Submit Search
Upload
Proxy data uploading in multi-cloud storage
•
0 likes
•
39 views
AI-enhanced title
IRJET Journal
Follow
https://www.irjet.net/archives/V5/i3/IRJET-V5I362.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 6
Download now
Download to read offline
Recommended
Ijariie1196
Ijariie1196
IJARIIE JOURNAL
1670 1673
1670 1673
Editor IJARCET
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET Journal
21 muhammad ahmadjan_8
21 muhammad ahmadjan_8
Alexander Decker
IRJET- Anchoring of Cloud Information under Key Presentation
IRJET- Anchoring of Cloud Information under Key Presentation
IRJET Journal
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET Journal
IRJET- Secure Skyline Queries over the Encrypted Data
IRJET- Secure Skyline Queries over the Encrypted Data
IRJET Journal
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET Journal
Recommended
Ijariie1196
Ijariie1196
IJARIIE JOURNAL
1670 1673
1670 1673
Editor IJARCET
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET Journal
21 muhammad ahmadjan_8
21 muhammad ahmadjan_8
Alexander Decker
IRJET- Anchoring of Cloud Information under Key Presentation
IRJET- Anchoring of Cloud Information under Key Presentation
IRJET Journal
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET Journal
IRJET- Secure Skyline Queries over the Encrypted Data
IRJET- Secure Skyline Queries over the Encrypted Data
IRJET Journal
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET Journal
Data integrity proof techniques in cloud storage
Data integrity proof techniques in cloud storage
IAEME Publication
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET Journal
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...
IJSRD
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
IRJET Journal
Protection of data using linear programming and fhe technique in cloud computing
Protection of data using linear programming and fhe technique in cloud computing
IAEME Publication
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
IJSRD
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
IJSRED
An4201262267
An4201262267
IJERA Editor
An Efficient PDP Scheme for Distributed Cloud Storage
An Efficient PDP Scheme for Distributed Cloud Storage
IJMER
IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...
IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...
IRJET Journal
Encrypted Query Processing Based Log Management in the Cloud for Improved Pot...
Encrypted Query Processing Based Log Management in the Cloud for Improved Pot...
Editor IJCATR
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy Preserving
IRJET Journal
Mutual query data sharing protocol for public key encryption through chosen-c...
Mutual query data sharing protocol for public key encryption through chosen-c...
IJECEIAES
DIVISION AND REPLICATION OF DATA IN GRID FOR OPTIMAL PERFORMANCE AND SECURITY
DIVISION AND REPLICATION OF DATA IN GRID FOR OPTIMAL PERFORMANCE AND SECURITY
ijgca
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET Journal
Ijcnc050208
Ijcnc050208
IJCNCJournal
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud Computing
IRJET Journal
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
IRJET Journal
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-Cloud
IJTET Journal
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
IRJET Journal
Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240
Editor IJARCET
More Related Content
What's hot
Data integrity proof techniques in cloud storage
Data integrity proof techniques in cloud storage
IAEME Publication
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET Journal
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...
IJSRD
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
IRJET Journal
Protection of data using linear programming and fhe technique in cloud computing
Protection of data using linear programming and fhe technique in cloud computing
IAEME Publication
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
IJSRD
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
IJSRED
An4201262267
An4201262267
IJERA Editor
An Efficient PDP Scheme for Distributed Cloud Storage
An Efficient PDP Scheme for Distributed Cloud Storage
IJMER
IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...
IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...
IRJET Journal
Encrypted Query Processing Based Log Management in the Cloud for Improved Pot...
Encrypted Query Processing Based Log Management in the Cloud for Improved Pot...
Editor IJCATR
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy Preserving
IRJET Journal
Mutual query data sharing protocol for public key encryption through chosen-c...
Mutual query data sharing protocol for public key encryption through chosen-c...
IJECEIAES
DIVISION AND REPLICATION OF DATA IN GRID FOR OPTIMAL PERFORMANCE AND SECURITY
DIVISION AND REPLICATION OF DATA IN GRID FOR OPTIMAL PERFORMANCE AND SECURITY
ijgca
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET Journal
Ijcnc050208
Ijcnc050208
IJCNCJournal
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud Computing
IRJET Journal
What's hot
(18)
Data integrity proof techniques in cloud storage
Data integrity proof techniques in cloud storage
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
Protection of data using linear programming and fhe technique in cloud computing
Protection of data using linear programming and fhe technique in cloud computing
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
An4201262267
An4201262267
An Efficient PDP Scheme for Distributed Cloud Storage
An Efficient PDP Scheme for Distributed Cloud Storage
IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...
IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...
Encrypted Query Processing Based Log Management in the Cloud for Improved Pot...
Encrypted Query Processing Based Log Management in the Cloud for Improved Pot...
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy Preserving
Mutual query data sharing protocol for public key encryption through chosen-c...
Mutual query data sharing protocol for public key encryption through chosen-c...
DIVISION AND REPLICATION OF DATA IN GRID FOR OPTIMAL PERFORMANCE AND SECURITY
DIVISION AND REPLICATION OF DATA IN GRID FOR OPTIMAL PERFORMANCE AND SECURITY
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
Ijcnc050208
Ijcnc050208
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud Computing
Similar to Proxy data uploading in multi-cloud storage
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
IRJET Journal
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-Cloud
IJTET Journal
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
IRJET Journal
Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240
Editor IJARCET
Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240
Editor IJARCET
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET Journal
IRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud Data
IRJET Journal
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET Journal
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
Enabling Cloud Storage Auditing with Key Exposure Resistance
Enabling Cloud Storage Auditing with Key Exposure Resistance
IRJET Journal
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
IRJET Journal
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET Journal
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET Journal
Multi-Server Authentication Key Exchange Approach in BIGDATA Environment
Multi-Server Authentication Key Exchange Approach in BIGDATA Environment
IRJET Journal
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
IRJET Journal
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET Journal
IRJET- Secure Cloud Storage through Dual Protection
IRJET- Secure Cloud Storage through Dual Protection
IRJET Journal
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
eSAT Journals
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET Journal
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET Journal
Similar to Proxy data uploading in multi-cloud storage
(20)
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-Cloud
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud Data
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
Enabling Cloud Storage Auditing with Key Exposure Resistance
Enabling Cloud Storage Auditing with Key Exposure Resistance
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
Multi-Server Authentication Key Exchange Approach in BIGDATA Environment
Multi-Server Authentication Key Exchange Approach in BIGDATA Environment
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Secure Cloud Storage through Dual Protection
IRJET- Secure Cloud Storage through Dual Protection
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZTE
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
purnimasatapathy1234
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
RajaP95
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Soham Mondal
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
KurinjimalarL3
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
eptoze12
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Dr.Costas Sachpazis
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
GDSCAESB
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
srsj9000
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
misbanausheenparvam
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
null - The Open Security Community
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
Asst.prof M.Gokilavani
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Tsuyoshi Horigome
Past, Present and Future of Generative AI
Past, Present and Future of Generative AI
abhishek36461
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
VICTOR MAESTRE RAMIREZ
Internship report on mechanical engineering
Internship report on mechanical engineering
malavadedarshan25
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
Mark Billinghurst
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
soniya singh
Recently uploaded
(20)
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Past, Present and Future of Generative AI
Past, Present and Future of Generative AI
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
Internship report on mechanical engineering
Internship report on mechanical engineering
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Proxy data uploading in multi-cloud storage
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 262 PROXY-ORIENTED DATA UPLOADING IN MULTI CLOUD STORAGE Mr.Sridharan.S 1, Kirubalani.J2, Padmapriya.M3 ,Sri Dhanalakshmi.A.M4 1Assistant Professor & Head, University college of Engineering, Thirukkuvalai, Tamilnadu, India 2,3,4 Student , University college of Engineering, Thirukkuvalai, Tamilnadu, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Computing ability and storage spaceneedofthese devices are ever-increasing enormously, it demandsthesecure way of storing the data in cost efficient model. There are vast numbers of users who use cloud services through mobile devices such as mobiles, PDA, tablets, laptops outstanding to its portability feature. Cloud Computing has manyadvantages inherent in it, but yet there are several risks and constraint exists, for e.g. protection, data access control, efficiency, bandwidth, etc a novel remote data integrity checking model: CP-ABE, IDP (identity-based proxy) inmulti-cloudstorage.The formal system model and security model are given. Based on the bilinear pairings, a concrete IDP protocol is designed.To analyze the efficiency of various well known cryptographic algorithms such as Identity-based cryptography, Proxy public key cryptography, these symmetric algorithms were implemented on cloud background and through the results derived from real time implementation of these algorithmson various handheld procedure, it is shown that which cryptographic technique can provide efficient and reliable security mechanism for information access control and security of user’s outsourced information in cloud computing. Key Words: Data security, Cryptographic techniques; Identity-based cryptography, Proxy public key cryptography, CP-ABE. I. INTRODUCTION Cloud Computing is an emerging knowledge and its popularity is increasing drastically day-by-day. Already a huge total of population has accepted it for their various personal and commercial uses and the counting is still incrementing. Routinely Cloud storage services users to abstractedly outsource their data and have the benefitofon- demand high superiority cloud application withnosuffering of having local hardware and software tools. Although the advantages are understandable, such a overhaul is also taking up users ‘physical control’ of their outsourced information, which unavoidably createsnewsecuritythreats towards the accuracy of the information in cloud. To start workingon data access control, initially a study is necessary to find out effectiveness of cryptographic algorithms so that data operations on could be fast and consistent. User mobility, that means “anytime, anywhere” is turning in toan actuality. Making use of tools, computing ability from cloud computing technology and Internet convenience jointly is making a new surge, which is cloud computing for organizations. Cloud computing comes with many advantages such as, due to high resource availability on cloud servers, memberneed not worry to have very high arrangement deviceswith them for efficiency and power performance also CSPs provide possessions in rental basis and are much more economical than buying expensive hardware. As user need to pay as per procedure and range of hardware chosen so itisscalableand user can limit their resources to make it under their budget. The most excellent part here is its global availability due to data storage on server side and accessibility over internet. Key supervision is another vast area of research and still studiesare going on to make key management moresecured and resourceful. Let us in brief have a discussion regarding the security problems that take place with key management on devices with outsourcing information on cloud server. Common security problems in key management are Effectiveness in operations Strong protection of cryptographic algorithms Keys being fetch Keys being susceptible to hack or cooperation Supervision of all keys Requires to calculate linearly to manage many keys Permitting approved members access to their information II LITERATURE SURVEY In [1] authorsintroduced a model for AES thatallowsaclient that hasoutsourced data at an untrusted cloud to verify that the server possesses the unique data without downloading it. This model generates a probabilistic proof of possession through example random set of blocks from the server, which significantly reduces cost. The data owner maintain a constant amount of data to verify the proof. The request/response protocol transmits a little, constant amount of data, which reducesnetwork statement.Thus,the AES model for remote information integrity checking supports the large information sets in widely-distributed storage scheme. The key component of this scheme is the homomorphism verifiable tags. In [2] authors introduce the proficient and secured outsourced information is addressed either by public key cryptography or requiring the member to outsource itsdata in encrypted form called EPDP (Efficient-PDP). This tech- nique is based completely on symmetric key cryptography
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 263 and not require any bulk encryption. It allows dynamic data that efficiently support operation, such as block updation, deletion. Two different approaches PDP and POR have been proposed. The POR is a public key based technique allowing any verifier to query the server and obtain an interactive proof of information possession. In [3] authors expected the POR method permits back-up examination to produce a concise proof that a client can retrieve a file F, that is, that the archive retain and dependably transmits file data sufficient for the user to recover F in its whole. A POR is a kind of cryptographic evidence of knowledge (POK), but one specially designed to handle a big file F. To discover POR protocols, in which the message expenses, memory accesses for the proven, and storage necessities of the member are small parameters fundamentally independent of the length of F. The goal of a POR is to achieve these checks without client having to regain the files themselves. A POR can also provide service with quality assurances. In [4] authors introduce the problem of ensure the integrity of data storage. In particular, to think about the jobofallowa third party auditor, on behalf of the consumer to verify the integrity of the energetic information stored in the cloud server. The introduction of third party auditor reduces the participation of the client through the auditing of whether their data in the cloud is certainly intact, which can be essential in achieving financial system of scale for Cloud Computing. In [5] authors careful the cloud data storage space protection, which has always been an important aspect of ensures the accuracy of member data in the cloud, it is denote ineffective and flexible scattered confirmation scheme with two elements. By utilize the homomorphism token with flexible distributed verification achieves the storage space correctness and data error localization.Unlike the popular past works, this system further supportsafeand efficient dynamic operation son data blocks, including: information insert, update, delete and append. III METHODOLOGY 3.1 CRYPTOGRAPHIC APPROACH The encryption algorithm is most intermittently used procedure to protect data within cloud environment. The data related to a customer can be categorized as public data and private data. The public data is sharable among trusted clients that provide an open environment for cooperation. Private data is client’s trustworthy data that must be transferred in encrypted form for security and privacy. In this paper propose a suitable method that cryptographic algorithms with different key length are used in various environment. The number of devices such as smart phones and smart pads grows rapidly recently. These two keys are the same or easy to deduce each other. The representatives of symmetric cryptosystem areIdentity-basedcryptography, Proxy public key cryptography, CP-ABE. For an asymmetric cryptosystem, the receiver possesses private key and public key. The public key can be published but the private key should be kept secret. SECURITY MODEL FOR CP-ABE Setup: The challengers run the Setup algorithmand give the community constraint, PK to the opponent Phase 1: The adversary makes repeated private keys corresponding to sets of attributes S1, . . . , Sq1 . Challenge: The adversary submits two equal length messages M0 and M1. In addition the adversary gives a challenge accessstructure A∗ such that none of the sets S1,.. . , Sq1 from Phase 1 satisfy the access structure. The challenger flips a random coin b, and encrypts Mb under A. The ciphertext CT* is given to the adversary. Proposed solution consists of 4 phases, Setup Phase, Key Generation Phase, Encryption Phase and Decryption Phase. Set Up: The setup algorithm chooses a group F of prime order p and a generator g. Step 1: A trust ability generate a tuple F=[p,F,F1,g Î F, e] Gen(1k) . Step 2: For each attribute ai where 1 ≤i ≤n, the authority generates random value {ai ,t Î *p Z } 1 ≤t ≤ni and computes {T i, t = i t a g , } 1 ≤t ≤ni Step 3: Compute Y = e(g, g)α where α Î *p Z Step 4: The public key PK consists of [Y,p,F,F1 ,e ,{{T i, t } 1 ≤t ≤ni }1 ≤i ≤n] The master key Mk is [α, {{ai, t Î *p Z } 1 ≤t ≤ni} 1 ≤i ≤n] 3.2 System Model and Security Model of ID-PUIC The system model and security model of IDP protocol. An IDP protocol consists of four different entities which are described below: 1) Original Client: an entity, which has massive data to be uploaded to PCS by the delegated proxy, can perform the remote data integrity checking. 2) PCS (Public Cloud Server): an entity, which is managedby cloud service supplier, has important storage space and computation resource to maintain the clients’ data. 3) Proxy: an entity, which is authorized to process the Original Client’s data and upload them, is selected and authorized by Original Client. When Proxy satisfies the warrant m! Which is signed and issued by Original- Client, it can process and upload the original client’s data; otherwise, it can not perform the procedure.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 264 4) KGC (Key Generation Center): an entity,whenreceivingan identity, it generates the private key which corresponds to the received identity. An efficient ID-DPDP protocol. It is built from bilinear pairings which will be briefly reviewed below. Let F1 and F2 be two cyclic multiplicative groups with the same prime order q. Let e : F1 × F1 → F2 be a bilinear map which satisfies the subsequent property: 1) Bilinearity: ∀g1, g2, g3 ∈ F1 and a, b ∈ Zq e(g1, g2g3) = e(g2g3, g1) = e(g2, g1)e(g3, g1) e(g1a, g2b) = e(g1, g2)ab 2) Non-degeneracy: ∃g4, g5 ∈ F1 such that e(g4, g5) 6=1F2. Fig -1: Architecture 3.3 System Model and Security Model of Proxy Public Key Cryptography The proxy public key cryptography system model and security definition are presented in this section. A proxy public key cryptography protocol comprises four different entities which are illustrated in Figure 1. We describe them below: 1) Client: an entity, which has massive data to be stored on the multi-cloud for maintenance and computation, can be either individual consumer or corporation. 2) CS (Cloud Server): an entity, which is managed by cloud service provider, has significant storage space and computation resource to maintain the clients’ data. 3) Combiner: an entity, which receives the storage request and distributes the block-tag pairs to the corresponding cloud servers. When receiving the challenge, it splits the challenge and distributesthem to the differentcloudservers. When receiving the responses from the cloud servers, it combines them and sends the combined response to the verifier. 4) PKG (Private Key Generator): an entity, when receiving the identity, it outputs the corresponding private key. IV EXPERIMENT AND RESULTS The proposed method has been implemented using JAVA Technology. Extensiveexperiment were conducted to check good organization of symmetric algorithms on mobile background for encryption and decryption of data before outsourcing data to cloud servers. Implemented revealed performance of algorithmsi.e. when executed fordiverseno. of operations separately. Below the output of algorithm performance which were found in study: Structure Model and Security Model Of IDP 4.1 Cloud server It is a CSP in cloud computing. Server uses glassfish server and web services to communicate with mobile applications. Here SOAP is used for connection between client and server. Two types of servers are used. a) Storage server: Here outsourced information isstoredintheformof encrypted files. It is used for storage purpose only no computation is done. b) Trusted hashing server: This is THS server used for store log of hash of files for backup. Its computing display place performs both computations as well as storage of hash. Database: SQLSERVER is used as a database. Here encrypted user files are stored. 4.2 User Registration This module is designed for new userswho visit this project. The new user has to register with the proper details. This system requires a proper user authentication for accessing the features behind in this system. For getting the rights to accessing the featuresusershave to register their identityto this system. Once registered the system will provides the accessibility rights to the users to work in this system. File Upload Not all files are straight stored in multiple clouds, but only the files that are verified by the trusted TPA are uploaded. If any corrupted file is loaded, then that file cannot be saved instead they may be deleted by the TPA. The File may be encrypted using the cryptographic key in whichisatrandom generated.
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 265 File Division The Cloud User who has a huge amount of data to be stored in several clouds and has the permissions to access and manipulate stored data. The member’s Data is transformed into data blocks of different sizes for improving the efficiency of storage and as well as to improve the securityof file. File verification Using the cryptographic key the file is encrypted and by using this key the file datas may be decrypted by the third party auditor for the verification process File download Only the verified Files can be downloaded by the File member. If the user wantsto download their documents,the data stored in multi-cloud is integrated and downloaded. View All Files All the Files in the web including verified data and not- verified are viewed by the Administrator. View File Owners Registered File Owners are viewed by the Administrator. Admin can have the facility to contact the file owners and can monitor the storage space used by the file owners. File Deletion The Uploaded file can be deleted by the File Owner. The protection can be increased if we are making key certification along with the deletion process. One problem can arise is in the case of key remembrance. Fig-2: Process flow Diagram Fig-3: Cloud Member Registration Fig -4: Cloud Member Login Fig -5: Data Upload Fig -6: File Spilt 3 Server
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 266 Fig -4: File View IV. CONCLUSION In multi-cloud storage, this paper formalizesthe IDPsystem model and security model. At the same time, we propose the first IDP protocol which is provably secure under the assumption that the CDH problem is hard. Besides of the elimination of certificate management, our IDPprotocol has also flexibility and high efficiency. At the same time, the proposed IDP protocol can realize private verification, delegated verification and public verification based on the client’s authorization. When the proposed protocol is compared for efficiency in terms of time and memory, it proved to be advantages for small sized file asforasmemory consumption is concerned. The proposed works faster. It is simple and requires no complex computations,andyetyields accurate estimation. The distributed cloud storage is indispensable. REFERENCES [1]. Kumar, K., Lu, Y.-H.: Yung-Hsiang Lu: Cloud Computing for Mobile Users: Can Offloading Computation Save Energy? Computer 43(4), 51– 56 (2010) [2]. Simoens, P., De Turck, F., Dhoedt, B., Demeester, P.: Remote Display Solutions for Mobile Cloud Computing. Computer 44(8), 46–53 (2011) [3]. Ayesha Malik, Muhammad Mohsin Nazir, "Security Framework for Cloud Computing Environment: A Review," Journal of Emerging Trends in Computing and Information Sciences, 2012. [4]. Shashi Mehrotra Seth, Rajan Mishra, “Comparative Analysis Of Encryption Algorithms For Data Communication," IJCST Vol. 2, Issue 2, June 2011 . [5]. Shahryar Shafique Qureshi1 , Toufeeq Ahmad1, Khalid Rafique2, Shuja-ul-islam3 “Mobile cloudcomputingasfuture for mobile applications – implementation methods and challenging issues”-2011. [6]. Mell P, Grance T (2011) The NIST definition of Cloud Computing. NIST, SpecialPublication800–145,Gaithersburg, MD [7]. 29. Zhang Q, Cheng L, Boutaba R (2010) Cloud Computing: state-of-the-art and research challenges.Journal of Internet Services Applications 1(1):7–18 [8]. Pearson, S., Y. Shen, and M. Mowbray, “A Privacy Manager for Cloud Computing”, in Proceedings of the 1st International Conference on Cloud Computing. 2009, Springer-Verlag: Beijing, China. p. 90-106. [9]. Wang, Q., et al., “Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing”, in Computer Security – ESORICS 2009, M. Backes and P. Ning, Editors. 2009, Springer Berlin / Heidelberg. p. 355-370. [10]. Hoang T. Dinh, Chonho Lee, Dusit Niyato, and Ping Wang. A Survey of Mobile Cloud Computing: Architecture Applications, and Approaches,In Wireless Communications and Mobile Computing 2011. [11]. Wei Ren, Linchen Yu, Ren Gao, Feng Xiong.Lightweight and Compromise Resilient Storage Outsourcing with Distributed Secure Accessibility in Mobile Cloud Computing. Tsinghua Science And Technology, ISSNl1007- 0214ll06/09llpp520 528. Volume 16, Number 5, October 2011. [12]. Liu Q, Wang G, Wu J. Efficient sharing of secure cloud storage services. In: 2010 IEEE 10th International Conference on Computer and Information Technology (CIT10). Bradford, West Yorkshire, UK, 2010: 922-929. [13]. Jim Luo And Myong Kang, 2011.“Application Lockbox for mobile device security” Aman Sagar, Sanjeev Kumar, Palladium in Cryptography:HCTL OpenInternationalJournal of Technology Innovations and Research, Volume 7,January 2014, ISSN: 2321-1814, ISBN: 978-1-62951-250-1. [14]. P. Syam Kumar, R. Subramanian and D. Thamizh Selvam, Ensuring Data Storage Security in CloudComputing using Sobol Sequence, 978-1-4244- 7674-9/10., IEEE, 2010. [15]. Rahul Bhatnagar, Suyash Raizada, Pramod Saxena, SECURITY IN CLOUD COMPUTING, InternationalJournalFor Technological Research In Engineering, ISSN (Online):2347 4718, December - 2013. [16]. Venkata Sravan Kumar, Maddineni Shivashanker Ragi, Security Techniquesfor Protecting DatainCloudComputing, Master SE – 371 79 Karlskrona Sweden, November 2011. [17]. K. Kumar and Y. H. Lu, “Cloud Computing For Mobile Users: Can Offloading Computation Save Energy?,” IEEE Journal Computer, vol.43, pp. 51-56, April 2010. [18]. E. Lagerspetz and S. Tarkoma, “Mobile Search and the Cloud: The Benefits of Offloading,” IEEE International
6.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 267 Conference on Workshops (PERCOM Workshops), pp. 117– 122, March 2011. [19]. X. Zhang, J. Schiffman, S. Gibbs, A. Kunjithapatham , and S. Jeong, “Securing Elastic Applications onMobileDevicesfor Cloud Computing,” Proc. [20]. W. Ren, L. Yu, R. Gao, and F. Xiong, “Lightweight and Compromise Resilient Storage Outsourcing withDistributed Secure Accessibility in Mobile Cloud Computing,” vol. 16, pp.520-528, October 2011.
Download now