Computing and Control Engineering (ICCCE 2012), 12 & 13 April, 2012. [13]. Vijeyta Devi & Vadlamani Nagalakshmi,”A Prospective Approach On Security With RSA Algorithm And Cloud SQL In Cloud Computing”, In International Journal Of Computer Science And Engineering (Ijcse) Issn 2278-9960 Vol. 2, Issue 2, May. [14]. Vidhisha.S, C.Surekha, S.Sanjeeva Rayudu, U.Seshadri,” Preserving privacy for secure and outsourcing for Linear Programming in cloud computing”, Jawaharlal Nehru Technological University Ananatapur. [15]. V.Venkatesh, P.Parthasarathi,” Enhanced audit services for the correctness of outsourced data in cloud storage “,In International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2. [16]. Wang, Qian Wang, Kui Ren, Ning Cao, And Wenjing Lou, “Toward Secure And Dependable Storage Services In Cloud Computing”,In IEEE Transactions On Services Computing, Vol. 5, No. 2, April-June 2012. [17]. Q. Wang, K. Ren, W. Lou, and Y. Zhang, “Dependable and secure sensor data storage with dynamic integrity assurance,” in Proc. Of IEEE INFOCOM’09, Rio de Janeiro, Brazil, April 2009, pp. 954–962 [18]. K. D. Bowers, A. Juels, and A. Oprea, “Hail: A high- availability and integrity layer for cloud storage,” in Proc. of CCS’09. Chicago, IL, USA: ACM, 2009, pp. 187–198.