SlideShare a Scribd company logo
1 of 6
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 262
PROXY-ORIENTED DATA UPLOADING IN MULTI CLOUD STORAGE
Mr.Sridharan.S 1, Kirubalani.J2, Padmapriya.M3 ,Sri Dhanalakshmi.A.M4
1Assistant Professor & Head, University college of Engineering, Thirukkuvalai, Tamilnadu, India
2,3,4 Student , University college of Engineering, Thirukkuvalai, Tamilnadu, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Computing ability and storage spaceneedofthese
devices are ever-increasing enormously, it demandsthesecure
way of storing the data in cost efficient model. There are vast
numbers of users who use cloud services through mobile
devices such as mobiles, PDA, tablets, laptops outstanding to
its portability feature. Cloud Computing has manyadvantages
inherent in it, but yet there are several risks and constraint
exists, for e.g. protection, data access control, efficiency,
bandwidth, etc a novel remote data integrity checking model:
CP-ABE, IDP (identity-based proxy) inmulti-cloudstorage.The
formal system model and security model are given. Based on
the bilinear pairings, a concrete IDP protocol is designed.To
analyze the efficiency of various well known cryptographic
algorithms such as Identity-based cryptography, Proxy public
key cryptography, these symmetric algorithms were
implemented on cloud background and through the results
derived from real time implementation of these algorithmson
various handheld procedure, it is shown that which
cryptographic technique can provide efficient and reliable
security mechanism for information access control and
security of user’s outsourced information in cloud computing.
Key Words: Data security, Cryptographic techniques;
Identity-based cryptography, Proxy public key
cryptography, CP-ABE.
I. INTRODUCTION
Cloud Computing is an emerging knowledge and its
popularity is increasing drastically day-by-day. Already a
huge total of population has accepted it for their various
personal and commercial uses and the counting is still
incrementing. Routinely Cloud storage services users to
abstractedly outsource their data and have the benefitofon-
demand high superiority cloud application withnosuffering
of having local hardware and software tools. Although the
advantages are understandable, such a overhaul is also
taking up users ‘physical control’ of their outsourced
information, which unavoidably createsnewsecuritythreats
towards the accuracy of the information in cloud. To start
workingon data access control, initially a study is necessary
to find out effectiveness of cryptographic algorithms so that
data operations on could be fast and consistent. User
mobility, that means “anytime, anywhere” is turning in toan
actuality. Making use of tools, computing ability from cloud
computing technology and Internet convenience jointly is
making a new surge, which is cloud computing for
organizations.
Cloud computing comes with many advantages such as, due
to high resource availability on cloud servers, memberneed
not worry to have very high arrangement deviceswith them
for efficiency and power performance also CSPs provide
possessions in rental basis and are much more economical
than buying expensive hardware. As user need to pay as per
procedure and range of hardware chosen so itisscalableand
user can limit their resources to make it under their budget.
The most excellent part here is its global availability due to
data storage on server side and accessibility over internet.
Key supervision is another vast area of research and still
studiesare going on to make key management moresecured
and resourceful. Let us in brief have a discussion regarding
the security problems that take place with key management
on devices with outsourcing information on cloud server.
Common security problems in key management are
 Effectiveness in operations
 Strong protection of cryptographic algorithms
 Keys being fetch
 Keys being susceptible to hack or cooperation
 Supervision of all keys
 Requires to calculate linearly to manage many keys
 Permitting approved members access to their
information
II LITERATURE SURVEY
In [1] authorsintroduced a model for AES thatallowsaclient
that hasoutsourced data at an untrusted cloud to verify that
the server possesses the unique data without downloading
it. This model generates a probabilistic proof of possession
through example random set of blocks from the server,
which significantly reduces cost. The data owner maintain a
constant amount of data to verify the proof. The
request/response protocol transmits a little, constant
amount of data, which reducesnetwork statement.Thus,the
AES model for remote information integrity checking
supports the large information sets in widely-distributed
storage scheme. The key component of this scheme is the
homomorphism verifiable tags.
In [2] authors introduce the proficient and secured
outsourced information is addressed either by public key
cryptography or requiring the member to outsource itsdata
in encrypted form called EPDP (Efficient-PDP). This tech-
nique is based completely on symmetric key cryptography
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 263
and not require any bulk encryption. It allows dynamic data
that efficiently support operation, such as block updation,
deletion. Two different approaches PDP and POR have been
proposed. The POR is a public key based technique allowing
any verifier to query the server and obtain an interactive
proof of information possession.
In [3] authors expected the POR method permits back-up
examination to produce a concise proof that a client can
retrieve a file F, that is, that the archive retain and
dependably transmits file data sufficient for the user to
recover F in its whole. A POR is a kind of cryptographic
evidence of knowledge (POK), but one specially designed to
handle a big file F. To discover POR protocols, in which the
message expenses, memory accesses for the proven, and
storage necessities of the member are small parameters
fundamentally independent of the length of F. The goal of a
POR is to achieve these checks without client having to
regain the files themselves. A POR can also provide service
with quality assurances.
In [4] authors introduce the problem of ensure the integrity
of data storage. In particular, to think about the jobofallowa
third party auditor, on behalf of the consumer to verify the
integrity of the energetic information stored in the cloud
server. The introduction of third party auditor reduces the
participation of the client through the auditing of whether
their data in the cloud is certainly intact, which can be
essential in achieving financial system of scale for Cloud
Computing.
In [5] authors careful the cloud data storage space
protection, which has always been an important aspect of
ensures the accuracy of member data in the cloud, it is
denote ineffective and flexible scattered confirmation
scheme with two elements. By utilize the homomorphism
token with flexible distributed verification achieves the
storage space correctness and data error localization.Unlike
the popular past works, this system further supportsafeand
efficient dynamic operation son data blocks, including:
information insert, update, delete and append.
III METHODOLOGY
3.1 CRYPTOGRAPHIC APPROACH
The encryption algorithm is most intermittently used
procedure to protect data within cloud environment. The
data related to a customer can be categorized as public data
and private data. The public data is sharable among trusted
clients that provide an open environment for cooperation.
Private data is client’s trustworthy data that must be
transferred in encrypted form for security and privacy. In
this paper propose a suitable method that cryptographic
algorithms with different key length are used in various
environment. The number of devices such as smart phones
and smart pads grows rapidly recently. These two keys are
the same or easy to deduce each other. The representatives
of symmetric cryptosystem areIdentity-basedcryptography,
Proxy public key cryptography, CP-ABE. For an asymmetric
cryptosystem, the receiver possesses private key and public
key. The public key can be published but the private key
should be kept secret.
SECURITY MODEL FOR CP-ABE
Setup: The challengers run the Setup algorithmand give the
community constraint, PK to the opponent
Phase 1: The adversary makes repeated private keys
corresponding to sets of attributes S1, . . . , Sq1 .
Challenge: The adversary submits two equal length
messages M0 and M1. In addition the adversary gives a
challenge accessstructure A∗ such that none of the sets S1,..
. , Sq1 from Phase 1 satisfy the access structure. The
challenger flips a random coin b, and encrypts Mb under A.
The ciphertext CT* is given to the adversary.
Proposed solution consists of 4 phases, Setup Phase, Key
Generation Phase, Encryption Phase and Decryption Phase.
Set Up:
The setup algorithm chooses a group F of prime order p and
a generator g.
Step 1: A trust ability generate a tuple F=[p,F,F1,g Î F, e]
Gen(1k) .
Step 2: For each attribute ai where 1 ≤i ≤n, the authority
generates random value {ai ,t Î *p Z } 1 ≤t ≤ni and computes
{T i, t = i t a g , } 1 ≤t ≤ni
Step 3: Compute Y = e(g, g)α where α Î *p Z
Step 4: The public key PK consists of [Y,p,F,F1 ,e ,{{T i, t } 1 ≤t
≤ni }1 ≤i ≤n]
The master key Mk is [α, {{ai, t Î *p Z } 1 ≤t ≤ni} 1 ≤i ≤n]
3.2 System Model and Security Model of
ID-PUIC
The system model and security model of IDP protocol. An
IDP protocol consists of four different entities which are
described below:
1) Original Client: an entity, which has massive data to be
uploaded to PCS by the delegated proxy, can perform the
remote data integrity checking.
2) PCS (Public Cloud Server): an entity, which is managedby
cloud service supplier, has important storage space and
computation resource to maintain the clients’ data.
3) Proxy: an entity, which is authorized to process the
Original Client’s data and upload them, is selected and
authorized by Original Client. When Proxy satisfies the
warrant m! Which is signed and issued by Original- Client, it
can process and upload the original client’s data; otherwise,
it can not perform the procedure.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 264
4) KGC (Key Generation Center): an entity,whenreceivingan
identity, it generates the private key which corresponds to
the received identity.
An efficient ID-DPDP protocol. It is built from bilinear
pairings which will be briefly reviewed below.
Let F1 and F2 be two cyclic multiplicative groups with the
same prime order q. Let e : F1 × F1 → F2 be a bilinear map
which satisfies the subsequent property:
1) Bilinearity: ∀g1, g2, g3 ∈ F1 and a, b ∈ Zq
e(g1, g2g3) = e(g2g3, g1) = e(g2, g1)e(g3, g1)
e(g1a, g2b) = e(g1, g2)ab
2) Non-degeneracy: ∃g4, g5 ∈ F1 such that e(g4, g5) 6=1F2.
Fig -1: Architecture
3.3 System Model and Security Model of Proxy
Public Key Cryptography
The proxy public key cryptography system model and
security definition are presented in this section. A proxy
public key cryptography protocol comprises four different
entities which are illustrated in Figure 1. We describe them
below:
1) Client: an entity, which has massive data to be stored on
the multi-cloud for maintenance and computation, can be
either individual consumer or corporation.
2) CS (Cloud Server): an entity, which is managed by cloud
service provider, has significant storage space and
computation resource to maintain the clients’ data.
3) Combiner: an entity, which receives the storage request
and distributes the block-tag pairs to the corresponding
cloud servers. When receiving the challenge, it splits the
challenge and distributesthem to the differentcloudservers.
When receiving the responses from the cloud servers, it
combines them and sends the combined response to the
verifier.
4) PKG (Private Key Generator): an entity, when receiving
the identity, it outputs the corresponding private key.
IV EXPERIMENT AND RESULTS
The proposed method has been implemented using JAVA
Technology. Extensiveexperiment were conducted to check
good organization of symmetric algorithms on mobile
background for encryption and decryption of data before
outsourcing data to cloud servers. Implemented revealed
performance of algorithmsi.e. when executed fordiverseno.
of operations separately. Below the output of algorithm
performance which were found in study:
Structure Model and Security Model Of IDP
4.1 Cloud server
It is a CSP in cloud computing. Server uses glassfish
server and web services to communicate with mobile
applications. Here SOAP is used for connection between
client and server. Two types of servers are used.
a) Storage server:
Here outsourced information isstoredintheformof
encrypted files. It is used for storage purpose only no
computation is done.
b) Trusted hashing server:
This is THS server used for store log of hash of files
for backup. Its computing display place performs both
computations as well as storage of hash.
Database:
SQLSERVER is used as a database. Here encrypted user files
are stored.
4.2 User Registration
This module is designed for new userswho visit this project.
The new user has to register with the proper details. This
system requires a proper user authentication for accessing
the features behind in this system. For getting the rights to
accessing the featuresusershave to register their identityto
this system. Once registered the system will provides the
accessibility rights to the users to work in this system.
File Upload
Not all files are straight stored in multiple clouds, but only
the files that are verified by the trusted TPA are uploaded. If
any corrupted file is loaded, then that file cannot be saved
instead they may be deleted by the TPA. The File may be
encrypted using the cryptographic key in whichisatrandom
generated.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 265
File Division
The Cloud User who has a huge amount of data to be stored
in several clouds and has the permissions to access and
manipulate stored data. The member’s Data is transformed
into data blocks of different sizes for improving the
efficiency of storage and as well as to improve the securityof
file.
File verification
Using the cryptographic key the file is encrypted and by
using this key the file datas may be decrypted by the third
party auditor for the verification process
File download
Only the verified Files can be downloaded by the File
member. If the user wantsto download their documents,the
data stored in multi-cloud is integrated and downloaded.
View All Files
All the Files in the web including verified data and not-
verified are viewed by the Administrator.
View File Owners
Registered File Owners are viewed by the Administrator.
Admin can have the facility to contact the file owners and
can monitor the storage space used by the file owners.
File Deletion
The Uploaded file can be deleted by the File Owner. The
protection can be increased if we are making key
certification along with the deletion process. One problem
can arise is in the case of key remembrance.
Fig-2: Process flow Diagram
Fig-3: Cloud Member Registration
Fig -4: Cloud Member Login
Fig -5: Data Upload
Fig -6: File Spilt 3 Server
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 266
Fig -4: File View
IV. CONCLUSION
In multi-cloud storage, this paper formalizesthe IDPsystem
model and security model. At the same time, we propose the
first IDP protocol which is provably secure under the
assumption that the CDH problem is hard. Besides of the
elimination of certificate management, our IDPprotocol has
also flexibility and high efficiency. At the same time, the
proposed IDP protocol can realize private verification,
delegated verification and public verification based on the
client’s authorization. When the proposed protocol is
compared for efficiency in terms of time and memory, it
proved to be advantages for small sized file asforasmemory
consumption is concerned. The proposed works faster. It is
simple and requires no complex computations,andyetyields
accurate estimation. The distributed cloud storage is
indispensable.
REFERENCES
[1]. Kumar, K., Lu, Y.-H.: Yung-Hsiang Lu: Cloud Computing
for Mobile Users: Can Offloading Computation Save Energy?
Computer 43(4), 51– 56 (2010)
[2]. Simoens, P., De Turck, F., Dhoedt, B., Demeester, P.:
Remote Display Solutions for Mobile Cloud Computing.
Computer 44(8), 46–53 (2011)
[3]. Ayesha Malik, Muhammad Mohsin Nazir, "Security
Framework for Cloud Computing Environment: A Review,"
Journal of Emerging Trends in Computing and Information
Sciences, 2012.
[4]. Shashi Mehrotra Seth, Rajan Mishra, “Comparative
Analysis Of Encryption Algorithms For Data
Communication," IJCST Vol. 2, Issue 2, June 2011 .
[5]. Shahryar Shafique Qureshi1 , Toufeeq Ahmad1, Khalid
Rafique2, Shuja-ul-islam3 “Mobile cloudcomputingasfuture
for mobile applications – implementation methods and
challenging issues”-2011.
[6]. Mell P, Grance T (2011) The NIST definition of Cloud
Computing. NIST, SpecialPublication800–145,Gaithersburg,
MD
[7]. 29. Zhang Q, Cheng L, Boutaba R (2010) Cloud
Computing: state-of-the-art and research challenges.Journal
of Internet Services Applications 1(1):7–18
[8]. Pearson, S., Y. Shen, and M. Mowbray, “A Privacy
Manager for Cloud Computing”, in Proceedings of the 1st
International Conference on Cloud Computing. 2009,
Springer-Verlag: Beijing, China. p. 90-106.
[9]. Wang, Q., et al., “Enabling Public Verifiability and Data
Dynamics for Storage Security in Cloud Computing”, in
Computer Security – ESORICS 2009, M. Backes and P. Ning,
Editors. 2009, Springer Berlin / Heidelberg. p. 355-370.
[10]. Hoang T. Dinh, Chonho Lee, Dusit Niyato, and Ping
Wang. A Survey of Mobile Cloud Computing: Architecture
Applications, and Approaches,In Wireless Communications
and Mobile Computing 2011.
[11]. Wei Ren, Linchen Yu, Ren Gao, Feng Xiong.Lightweight
and Compromise Resilient Storage Outsourcing with
Distributed Secure Accessibility in Mobile Cloud Computing.
Tsinghua Science And Technology, ISSNl1007-
0214ll06/09llpp520 528. Volume 16, Number 5, October
2011.
[12]. Liu Q, Wang G, Wu J. Efficient sharing of secure cloud
storage services. In: 2010 IEEE 10th International
Conference on Computer and Information Technology
(CIT10). Bradford, West Yorkshire, UK, 2010: 922-929.
[13]. Jim Luo And Myong Kang, 2011.“Application Lockbox
for mobile device security” Aman Sagar, Sanjeev Kumar,
Palladium in Cryptography:HCTL OpenInternationalJournal
of Technology Innovations and Research, Volume 7,January
2014, ISSN: 2321-1814, ISBN: 978-1-62951-250-1.
[14]. P. Syam Kumar, R. Subramanian and D. Thamizh
Selvam, Ensuring Data Storage Security in CloudComputing
using Sobol Sequence, 978-1-4244- 7674-9/10., IEEE, 2010.
[15]. Rahul Bhatnagar, Suyash Raizada, Pramod Saxena,
SECURITY IN CLOUD COMPUTING, InternationalJournalFor
Technological Research In Engineering, ISSN (Online):2347
4718, December - 2013.
[16]. Venkata Sravan Kumar, Maddineni Shivashanker Ragi,
Security Techniquesfor Protecting DatainCloudComputing,
Master SE – 371 79 Karlskrona Sweden, November 2011.
[17]. K. Kumar and Y. H. Lu, “Cloud Computing For Mobile
Users: Can Offloading Computation Save Energy?,” IEEE
Journal Computer, vol.43, pp. 51-56, April 2010.
[18]. E. Lagerspetz and S. Tarkoma, “Mobile Search and the
Cloud: The Benefits of Offloading,” IEEE International
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 267
Conference on Workshops (PERCOM Workshops), pp. 117–
122, March 2011.
[19]. X. Zhang, J. Schiffman, S. Gibbs, A. Kunjithapatham , and
S. Jeong, “Securing Elastic Applications onMobileDevicesfor
Cloud Computing,” Proc.
[20]. W. Ren, L. Yu, R. Gao, and F. Xiong, “Lightweight and
Compromise Resilient Storage Outsourcing withDistributed
Secure Accessibility in Mobile Cloud Computing,” vol. 16,
pp.520-528, October 2011.

More Related Content

What's hot

Data integrity proof techniques in cloud storage
Data integrity proof techniques in cloud storageData integrity proof techniques in cloud storage
Data integrity proof techniques in cloud storageIAEME Publication
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET-  	  Secure Data Deduplication and Auditing for Cloud Data StorageIRJET-  	  Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET- Secure Data Deduplication and Auditing for Cloud Data StorageIRJET Journal
 
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...IJSRD
 
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud MembersAn Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud MembersIRJET Journal
 
Protection of data using linear programming and fhe technique in cloud computing
Protection of data using linear programming and fhe technique in cloud computingProtection of data using linear programming and fhe technique in cloud computing
Protection of data using linear programming and fhe technique in cloud computingIAEME Publication
 
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute-Based Encryption for Access of Secured Data in Cloud StorageAttribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute-Based Encryption for Access of Secured Data in Cloud StorageIJSRD
 
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...IJSRED
 
An Efficient PDP Scheme for Distributed Cloud Storage
An Efficient PDP Scheme for Distributed Cloud StorageAn Efficient PDP Scheme for Distributed Cloud Storage
An Efficient PDP Scheme for Distributed Cloud StorageIJMER
 
IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...
IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...
IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...IRJET Journal
 
Encrypted Query Processing Based Log Management in the Cloud for Improved Pot...
Encrypted Query Processing Based Log Management in the Cloud for Improved Pot...Encrypted Query Processing Based Log Management in the Cloud for Improved Pot...
Encrypted Query Processing Based Log Management in the Cloud for Improved Pot...Editor IJCATR
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingIRJET Journal
 
Mutual query data sharing protocol for public key encryption through chosen-c...
Mutual query data sharing protocol for public key encryption through chosen-c...Mutual query data sharing protocol for public key encryption through chosen-c...
Mutual query data sharing protocol for public key encryption through chosen-c...IJECEIAES
 
DIVISION AND REPLICATION OF DATA IN GRID FOR OPTIMAL PERFORMANCE AND SECURITY
DIVISION AND REPLICATION OF DATA IN GRID FOR OPTIMAL PERFORMANCE AND SECURITYDIVISION AND REPLICATION OF DATA IN GRID FOR OPTIMAL PERFORMANCE AND SECURITY
DIVISION AND REPLICATION OF DATA IN GRID FOR OPTIMAL PERFORMANCE AND SECURITYijgca
 
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET Journal
 
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET Journal
 

What's hot (18)

Data integrity proof techniques in cloud storage
Data integrity proof techniques in cloud storageData integrity proof techniques in cloud storage
Data integrity proof techniques in cloud storage
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET-  	  Secure Data Deduplication and Auditing for Cloud Data StorageIRJET-  	  Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
 
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...
 
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud MembersAn Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
 
Protection of data using linear programming and fhe technique in cloud computing
Protection of data using linear programming and fhe technique in cloud computingProtection of data using linear programming and fhe technique in cloud computing
Protection of data using linear programming and fhe technique in cloud computing
 
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute-Based Encryption for Access of Secured Data in Cloud StorageAttribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
 
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
 
An4201262267
An4201262267An4201262267
An4201262267
 
An Efficient PDP Scheme for Distributed Cloud Storage
An Efficient PDP Scheme for Distributed Cloud StorageAn Efficient PDP Scheme for Distributed Cloud Storage
An Efficient PDP Scheme for Distributed Cloud Storage
 
IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...
IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...
IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...
 
Encrypted Query Processing Based Log Management in the Cloud for Improved Pot...
Encrypted Query Processing Based Log Management in the Cloud for Improved Pot...Encrypted Query Processing Based Log Management in the Cloud for Improved Pot...
Encrypted Query Processing Based Log Management in the Cloud for Improved Pot...
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy Preserving
 
Mutual query data sharing protocol for public key encryption through chosen-c...
Mutual query data sharing protocol for public key encryption through chosen-c...Mutual query data sharing protocol for public key encryption through chosen-c...
Mutual query data sharing protocol for public key encryption through chosen-c...
 
DIVISION AND REPLICATION OF DATA IN GRID FOR OPTIMAL PERFORMANCE AND SECURITY
DIVISION AND REPLICATION OF DATA IN GRID FOR OPTIMAL PERFORMANCE AND SECURITYDIVISION AND REPLICATION OF DATA IN GRID FOR OPTIMAL PERFORMANCE AND SECURITY
DIVISION AND REPLICATION OF DATA IN GRID FOR OPTIMAL PERFORMANCE AND SECURITY
 
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
 
Ijcnc050208
Ijcnc050208Ijcnc050208
Ijcnc050208
 
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud Computing
 

Similar to Proxy data uploading in multi-cloud storage

A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud DataA Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud DataIRJET Journal
 
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudIJTET Journal
 
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...IRJET Journal
 
Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240Editor IJARCET
 
Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240Editor IJARCET
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET Journal
 
IRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud DataIRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud DataIRJET Journal
 
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud StorageIRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud StorageIRJET Journal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Enabling Cloud Storage Auditing with Key Exposure Resistance
Enabling Cloud Storage Auditing with Key Exposure ResistanceEnabling Cloud Storage Auditing with Key Exposure Resistance
Enabling Cloud Storage Auditing with Key Exposure ResistanceIRJET Journal
 
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...IRJET Journal
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET Journal
 
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- Secure Database Management and Privacy Preserving in Cloud ServerIRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- Secure Database Management and Privacy Preserving in Cloud ServerIRJET Journal
 
Multi-Server Authentication Key Exchange Approach in BIGDATA Environment
Multi-Server Authentication Key Exchange Approach in BIGDATA EnvironmentMulti-Server Authentication Key Exchange Approach in BIGDATA Environment
Multi-Server Authentication Key Exchange Approach in BIGDATA EnvironmentIRJET Journal
 
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...IRJET Journal
 
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on CloudIRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on CloudIRJET Journal
 
IRJET- Secure Cloud Storage through Dual Protection
IRJET- Secure Cloud Storage through Dual ProtectionIRJET- Secure Cloud Storage through Dual Protection
IRJET- Secure Cloud Storage through Dual ProtectionIRJET Journal
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...IRJET Journal
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET Journal
 

Similar to Proxy data uploading in multi-cloud storage (20)

A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud DataA Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
 
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-Cloud
 
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
 
Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240
 
Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
 
IRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud DataIRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud Data
 
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud StorageIRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Enabling Cloud Storage Auditing with Key Exposure Resistance
Enabling Cloud Storage Auditing with Key Exposure ResistanceEnabling Cloud Storage Auditing with Key Exposure Resistance
Enabling Cloud Storage Auditing with Key Exposure Resistance
 
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
 
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- Secure Database Management and Privacy Preserving in Cloud ServerIRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
 
Multi-Server Authentication Key Exchange Approach in BIGDATA Environment
Multi-Server Authentication Key Exchange Approach in BIGDATA EnvironmentMulti-Server Authentication Key Exchange Approach in BIGDATA Environment
Multi-Server Authentication Key Exchange Approach in BIGDATA Environment
 
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
 
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on CloudIRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on Cloud
 
IRJET- Secure Cloud Storage through Dual Protection
IRJET- Secure Cloud Storage through Dual ProtectionIRJET- Secure Cloud Storage through Dual Protection
IRJET- Secure Cloud Storage through Dual Protection
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 

Recently uploaded (20)

ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 

Proxy data uploading in multi-cloud storage

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 262 PROXY-ORIENTED DATA UPLOADING IN MULTI CLOUD STORAGE Mr.Sridharan.S 1, Kirubalani.J2, Padmapriya.M3 ,Sri Dhanalakshmi.A.M4 1Assistant Professor & Head, University college of Engineering, Thirukkuvalai, Tamilnadu, India 2,3,4 Student , University college of Engineering, Thirukkuvalai, Tamilnadu, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Computing ability and storage spaceneedofthese devices are ever-increasing enormously, it demandsthesecure way of storing the data in cost efficient model. There are vast numbers of users who use cloud services through mobile devices such as mobiles, PDA, tablets, laptops outstanding to its portability feature. Cloud Computing has manyadvantages inherent in it, but yet there are several risks and constraint exists, for e.g. protection, data access control, efficiency, bandwidth, etc a novel remote data integrity checking model: CP-ABE, IDP (identity-based proxy) inmulti-cloudstorage.The formal system model and security model are given. Based on the bilinear pairings, a concrete IDP protocol is designed.To analyze the efficiency of various well known cryptographic algorithms such as Identity-based cryptography, Proxy public key cryptography, these symmetric algorithms were implemented on cloud background and through the results derived from real time implementation of these algorithmson various handheld procedure, it is shown that which cryptographic technique can provide efficient and reliable security mechanism for information access control and security of user’s outsourced information in cloud computing. Key Words: Data security, Cryptographic techniques; Identity-based cryptography, Proxy public key cryptography, CP-ABE. I. INTRODUCTION Cloud Computing is an emerging knowledge and its popularity is increasing drastically day-by-day. Already a huge total of population has accepted it for their various personal and commercial uses and the counting is still incrementing. Routinely Cloud storage services users to abstractedly outsource their data and have the benefitofon- demand high superiority cloud application withnosuffering of having local hardware and software tools. Although the advantages are understandable, such a overhaul is also taking up users ‘physical control’ of their outsourced information, which unavoidably createsnewsecuritythreats towards the accuracy of the information in cloud. To start workingon data access control, initially a study is necessary to find out effectiveness of cryptographic algorithms so that data operations on could be fast and consistent. User mobility, that means “anytime, anywhere” is turning in toan actuality. Making use of tools, computing ability from cloud computing technology and Internet convenience jointly is making a new surge, which is cloud computing for organizations. Cloud computing comes with many advantages such as, due to high resource availability on cloud servers, memberneed not worry to have very high arrangement deviceswith them for efficiency and power performance also CSPs provide possessions in rental basis and are much more economical than buying expensive hardware. As user need to pay as per procedure and range of hardware chosen so itisscalableand user can limit their resources to make it under their budget. The most excellent part here is its global availability due to data storage on server side and accessibility over internet. Key supervision is another vast area of research and still studiesare going on to make key management moresecured and resourceful. Let us in brief have a discussion regarding the security problems that take place with key management on devices with outsourcing information on cloud server. Common security problems in key management are  Effectiveness in operations  Strong protection of cryptographic algorithms  Keys being fetch  Keys being susceptible to hack or cooperation  Supervision of all keys  Requires to calculate linearly to manage many keys  Permitting approved members access to their information II LITERATURE SURVEY In [1] authorsintroduced a model for AES thatallowsaclient that hasoutsourced data at an untrusted cloud to verify that the server possesses the unique data without downloading it. This model generates a probabilistic proof of possession through example random set of blocks from the server, which significantly reduces cost. The data owner maintain a constant amount of data to verify the proof. The request/response protocol transmits a little, constant amount of data, which reducesnetwork statement.Thus,the AES model for remote information integrity checking supports the large information sets in widely-distributed storage scheme. The key component of this scheme is the homomorphism verifiable tags. In [2] authors introduce the proficient and secured outsourced information is addressed either by public key cryptography or requiring the member to outsource itsdata in encrypted form called EPDP (Efficient-PDP). This tech- nique is based completely on symmetric key cryptography
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 263 and not require any bulk encryption. It allows dynamic data that efficiently support operation, such as block updation, deletion. Two different approaches PDP and POR have been proposed. The POR is a public key based technique allowing any verifier to query the server and obtain an interactive proof of information possession. In [3] authors expected the POR method permits back-up examination to produce a concise proof that a client can retrieve a file F, that is, that the archive retain and dependably transmits file data sufficient for the user to recover F in its whole. A POR is a kind of cryptographic evidence of knowledge (POK), but one specially designed to handle a big file F. To discover POR protocols, in which the message expenses, memory accesses for the proven, and storage necessities of the member are small parameters fundamentally independent of the length of F. The goal of a POR is to achieve these checks without client having to regain the files themselves. A POR can also provide service with quality assurances. In [4] authors introduce the problem of ensure the integrity of data storage. In particular, to think about the jobofallowa third party auditor, on behalf of the consumer to verify the integrity of the energetic information stored in the cloud server. The introduction of third party auditor reduces the participation of the client through the auditing of whether their data in the cloud is certainly intact, which can be essential in achieving financial system of scale for Cloud Computing. In [5] authors careful the cloud data storage space protection, which has always been an important aspect of ensures the accuracy of member data in the cloud, it is denote ineffective and flexible scattered confirmation scheme with two elements. By utilize the homomorphism token with flexible distributed verification achieves the storage space correctness and data error localization.Unlike the popular past works, this system further supportsafeand efficient dynamic operation son data blocks, including: information insert, update, delete and append. III METHODOLOGY 3.1 CRYPTOGRAPHIC APPROACH The encryption algorithm is most intermittently used procedure to protect data within cloud environment. The data related to a customer can be categorized as public data and private data. The public data is sharable among trusted clients that provide an open environment for cooperation. Private data is client’s trustworthy data that must be transferred in encrypted form for security and privacy. In this paper propose a suitable method that cryptographic algorithms with different key length are used in various environment. The number of devices such as smart phones and smart pads grows rapidly recently. These two keys are the same or easy to deduce each other. The representatives of symmetric cryptosystem areIdentity-basedcryptography, Proxy public key cryptography, CP-ABE. For an asymmetric cryptosystem, the receiver possesses private key and public key. The public key can be published but the private key should be kept secret. SECURITY MODEL FOR CP-ABE Setup: The challengers run the Setup algorithmand give the community constraint, PK to the opponent Phase 1: The adversary makes repeated private keys corresponding to sets of attributes S1, . . . , Sq1 . Challenge: The adversary submits two equal length messages M0 and M1. In addition the adversary gives a challenge accessstructure A∗ such that none of the sets S1,.. . , Sq1 from Phase 1 satisfy the access structure. The challenger flips a random coin b, and encrypts Mb under A. The ciphertext CT* is given to the adversary. Proposed solution consists of 4 phases, Setup Phase, Key Generation Phase, Encryption Phase and Decryption Phase. Set Up: The setup algorithm chooses a group F of prime order p and a generator g. Step 1: A trust ability generate a tuple F=[p,F,F1,g Î F, e] Gen(1k) . Step 2: For each attribute ai where 1 ≤i ≤n, the authority generates random value {ai ,t Î *p Z } 1 ≤t ≤ni and computes {T i, t = i t a g , } 1 ≤t ≤ni Step 3: Compute Y = e(g, g)α where α Î *p Z Step 4: The public key PK consists of [Y,p,F,F1 ,e ,{{T i, t } 1 ≤t ≤ni }1 ≤i ≤n] The master key Mk is [α, {{ai, t Î *p Z } 1 ≤t ≤ni} 1 ≤i ≤n] 3.2 System Model and Security Model of ID-PUIC The system model and security model of IDP protocol. An IDP protocol consists of four different entities which are described below: 1) Original Client: an entity, which has massive data to be uploaded to PCS by the delegated proxy, can perform the remote data integrity checking. 2) PCS (Public Cloud Server): an entity, which is managedby cloud service supplier, has important storage space and computation resource to maintain the clients’ data. 3) Proxy: an entity, which is authorized to process the Original Client’s data and upload them, is selected and authorized by Original Client. When Proxy satisfies the warrant m! Which is signed and issued by Original- Client, it can process and upload the original client’s data; otherwise, it can not perform the procedure.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 264 4) KGC (Key Generation Center): an entity,whenreceivingan identity, it generates the private key which corresponds to the received identity. An efficient ID-DPDP protocol. It is built from bilinear pairings which will be briefly reviewed below. Let F1 and F2 be two cyclic multiplicative groups with the same prime order q. Let e : F1 × F1 → F2 be a bilinear map which satisfies the subsequent property: 1) Bilinearity: ∀g1, g2, g3 ∈ F1 and a, b ∈ Zq e(g1, g2g3) = e(g2g3, g1) = e(g2, g1)e(g3, g1) e(g1a, g2b) = e(g1, g2)ab 2) Non-degeneracy: ∃g4, g5 ∈ F1 such that e(g4, g5) 6=1F2. Fig -1: Architecture 3.3 System Model and Security Model of Proxy Public Key Cryptography The proxy public key cryptography system model and security definition are presented in this section. A proxy public key cryptography protocol comprises four different entities which are illustrated in Figure 1. We describe them below: 1) Client: an entity, which has massive data to be stored on the multi-cloud for maintenance and computation, can be either individual consumer or corporation. 2) CS (Cloud Server): an entity, which is managed by cloud service provider, has significant storage space and computation resource to maintain the clients’ data. 3) Combiner: an entity, which receives the storage request and distributes the block-tag pairs to the corresponding cloud servers. When receiving the challenge, it splits the challenge and distributesthem to the differentcloudservers. When receiving the responses from the cloud servers, it combines them and sends the combined response to the verifier. 4) PKG (Private Key Generator): an entity, when receiving the identity, it outputs the corresponding private key. IV EXPERIMENT AND RESULTS The proposed method has been implemented using JAVA Technology. Extensiveexperiment were conducted to check good organization of symmetric algorithms on mobile background for encryption and decryption of data before outsourcing data to cloud servers. Implemented revealed performance of algorithmsi.e. when executed fordiverseno. of operations separately. Below the output of algorithm performance which were found in study: Structure Model and Security Model Of IDP 4.1 Cloud server It is a CSP in cloud computing. Server uses glassfish server and web services to communicate with mobile applications. Here SOAP is used for connection between client and server. Two types of servers are used. a) Storage server: Here outsourced information isstoredintheformof encrypted files. It is used for storage purpose only no computation is done. b) Trusted hashing server: This is THS server used for store log of hash of files for backup. Its computing display place performs both computations as well as storage of hash. Database: SQLSERVER is used as a database. Here encrypted user files are stored. 4.2 User Registration This module is designed for new userswho visit this project. The new user has to register with the proper details. This system requires a proper user authentication for accessing the features behind in this system. For getting the rights to accessing the featuresusershave to register their identityto this system. Once registered the system will provides the accessibility rights to the users to work in this system. File Upload Not all files are straight stored in multiple clouds, but only the files that are verified by the trusted TPA are uploaded. If any corrupted file is loaded, then that file cannot be saved instead they may be deleted by the TPA. The File may be encrypted using the cryptographic key in whichisatrandom generated.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 265 File Division The Cloud User who has a huge amount of data to be stored in several clouds and has the permissions to access and manipulate stored data. The member’s Data is transformed into data blocks of different sizes for improving the efficiency of storage and as well as to improve the securityof file. File verification Using the cryptographic key the file is encrypted and by using this key the file datas may be decrypted by the third party auditor for the verification process File download Only the verified Files can be downloaded by the File member. If the user wantsto download their documents,the data stored in multi-cloud is integrated and downloaded. View All Files All the Files in the web including verified data and not- verified are viewed by the Administrator. View File Owners Registered File Owners are viewed by the Administrator. Admin can have the facility to contact the file owners and can monitor the storage space used by the file owners. File Deletion The Uploaded file can be deleted by the File Owner. The protection can be increased if we are making key certification along with the deletion process. One problem can arise is in the case of key remembrance. Fig-2: Process flow Diagram Fig-3: Cloud Member Registration Fig -4: Cloud Member Login Fig -5: Data Upload Fig -6: File Spilt 3 Server
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 266 Fig -4: File View IV. CONCLUSION In multi-cloud storage, this paper formalizesthe IDPsystem model and security model. At the same time, we propose the first IDP protocol which is provably secure under the assumption that the CDH problem is hard. Besides of the elimination of certificate management, our IDPprotocol has also flexibility and high efficiency. At the same time, the proposed IDP protocol can realize private verification, delegated verification and public verification based on the client’s authorization. When the proposed protocol is compared for efficiency in terms of time and memory, it proved to be advantages for small sized file asforasmemory consumption is concerned. The proposed works faster. It is simple and requires no complex computations,andyetyields accurate estimation. The distributed cloud storage is indispensable. REFERENCES [1]. Kumar, K., Lu, Y.-H.: Yung-Hsiang Lu: Cloud Computing for Mobile Users: Can Offloading Computation Save Energy? Computer 43(4), 51– 56 (2010) [2]. Simoens, P., De Turck, F., Dhoedt, B., Demeester, P.: Remote Display Solutions for Mobile Cloud Computing. Computer 44(8), 46–53 (2011) [3]. Ayesha Malik, Muhammad Mohsin Nazir, "Security Framework for Cloud Computing Environment: A Review," Journal of Emerging Trends in Computing and Information Sciences, 2012. [4]. Shashi Mehrotra Seth, Rajan Mishra, “Comparative Analysis Of Encryption Algorithms For Data Communication," IJCST Vol. 2, Issue 2, June 2011 . [5]. Shahryar Shafique Qureshi1 , Toufeeq Ahmad1, Khalid Rafique2, Shuja-ul-islam3 “Mobile cloudcomputingasfuture for mobile applications – implementation methods and challenging issues”-2011. [6]. Mell P, Grance T (2011) The NIST definition of Cloud Computing. NIST, SpecialPublication800–145,Gaithersburg, MD [7]. 29. Zhang Q, Cheng L, Boutaba R (2010) Cloud Computing: state-of-the-art and research challenges.Journal of Internet Services Applications 1(1):7–18 [8]. Pearson, S., Y. Shen, and M. Mowbray, “A Privacy Manager for Cloud Computing”, in Proceedings of the 1st International Conference on Cloud Computing. 2009, Springer-Verlag: Beijing, China. p. 90-106. [9]. Wang, Q., et al., “Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing”, in Computer Security – ESORICS 2009, M. Backes and P. Ning, Editors. 2009, Springer Berlin / Heidelberg. p. 355-370. [10]. Hoang T. Dinh, Chonho Lee, Dusit Niyato, and Ping Wang. A Survey of Mobile Cloud Computing: Architecture Applications, and Approaches,In Wireless Communications and Mobile Computing 2011. [11]. Wei Ren, Linchen Yu, Ren Gao, Feng Xiong.Lightweight and Compromise Resilient Storage Outsourcing with Distributed Secure Accessibility in Mobile Cloud Computing. Tsinghua Science And Technology, ISSNl1007- 0214ll06/09llpp520 528. Volume 16, Number 5, October 2011. [12]. Liu Q, Wang G, Wu J. Efficient sharing of secure cloud storage services. In: 2010 IEEE 10th International Conference on Computer and Information Technology (CIT10). Bradford, West Yorkshire, UK, 2010: 922-929. [13]. Jim Luo And Myong Kang, 2011.“Application Lockbox for mobile device security” Aman Sagar, Sanjeev Kumar, Palladium in Cryptography:HCTL OpenInternationalJournal of Technology Innovations and Research, Volume 7,January 2014, ISSN: 2321-1814, ISBN: 978-1-62951-250-1. [14]. P. Syam Kumar, R. Subramanian and D. Thamizh Selvam, Ensuring Data Storage Security in CloudComputing using Sobol Sequence, 978-1-4244- 7674-9/10., IEEE, 2010. [15]. Rahul Bhatnagar, Suyash Raizada, Pramod Saxena, SECURITY IN CLOUD COMPUTING, InternationalJournalFor Technological Research In Engineering, ISSN (Online):2347 4718, December - 2013. [16]. Venkata Sravan Kumar, Maddineni Shivashanker Ragi, Security Techniquesfor Protecting DatainCloudComputing, Master SE – 371 79 Karlskrona Sweden, November 2011. [17]. K. Kumar and Y. H. Lu, “Cloud Computing For Mobile Users: Can Offloading Computation Save Energy?,” IEEE Journal Computer, vol.43, pp. 51-56, April 2010. [18]. E. Lagerspetz and S. Tarkoma, “Mobile Search and the Cloud: The Benefits of Offloading,” IEEE International
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 267 Conference on Workshops (PERCOM Workshops), pp. 117– 122, March 2011. [19]. X. Zhang, J. Schiffman, S. Gibbs, A. Kunjithapatham , and S. Jeong, “Securing Elastic Applications onMobileDevicesfor Cloud Computing,” Proc. [20]. W. Ren, L. Yu, R. Gao, and F. Xiong, “Lightweight and Compromise Resilient Storage Outsourcing withDistributed Secure Accessibility in Mobile Cloud Computing,” vol. 16, pp.520-528, October 2011.