SlideShare a Scribd company logo
1 of 10
Privacy-Preserving Public Auditing For Secure Cloud
Storage
ABSTRACT:
Using cloud storage, users can remotely store their data and enjoy the on-demand
high-quality applications and services from a shared pool of configurable
computing resources, without the burden of local data storage and maintenance.
However, the fact that users no longer have physical possession of the outsourced
data makes the data integrity protection in cloud computing a formidable task,
especially for users with constrained computing resources. Moreover, users should
be able to just use the cloud storage as if it is local, without worrying about the
need to verify its integrity. Thus, enabling public auditability for cloud storage is of
critical importance so that users can resort to a third-party auditor (TPA) to check
the integrity of outsourced data and be worry free. To securely introduce an
effective TPA, the auditing process should bring in no new vulnerabilities toward
user data privacy, and introduce no additional online burden to user. In this paper,
we propose a secure cloud storage system supporting privacy-preserving public
auditing. We further extend our result to enable the TPA to perform audits for
multiple users simultaneously and efficiently. Extensive security and performance
analysis show the proposed schemes are provably secure and highly efficient. Our
preliminary experiment conducted on Amazon EC2 instance further demonstrates
the fast performance of the design.
EXISTING SYSTEM:
In the Existing systems, the notion of public auditability has been proposed in the
context of ensuring remotely stored data integrity under different system and
security models. Public auditability allows an external party, in addition to the user
himself, to verify the correctness of remotely stored data. However, most of these
schemes do not consider the privacy protection of usersā€™ data against external
auditors. Indeed, they may potentially reveal userā€™s data to auditors. This severe
drawback greatly affects the security of these protocols in cloud computing. From
the perspective of protecting data privacy, the users, who own the data and rely on
TPA just for the storage security of their data, do not want this auditing process
introducing new vulnerabilities of unauthorized information leakage toward their
data security.
DISADVANTAGES OF EXISTING SYSTEM:
ļƒ¼ Although the infrastructures under the cloud are much more powerful and
reliable than personal computing devices, they are still facing the broad range of
both internal and external threats for data integrity.
ļƒ¼ Second, there do exist various motivations for CSP to behave unfaithfully
toward the cloud users regarding their outsourced data status.
ļƒ¼ In particular, simply downloading all the data for its integrity verification is not
a practical solution due to the expensiveness in I/O and transmission cost across
the network. Besides, it is often insufficient to detect the data corruption only
when accessing the data, as it does not give users correctness assurance for
those unaccessed data and might be too late to recover the data loss or damage.
ļƒ¼ Encryption does not completely solve the problem of protecting data privacy
against third-party auditing but just reduces it to the complex key management
domain. Unauthorized data leakage still remains possible due to the potential
exposure of decryption keys.
PROPOSED SYSTEM:
In this paper, we utilize the public key based homomorphic authenticator and
uniquely integrate it with random mask technique to achieve a privacy-preserving
public auditing system for cloud data storage security while keeping all above
requirements in mind. To support efficient handling of multiple auditing tasks, we
further explore the technique of bilinear aggregate signature to extend our main
result into a multi-user setting, where TPA can perform multiple auditing tasks
simultaneously. Extensive security and performance analysis shows the proposed
schemes are provably secure and highly efficient. We also show how to extent our
main scheme to support batch auditing for TPA upon delegations from multi-users.
ADVANTAGES OF PROPOSED SYSTEM:
1. Public auditability: to allow TPA to verify the correctness of the cloud data
on demand without retrieving a copy of the whole data or introducing
additional online burden to the cloud users.
2. Storage correctness: to ensure that there exists no cheating cloud server
that can pass the TPAā€™s audit without indeed storing usersā€™ data intact.
3. Privacy preserving: to ensure that the TPA cannot derive usersā€™ data
content from the information collected during the auditing process.
4. Batch auditing: to enable TPA with secure and efficient auditing capability
to cope with multiple auditing delegations from possibly large number of
different users simultaneously
5. Lightweight: to allow TPA to perform auditing with minimum
communication and computation overhead.
MODULES:
1. Privacy-Preserving Public Auditing Module:
Homomorphic authenticators are unforgeable verification metadata
generated from individual data blocks, which can be securely aggregated in
such a way to assure an auditor that a linear combination of data blocks is
correctly computed by verifying only the aggregated authenticator.
Overview to achieve privacy-preserving public auditing, we propose to
uniquely integrate the homomorphic authenticator with random mask
technique. In our protocol, the linear combination of sampled blocks in the
serverā€™s response is masked with randomness generated by a pseudo random
function (PRF). The proposed scheme is as follows:
Setup Phase
Audit Phase
2. Batch Auditing Module:
With the establishment of privacy-preserving public auditing in Cloud
Computing, TPA may concurrently handle multiple auditing delegations
upon different usersā€™ requests. The individual auditing of these tasks for
TPA can be tedious and very inefficient. Batch auditing not only allows TPA
to perform the multiple auditing tasks simultaneously, but also greatly
reduces the computation cost on the TPA side.
3. Data Dynamics Module:
Hence, supporting data dynamics for privacy-preserving public risk auditing
is also of paramount importance. Now we show how our main scheme can
be adapted to build upon the existing work to support data dynamics,
including block level operations of modification, deletion and insertion. We
can adopt this technique in our design to achieve privacy-preserving public
risk auditing with support of data dynamics.
SYSTEM ARCHITECTURE:
ALGORITHMS USED:
SYSTEM CONFIGURATION:-
HARDWARE CONFIGURATION:-
ļƒ¼ Processor - Pentium ā€“IV
ļƒ¼ Speed - 1.1 Ghz
ļƒ¼ RAM - 256 MB(min)
ļƒ¼ Hard Disk - 20 GB
ļƒ¼ Key Board - Standard Windows Keyboard
ļƒ¼ Mouse - Two or Three Button Mouse
ļƒ¼ Monitor - SVGA
REFERENCE:
Cong Wang, Member, IEEE, Sherman S.M. Chow, Qian Wang, Member, IEEE,
Kui Ren, Senior Member, IEEE, and Wenjing Lou, Senior Member, IEEE
ā€œPrivacy- Preserving Public Auditing for Secure Cloud Storageā€, IEEE
TRANSACTIONS ON COMPUTERS, VOL. 62, NO. 2, FEBRUARY 2013

More Related Content

What's hot

Oruta project report
Oruta project reportOruta project report
Oruta project reportManasa Chowdary
Ā 
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
PUBLIC AUDITING 	             FOR SECURE CLOUD STORAGE                       ...PUBLIC AUDITING 	             FOR SECURE CLOUD STORAGE                       ...
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...Bharath Nair
Ā 
Privacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storagePrivacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storageNagamalleswararao Tadikonda
Ā 
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.pptPrivacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.pptGirish Chandra
Ā 
Privacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storagePrivacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storageparry prabhu
Ā 
Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud Girish Chandra
Ā 
Privacy preserving public auditing for regenerating code based cloud storage
Privacy preserving public auditing for regenerating code based cloud storagePrivacy preserving public auditing for regenerating code based cloud storage
Privacy preserving public auditing for regenerating code based cloud storagekitechsolutions
Ā 
Privacy preserving public auditing
Privacy preserving public auditingPrivacy preserving public auditing
Privacy preserving public auditingvmshimavm
Ā 
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGESECURITY IN CLOUD COMPUTINGPRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGESECURITY IN CLOUD COMPUTING
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTINGKayalvizhi Selvaraj
Ā 
Ensuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloudEnsuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloudSathya Moorthy
Ā 
Oruta privacy preserving public auditing
Oruta privacy preserving public auditingOruta privacy preserving public auditing
Oruta privacy preserving public auditingPapitha Velumani
Ā 
Integrity Auditing Of Dynamic Cloud Data With Group User Revocation
Integrity Auditing Of Dynamic Cloud Data With Group User RevocationIntegrity Auditing Of Dynamic Cloud Data With Group User Revocation
Integrity Auditing Of Dynamic Cloud Data With Group User RevocationJSPM's JSCOE , Pune Maharashtra.
Ā 
Towards secure and dependable storage service in cloud
Towards secure and dependable storage service in cloudTowards secure and dependable storage service in cloud
Towards secure and dependable storage service in cloudsibidlegend
Ā 
cloud computing preservity
cloud computing preservitycloud computing preservity
cloud computing preservitychennuruvishnu
Ā 
Privacy preserving public auditing for regenerating-code-based
Privacy preserving public auditing for regenerating-code-basedPrivacy preserving public auditing for regenerating-code-based
Privacy preserving public auditing for regenerating-code-basedNagamalleswararao Tadikonda
Ā 
L04302088092
L04302088092L04302088092
L04302088092ijceronline
Ā 
A Novel privacy preserving public auditing for shared data in cloud
A Novel privacy preserving public auditing for shared data in cloudA Novel privacy preserving public auditing for shared data in cloud
A Novel privacy preserving public auditing for shared data in cloudJAVVAJI VENKATA RAO
Ā 
Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...IGEEKS TECHNOLOGIES
Ā 

What's hot (20)

Oruta project report
Oruta project reportOruta project report
Oruta project report
Ā 
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
PUBLIC AUDITING 	             FOR SECURE CLOUD STORAGE                       ...PUBLIC AUDITING 	             FOR SECURE CLOUD STORAGE                       ...
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
Ā 
Privacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storagePrivacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storage
Ā 
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.pptPrivacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Ā 
Privacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storagePrivacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storage
Ā 
Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud
Ā 
Privacy preserving public auditing for regenerating code based cloud storage
Privacy preserving public auditing for regenerating code based cloud storagePrivacy preserving public auditing for regenerating code based cloud storage
Privacy preserving public auditing for regenerating code based cloud storage
Ā 
Privacy preserving public auditing
Privacy preserving public auditingPrivacy preserving public auditing
Privacy preserving public auditing
Ā 
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGESECURITY IN CLOUD COMPUTINGPRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGESECURITY IN CLOUD COMPUTING
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
Ā 
Oruta ppt
Oruta pptOruta ppt
Oruta ppt
Ā 
Ensuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloudEnsuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloud
Ā 
Oruta privacy preserving public auditing
Oruta privacy preserving public auditingOruta privacy preserving public auditing
Oruta privacy preserving public auditing
Ā 
Integrity Auditing Of Dynamic Cloud Data With Group User Revocation
Integrity Auditing Of Dynamic Cloud Data With Group User RevocationIntegrity Auditing Of Dynamic Cloud Data With Group User Revocation
Integrity Auditing Of Dynamic Cloud Data With Group User Revocation
Ā 
Towards secure and dependable storage service in cloud
Towards secure and dependable storage service in cloudTowards secure and dependable storage service in cloud
Towards secure and dependable storage service in cloud
Ā 
cloud computing preservity
cloud computing preservitycloud computing preservity
cloud computing preservity
Ā 
Privacy preserving public auditing for regenerating-code-based
Privacy preserving public auditing for regenerating-code-basedPrivacy preserving public auditing for regenerating-code-based
Privacy preserving public auditing for regenerating-code-based
Ā 
L04302088092
L04302088092L04302088092
L04302088092
Ā 
Observability
ObservabilityObservability
Observability
Ā 
A Novel privacy preserving public auditing for shared data in cloud
A Novel privacy preserving public auditing for shared data in cloudA Novel privacy preserving public auditing for shared data in cloud
A Novel privacy preserving public auditing for shared data in cloud
Ā 
Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...
Ā 

Viewers also liked

May 2012 - Real Estate Market Updates
May 2012 - Real Estate Market UpdatesMay 2012 - Real Estate Market Updates
May 2012 - Real Estate Market Updatesadamcrognale
Ā 
John A Chapman opportunities minerals space 20120131
John A Chapman opportunities minerals space 20120131John A Chapman opportunities minerals space 20120131
John A Chapman opportunities minerals space 20120131John Chapman
Ā 
Sang tao slogan cho vivavivu
Sang tao slogan cho vivavivuSang tao slogan cho vivavivu
Sang tao slogan cho vivavivuNguyen D
Ā 
Recent Epidemic Outbreaks - Around the World
Recent Epidemic Outbreaks - Around the WorldRecent Epidemic Outbreaks - Around the World
Recent Epidemic Outbreaks - Around the WorldMaps of World
Ā 
Ctizen journalism
Ctizen journalismCtizen journalism
Ctizen journalismpumascomm
Ā 
2011 kickoff workshop_robot_wiring
2011 kickoff workshop_robot_wiring2011 kickoff workshop_robot_wiring
2011 kickoff workshop_robot_wiringOregon FIRST Robotics
Ā 
A method for mining infrequent causal associations and its application in fin...
A method for mining infrequent causal associations and its application in fin...A method for mining infrequent causal associations and its application in fin...
A method for mining infrequent causal associations and its application in fin...JPINFOTECH JAYAPRAKASH
Ā 
Csc roles & responsibility
Csc roles & responsibilityCsc roles & responsibility
Csc roles & responsibilitySandipan Dhar
Ā 
ICT & Digital Divide by John Jacob
ICT & Digital Divide by John JacobICT & Digital Divide by John Jacob
ICT & Digital Divide by John Jacobpumascomm
Ā 
First fare 2011 creating custom dashboards with labview
First fare 2011 creating custom dashboards with labviewFirst fare 2011 creating custom dashboards with labview
First fare 2011 creating custom dashboards with labviewOregon FIRST Robotics
Ā 
TEDxAthens at University of Bath Greek Alumni Club
TEDxAthens at University of Bath Greek Alumni ClubTEDxAthens at University of Bath Greek Alumni Club
TEDxAthens at University of Bath Greek Alumni ClubDimitris Kalavros-Gousiou
Ā 
Yeager -- Curation
Yeager -- CurationYeager -- Curation
Yeager -- CurationBOLO Conference
Ā 
Tips to Protect Your Organization from Data Breaches and Identity Theft
Tips to Protect Your Organization from Data Breaches and Identity TheftTips to Protect Your Organization from Data Breaches and Identity Theft
Tips to Protect Your Organization from Data Breaches and Identity TheftCase IQ
Ā 
Hayden -- Social Super Forum
Hayden -- Social Super ForumHayden -- Social Super Forum
Hayden -- Social Super ForumBOLO Conference
Ā 
Face to-face proximity estimation using bluetooth on smartphones
Face to-face proximity estimation using bluetooth on smartphonesFace to-face proximity estimation using bluetooth on smartphones
Face to-face proximity estimation using bluetooth on smartphonesJPINFOTECH JAYAPRAKASH
Ā 
Smykova logo all
Smykova logo allSmykova logo all
Smykova logo allya_sandu
Ā 
Physics at work and play[1] bimanbasu
Physics at work and play[1] bimanbasuPhysics at work and play[1] bimanbasu
Physics at work and play[1] bimanbasuSandipan Dhar
Ā 

Viewers also liked (19)

May 2012 - Real Estate Market Updates
May 2012 - Real Estate Market UpdatesMay 2012 - Real Estate Market Updates
May 2012 - Real Estate Market Updates
Ā 
John A Chapman opportunities minerals space 20120131
John A Chapman opportunities minerals space 20120131John A Chapman opportunities minerals space 20120131
John A Chapman opportunities minerals space 20120131
Ā 
Sang tao slogan cho vivavivu
Sang tao slogan cho vivavivuSang tao slogan cho vivavivu
Sang tao slogan cho vivavivu
Ā 
Recent Epidemic Outbreaks - Around the World
Recent Epidemic Outbreaks - Around the WorldRecent Epidemic Outbreaks - Around the World
Recent Epidemic Outbreaks - Around the World
Ā 
Ctizen journalism
Ctizen journalismCtizen journalism
Ctizen journalism
Ā 
ieee projects for cse 2013
ieee projects for cse 2013ieee projects for cse 2013
ieee projects for cse 2013
Ā 
2011 kickoff workshop_robot_wiring
2011 kickoff workshop_robot_wiring2011 kickoff workshop_robot_wiring
2011 kickoff workshop_robot_wiring
Ā 
A method for mining infrequent causal associations and its application in fin...
A method for mining infrequent causal associations and its application in fin...A method for mining infrequent causal associations and its application in fin...
A method for mining infrequent causal associations and its application in fin...
Ā 
Csc roles & responsibility
Csc roles & responsibilityCsc roles & responsibility
Csc roles & responsibility
Ā 
ICT & Digital Divide by John Jacob
ICT & Digital Divide by John JacobICT & Digital Divide by John Jacob
ICT & Digital Divide by John Jacob
Ā 
First fare 2011 creating custom dashboards with labview
First fare 2011 creating custom dashboards with labviewFirst fare 2011 creating custom dashboards with labview
First fare 2011 creating custom dashboards with labview
Ā 
Cop form
Cop formCop form
Cop form
Ā 
TEDxAthens at University of Bath Greek Alumni Club
TEDxAthens at University of Bath Greek Alumni ClubTEDxAthens at University of Bath Greek Alumni Club
TEDxAthens at University of Bath Greek Alumni Club
Ā 
Yeager -- Curation
Yeager -- CurationYeager -- Curation
Yeager -- Curation
Ā 
Tips to Protect Your Organization from Data Breaches and Identity Theft
Tips to Protect Your Organization from Data Breaches and Identity TheftTips to Protect Your Organization from Data Breaches and Identity Theft
Tips to Protect Your Organization from Data Breaches and Identity Theft
Ā 
Hayden -- Social Super Forum
Hayden -- Social Super ForumHayden -- Social Super Forum
Hayden -- Social Super Forum
Ā 
Face to-face proximity estimation using bluetooth on smartphones
Face to-face proximity estimation using bluetooth on smartphonesFace to-face proximity estimation using bluetooth on smartphones
Face to-face proximity estimation using bluetooth on smartphones
Ā 
Smykova logo all
Smykova logo allSmykova logo all
Smykova logo all
Ā 
Physics at work and play[1] bimanbasu
Physics at work and play[1] bimanbasuPhysics at work and play[1] bimanbasu
Physics at work and play[1] bimanbasu
Ā 

Similar to Privacy preserving public auditing for secure cloud storage

JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing for ...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing for ...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing for ...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing for ...IEEEGLOBALSOFTTECHNOLOGIES
Ā 
Iaetsd storage privacy protection against data
Iaetsd storage privacy protection against dataIaetsd storage privacy protection against data
Iaetsd storage privacy protection against dataIaetsd Iaetsd
Ā 
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentInsuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentEditor IJCATR
Ā 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationEditor IJMTER
Ā 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storageMuthu Sybian
Ā 
Privacy preserving public auditing for
Privacy preserving public auditing forPrivacy preserving public auditing for
Privacy preserving public auditing forkarthika kathirvel
Ā 
V04405122126
V04405122126V04405122126
V04405122126IJERA Editor
Ā 
Homomorphic authentication with random masking technique ensuring privacy
Homomorphic authentication with random masking technique ensuring privacyHomomorphic authentication with random masking technique ensuring privacy
Homomorphic authentication with random masking technique ensuring privacyShakas Technologies
Ā 
Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds IRJET Journal
Ā 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEditor IJMTER
Ā 
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...INFOGAIN PUBLICATION
Ā 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
Ā 
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud StorageIRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud StorageIRJET Journal
Ā 
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud StoragePrivacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage1crore projects
Ā 
Security Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party AuditorSecurity Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party Auditorijsrd.com
Ā 
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...IJERA Editor
Ā 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
Ā 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data securityeSAT Publishing House
Ā 
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesCentralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesEditor IJMTER
Ā 

Similar to Privacy preserving public auditing for secure cloud storage (20)

JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing for ...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing for ...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing for ...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing for ...
Ā 
Iaetsd storage privacy protection against data
Iaetsd storage privacy protection against dataIaetsd storage privacy protection against data
Iaetsd storage privacy protection against data
Ā 
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentInsuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud Environment
Ā 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Ā 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storage
Ā 
Privacy preserving public auditing for
Privacy preserving public auditing forPrivacy preserving public auditing for
Privacy preserving public auditing for
Ā 
V04405122126
V04405122126V04405122126
V04405122126
Ā 
Homomorphic authentication with random masking technique ensuring privacy
Homomorphic authentication with random masking technique ensuring privacyHomomorphic authentication with random masking technique ensuring privacy
Homomorphic authentication with random masking technique ensuring privacy
Ā 
Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds
Ā 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Ā 
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Ā 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
Ā 
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud StorageIRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
Ā 
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud StoragePrivacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Ā 
Security Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party AuditorSecurity Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party Auditor
Ā 
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Ā 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
Ā 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
Ā 
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesCentralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Ā 
50120140503020
5012014050302050120140503020
50120140503020
Ā 

Recently uploaded

Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
Ā 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
Ā 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
Ā 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
Ā 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
Ā 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
Ā 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
Ā 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
Ā 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
Ā 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
Ā 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
Ā 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
Ā 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 šŸ’ž Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 šŸ’ž Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 šŸ’ž Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 šŸ’ž Full Nigh...Pooja Nehwal
Ā 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
Ā 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
Ā 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
Ā 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
Ā 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
Ā 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
Ā 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
Ā 

Recently uploaded (20)

Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
Ā 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
Ā 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
Ā 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
Ā 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
Ā 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
Ā 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
Ā 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Ā 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
Ā 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
Ā 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
Ā 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
Ā 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 šŸ’ž Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 šŸ’ž Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 šŸ’ž Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 šŸ’ž Full Nigh...
Ā 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
Ā 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
Ā 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
Ā 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
Ā 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
Ā 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
Ā 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
Ā 

Privacy preserving public auditing for secure cloud storage

  • 1. Privacy-Preserving Public Auditing For Secure Cloud Storage ABSTRACT: Using cloud storage, users can remotely store their data and enjoy the on-demand high-quality applications and services from a shared pool of configurable computing resources, without the burden of local data storage and maintenance. However, the fact that users no longer have physical possession of the outsourced data makes the data integrity protection in cloud computing a formidable task, especially for users with constrained computing resources. Moreover, users should be able to just use the cloud storage as if it is local, without worrying about the need to verify its integrity. Thus, enabling public auditability for cloud storage is of critical importance so that users can resort to a third-party auditor (TPA) to check the integrity of outsourced data and be worry free. To securely introduce an effective TPA, the auditing process should bring in no new vulnerabilities toward user data privacy, and introduce no additional online burden to user. In this paper, we propose a secure cloud storage system supporting privacy-preserving public auditing. We further extend our result to enable the TPA to perform audits for multiple users simultaneously and efficiently. Extensive security and performance analysis show the proposed schemes are provably secure and highly efficient. Our
  • 2. preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design. EXISTING SYSTEM: In the Existing systems, the notion of public auditability has been proposed in the context of ensuring remotely stored data integrity under different system and security models. Public auditability allows an external party, in addition to the user himself, to verify the correctness of remotely stored data. However, most of these schemes do not consider the privacy protection of usersā€™ data against external auditors. Indeed, they may potentially reveal userā€™s data to auditors. This severe drawback greatly affects the security of these protocols in cloud computing. From the perspective of protecting data privacy, the users, who own the data and rely on TPA just for the storage security of their data, do not want this auditing process introducing new vulnerabilities of unauthorized information leakage toward their data security. DISADVANTAGES OF EXISTING SYSTEM: ļƒ¼ Although the infrastructures under the cloud are much more powerful and reliable than personal computing devices, they are still facing the broad range of both internal and external threats for data integrity.
  • 3. ļƒ¼ Second, there do exist various motivations for CSP to behave unfaithfully toward the cloud users regarding their outsourced data status. ļƒ¼ In particular, simply downloading all the data for its integrity verification is not a practical solution due to the expensiveness in I/O and transmission cost across the network. Besides, it is often insufficient to detect the data corruption only when accessing the data, as it does not give users correctness assurance for those unaccessed data and might be too late to recover the data loss or damage. ļƒ¼ Encryption does not completely solve the problem of protecting data privacy against third-party auditing but just reduces it to the complex key management domain. Unauthorized data leakage still remains possible due to the potential exposure of decryption keys. PROPOSED SYSTEM: In this paper, we utilize the public key based homomorphic authenticator and uniquely integrate it with random mask technique to achieve a privacy-preserving public auditing system for cloud data storage security while keeping all above requirements in mind. To support efficient handling of multiple auditing tasks, we further explore the technique of bilinear aggregate signature to extend our main result into a multi-user setting, where TPA can perform multiple auditing tasks simultaneously. Extensive security and performance analysis shows the proposed
  • 4. schemes are provably secure and highly efficient. We also show how to extent our main scheme to support batch auditing for TPA upon delegations from multi-users. ADVANTAGES OF PROPOSED SYSTEM: 1. Public auditability: to allow TPA to verify the correctness of the cloud data on demand without retrieving a copy of the whole data or introducing additional online burden to the cloud users. 2. Storage correctness: to ensure that there exists no cheating cloud server that can pass the TPAā€™s audit without indeed storing usersā€™ data intact. 3. Privacy preserving: to ensure that the TPA cannot derive usersā€™ data content from the information collected during the auditing process. 4. Batch auditing: to enable TPA with secure and efficient auditing capability to cope with multiple auditing delegations from possibly large number of different users simultaneously 5. Lightweight: to allow TPA to perform auditing with minimum communication and computation overhead.
  • 5. MODULES: 1. Privacy-Preserving Public Auditing Module: Homomorphic authenticators are unforgeable verification metadata generated from individual data blocks, which can be securely aggregated in such a way to assure an auditor that a linear combination of data blocks is correctly computed by verifying only the aggregated authenticator. Overview to achieve privacy-preserving public auditing, we propose to uniquely integrate the homomorphic authenticator with random mask technique. In our protocol, the linear combination of sampled blocks in the serverā€™s response is masked with randomness generated by a pseudo random function (PRF). The proposed scheme is as follows: Setup Phase Audit Phase 2. Batch Auditing Module: With the establishment of privacy-preserving public auditing in Cloud Computing, TPA may concurrently handle multiple auditing delegations upon different usersā€™ requests. The individual auditing of these tasks for TPA can be tedious and very inefficient. Batch auditing not only allows TPA
  • 6. to perform the multiple auditing tasks simultaneously, but also greatly reduces the computation cost on the TPA side. 3. Data Dynamics Module: Hence, supporting data dynamics for privacy-preserving public risk auditing is also of paramount importance. Now we show how our main scheme can be adapted to build upon the existing work to support data dynamics, including block level operations of modification, deletion and insertion. We can adopt this technique in our design to achieve privacy-preserving public risk auditing with support of data dynamics.
  • 9. SYSTEM CONFIGURATION:- HARDWARE CONFIGURATION:- ļƒ¼ Processor - Pentium ā€“IV ļƒ¼ Speed - 1.1 Ghz ļƒ¼ RAM - 256 MB(min) ļƒ¼ Hard Disk - 20 GB ļƒ¼ Key Board - Standard Windows Keyboard ļƒ¼ Mouse - Two or Three Button Mouse ļƒ¼ Monitor - SVGA REFERENCE: Cong Wang, Member, IEEE, Sherman S.M. Chow, Qian Wang, Member, IEEE, Kui Ren, Senior Member, IEEE, and Wenjing Lou, Senior Member, IEEE
  • 10. ā€œPrivacy- Preserving Public Auditing for Secure Cloud Storageā€, IEEE TRANSACTIONS ON COMPUTERS, VOL. 62, NO. 2, FEBRUARY 2013