SlideShare a Scribd company logo
1 of 5
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6956
REDSC: RELIABLITY OF DATA SHARING IN CLOUD
ADITYA SHITOLE1, OMKAR DHAPTE2, EMAAD PERZADE3 ,SUSMITA GAIKWAD4
ASMITA PATIL5
1 Student, Dept of Computer Engineering, A.I.S.S.M.S. Polytechnic Pune, Maharashtra, India
2 Student, Dept of Computer Engineering, A.I.S.S.M.S. Polytechnic Pune, Maharashtra, India
3 Student, Dept of Computer Engineering, A.I.S.S.M.S. Polytechnic Pune, Maharashtra, India
4 Student, Dept of Computer Engineering, A.I.S.S.M.S. Polytechnic Pune, Maharashtra, India
5Professor, Dept of Computer Engineering, A.I.S.S.M.S. Polytechnic Pune, Maharashtra, India
------------------------------------------------------------------***---------------------------------------------------------------------
Abstract: Cloud storage auditing schemes for shared
data refer to checkingtheintegrityofclouddatashared
by a group of users. Remote data integrity checking
enables a data storage server, says a cloud server, to
prove to a verifier that it is actually storing a data
owner’s data honestly. To date, a number of Remote
data integrity checking protocols have been proposed
in the literature, but most of the constructions suffer
from the issue of a complex key management, that is,
they rely on the expensive public key infrastructure
which might hinder the deployment of Remote data
integritycheckinginpractice.Inthispaper,wepropose
a new construction of identity-based (ID-based)
Remote data integritycheckingprotocolbymakinguse
ofkey-homomorphiccryptographicprimitivetoreduce
the system complexityandthecostforestablishingand
managing the public key authentication framework in
public key infrastructure based Remote data integrity
checking schemes.WeformalizeID-basedRemotedata
integrity checking and its security model including
security against a malicious cloud server and zero
knowledge privacy against a third party verifier. The
proposed ID-based Remote data integrity checking
protocol leaks no information of the stored data to the
verifier during the Remote data integrity checking
process. The newconstructionisprovensecureagainst
the malicious server in the generic group model and
achieves zero knowledge privacy against a verifier.
Extensivesecurityanalysisandimplementationresults
demonstrate that the proposed protocol is provably
secure and practical in the real-world applications.We
Extend this work with Group Management with
Forward Secrecy & Backward Secrecy by Time
Duration & Recovery of File when Data Integrity
Checking Fault Occur
Key Words: cloud data, security, group data security.
1.INTRODUCTION:
In cloud storage auditing schemes, the data owner needs to
use his/her private key to generate authenticators
(signatures) for file blocks. These authenticators are used to
prove that the cloud truly possessesthesefileblocks.Whena
user is revoked, the user’s private key should also be
revoked. For traditional cloud storage auditing schemes for
share data, all of authenticators generated by the revoked
user should be transformed into the authenticators of one
designated non-revokedgroupuser.Cloudcomputing,which
has received considerable attention from research
communities in academia as well as industry,isa distributed
computation model over a large pool of shared-virtualized
computing resources, such as storage, processing power,
applications and services. Cloud users are provisioned and
release recourses as they want in cloud computing
environment. This kind of new computation model
represents a new vision of providing computing services as
public utilities like water and electricity. Cloud computing
brings a number of benefits for cloud users. This non-
revoked group user needs to download all of revoked user’s
blocks, re-sign these blocks, and upload new
to the cloud. Obviously, it costs huge amount of computation
resource and communication resource due to the large size
of shared data in the cloud. In order to solve this problem,
recently, some auditing schemes for shared data with user
revocation have been proposed.
2. EXISTING SYSTEM:
At present all the documents are stored using some
credentials that users have to remember.Sotheyarelikeany
unique number or any password but these all hackable. As
existing system is not much user friendly that every existing
human being individual can use it. If any user needs any
documents or any identity proof the user has to carry some
copy if the same so sometimes it is not possible.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6957
3. PROPOSED SYSTEM:
It is highly secured of the data as it uses a cloud storage with
AES Alogrithm. Cloud is for the data owner to encrypt his
data before storing into the Cloud, and hence the data
remain information-theoretically secure against the Cloud
provider and other malicious users. When the data owner
wants to share his data to a group, he sends the key used for
data encryption to each member of the group. Any member
of the group can then get the encrypted data from the Cloud
and decrypt the data using the key and hence does not
require the intervention of the data owner.
4. APPLICATIONS:
Bank application
Social Web Application.
5. SYSTEM REQUIREMENTS:
5.1. HARDWARE REQUIREMENTS:
System Processors : Core2 Duo
Speed : 2.4 GHz
Hard Disk : 150 GB
5.2. SOFTWARE REQUIREMENTS:
Operating system : 64bit Windows7
and on words
Coding Language : Java J2EE
IDE : Eclipse kepler
Database : MYSQL
6. Modules:
6.1. DATA GROUP SHARING:
Server can utilize this total trapdoor and some public
information to perform keyword search and give back the
outcome to Bob. In this way, in KASE, the assignment of
keyword search right can be accomplished by sharing the
single total key. We take note of that the assignment of
decryption rights can be accomplishedutilizingthekey-total
encryption approach as of late proposed in , however it
remains an open issue to appoint the keyword search rights
together with the decryption rights, which is the subject
point of this paper. To outline, the issue of developing a
KASE .
6.2. PUBLIC INTEGRITY AUDITING:
public integrity auditing for shared dynamic data to
gathering client denial. Our contributions are three folds:1)
We investigate on the protected and proficient shared data
coordinate examining for multi-client operation for
ciphertext database.2) By consolidating the primitives of
victor responsibility, hilter kilter gathering key assention
and gathering mark, we propose a proficient data examining
plan while in the meantime giving some new elements, for
example, traceability and countability. 3) We give the
security and productivity examination of our plan, and the
investigation results demonstratethatourplanissecureand
effective.
6.3. CLOUD STORAGE MODEL:
Cloud storage is a model of data stockpiling where the
computerized datais put away in consistent pools, the
physical stockpiling compasses numerous servers (and
regularly areas), and the physical environment is ordinarily
possessed and oversaw by a facilitating organization. These
cloud storage suppliers are in charge of keeping the data
accessible and available, and the physical environment
secured and running. Individuals and associations purchase
or rent stockpiling limit from the suppliers to store client,
association, or application data.Cloud stockpiling services
may be gotten to through a co-found cloud PC benefit, a web
application programming interface (API) or by applications
that use the API, for example, cloud desktop stockpiling, a
cloud storage gateway or Web-based substance
administration frameworks.whyshouldapprovedgetto and
alter the data by the data owner. The cloud storage server is
semi-trusted, who gives data stockpiling services to the
gathering clients. TPA could be any substance in the cloud,
which will have the capacity to direct the data honestyofthe
mutual information put away in the cloud server. In our
framework, the data owner could encrypt and transfer its
data to the remote cloud storage server. Likewise, he/she
shares the benefit, for example, get to and change
(accumulate and execute if fundamental) to various group
clients.
6.4. REVOKED GROUP USER:
The group signature will keep the conspiracy of cloud and
denied bunch clients, where the data owner will partake in
the client repudiation stage and the cloud couldn't renounce
the data that last altered by the disavowed user.An assailant
outside the gathering (incorporate the repudiated bunch
client distributed storage server) may get some learning of
the plaintext of the data. Really, this sort of aggressor needs
to at lease break the security of the received gathering data
encryption plan. The cloud storageserverconspireswiththe
disavowed bunch clients, and they need to give an illicitdata
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6958
without being distinguished. Really, in cloud environment,
we expect that the cloud storage server is semi-trusted. In
this way, it is sensible that a disavowed client will conspire
with the cloud server and share its secret group key to the
cloud storage server. For this situation, in spite of the fact
that the server intermediary bunch client repudiation way
[24] brings much correspondence and calculation expense
sparing, it will make the plan unstable against a pernicious
cloud storage server who can getthesecretkeyofrenounced
clients amid the client disavowal stage. Accordingly, a
malignant cloud server will have the capacity to make data
m, last altered by a client that should have been be
disavowed, into a malevolent data m′. In the client
renouncement handle, the cloud could make the malicious
data m′ get to be legitimate.
6.5. GROUP SIGNAGTURE:
Group signature is presented by Chaum and Heyst It gives
namelessness to signers, where every gathering part has a
private key that empowers the client to sign messages. Be
that as it may, the subsequent sign keeps thecharacterofthe
signer secret. More often than not, there is an outsider that
can lead the sign namelessness utilizinga uniquetrapdoor.A
few frameworks bolster denial where bunch enrollmentcan
be handicapped without influencing the signing capacity of
unrevoked clients. Boneh and Shacham proposed a
productive gathering signature with verifier-neighborhood
denial. The plan gives the properties of gathering sign, for
example, caring namelessness and traceability.Likewise,the
plan is a short sign plan where client disavowal justrequires
sending repudiation information to signature verifiers.
Libert et al. proposed another versatile denial technique for
gathering sign taking into account the show encryption
system. On the other hand, the plan presents vital capacity
overhead at gathering client side. Later, Libert et al. outlined
a plan to update the previous plan which could acquire
private key of consistent size. In their plan, the unrevoked
individuals still don't have to overhaul their keys at every
repudiation.
ALGORITHMS:
VC.KeyGen( , q).
Given the security parameter k and the size q of the
committed vector (with q = poly(k) ), the key generation
outputs some public parameters pp.
VC. (m1, ...,mq).
On input a sequence of q messages m1, ...,mq∈ M (M is the
message space) and the public parameters pp, the
committing algorithm outputs a commitmentstringCand an
auxiliary information aux.
VC. (m, i, aux).
This algorithm is run by the committer to produce a proof i
that m is the i-th
committed message. In particular, notice that in the case
when some updates have occurred the auxiliaryinformation
aux can include the update information produced by these
updates.
VC. (C,m, i,_A).
The verification algorithm accepts (i.e., it outputs 1) only if
Ai is a valid proof that C was created to a sequence m1, ...,mq
such that m = mi.
VC. (C,m,m′, i).
This algorithm is run by the committer who produces C and
wants to update it by changing the i-th message to m′. The
algorithm takes as input the old message m, the new
message m′ and the position i. It outputs a new commitment
C’ together with an update information U.
VC.Proof (C,_j,m′, i,U).
This algorithm can be run by any user who holds a proof Aj
for some message at position j w.r.t. C, and it allows the user
to compute an updated proof A′j (and the updated
commitment C′) such that A′j will be valid with regard to C′
which contains m′ as the new message at position i.
Basically, the value U contains the updateinformationwhich
is needed to compute such values.
7. DATA DESCRIPTION:
Describing and documenting data is essential in ensuring
that the researcher,and otherswhomayneedtousethedata,
can make sense of the data and understand the processes
that have been followed in the collection, processing, and
analysis of the data.
Research data are any physical and/or digital materials that
are collected, observed, or created in research activity for
purposes of analysis to produce original research results or
creative works.
8. DATA OBJECTS AND RELATIONSHIPS
A data object is a part of the repository whosecontentcanbe
addressed and interpreted by the program. All data objects
must be declared in the ABAP program and are not
persistent, meaning that they only existwhiletheprogramis
being executed. Before you canprocesspersistentdata (such
as data from a database table or from a sequential file), you
must read it into data objects first. Conversely, ifyouwant to
retain the contents of a data object beyond the end of the
program, you must save it in a persistent form.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6959
9. ARCHITECTURAL DESIGN:
10. FUTURE SCOPE:
A novel privacy-preserving mechanism that supportspublic
auditing on shared data stored in the cloud. In particular,we
exploit ring signatures to compute verification metadata
needed to audit the correctness of shared data. With our
mechanism, the identity of thesigneroneachblock inshared
data is kept private from public verifiers, who are able to
efficiently verify shared data integritywithoutretrievingthe
entire file.
11. MAJAOR CONSTRAIN:
We are building Web base application so user requires IDE
for accessing functionalities of developed services. So you
can use any device which has web browser.
System will be built on java platform, so it needs around500
Mega-Byte of space.
The database which is being used for this application is H-
Base. As it is a re-mote application, a number of users can
access it simultaneously.
To send/receive packets, Internetconnectioneitherthrough
GPRS(Service provider) or WLAN.
12. CONCLUSION:
In this, we investigated a new primitivecalledidentity-based
remote data integrity checking for secure cloud storage. We
formalized the securitymodel oftwoimportantpropertiesof
this primitive, namely, soundness and perfect data privacy.
We provided a new construction of this primitive and
showed that it achieves soundness and perfect data privacy.
Both the numerical analysis and the implementation
demonstrated that the proposed protocol is efficient and
practical. Extend this work with Group Management with
Forward Secrecy & Backward Secrecy by Time Duration &
Recovery of File when Data Integrity Checking Fault Occur.
REFERENCES
[1 P. Mell, T. Grance, Draft NIST working definition of cloud
computing, Reference on June. 3rd, 2009.
http://csrc.nist.gov/groups/SNC/cloudcomputing/index.ht
m.
[2] Cloud Security Alliance. Top threats to cloud computing.
http://www.cloudsecurityalliance.org, 2010.
[3] M. Blum, W. Evans, P.Gemmell, S. Kannan, M. Naor,
Checking the correctness of memories. Proc. of the 32nd
Anual Symposium on FoundationsfoVomputers,SFCS1991,
pp. 90–99, 1991.
[4] G. Ateniese, R. C. Burns, R. Curtmola,J.Herring,L.Kissner,
Z. N.J. Peterson, D. X. Song, Provable data possession at
untrusted stores. ACM Conference on Computer and
communications Security, 598-609,2007.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6960
BIOGRAPHIES
ADITYA SHITOLE
Student, Dept of Computer
Engineering, A.I.S.S.M.S.
Polytechnic Pune, Maharashtra,
India
OMKAR DHAPTE
Student, Dept of Computer
Engineering, A.I.S.S.M.S.
Polytechnic Pune, Maharashtra,
India
EMAAD PERZADE
Student, Dept of Computer
Engineering, A.I.S.S.M.S.
Polytechnic Pune, Maharashtra,
India
SUSMITA GAIKWAD
Student, Dept of Computer
Engineering, A.I.S.S.M.S.
Polytechnic Pune, Maharashtra,
India

More Related Content

What's hot

Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data securityeSAT Publishing House
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
 
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud StorageA Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud StorageIRJET Journal
 
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...IRJET Journal
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudIJERA Editor
 
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud StorageA Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storageijtsrd
 
Towards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the DataTowards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the DataIRJET Journal
 
An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...IJECEIAES
 
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET Journal
 
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET Journal
 
Dynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudDynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudAM Publications
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudeSAT Journals
 
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudeSAT Publishing House
 
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageBio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageIJERA Editor
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationEditor IJMTER
 
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...IRJET Journal
 
Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Editor IJARCET
 

What's hot (19)

Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud StorageA Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
 
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
 
Oruta project report
Oruta project reportOruta project report
Oruta project report
 
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud StorageA Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
 
Towards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the DataTowards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the Data
 
An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...
 
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
 
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
 
Dynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudDynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for Cloud
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloud
 
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloud
 
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageBio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
 
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
 
Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409
 

Similar to Reliability of Data Sharing in Cloud

IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET Journal
 
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET- Security Enhance using Hash and Chaostic Algorithm in CloudIRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET- Security Enhance using Hash and Chaostic Algorithm in CloudIRJET Journal
 
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET- Security Enhance using Hash and Chaostic Algorithm in CloudIRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET- Security Enhance using Hash and Chaostic Algorithm in CloudIRJET Journal
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET Journal
 
IRJET- Multi-Owner Keyword Search over Cloud with Cryptography
IRJET- Multi-Owner Keyword Search over Cloud with CryptographyIRJET- Multi-Owner Keyword Search over Cloud with Cryptography
IRJET- Multi-Owner Keyword Search over Cloud with CryptographyIRJET Journal
 
IRJET- An Efficient Data Replication in Salesforce Cloud Environment
IRJET-  	  An Efficient Data Replication in Salesforce Cloud EnvironmentIRJET-  	  An Efficient Data Replication in Salesforce Cloud Environment
IRJET- An Efficient Data Replication in Salesforce Cloud EnvironmentIRJET Journal
 
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on CloudIRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on CloudIRJET Journal
 
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET -  	  Reliable and Efficient Revocation and Data Sharing using Identity...IRJET -  	  Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...IRJET Journal
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEditor IJMTER
 
public truthfulness assessment for shared active cloud data storage with grou...
public truthfulness assessment for shared active cloud data storage with grou...public truthfulness assessment for shared active cloud data storage with grou...
public truthfulness assessment for shared active cloud data storage with grou...Ijripublishers Ijri
 
IRJET- Fast Phrase Search for Encrypted Cloud Storage
IRJET- Fast Phrase Search for Encrypted Cloud StorageIRJET- Fast Phrase Search for Encrypted Cloud Storage
IRJET- Fast Phrase Search for Encrypted Cloud StorageIRJET Journal
 
Excellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingExcellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingEditor IJMTER
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...IRJET Journal
 
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET Journal
 
IRJET- Enhancing Information Leakage in Multi Cloud Storage Facilities
IRJET-  	  Enhancing Information Leakage in Multi Cloud Storage FacilitiesIRJET-  	  Enhancing Information Leakage in Multi Cloud Storage Facilities
IRJET- Enhancing Information Leakage in Multi Cloud Storage FacilitiesIRJET Journal
 
Flaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple cloudsFlaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple cloudsIRJET Journal
 
Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...
Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...
Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...IIRindia
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET Journal
 
Measurable, safe and secure data management for sensitive users in cloud comp...
Measurable, safe and secure data management for sensitive users in cloud comp...Measurable, safe and secure data management for sensitive users in cloud comp...
Measurable, safe and secure data management for sensitive users in cloud comp...eSAT Publishing House
 
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
Anti Collusion Data Sharing Schema for Centralized Group in CloudAnti Collusion Data Sharing Schema for Centralized Group in Cloud
Anti Collusion Data Sharing Schema for Centralized Group in CloudIRJET Journal
 

Similar to Reliability of Data Sharing in Cloud (20)

IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
 
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET- Security Enhance using Hash and Chaostic Algorithm in CloudIRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
 
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET- Security Enhance using Hash and Chaostic Algorithm in CloudIRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
 
IRJET- Multi-Owner Keyword Search over Cloud with Cryptography
IRJET- Multi-Owner Keyword Search over Cloud with CryptographyIRJET- Multi-Owner Keyword Search over Cloud with Cryptography
IRJET- Multi-Owner Keyword Search over Cloud with Cryptography
 
IRJET- An Efficient Data Replication in Salesforce Cloud Environment
IRJET-  	  An Efficient Data Replication in Salesforce Cloud EnvironmentIRJET-  	  An Efficient Data Replication in Salesforce Cloud Environment
IRJET- An Efficient Data Replication in Salesforce Cloud Environment
 
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on CloudIRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on Cloud
 
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET -  	  Reliable and Efficient Revocation and Data Sharing using Identity...IRJET -  	  Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
 
public truthfulness assessment for shared active cloud data storage with grou...
public truthfulness assessment for shared active cloud data storage with grou...public truthfulness assessment for shared active cloud data storage with grou...
public truthfulness assessment for shared active cloud data storage with grou...
 
IRJET- Fast Phrase Search for Encrypted Cloud Storage
IRJET- Fast Phrase Search for Encrypted Cloud StorageIRJET- Fast Phrase Search for Encrypted Cloud Storage
IRJET- Fast Phrase Search for Encrypted Cloud Storage
 
Excellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingExcellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computing
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
 
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing Features
 
IRJET- Enhancing Information Leakage in Multi Cloud Storage Facilities
IRJET-  	  Enhancing Information Leakage in Multi Cloud Storage FacilitiesIRJET-  	  Enhancing Information Leakage in Multi Cloud Storage Facilities
IRJET- Enhancing Information Leakage in Multi Cloud Storage Facilities
 
Flaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple cloudsFlaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple clouds
 
Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...
Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...
Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
 
Measurable, safe and secure data management for sensitive users in cloud comp...
Measurable, safe and secure data management for sensitive users in cloud comp...Measurable, safe and secure data management for sensitive users in cloud comp...
Measurable, safe and secure data management for sensitive users in cloud comp...
 
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
Anti Collusion Data Sharing Schema for Centralized Group in CloudAnti Collusion Data Sharing Schema for Centralized Group in Cloud
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 

Recently uploaded (20)

Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 

Reliability of Data Sharing in Cloud

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6956 REDSC: RELIABLITY OF DATA SHARING IN CLOUD ADITYA SHITOLE1, OMKAR DHAPTE2, EMAAD PERZADE3 ,SUSMITA GAIKWAD4 ASMITA PATIL5 1 Student, Dept of Computer Engineering, A.I.S.S.M.S. Polytechnic Pune, Maharashtra, India 2 Student, Dept of Computer Engineering, A.I.S.S.M.S. Polytechnic Pune, Maharashtra, India 3 Student, Dept of Computer Engineering, A.I.S.S.M.S. Polytechnic Pune, Maharashtra, India 4 Student, Dept of Computer Engineering, A.I.S.S.M.S. Polytechnic Pune, Maharashtra, India 5Professor, Dept of Computer Engineering, A.I.S.S.M.S. Polytechnic Pune, Maharashtra, India ------------------------------------------------------------------***--------------------------------------------------------------------- Abstract: Cloud storage auditing schemes for shared data refer to checkingtheintegrityofclouddatashared by a group of users. Remote data integrity checking enables a data storage server, says a cloud server, to prove to a verifier that it is actually storing a data owner’s data honestly. To date, a number of Remote data integrity checking protocols have been proposed in the literature, but most of the constructions suffer from the issue of a complex key management, that is, they rely on the expensive public key infrastructure which might hinder the deployment of Remote data integritycheckinginpractice.Inthispaper,wepropose a new construction of identity-based (ID-based) Remote data integritycheckingprotocolbymakinguse ofkey-homomorphiccryptographicprimitivetoreduce the system complexityandthecostforestablishingand managing the public key authentication framework in public key infrastructure based Remote data integrity checking schemes.WeformalizeID-basedRemotedata integrity checking and its security model including security against a malicious cloud server and zero knowledge privacy against a third party verifier. The proposed ID-based Remote data integrity checking protocol leaks no information of the stored data to the verifier during the Remote data integrity checking process. The newconstructionisprovensecureagainst the malicious server in the generic group model and achieves zero knowledge privacy against a verifier. Extensivesecurityanalysisandimplementationresults demonstrate that the proposed protocol is provably secure and practical in the real-world applications.We Extend this work with Group Management with Forward Secrecy & Backward Secrecy by Time Duration & Recovery of File when Data Integrity Checking Fault Occur Key Words: cloud data, security, group data security. 1.INTRODUCTION: In cloud storage auditing schemes, the data owner needs to use his/her private key to generate authenticators (signatures) for file blocks. These authenticators are used to prove that the cloud truly possessesthesefileblocks.Whena user is revoked, the user’s private key should also be revoked. For traditional cloud storage auditing schemes for share data, all of authenticators generated by the revoked user should be transformed into the authenticators of one designated non-revokedgroupuser.Cloudcomputing,which has received considerable attention from research communities in academia as well as industry,isa distributed computation model over a large pool of shared-virtualized computing resources, such as storage, processing power, applications and services. Cloud users are provisioned and release recourses as they want in cloud computing environment. This kind of new computation model represents a new vision of providing computing services as public utilities like water and electricity. Cloud computing brings a number of benefits for cloud users. This non- revoked group user needs to download all of revoked user’s blocks, re-sign these blocks, and upload new to the cloud. Obviously, it costs huge amount of computation resource and communication resource due to the large size of shared data in the cloud. In order to solve this problem, recently, some auditing schemes for shared data with user revocation have been proposed. 2. EXISTING SYSTEM: At present all the documents are stored using some credentials that users have to remember.Sotheyarelikeany unique number or any password but these all hackable. As existing system is not much user friendly that every existing human being individual can use it. If any user needs any documents or any identity proof the user has to carry some copy if the same so sometimes it is not possible.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6957 3. PROPOSED SYSTEM: It is highly secured of the data as it uses a cloud storage with AES Alogrithm. Cloud is for the data owner to encrypt his data before storing into the Cloud, and hence the data remain information-theoretically secure against the Cloud provider and other malicious users. When the data owner wants to share his data to a group, he sends the key used for data encryption to each member of the group. Any member of the group can then get the encrypted data from the Cloud and decrypt the data using the key and hence does not require the intervention of the data owner. 4. APPLICATIONS: Bank application Social Web Application. 5. SYSTEM REQUIREMENTS: 5.1. HARDWARE REQUIREMENTS: System Processors : Core2 Duo Speed : 2.4 GHz Hard Disk : 150 GB 5.2. SOFTWARE REQUIREMENTS: Operating system : 64bit Windows7 and on words Coding Language : Java J2EE IDE : Eclipse kepler Database : MYSQL 6. Modules: 6.1. DATA GROUP SHARING: Server can utilize this total trapdoor and some public information to perform keyword search and give back the outcome to Bob. In this way, in KASE, the assignment of keyword search right can be accomplished by sharing the single total key. We take note of that the assignment of decryption rights can be accomplishedutilizingthekey-total encryption approach as of late proposed in , however it remains an open issue to appoint the keyword search rights together with the decryption rights, which is the subject point of this paper. To outline, the issue of developing a KASE . 6.2. PUBLIC INTEGRITY AUDITING: public integrity auditing for shared dynamic data to gathering client denial. Our contributions are three folds:1) We investigate on the protected and proficient shared data coordinate examining for multi-client operation for ciphertext database.2) By consolidating the primitives of victor responsibility, hilter kilter gathering key assention and gathering mark, we propose a proficient data examining plan while in the meantime giving some new elements, for example, traceability and countability. 3) We give the security and productivity examination of our plan, and the investigation results demonstratethatourplanissecureand effective. 6.3. CLOUD STORAGE MODEL: Cloud storage is a model of data stockpiling where the computerized datais put away in consistent pools, the physical stockpiling compasses numerous servers (and regularly areas), and the physical environment is ordinarily possessed and oversaw by a facilitating organization. These cloud storage suppliers are in charge of keeping the data accessible and available, and the physical environment secured and running. Individuals and associations purchase or rent stockpiling limit from the suppliers to store client, association, or application data.Cloud stockpiling services may be gotten to through a co-found cloud PC benefit, a web application programming interface (API) or by applications that use the API, for example, cloud desktop stockpiling, a cloud storage gateway or Web-based substance administration frameworks.whyshouldapprovedgetto and alter the data by the data owner. The cloud storage server is semi-trusted, who gives data stockpiling services to the gathering clients. TPA could be any substance in the cloud, which will have the capacity to direct the data honestyofthe mutual information put away in the cloud server. In our framework, the data owner could encrypt and transfer its data to the remote cloud storage server. Likewise, he/she shares the benefit, for example, get to and change (accumulate and execute if fundamental) to various group clients. 6.4. REVOKED GROUP USER: The group signature will keep the conspiracy of cloud and denied bunch clients, where the data owner will partake in the client repudiation stage and the cloud couldn't renounce the data that last altered by the disavowed user.An assailant outside the gathering (incorporate the repudiated bunch client distributed storage server) may get some learning of the plaintext of the data. Really, this sort of aggressor needs to at lease break the security of the received gathering data encryption plan. The cloud storageserverconspireswiththe disavowed bunch clients, and they need to give an illicitdata
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6958 without being distinguished. Really, in cloud environment, we expect that the cloud storage server is semi-trusted. In this way, it is sensible that a disavowed client will conspire with the cloud server and share its secret group key to the cloud storage server. For this situation, in spite of the fact that the server intermediary bunch client repudiation way [24] brings much correspondence and calculation expense sparing, it will make the plan unstable against a pernicious cloud storage server who can getthesecretkeyofrenounced clients amid the client disavowal stage. Accordingly, a malignant cloud server will have the capacity to make data m, last altered by a client that should have been be disavowed, into a malevolent data m′. In the client renouncement handle, the cloud could make the malicious data m′ get to be legitimate. 6.5. GROUP SIGNAGTURE: Group signature is presented by Chaum and Heyst It gives namelessness to signers, where every gathering part has a private key that empowers the client to sign messages. Be that as it may, the subsequent sign keeps thecharacterofthe signer secret. More often than not, there is an outsider that can lead the sign namelessness utilizinga uniquetrapdoor.A few frameworks bolster denial where bunch enrollmentcan be handicapped without influencing the signing capacity of unrevoked clients. Boneh and Shacham proposed a productive gathering signature with verifier-neighborhood denial. The plan gives the properties of gathering sign, for example, caring namelessness and traceability.Likewise,the plan is a short sign plan where client disavowal justrequires sending repudiation information to signature verifiers. Libert et al. proposed another versatile denial technique for gathering sign taking into account the show encryption system. On the other hand, the plan presents vital capacity overhead at gathering client side. Later, Libert et al. outlined a plan to update the previous plan which could acquire private key of consistent size. In their plan, the unrevoked individuals still don't have to overhaul their keys at every repudiation. ALGORITHMS: VC.KeyGen( , q). Given the security parameter k and the size q of the committed vector (with q = poly(k) ), the key generation outputs some public parameters pp. VC. (m1, ...,mq). On input a sequence of q messages m1, ...,mq∈ M (M is the message space) and the public parameters pp, the committing algorithm outputs a commitmentstringCand an auxiliary information aux. VC. (m, i, aux). This algorithm is run by the committer to produce a proof i that m is the i-th committed message. In particular, notice that in the case when some updates have occurred the auxiliaryinformation aux can include the update information produced by these updates. VC. (C,m, i,_A). The verification algorithm accepts (i.e., it outputs 1) only if Ai is a valid proof that C was created to a sequence m1, ...,mq such that m = mi. VC. (C,m,m′, i). This algorithm is run by the committer who produces C and wants to update it by changing the i-th message to m′. The algorithm takes as input the old message m, the new message m′ and the position i. It outputs a new commitment C’ together with an update information U. VC.Proof (C,_j,m′, i,U). This algorithm can be run by any user who holds a proof Aj for some message at position j w.r.t. C, and it allows the user to compute an updated proof A′j (and the updated commitment C′) such that A′j will be valid with regard to C′ which contains m′ as the new message at position i. Basically, the value U contains the updateinformationwhich is needed to compute such values. 7. DATA DESCRIPTION: Describing and documenting data is essential in ensuring that the researcher,and otherswhomayneedtousethedata, can make sense of the data and understand the processes that have been followed in the collection, processing, and analysis of the data. Research data are any physical and/or digital materials that are collected, observed, or created in research activity for purposes of analysis to produce original research results or creative works. 8. DATA OBJECTS AND RELATIONSHIPS A data object is a part of the repository whosecontentcanbe addressed and interpreted by the program. All data objects must be declared in the ABAP program and are not persistent, meaning that they only existwhiletheprogramis being executed. Before you canprocesspersistentdata (such as data from a database table or from a sequential file), you must read it into data objects first. Conversely, ifyouwant to retain the contents of a data object beyond the end of the program, you must save it in a persistent form.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6959 9. ARCHITECTURAL DESIGN: 10. FUTURE SCOPE: A novel privacy-preserving mechanism that supportspublic auditing on shared data stored in the cloud. In particular,we exploit ring signatures to compute verification metadata needed to audit the correctness of shared data. With our mechanism, the identity of thesigneroneachblock inshared data is kept private from public verifiers, who are able to efficiently verify shared data integritywithoutretrievingthe entire file. 11. MAJAOR CONSTRAIN: We are building Web base application so user requires IDE for accessing functionalities of developed services. So you can use any device which has web browser. System will be built on java platform, so it needs around500 Mega-Byte of space. The database which is being used for this application is H- Base. As it is a re-mote application, a number of users can access it simultaneously. To send/receive packets, Internetconnectioneitherthrough GPRS(Service provider) or WLAN. 12. CONCLUSION: In this, we investigated a new primitivecalledidentity-based remote data integrity checking for secure cloud storage. We formalized the securitymodel oftwoimportantpropertiesof this primitive, namely, soundness and perfect data privacy. We provided a new construction of this primitive and showed that it achieves soundness and perfect data privacy. Both the numerical analysis and the implementation demonstrated that the proposed protocol is efficient and practical. Extend this work with Group Management with Forward Secrecy & Backward Secrecy by Time Duration & Recovery of File when Data Integrity Checking Fault Occur. REFERENCES [1 P. Mell, T. Grance, Draft NIST working definition of cloud computing, Reference on June. 3rd, 2009. http://csrc.nist.gov/groups/SNC/cloudcomputing/index.ht m. [2] Cloud Security Alliance. Top threats to cloud computing. http://www.cloudsecurityalliance.org, 2010. [3] M. Blum, W. Evans, P.Gemmell, S. Kannan, M. Naor, Checking the correctness of memories. Proc. of the 32nd Anual Symposium on FoundationsfoVomputers,SFCS1991, pp. 90–99, 1991. [4] G. Ateniese, R. C. Burns, R. Curtmola,J.Herring,L.Kissner, Z. N.J. Peterson, D. X. Song, Provable data possession at untrusted stores. ACM Conference on Computer and communications Security, 598-609,2007.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6960 BIOGRAPHIES ADITYA SHITOLE Student, Dept of Computer Engineering, A.I.S.S.M.S. Polytechnic Pune, Maharashtra, India OMKAR DHAPTE Student, Dept of Computer Engineering, A.I.S.S.M.S. Polytechnic Pune, Maharashtra, India EMAAD PERZADE Student, Dept of Computer Engineering, A.I.S.S.M.S. Polytechnic Pune, Maharashtra, India SUSMITA GAIKWAD Student, Dept of Computer Engineering, A.I.S.S.M.S. Polytechnic Pune, Maharashtra, India