SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1198
Two ways Verification for Securing Cloud Data
Manisha A. Pradhan1, Pratiksha P. Bhagat2, Prajakta U. Bakhade3
1,2,3 Student, Department of CSE, Des’scoet, Dhamangaon Rly, Maharashtra, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Cloud Computing is a technology that uses the
internet and central remote servers to maintain data and
applications. Cloud computing allows consumers and
businesses to use applications without installation and access
their personal files at any computer with internet access. The
management of the deployed applications canalsobringthree
major challenges as network feasibility, computational
feasibility and data security. After the application is pushedto
the cloud infrastructure, the additional persuasion of security
auditing must be integrated in order to protect the data.
Various research attempts are made towards enabling the
auditing features on the cloud based data by various
researchers. Nevertheless, the complexity of the audit process
proven to be the bottleneck in improving performance of the
application as it consumes the computational resources ofthe
same application. The proposed framework demonstrates a
significant reduction in the computational load on the cloud
server, thus improves the application performance leveraging
the infrastructure use.
Key Words: Cloud Storage, Data Security, Two-Way
Security, Consumer Security, Computation Cost Reduction.
1. INTRODUCTION
Cloud computing refers to provision of computational
resources on demand via a computer network. cloud
computing provides various services which includes
software as a service, platform asa service, infrastructureas
a service. In traditional modelof computing,user’scomputer
contain both data and software; while in cloud computing
there is no need to contain data and software only the
system needs operating system and web browser. Cloud
computing provides various advantages which include
economies of scale, dynamic provisioning, increased
flexibility, low capital expenditure and many more[1]. As
cloud computing share resourcesover the network, security
is the basic concern. Data owners store theirdataonexternal
servers so data confidentiality, authentication,accesscontrol
are some of the basic concerns. To protect user’s privacyone
way is to use authentication techniquesuchasusernameand
password. Authentication is to check user’s identity, means
whether the person is same as he pretends to be. There are
various authentication methodsand techniques[2]. It is also
important to secure the access to all IT system and services.
Access control is a procedure that allows or denies access to
a system or services. In this paper an efficient access
mechanism using capability list is introduced. The
identification of user’sare done using an extra securitylayer
i.e. two factor authentication mechanism in order toprovide
cloud access. The data are outsourced to cloud after
encryption with symmetric key by the data owner.
Considering the recent growth in the space of computing
with the introduction of cloud computing, Internet-of-
Things, Grid Computing, Internet and information security,
the newer dimensions are introduced for research.
The notable work outcomes M. Armbrust et al on
cloud computing, M. Whaiduzzaman et al. on vehicularcloud
computing, P. M. Mell et al. on NIST, G. Han et al. on routing
algorithmsand T. Qiu et al. on IoT have motivatednumberof
research enthusiast in the recent era. With the introduction
of cloud computing, the industry received a huge attention
due to the benefits and advantages. Various companies,
ranging from small to minimum to large enterprises
migrated their applications on the cloud. Some companies
migrated their data on the cloud due to the large size of the
data and high cost of the dedicated storage facilities. The
work by M. Ali et al. has demonstrated the challenges of
storing data on the cloud and security issues. The practical
approachesof the security implementationsarediscussedby
T. A. Velte et al., which enabled the research dentations for
various researchers. The trend followed by Z. Xia et al. by
proposing rank based search scheme over encrypteddata,Z.
Fu et al. by demonstrating personalized search operations
over encrypted data and again with Z. Fu et al. by secure
searching operations on cloud data. Nevertheless, the data
owners demand for the continuous proof of the correctness
of the data so that the consumers of the data can receive the
secure and correct data from the services. A number of
research attempts are been made to ensure the remote
monitoring and auditing of the data. Few distinguishedwork
established the thought to ensure the correctness with data
integrity verification by Y. Ren et al on provable auditing of
data, B. Chen et al. on remote verification of the data based
on network coding and G. Ateniese et al. on prevention of
untrusted access of the data.
Firstly, it is to allocate computational loads in
optimal among the data processing and security features.
Secondly, as third party companies host the data, hence the
protection is also the responsibility of that company and the
data owner company need to decide upon the access of the
data to the service provider. Thus, building the public
auditing system with the benefit of preserving the privacyof
the data is the major goal of this work. Additionally, this
work also proposes a method to collect and store the access
history for further statistical analysis.
2. RELATED WORK
 Ateniese et al.[3] proposed a proxy re encryption
technique which is a secure distributed storage scheme.
The blocks of content are encrypted by data owner with
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1199
symmetriccontent keys. The contentkeysareallencrypted
with a master public key. Master private key and user’s
public key are used to generate proxy re-encryption keys
by the dataowner,using which the semitrusted servercan
then convert the ciphertext into plaintext for a specific
user.
 Zhoa et al.[4] proposed a progressive elliptic curve
encryption scheme. In this pieces of data are encrypted
number of times using multiple keys and later decrypted
using only one key. The main problem with this technique
is that it requires data owner to be online at all times.
 Miklauet al.[5] proposedaframeworkforaccesscontrol
on published xml documents. This can be accomplished by
using different cryptographic keys over different portions
of xml tree. They also presented metadata nodes in the
structure to enforce access control.
 Bennani et al.[6] proposed a model in which the
database is replicated in cloud n number of times where n
is the number of roles. When a role is revokedaccessrights,
the database is removed. Thisleadsintheworst casetothe
creation from scratch a new view and re-keying the
corresponding database. The main problem with this
model is that it is infeasible to implement due to high
redundancy.
 Naor et al.[7] presented symmetric key primitives in an
untrusted storage environment. This scheme is based on
pre-keydistributionmechanismusingscheme.Thisreduces
the public key cryptographyin software asaservicemodel.
The performance of the schemes are not evaluated in this
model.
 Weicao wang Z.Li et al.[9] suggested to encrypt every
data block with a different key so that flexible
cryptography based access control can be achieved. The
owner needs to maintain only a few secrets through the
adaptation of key derivation methods but scheme for key
management is not mentioned.
 Zhou [10] carried out study on privacy and security,
work that can be done to prevent privacy and security
breaches and outlines that security laws should also be
taken into consideration
The cloud based data is generally accessed by the data
owner, data consumers or the customers of the data owner,
third party auditors and finally the cloud service provider.
The owner is fully trusted in this scenario and it is the
responsibility of the cloud service provider to ensure the
security of the data while being accessed by the consumers.
Nevertheless, the third party auditor and the cloud service
providers can also access the data, while being partially
trusted by the data owner. In such scenariosthe challengeof
data being accessed by any attacker in terms of audit
information and statistical information of the cloud service
provider is non-valuable. Thusmakingthismodelchallenged
by the researchers and demands improvements.
Secondly, the prime disrupt of these models are to
consume the computational capacityofthecloudservers.The
cloud server are configured to cater the consumer and data
owner demands for higher loads, but the added
computational processing for the security and auditing
always tend to reduce the performance.
A. Evaluation of Generic Model
The above discussed model is the most popular existing
framework [Fig – 1] in spite of the arguments for security.
Figure 1: Three Party Verification and Cloud Data Security
Model
The generic model is an association of the data owner, third
party auditor and service provider. Along with these three
parties, the consumer of the data is also to be considered.
The first party, being the data owner, always can establish
the secure and trusted connection to the data. In the other
side, Auditor and Service Provider can also establish the
connection to the data but those connections and access
requests are considered to be the semi-trusted connections.
Finally, the connections from the data consumers are
completely untrusted and it is the responsibility of the cloud
service provider to reducetherisk ofunauthorized accessby
verifying the connections.
3. PROPOSED SYSTEM
The major identified drawbacks of the existing systems are
semi-trusted access by the third party auditors and upon
introducing the security measures for the auditor access to
the data, the increase in the computing load on the cloud
servers. Hence, this work proposes a two way security
mechanism for cloud based data separately for data
consumers and auditors based on different key based
accessed. In this section, this work elaborates the two ways
key based mechanism and also furnishes the comparative
study in order to demonstrate the performance
improvements [Fig – 2].
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1200
Figure 2: Proposed Two Way Cloud Data Security Model
The proposed model algorithm is divided into four parts as
generate the keys, upload the files with key based
encryption, access request validation and finally the data
decryption.
Step 1. Generation of the keys
Algorithm Part – 1: Key Generation
1. Randomize two prime number selection as A & B, where
A is greater than B
2. Calculate the product of two prime numbers as K = A * B
3. Consider a random polynomial of order N as ℽ(N)
4. Calculate the intermediator of the key as ℽ(N) = (A-1) *
(B – 1)
5. Calculate the public prime component asE suchthatGCD
(E, ℽ(N)) == 1
6. Generate the Public Key PK as PK = (E, ℽ(N))
7. Generate the File Descriptor Private Key as FDPvK = (D1,
ℽ(N)), where D1 = Eℽ(N) / | ℽ(N)|
8. Generate the File Content Private Key as FCPvK = (D2,
ℽ(N)), where D2 = ℽ(N)E/ | ℽ(N)|
Nevertheless, the key generation algorithm canbereplaced
by any proprietary encryption and decryption algorithmin
general and the modified algorithm will not change the
performance improvements of this proposed framework.
Step -2. Encryption of the file data and uploading of the
file
Algorithm Part – 2: Encrypt and Merge for Upload
1. Segregate the file descriptor and the file content as
consider as FD and FC respectively
2. If FD is not encrypted, then encrypt with PK & FDPvK,
else continue to the next part
3. If FC is not encrypted, then encrypt with PK & FCPvK,
else continue to the next part
4. If FD & FC both are encrypted, then merge the
encrypted FD & FC and upload the file to the cloud
storage
Once the files are uploaded on to the cloud, then the access
requests can be accepted and process for the validation
Step -3. Access request validation
Algorithm Part – 3: Access Request Validation
1. If the access request is been made for the auditing
access, then verify the request with the key combination
of PK & FDPvK.
2. Once, the verification is valid, and label the request as
FDR. Else terminate the request.
3. Else If the access request is been made for the data
access, then verify the request with the key combination
of PK & PCPvK
4. Once, the verification is valid, and label the request as
FCR. Else terminate the request.
This step will significantly reduce the computational
overload of the security process and also ensure semi-
trusted access to the core components of the cloud data.
Step -4. Decryption of the file
Algorithm Part – 4: Decryption of the Content
1. If the requester label is FDR, then process the file
descriptor and decrypt.
2. Else If the requester label is FCR, then process the file
content and decrypt file descriptor and content both.
4. CONCLUSION
This paper presented a set of security procedures to secure
the data of a data owner in cloud. The combinedapproachof
access control and cryptography is used to protect
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1201
outsourced data. The acceptance of the cloud computing is
due to the nature of the applications and services to be
scalable during the fluctuation of the demands. This
characteristic alone gained a lot of popularity and
acceptance of cloud computing. This proposed method not
only enhances the security measures, also demonstratesthe
reduction in response time as far as the encryption and
decryption is concerned. This improvement will certainly
help the researcher community to rethink on the security
protocols those are used and predict the newer research
dimensions.
5. REFERENCES
1. G. Ateniese, K. Fu, M. Green, and S. Hohenberger,
“Improved proxy re-encryption schemes with
applications to secure distributed storage”, ACM
Transactions on Information and System Security,
Vol. 9, No. 1, Feb 2006, pp. 1-30.
2. Zhao G, Rong C, Li J, Zhang F, Tang Y (2010)
“Trusted data sharing over untrusted cloud storage
providers” IEEE second international conference
cloud computing technology and
science(CloudCom) 2010, pp 97–103.
3. G. Miklau, and D. Suciu” Controlling access to
published data using cryptography”, Proc. 29th
VLDB, Germany, Sept 2003, pp. 898-909.
4. Bennani N, Damiani E(2010)” Towardscloud based
key management for outsourced databases” IEEE
34th annual computer software and application
conference workshop 2010 pp. 232-236.
5. Dalit Naor, A. Shenhav, and A. Wool” Toward
securing untrusted storage without public-key
operations”, Proc. 2005 ACM Workshop on Storage
Security and Survivability (StorageSS), Virginia,
USA, Nov 2005, pp. 51-56.
6. Rolf Blom, “An optimal class of symmetric key
generation systems”, Proc. Eurocrypt 84 workshop
on Advances in cryptology: theory and application
of cryptographic techniques, Springer Verlag, NY,
USA, 1985, pp. 335- 338.
7. Weicao wang Z.Li "On Securing untrusted clouds
with cryptography”,Proceedings of the 9th annual
ACM workshop on Privacy in the electronic
society.,ACM, 2010.
8. Zhou M, Zhang R, Xiew, Qian W, Zhou A (2010),”
Security and privacy in cloud computing: a survey”
Sixth International Conferences on Emantics
Knowledge And Grid 2010.
9. Maninder Singh , Sarbjeet Singh, “Design and
implementation of multi-tierauthenticationscheme
in cloud”, International Journal ofComputerScience
Issues(IJCSI), ISSN (Online):1694-0814,Vol.9,Issue
5, No 2, pp. 181-187, September 2012.
10. Abdul Raouf Khan, “Access control In cloud
computing envirome.
11. P. M. Mell and T. Grance, ``The NIST denition of
cloud computing,''Commun. ACM, vol. 53. no. 6, p.
50, 2011.
12. G. Han, A. Qian, J. Jiang, N. Sun, and L. Liu, ``A grid-
based joint routing and charging algorithm for
industrial wirelessrechargeable sensor networks,''
Comput. Netw., vol. 101, no. 6, pp. 1928, 2016.
13. T. Qiu, D. Luo, F. Xia, N. Deonauth,W. Si, andA.Tolba,
``A greedy model with small world for improving
the robustness of heterogeneous Internet of
Things,'' Comput. Netw., vol. 101, no. 6, pp. 127143,
2016.
14. M. Ali, S. U. Khan, and A. V. Vasilakos, ``Security in
cloud computing: Opportunities and challenges,''
Inf. Sci., vol. 305, pp. 357383, Jun. 2015.

More Related Content

What's hot

Cloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge PrivacyCloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge PrivacyIJERA Editor
 
A provenance policy based access
A provenance policy based accessA provenance policy based access
A provenance policy based accessijsptm
 
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...INFOGAIN PUBLICATION
 
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentInsuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentEditor IJCATR
 
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud StorageA Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storageijtsrd
 
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET Journal
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data securityeSAT Publishing House
 
A Secure Model for Cloud Computing Based Storage and Retrieval
A Secure Model for Cloud Computing Based Storage and  RetrievalA Secure Model for Cloud Computing Based Storage and  Retrieval
A Secure Model for Cloud Computing Based Storage and RetrievalIOSR Journals
 
Authenticated and unrestricted auditing of big data space on cloud through v...
Authenticated and unrestricted auditing of big data space on  cloud through v...Authenticated and unrestricted auditing of big data space on  cloud through v...
Authenticated and unrestricted auditing of big data space on cloud through v...IJMER
 
IJSRED-V2I1P2
IJSRED-V2I1P2IJSRED-V2I1P2
IJSRED-V2I1P2IJSRED
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationEditor IJMTER
 
IRJET- Secure Cloud Storage through Dual Protection
IRJET- Secure Cloud Storage through Dual ProtectionIRJET- Secure Cloud Storage through Dual Protection
IRJET- Secure Cloud Storage through Dual ProtectionIRJET Journal
 
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...IRJET Journal
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...IRJET Journal
 
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud StorageIRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud StorageIRJET Journal
 
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEMSURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEMijiert bestjournal
 

What's hot (20)

Cloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge PrivacyCloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge Privacy
 
A provenance policy based access
A provenance policy based accessA provenance policy based access
A provenance policy based access
 
50120140503020
5012014050302050120140503020
50120140503020
 
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
 
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentInsuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud Environment
 
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud StorageA Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
 
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key Exposure
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
 
A Secure Model for Cloud Computing Based Storage and Retrieval
A Secure Model for Cloud Computing Based Storage and  RetrievalA Secure Model for Cloud Computing Based Storage and  Retrieval
A Secure Model for Cloud Computing Based Storage and Retrieval
 
Authenticated and unrestricted auditing of big data space on cloud through v...
Authenticated and unrestricted auditing of big data space on  cloud through v...Authenticated and unrestricted auditing of big data space on  cloud through v...
Authenticated and unrestricted auditing of big data space on cloud through v...
 
IJSRED-V2I1P2
IJSRED-V2I1P2IJSRED-V2I1P2
IJSRED-V2I1P2
 
Ad4502189193
Ad4502189193Ad4502189193
Ad4502189193
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
 
IRJET- Secure Cloud Storage through Dual Protection
IRJET- Secure Cloud Storage through Dual ProtectionIRJET- Secure Cloud Storage through Dual Protection
IRJET- Secure Cloud Storage through Dual Protection
 
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
 
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud StorageIRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
 
I42024349
I42024349I42024349
I42024349
 
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEMSURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
 

Similar to IRJET- Two ways Verification for Securing Cloud Data

Analysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and MethodologiesAnalysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and MethodologiesIRJET Journal
 
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET Journal
 
Security Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party AuditorSecurity Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party Auditorijsrd.com
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...IRJET Journal
 
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET Journal
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesIRJET Journal
 
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud StorageA Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud StorageIRJET Journal
 
Towards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the DataTowards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the DataIRJET Journal
 
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...IRJET Journal
 
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET Journal
 
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on CloudIRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on CloudIRJET Journal
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET Journal
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...IJNSA Journal
 
A Survey on Batch Auditing Systems for Cloud Storage
A Survey on Batch Auditing Systems for Cloud StorageA Survey on Batch Auditing Systems for Cloud Storage
A Survey on Batch Auditing Systems for Cloud StorageIRJET Journal
 
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesCentralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesEditor IJMTER
 
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...IRJET Journal
 
Iaetsd storage privacy protection against data
Iaetsd storage privacy protection against dataIaetsd storage privacy protection against data
Iaetsd storage privacy protection against dataIaetsd Iaetsd
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...IJNSA Journal
 
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVMIRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVMIRJET Journal
 
A study on security issues in cloud based e learning
A study on security issues in cloud based e learningA study on security issues in cloud based e learning
A study on security issues in cloud based e learningManimaran A
 

Similar to IRJET- Two ways Verification for Securing Cloud Data (20)

Analysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and MethodologiesAnalysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and Methodologies
 
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
 
Security Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party AuditorSecurity Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party Auditor
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
 
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
 
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud StorageA Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
 
Towards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the DataTowards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the Data
 
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
 
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
 
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on CloudIRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on Cloud
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
 
A Survey on Batch Auditing Systems for Cloud Storage
A Survey on Batch Auditing Systems for Cloud StorageA Survey on Batch Auditing Systems for Cloud Storage
A Survey on Batch Auditing Systems for Cloud Storage
 
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesCentralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data Services
 
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
 
Iaetsd storage privacy protection against data
Iaetsd storage privacy protection against dataIaetsd storage privacy protection against data
Iaetsd storage privacy protection against data
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
 
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVMIRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
 
A study on security issues in cloud based e learning
A study on security issues in cloud based e learningA study on security issues in cloud based e learning
A study on security issues in cloud based e learning
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 

Recently uploaded (20)

Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 

IRJET- Two ways Verification for Securing Cloud Data

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1198 Two ways Verification for Securing Cloud Data Manisha A. Pradhan1, Pratiksha P. Bhagat2, Prajakta U. Bakhade3 1,2,3 Student, Department of CSE, Des’scoet, Dhamangaon Rly, Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Cloud Computing is a technology that uses the internet and central remote servers to maintain data and applications. Cloud computing allows consumers and businesses to use applications without installation and access their personal files at any computer with internet access. The management of the deployed applications canalsobringthree major challenges as network feasibility, computational feasibility and data security. After the application is pushedto the cloud infrastructure, the additional persuasion of security auditing must be integrated in order to protect the data. Various research attempts are made towards enabling the auditing features on the cloud based data by various researchers. Nevertheless, the complexity of the audit process proven to be the bottleneck in improving performance of the application as it consumes the computational resources ofthe same application. The proposed framework demonstrates a significant reduction in the computational load on the cloud server, thus improves the application performance leveraging the infrastructure use. Key Words: Cloud Storage, Data Security, Two-Way Security, Consumer Security, Computation Cost Reduction. 1. INTRODUCTION Cloud computing refers to provision of computational resources on demand via a computer network. cloud computing provides various services which includes software as a service, platform asa service, infrastructureas a service. In traditional modelof computing,user’scomputer contain both data and software; while in cloud computing there is no need to contain data and software only the system needs operating system and web browser. Cloud computing provides various advantages which include economies of scale, dynamic provisioning, increased flexibility, low capital expenditure and many more[1]. As cloud computing share resourcesover the network, security is the basic concern. Data owners store theirdataonexternal servers so data confidentiality, authentication,accesscontrol are some of the basic concerns. To protect user’s privacyone way is to use authentication techniquesuchasusernameand password. Authentication is to check user’s identity, means whether the person is same as he pretends to be. There are various authentication methodsand techniques[2]. It is also important to secure the access to all IT system and services. Access control is a procedure that allows or denies access to a system or services. In this paper an efficient access mechanism using capability list is introduced. The identification of user’sare done using an extra securitylayer i.e. two factor authentication mechanism in order toprovide cloud access. The data are outsourced to cloud after encryption with symmetric key by the data owner. Considering the recent growth in the space of computing with the introduction of cloud computing, Internet-of- Things, Grid Computing, Internet and information security, the newer dimensions are introduced for research. The notable work outcomes M. Armbrust et al on cloud computing, M. Whaiduzzaman et al. on vehicularcloud computing, P. M. Mell et al. on NIST, G. Han et al. on routing algorithmsand T. Qiu et al. on IoT have motivatednumberof research enthusiast in the recent era. With the introduction of cloud computing, the industry received a huge attention due to the benefits and advantages. Various companies, ranging from small to minimum to large enterprises migrated their applications on the cloud. Some companies migrated their data on the cloud due to the large size of the data and high cost of the dedicated storage facilities. The work by M. Ali et al. has demonstrated the challenges of storing data on the cloud and security issues. The practical approachesof the security implementationsarediscussedby T. A. Velte et al., which enabled the research dentations for various researchers. The trend followed by Z. Xia et al. by proposing rank based search scheme over encrypteddata,Z. Fu et al. by demonstrating personalized search operations over encrypted data and again with Z. Fu et al. by secure searching operations on cloud data. Nevertheless, the data owners demand for the continuous proof of the correctness of the data so that the consumers of the data can receive the secure and correct data from the services. A number of research attempts are been made to ensure the remote monitoring and auditing of the data. Few distinguishedwork established the thought to ensure the correctness with data integrity verification by Y. Ren et al on provable auditing of data, B. Chen et al. on remote verification of the data based on network coding and G. Ateniese et al. on prevention of untrusted access of the data. Firstly, it is to allocate computational loads in optimal among the data processing and security features. Secondly, as third party companies host the data, hence the protection is also the responsibility of that company and the data owner company need to decide upon the access of the data to the service provider. Thus, building the public auditing system with the benefit of preserving the privacyof the data is the major goal of this work. Additionally, this work also proposes a method to collect and store the access history for further statistical analysis. 2. RELATED WORK  Ateniese et al.[3] proposed a proxy re encryption technique which is a secure distributed storage scheme. The blocks of content are encrypted by data owner with
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1199 symmetriccontent keys. The contentkeysareallencrypted with a master public key. Master private key and user’s public key are used to generate proxy re-encryption keys by the dataowner,using which the semitrusted servercan then convert the ciphertext into plaintext for a specific user.  Zhoa et al.[4] proposed a progressive elliptic curve encryption scheme. In this pieces of data are encrypted number of times using multiple keys and later decrypted using only one key. The main problem with this technique is that it requires data owner to be online at all times.  Miklauet al.[5] proposedaframeworkforaccesscontrol on published xml documents. This can be accomplished by using different cryptographic keys over different portions of xml tree. They also presented metadata nodes in the structure to enforce access control.  Bennani et al.[6] proposed a model in which the database is replicated in cloud n number of times where n is the number of roles. When a role is revokedaccessrights, the database is removed. Thisleadsintheworst casetothe creation from scratch a new view and re-keying the corresponding database. The main problem with this model is that it is infeasible to implement due to high redundancy.  Naor et al.[7] presented symmetric key primitives in an untrusted storage environment. This scheme is based on pre-keydistributionmechanismusingscheme.Thisreduces the public key cryptographyin software asaservicemodel. The performance of the schemes are not evaluated in this model.  Weicao wang Z.Li et al.[9] suggested to encrypt every data block with a different key so that flexible cryptography based access control can be achieved. The owner needs to maintain only a few secrets through the adaptation of key derivation methods but scheme for key management is not mentioned.  Zhou [10] carried out study on privacy and security, work that can be done to prevent privacy and security breaches and outlines that security laws should also be taken into consideration The cloud based data is generally accessed by the data owner, data consumers or the customers of the data owner, third party auditors and finally the cloud service provider. The owner is fully trusted in this scenario and it is the responsibility of the cloud service provider to ensure the security of the data while being accessed by the consumers. Nevertheless, the third party auditor and the cloud service providers can also access the data, while being partially trusted by the data owner. In such scenariosthe challengeof data being accessed by any attacker in terms of audit information and statistical information of the cloud service provider is non-valuable. Thusmakingthismodelchallenged by the researchers and demands improvements. Secondly, the prime disrupt of these models are to consume the computational capacityofthecloudservers.The cloud server are configured to cater the consumer and data owner demands for higher loads, but the added computational processing for the security and auditing always tend to reduce the performance. A. Evaluation of Generic Model The above discussed model is the most popular existing framework [Fig – 1] in spite of the arguments for security. Figure 1: Three Party Verification and Cloud Data Security Model The generic model is an association of the data owner, third party auditor and service provider. Along with these three parties, the consumer of the data is also to be considered. The first party, being the data owner, always can establish the secure and trusted connection to the data. In the other side, Auditor and Service Provider can also establish the connection to the data but those connections and access requests are considered to be the semi-trusted connections. Finally, the connections from the data consumers are completely untrusted and it is the responsibility of the cloud service provider to reducetherisk ofunauthorized accessby verifying the connections. 3. PROPOSED SYSTEM The major identified drawbacks of the existing systems are semi-trusted access by the third party auditors and upon introducing the security measures for the auditor access to the data, the increase in the computing load on the cloud servers. Hence, this work proposes a two way security mechanism for cloud based data separately for data consumers and auditors based on different key based accessed. In this section, this work elaborates the two ways key based mechanism and also furnishes the comparative study in order to demonstrate the performance improvements [Fig – 2].
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1200 Figure 2: Proposed Two Way Cloud Data Security Model The proposed model algorithm is divided into four parts as generate the keys, upload the files with key based encryption, access request validation and finally the data decryption. Step 1. Generation of the keys Algorithm Part – 1: Key Generation 1. Randomize two prime number selection as A & B, where A is greater than B 2. Calculate the product of two prime numbers as K = A * B 3. Consider a random polynomial of order N as ℽ(N) 4. Calculate the intermediator of the key as ℽ(N) = (A-1) * (B – 1) 5. Calculate the public prime component asE suchthatGCD (E, ℽ(N)) == 1 6. Generate the Public Key PK as PK = (E, ℽ(N)) 7. Generate the File Descriptor Private Key as FDPvK = (D1, ℽ(N)), where D1 = Eℽ(N) / | ℽ(N)| 8. Generate the File Content Private Key as FCPvK = (D2, ℽ(N)), where D2 = ℽ(N)E/ | ℽ(N)| Nevertheless, the key generation algorithm canbereplaced by any proprietary encryption and decryption algorithmin general and the modified algorithm will not change the performance improvements of this proposed framework. Step -2. Encryption of the file data and uploading of the file Algorithm Part – 2: Encrypt and Merge for Upload 1. Segregate the file descriptor and the file content as consider as FD and FC respectively 2. If FD is not encrypted, then encrypt with PK & FDPvK, else continue to the next part 3. If FC is not encrypted, then encrypt with PK & FCPvK, else continue to the next part 4. If FD & FC both are encrypted, then merge the encrypted FD & FC and upload the file to the cloud storage Once the files are uploaded on to the cloud, then the access requests can be accepted and process for the validation Step -3. Access request validation Algorithm Part – 3: Access Request Validation 1. If the access request is been made for the auditing access, then verify the request with the key combination of PK & FDPvK. 2. Once, the verification is valid, and label the request as FDR. Else terminate the request. 3. Else If the access request is been made for the data access, then verify the request with the key combination of PK & PCPvK 4. Once, the verification is valid, and label the request as FCR. Else terminate the request. This step will significantly reduce the computational overload of the security process and also ensure semi- trusted access to the core components of the cloud data. Step -4. Decryption of the file Algorithm Part – 4: Decryption of the Content 1. If the requester label is FDR, then process the file descriptor and decrypt. 2. Else If the requester label is FCR, then process the file content and decrypt file descriptor and content both. 4. CONCLUSION This paper presented a set of security procedures to secure the data of a data owner in cloud. The combinedapproachof access control and cryptography is used to protect
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1201 outsourced data. The acceptance of the cloud computing is due to the nature of the applications and services to be scalable during the fluctuation of the demands. This characteristic alone gained a lot of popularity and acceptance of cloud computing. This proposed method not only enhances the security measures, also demonstratesthe reduction in response time as far as the encryption and decryption is concerned. This improvement will certainly help the researcher community to rethink on the security protocols those are used and predict the newer research dimensions. 5. REFERENCES 1. G. Ateniese, K. Fu, M. Green, and S. Hohenberger, “Improved proxy re-encryption schemes with applications to secure distributed storage”, ACM Transactions on Information and System Security, Vol. 9, No. 1, Feb 2006, pp. 1-30. 2. Zhao G, Rong C, Li J, Zhang F, Tang Y (2010) “Trusted data sharing over untrusted cloud storage providers” IEEE second international conference cloud computing technology and science(CloudCom) 2010, pp 97–103. 3. G. Miklau, and D. Suciu” Controlling access to published data using cryptography”, Proc. 29th VLDB, Germany, Sept 2003, pp. 898-909. 4. Bennani N, Damiani E(2010)” Towardscloud based key management for outsourced databases” IEEE 34th annual computer software and application conference workshop 2010 pp. 232-236. 5. Dalit Naor, A. Shenhav, and A. Wool” Toward securing untrusted storage without public-key operations”, Proc. 2005 ACM Workshop on Storage Security and Survivability (StorageSS), Virginia, USA, Nov 2005, pp. 51-56. 6. Rolf Blom, “An optimal class of symmetric key generation systems”, Proc. Eurocrypt 84 workshop on Advances in cryptology: theory and application of cryptographic techniques, Springer Verlag, NY, USA, 1985, pp. 335- 338. 7. Weicao wang Z.Li "On Securing untrusted clouds with cryptography”,Proceedings of the 9th annual ACM workshop on Privacy in the electronic society.,ACM, 2010. 8. Zhou M, Zhang R, Xiew, Qian W, Zhou A (2010),” Security and privacy in cloud computing: a survey” Sixth International Conferences on Emantics Knowledge And Grid 2010. 9. Maninder Singh , Sarbjeet Singh, “Design and implementation of multi-tierauthenticationscheme in cloud”, International Journal ofComputerScience Issues(IJCSI), ISSN (Online):1694-0814,Vol.9,Issue 5, No 2, pp. 181-187, September 2012. 10. Abdul Raouf Khan, “Access control In cloud computing envirome. 11. P. M. Mell and T. Grance, ``The NIST denition of cloud computing,''Commun. ACM, vol. 53. no. 6, p. 50, 2011. 12. G. Han, A. Qian, J. Jiang, N. Sun, and L. Liu, ``A grid- based joint routing and charging algorithm for industrial wirelessrechargeable sensor networks,'' Comput. Netw., vol. 101, no. 6, pp. 1928, 2016. 13. T. Qiu, D. Luo, F. Xia, N. Deonauth,W. Si, andA.Tolba, ``A greedy model with small world for improving the robustness of heterogeneous Internet of Things,'' Comput. Netw., vol. 101, no. 6, pp. 127143, 2016. 14. M. Ali, S. U. Khan, and A. V. Vasilakos, ``Security in cloud computing: Opportunities and challenges,'' Inf. Sci., vol. 305, pp. 357383, Jun. 2015.