Submit Search
Upload
IRJET- Two ways Verification for Securing Cloud Data
•
0 likes
•
16 views
IRJET Journal
Follow
https://www.irjet.net/archives/V5/i3/IRJET-V5I3272.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 4
Download now
Download to read offline
Recommended
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET Journal
Br36413417
Br36413417
IJERA Editor
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
IOSR Journals
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET Journal
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET Journal
A Brief Survey on Various Technologies Involved in Cloud Computing Security
A Brief Survey on Various Technologies Involved in Cloud Computing Security
Associate Professor in VSB Coimbatore
Iaetsd enhancement of performance and security in bigdata processing
Iaetsd enhancement of performance and security in bigdata processing
Iaetsd Iaetsd
Secure Data Self-Destructing with Time Constraint in Clouds
Secure Data Self-Destructing with Time Constraint in Clouds
IRJET Journal
Recommended
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET Journal
Br36413417
Br36413417
IJERA Editor
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
IOSR Journals
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET Journal
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET Journal
A Brief Survey on Various Technologies Involved in Cloud Computing Security
A Brief Survey on Various Technologies Involved in Cloud Computing Security
Associate Professor in VSB Coimbatore
Iaetsd enhancement of performance and security in bigdata processing
Iaetsd enhancement of performance and security in bigdata processing
Iaetsd Iaetsd
Secure Data Self-Destructing with Time Constraint in Clouds
Secure Data Self-Destructing with Time Constraint in Clouds
IRJET Journal
Cloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge Privacy
IJERA Editor
A provenance policy based access
A provenance policy based access
ijsptm
50120140503020
50120140503020
IAEME Publication
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
INFOGAIN PUBLICATION
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud Environment
Editor IJCATR
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
ijtsrd
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key Exposure
IRJET Journal
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
eSAT Journals
Enhanced security framework to ensure data security
Enhanced security framework to ensure data security
eSAT Publishing House
A Secure Model for Cloud Computing Based Storage and Retrieval
A Secure Model for Cloud Computing Based Storage and Retrieval
IOSR Journals
Authenticated and unrestricted auditing of big data space on cloud through v...
Authenticated and unrestricted auditing of big data space on cloud through v...
IJMER
IJSRED-V2I1P2
IJSRED-V2I1P2
IJSRED
Ad4502189193
Ad4502189193
IJERA Editor
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Editor IJMTER
IRJET- Secure Cloud Storage through Dual Protection
IRJET- Secure Cloud Storage through Dual Protection
IRJET Journal
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET Journal
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
IRJET Journal
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET Journal
I42024349
I42024349
IJERA Editor
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
ijiert bestjournal
Analysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and Methodologies
IRJET Journal
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET Journal
More Related Content
What's hot
Cloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge Privacy
IJERA Editor
A provenance policy based access
A provenance policy based access
ijsptm
50120140503020
50120140503020
IAEME Publication
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
INFOGAIN PUBLICATION
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud Environment
Editor IJCATR
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
ijtsrd
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key Exposure
IRJET Journal
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
eSAT Journals
Enhanced security framework to ensure data security
Enhanced security framework to ensure data security
eSAT Publishing House
A Secure Model for Cloud Computing Based Storage and Retrieval
A Secure Model for Cloud Computing Based Storage and Retrieval
IOSR Journals
Authenticated and unrestricted auditing of big data space on cloud through v...
Authenticated and unrestricted auditing of big data space on cloud through v...
IJMER
IJSRED-V2I1P2
IJSRED-V2I1P2
IJSRED
Ad4502189193
Ad4502189193
IJERA Editor
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Editor IJMTER
IRJET- Secure Cloud Storage through Dual Protection
IRJET- Secure Cloud Storage through Dual Protection
IRJET Journal
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET Journal
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
IRJET Journal
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET Journal
I42024349
I42024349
IJERA Editor
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
ijiert bestjournal
What's hot
(20)
Cloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge Privacy
A provenance policy based access
A provenance policy based access
50120140503020
50120140503020
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud Environment
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key Exposure
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security
Enhanced security framework to ensure data security
A Secure Model for Cloud Computing Based Storage and Retrieval
A Secure Model for Cloud Computing Based Storage and Retrieval
Authenticated and unrestricted auditing of big data space on cloud through v...
Authenticated and unrestricted auditing of big data space on cloud through v...
IJSRED-V2I1P2
IJSRED-V2I1P2
Ad4502189193
Ad4502189193
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
IRJET- Secure Cloud Storage through Dual Protection
IRJET- Secure Cloud Storage through Dual Protection
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
I42024349
I42024349
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
Similar to IRJET- Two ways Verification for Securing Cloud Data
Analysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and Methodologies
IRJET Journal
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET Journal
Security Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party Auditor
ijsrd.com
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET Journal
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET Journal
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
IRJET Journal
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
IRJET Journal
Towards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the Data
IRJET Journal
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
IRJET Journal
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET Journal
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET Journal
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET Journal
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
IJNSA Journal
A Survey on Batch Auditing Systems for Cloud Storage
A Survey on Batch Auditing Systems for Cloud Storage
IRJET Journal
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Editor IJMTER
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET Journal
Iaetsd storage privacy protection against data
Iaetsd storage privacy protection against data
Iaetsd Iaetsd
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
IJNSA Journal
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET Journal
A study on security issues in cloud based e learning
A study on security issues in cloud based e learning
Manimaran A
Similar to IRJET- Two ways Verification for Securing Cloud Data
(20)
Analysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and Methodologies
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
Security Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party Auditor
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
Towards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the Data
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
A Survey on Batch Auditing Systems for Cloud Storage
A Survey on Batch Auditing Systems for Cloud Storage
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data Services
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
Iaetsd storage privacy protection against data
Iaetsd storage privacy protection against data
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
A study on security issues in cloud based e learning
A study on security issues in cloud based e learning
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
srsj9000
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
NikhilNagaraju
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
power system scada applications and uses
power system scada applications and uses
DevarapalliHaritha
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
hassan khalil
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Dr.Costas Sachpazis
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
João Esperancinha
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
vipinkmenon1
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Tsuyoshi Horigome
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
rehmti665
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
DeelipZope
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
ssuser7cb4ff
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
VICTOR MAESTRE RAMIREZ
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
jennyeacort
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
misbanausheenparvam
microprocessor 8085 and its interfacing
microprocessor 8085 and its interfacing
jaychoudhary37
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
britheesh05
Recently uploaded
(20)
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
power system scada applications and uses
power system scada applications and uses
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
microprocessor 8085 and its interfacing
microprocessor 8085 and its interfacing
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
IRJET- Two ways Verification for Securing Cloud Data
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1198 Two ways Verification for Securing Cloud Data Manisha A. Pradhan1, Pratiksha P. Bhagat2, Prajakta U. Bakhade3 1,2,3 Student, Department of CSE, Des’scoet, Dhamangaon Rly, Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Cloud Computing is a technology that uses the internet and central remote servers to maintain data and applications. Cloud computing allows consumers and businesses to use applications without installation and access their personal files at any computer with internet access. The management of the deployed applications canalsobringthree major challenges as network feasibility, computational feasibility and data security. After the application is pushedto the cloud infrastructure, the additional persuasion of security auditing must be integrated in order to protect the data. Various research attempts are made towards enabling the auditing features on the cloud based data by various researchers. Nevertheless, the complexity of the audit process proven to be the bottleneck in improving performance of the application as it consumes the computational resources ofthe same application. The proposed framework demonstrates a significant reduction in the computational load on the cloud server, thus improves the application performance leveraging the infrastructure use. Key Words: Cloud Storage, Data Security, Two-Way Security, Consumer Security, Computation Cost Reduction. 1. INTRODUCTION Cloud computing refers to provision of computational resources on demand via a computer network. cloud computing provides various services which includes software as a service, platform asa service, infrastructureas a service. In traditional modelof computing,user’scomputer contain both data and software; while in cloud computing there is no need to contain data and software only the system needs operating system and web browser. Cloud computing provides various advantages which include economies of scale, dynamic provisioning, increased flexibility, low capital expenditure and many more[1]. As cloud computing share resourcesover the network, security is the basic concern. Data owners store theirdataonexternal servers so data confidentiality, authentication,accesscontrol are some of the basic concerns. To protect user’s privacyone way is to use authentication techniquesuchasusernameand password. Authentication is to check user’s identity, means whether the person is same as he pretends to be. There are various authentication methodsand techniques[2]. It is also important to secure the access to all IT system and services. Access control is a procedure that allows or denies access to a system or services. In this paper an efficient access mechanism using capability list is introduced. The identification of user’sare done using an extra securitylayer i.e. two factor authentication mechanism in order toprovide cloud access. The data are outsourced to cloud after encryption with symmetric key by the data owner. Considering the recent growth in the space of computing with the introduction of cloud computing, Internet-of- Things, Grid Computing, Internet and information security, the newer dimensions are introduced for research. The notable work outcomes M. Armbrust et al on cloud computing, M. Whaiduzzaman et al. on vehicularcloud computing, P. M. Mell et al. on NIST, G. Han et al. on routing algorithmsand T. Qiu et al. on IoT have motivatednumberof research enthusiast in the recent era. With the introduction of cloud computing, the industry received a huge attention due to the benefits and advantages. Various companies, ranging from small to minimum to large enterprises migrated their applications on the cloud. Some companies migrated their data on the cloud due to the large size of the data and high cost of the dedicated storage facilities. The work by M. Ali et al. has demonstrated the challenges of storing data on the cloud and security issues. The practical approachesof the security implementationsarediscussedby T. A. Velte et al., which enabled the research dentations for various researchers. The trend followed by Z. Xia et al. by proposing rank based search scheme over encrypteddata,Z. Fu et al. by demonstrating personalized search operations over encrypted data and again with Z. Fu et al. by secure searching operations on cloud data. Nevertheless, the data owners demand for the continuous proof of the correctness of the data so that the consumers of the data can receive the secure and correct data from the services. A number of research attempts are been made to ensure the remote monitoring and auditing of the data. Few distinguishedwork established the thought to ensure the correctness with data integrity verification by Y. Ren et al on provable auditing of data, B. Chen et al. on remote verification of the data based on network coding and G. Ateniese et al. on prevention of untrusted access of the data. Firstly, it is to allocate computational loads in optimal among the data processing and security features. Secondly, as third party companies host the data, hence the protection is also the responsibility of that company and the data owner company need to decide upon the access of the data to the service provider. Thus, building the public auditing system with the benefit of preserving the privacyof the data is the major goal of this work. Additionally, this work also proposes a method to collect and store the access history for further statistical analysis. 2. RELATED WORK Ateniese et al.[3] proposed a proxy re encryption technique which is a secure distributed storage scheme. The blocks of content are encrypted by data owner with
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1199 symmetriccontent keys. The contentkeysareallencrypted with a master public key. Master private key and user’s public key are used to generate proxy re-encryption keys by the dataowner,using which the semitrusted servercan then convert the ciphertext into plaintext for a specific user. Zhoa et al.[4] proposed a progressive elliptic curve encryption scheme. In this pieces of data are encrypted number of times using multiple keys and later decrypted using only one key. The main problem with this technique is that it requires data owner to be online at all times. Miklauet al.[5] proposedaframeworkforaccesscontrol on published xml documents. This can be accomplished by using different cryptographic keys over different portions of xml tree. They also presented metadata nodes in the structure to enforce access control. Bennani et al.[6] proposed a model in which the database is replicated in cloud n number of times where n is the number of roles. When a role is revokedaccessrights, the database is removed. Thisleadsintheworst casetothe creation from scratch a new view and re-keying the corresponding database. The main problem with this model is that it is infeasible to implement due to high redundancy. Naor et al.[7] presented symmetric key primitives in an untrusted storage environment. This scheme is based on pre-keydistributionmechanismusingscheme.Thisreduces the public key cryptographyin software asaservicemodel. The performance of the schemes are not evaluated in this model. Weicao wang Z.Li et al.[9] suggested to encrypt every data block with a different key so that flexible cryptography based access control can be achieved. The owner needs to maintain only a few secrets through the adaptation of key derivation methods but scheme for key management is not mentioned. Zhou [10] carried out study on privacy and security, work that can be done to prevent privacy and security breaches and outlines that security laws should also be taken into consideration The cloud based data is generally accessed by the data owner, data consumers or the customers of the data owner, third party auditors and finally the cloud service provider. The owner is fully trusted in this scenario and it is the responsibility of the cloud service provider to ensure the security of the data while being accessed by the consumers. Nevertheless, the third party auditor and the cloud service providers can also access the data, while being partially trusted by the data owner. In such scenariosthe challengeof data being accessed by any attacker in terms of audit information and statistical information of the cloud service provider is non-valuable. Thusmakingthismodelchallenged by the researchers and demands improvements. Secondly, the prime disrupt of these models are to consume the computational capacityofthecloudservers.The cloud server are configured to cater the consumer and data owner demands for higher loads, but the added computational processing for the security and auditing always tend to reduce the performance. A. Evaluation of Generic Model The above discussed model is the most popular existing framework [Fig – 1] in spite of the arguments for security. Figure 1: Three Party Verification and Cloud Data Security Model The generic model is an association of the data owner, third party auditor and service provider. Along with these three parties, the consumer of the data is also to be considered. The first party, being the data owner, always can establish the secure and trusted connection to the data. In the other side, Auditor and Service Provider can also establish the connection to the data but those connections and access requests are considered to be the semi-trusted connections. Finally, the connections from the data consumers are completely untrusted and it is the responsibility of the cloud service provider to reducetherisk ofunauthorized accessby verifying the connections. 3. PROPOSED SYSTEM The major identified drawbacks of the existing systems are semi-trusted access by the third party auditors and upon introducing the security measures for the auditor access to the data, the increase in the computing load on the cloud servers. Hence, this work proposes a two way security mechanism for cloud based data separately for data consumers and auditors based on different key based accessed. In this section, this work elaborates the two ways key based mechanism and also furnishes the comparative study in order to demonstrate the performance improvements [Fig – 2].
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1200 Figure 2: Proposed Two Way Cloud Data Security Model The proposed model algorithm is divided into four parts as generate the keys, upload the files with key based encryption, access request validation and finally the data decryption. Step 1. Generation of the keys Algorithm Part – 1: Key Generation 1. Randomize two prime number selection as A & B, where A is greater than B 2. Calculate the product of two prime numbers as K = A * B 3. Consider a random polynomial of order N as ℽ(N) 4. Calculate the intermediator of the key as ℽ(N) = (A-1) * (B – 1) 5. Calculate the public prime component asE suchthatGCD (E, ℽ(N)) == 1 6. Generate the Public Key PK as PK = (E, ℽ(N)) 7. Generate the File Descriptor Private Key as FDPvK = (D1, ℽ(N)), where D1 = Eℽ(N) / | ℽ(N)| 8. Generate the File Content Private Key as FCPvK = (D2, ℽ(N)), where D2 = ℽ(N)E/ | ℽ(N)| Nevertheless, the key generation algorithm canbereplaced by any proprietary encryption and decryption algorithmin general and the modified algorithm will not change the performance improvements of this proposed framework. Step -2. Encryption of the file data and uploading of the file Algorithm Part – 2: Encrypt and Merge for Upload 1. Segregate the file descriptor and the file content as consider as FD and FC respectively 2. If FD is not encrypted, then encrypt with PK & FDPvK, else continue to the next part 3. If FC is not encrypted, then encrypt with PK & FCPvK, else continue to the next part 4. If FD & FC both are encrypted, then merge the encrypted FD & FC and upload the file to the cloud storage Once the files are uploaded on to the cloud, then the access requests can be accepted and process for the validation Step -3. Access request validation Algorithm Part – 3: Access Request Validation 1. If the access request is been made for the auditing access, then verify the request with the key combination of PK & FDPvK. 2. Once, the verification is valid, and label the request as FDR. Else terminate the request. 3. Else If the access request is been made for the data access, then verify the request with the key combination of PK & PCPvK 4. Once, the verification is valid, and label the request as FCR. Else terminate the request. This step will significantly reduce the computational overload of the security process and also ensure semi- trusted access to the core components of the cloud data. Step -4. Decryption of the file Algorithm Part – 4: Decryption of the Content 1. If the requester label is FDR, then process the file descriptor and decrypt. 2. Else If the requester label is FCR, then process the file content and decrypt file descriptor and content both. 4. CONCLUSION This paper presented a set of security procedures to secure the data of a data owner in cloud. The combinedapproachof access control and cryptography is used to protect
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1201 outsourced data. The acceptance of the cloud computing is due to the nature of the applications and services to be scalable during the fluctuation of the demands. This characteristic alone gained a lot of popularity and acceptance of cloud computing. This proposed method not only enhances the security measures, also demonstratesthe reduction in response time as far as the encryption and decryption is concerned. This improvement will certainly help the researcher community to rethink on the security protocols those are used and predict the newer research dimensions. 5. REFERENCES 1. G. Ateniese, K. Fu, M. Green, and S. Hohenberger, “Improved proxy re-encryption schemes with applications to secure distributed storage”, ACM Transactions on Information and System Security, Vol. 9, No. 1, Feb 2006, pp. 1-30. 2. Zhao G, Rong C, Li J, Zhang F, Tang Y (2010) “Trusted data sharing over untrusted cloud storage providers” IEEE second international conference cloud computing technology and science(CloudCom) 2010, pp 97–103. 3. G. Miklau, and D. Suciu” Controlling access to published data using cryptography”, Proc. 29th VLDB, Germany, Sept 2003, pp. 898-909. 4. Bennani N, Damiani E(2010)” Towardscloud based key management for outsourced databases” IEEE 34th annual computer software and application conference workshop 2010 pp. 232-236. 5. Dalit Naor, A. Shenhav, and A. Wool” Toward securing untrusted storage without public-key operations”, Proc. 2005 ACM Workshop on Storage Security and Survivability (StorageSS), Virginia, USA, Nov 2005, pp. 51-56. 6. Rolf Blom, “An optimal class of symmetric key generation systems”, Proc. Eurocrypt 84 workshop on Advances in cryptology: theory and application of cryptographic techniques, Springer Verlag, NY, USA, 1985, pp. 335- 338. 7. Weicao wang Z.Li "On Securing untrusted clouds with cryptography”,Proceedings of the 9th annual ACM workshop on Privacy in the electronic society.,ACM, 2010. 8. Zhou M, Zhang R, Xiew, Qian W, Zhou A (2010),” Security and privacy in cloud computing: a survey” Sixth International Conferences on Emantics Knowledge And Grid 2010. 9. Maninder Singh , Sarbjeet Singh, “Design and implementation of multi-tierauthenticationscheme in cloud”, International Journal ofComputerScience Issues(IJCSI), ISSN (Online):1694-0814,Vol.9,Issue 5, No 2, pp. 181-187, September 2012. 10. Abdul Raouf Khan, “Access control In cloud computing envirome. 11. P. M. Mell and T. Grance, ``The NIST denition of cloud computing,''Commun. ACM, vol. 53. no. 6, p. 50, 2011. 12. G. Han, A. Qian, J. Jiang, N. Sun, and L. Liu, ``A grid- based joint routing and charging algorithm for industrial wirelessrechargeable sensor networks,'' Comput. Netw., vol. 101, no. 6, pp. 1928, 2016. 13. T. Qiu, D. Luo, F. Xia, N. Deonauth,W. Si, andA.Tolba, ``A greedy model with small world for improving the robustness of heterogeneous Internet of Things,'' Comput. Netw., vol. 101, no. 6, pp. 127143, 2016. 14. M. Ali, S. U. Khan, and A. V. Vasilakos, ``Security in cloud computing: Opportunities and challenges,'' Inf. Sci., vol. 305, pp. 357383, Jun. 2015.
Download now