SlideShare a Scribd company logo
1 of 5
Download to read offline
www.ijiarec.com
Author for Correspondence:
*1
Ms.R.Malar Priya, PG Scholar, Department of CSE, Aditya Institute of Technology, Coimbatore, India.
E-mail: malarpriya91@gmail.com
*2
Ms.R.Kalpana, PG Scholar, Department of CSE, Aditya Institute of Technology, Coimbatore, India.
E-mail: Kalpaname91@yahoo.com
3
Mr.S.Saravanakumar, M.E., Asst.Professor Department of CSE, Aditya Institute of Technology, Coimbatore, India.
NOV 2013
International Journal of Intellectual Advancements
and Research in Engineering Computations
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING
DYNAMIC BROADCAST ENCRYPTION, BIT TORRENT AND GROUP
SIGNATURE
*1
Ms.R.Malar Priya, *2
Ms.R.Kalpana, 3
S.Saravanakumar,M.E.,
ABSTRACT
Cloud computing refers to a network that distributes processing power, applications, and large systems
among many computers. Cloud computing seems to offer some incredible benefits for communicators: the
availability of an incredible array of software applications, access to lightning-quick processing power, unlimited
storage, and the ability to easily share and process information. All of this is available through your browser any
time you can access the Internet. While this might all appear enticing, there remain issues of reliability, portability,
privacy, and security. Since the data transmission on the internet or over any networks are vulnerable to the hackers
attack. We are in great need of encrypting the data. This paper combines the techniques of cloud data storage and
content Distribution by dynamic broadcast encryption algorithm along with the Bit Torrent application results in
minimizing the difficulties of bulky data and aims in resulting efficient sharing of the secure storage services in
cloud computing.
Index terms: Bit torrent, content distribution, Dynamic broadcast encryption, group signature.
I INTRODUCTION
Cloud computing is a subscription-based
service where you can obtain networked storage
space and computer resources .Cloud computing is the
long dreamed vision of computing as a utility, where
data owners can remotely store their data in the cloud to
enjoy on-demand high-quality applications and services
from a shared pool of configurable computing
resources. Cloud computing is about moving services,
computation and/or data—for cost and business
advantage—off-site to an internal or external, location-
transparent, centralized facility or contractor. By
making data available in the cloud, it can be more
easily and ubiquitously accessed, often at much lower
cost, increasing its value by enabling opportunities for
enhanced collaboration, integration, and analysis on a
shared common platform. Considering the installation
of network infrastructure a cloud environment can be
broadly categorized into three types- public cloud,
private cloud and hybrid cloud. Though from operation
and maintenance point-of-view cloud computing is a
great cost-effective IT solution for business of any
magnitude, but it has at least two major concerns-
technical developments, security and privacy. Since
cloud computing is relatively a new technology in
comparison to other existing computing solutions, it
still has lots of scope of becoming a mature system as a
reliable and cost-effective computing technology
downloading a file provide content to other clients
interested in the same file.
II PROBLEM AND ANALYSIS
The users require that their data remain secure
and they need to have a strong assurance
from the cloud servers to store their data correctly
without tampering or partially deleting because the
27
R.Malar Priya, R.Kalpana. et al., Inter. J. Int. Adv. & Res. In Engg. Comp., Vol.–01 (01) 2013 [26-30]
Copyrights © International Journal of Intellectual Advancements and Research in Engineering Computations, www.ijiarec.com
internal operation details of service providers may not
be known to the cloud users. In this paper, an efficient
and secure scheme for cloud data storage has to be in a
position to ensure the data integrity and confidentiality.
From the perspective of data security, which has always
been an important aspect of quality of service, Cloud
Computing inevitably poses new challenging security
threats for number of reasons.Considering various kinds
of data for each user stored in the cloud and the demand
of long term continuous assurance of their data safety,
the problem of verifying correctness of data storage in
the cloud becomes even more challenging.
Objectives:
The main goal is to provide the security and
reduces the bulky data for the user data application in
the cloud.
1. An effective and flexible distributed scheme
with explicit dynamic data support to ensure
the privacy of users’ data and guarantee the
data dependability in the cloud.
2. Content distribution makes the bulky data to
distribute in to various files and the file can be
downloaded by using bit torrent application in
the cloud.
3. The data mounted in the cloud can be well
secured by providing group signature
algorithm.
III SOLUTION AND MECHANISM
A. DATA STORAGE ON CLOUD:
Cloud storage is a model of networked
enterprise storage where data is stored in virtualized
pools of storage which are generally hosted by third
parties. Hosting companies operate large data centers,
and people who require their data to be hosted buy or
lease storage capacity from them. The data center
operators, in the background, virtualize the resources
according to the requirements of the customer and
expose them as storage pools, which the customers can
themselves use to store files or data objects. Physically,
the resource may span across multiple servers and
multiple locations. The safety of the files depends upon
the hosting companies, and on the applications that
leverage the cloud storage. When data is distributed it is
stored at more locations increasing the risk of
unauthorised physical access to the data. For example,
in cloud based architecture, data is replicated and
moved frequently so the risk of unauthorised data
recovery increases dramatically. (e.g. disposal of old
equipment, reuse of drives, reallocation of storage
space) The Manner that data is replicated depends on
the service level a customer chooses and on the service
provided. Different cloud vendors offer different
service levels. Risk of unauthorized access to data can
be mitigated through the use of encryption, which can
be applied to data as part of the storage service or by
on-premises equipment that encrypts data prior to
uploading it to the cloud.
The number of people with access to the data
who could be compromised (i.e. bribed or coerced)
increases dramatically. A single company might have a
small team of administrators, network engineers and
technicians, but a cloud storage company will have
many customers and thousands of servers and therefore
a much larger team of technical staff with physical and
electronic access to almost all of the data at the entire
facility or perhaps the entire company. Encryption keys
that are kept by the service user, as opposed to the
service provider limit the access to data by service
provider employees. It increases the number of
networks over which the data travels. Instead of just a
local area network (LAN) or storage area network
(SAN), data stored on a cloud requires a WAN (wide
area network) to connect them both. By sharing storage
and networks with many other users/customers it is
possible for other customers to access your data.
Sometimes because of erroneous actions, faulty
equipment, a bug and sometimes because of criminal
intent. This risk applies to all types of storage and not
only cloud storage. The risk of having data read during
transmission can be mitigated through encryption
technology. Encryption in transit protects data as it is
being transmitted to and from the cloud service.
28
R.Malar Priya, R.Kalpana. et al., Inter. J. Int. Adv. & Res. In Engg. Comp., Vol.–01 (01) 2013 [26-30]
Copyrights © International Journal of Intellectual Advancements and Research in Engineering Computations, www.ijiarec.com
Encryption at rest protects data that is stored at the
service provider. Encrypting data in an on-premises
cloud service on-ramp system can provide both kinds of
encryption protection.
B. CONTENT DISTRIBUTION:
A cloud provider provides two cloud-based
services: storage and content delivery. A content
provider utilizes these two services to store and
distribute her content to multiple subscribers. The
content provider and subscribers can access content via
a cloud-based application service, which reads and
manages the content stored in the storage service via
cloud storage APIs. The application service is an
application deployed in the cloud by the content
provider or a third party. The content provider can use
multiple cloud-based services from different cloud
service providers to host her application service,
content storage service, and content delivery service.
The problem identifies in the systems with a Minimum
distributed peer-to- peer systems. To achieve An MDT
objective for a group of client requires judicious use of
client uplink and downlink capacities, which are
typically highly asymmetric as offer their clients,
download speeds that are significantly larger than
upload speeds. In support of the MDT objective for
bulk-synchronous content distribution, in this paper we
investigate the potential benefit from the on- demand
deployment of cloud resources to upload capacity, we
propose the use of Bit Torrent in receiving the entire
content. Content distribution provides the major aspects
are
1. Integrity and Authenticity: Safeguarding the
accuracy and typically completeness of data and
processing methods. Unauthorized a single entities
cannot change data; adversaries cannot substitute a
forged document for a requested one.
2. Availability and Persistence: Ensuring that
authorized users have access to data and associated
assets when required. For a content distribution system
this often means always. This property entails stability
in the presence of failure or changing node populations.
3. Performance: The time required for performing the
operations allowed by the system, typically publication,
searching and retrieval of documents.
C. BIT TORRENT APPLICATION:
A BitTorrent client is a computer program that
manages downloads and uploads using the Bit Torrent
protocol. Bit Torrent is for distributing large amounts of
data over the Internet. Bit Torrent is one of the most
common protocols for transferring large files and it has
been estimated that networks collectively have
accounted for roughly 43% to 70% of all Internet
Traffic. The Bit Torrent protocol can be used to reduce
the server and network impact of distributing large
files. Rather than downloading a file from a single
source server, the Bit Torrent protocol allows users to
join a file of hosts to download and upload from each
other simultaneously.
BIT TORRENT APPLICATION RESULTS:
D. DYNAMIC BROADCAST ENCRYPTION
ALGORITHM:
Broadcast encryption (BE) schemes enable the sender
of a message to specify a subset of the registered (the
target set or privileged set), who will be able to decrypt
the cipher text sent to all users via a broadcast channel.
The complement of the target set (in the set of the
registered users) is called the revoked set. To
accomplish user revocation when sending a message, a
BE generally generates three parts: the Id Header, that
is a bit-string that unambiguously identifies the target
set/revoked set; the Key Header, that encapsulates a
session key for the privileged users; and the Message
Body, that contains the payload encrypted under the
session key.
Broadcast encryption is the cryptographic problem of
delivering encrypted content (e.g. TV programs or data
on DVDs) over a broadcast channel in such a way that
only qualified users (e.g. subscribers who have paid
their fees or DVD players conforming to a
specification) can decrypt the content. The challenge
arises from the requirement that the set of qualified
users can change in each broadcast emission, and
29
R.Malar Priya, R.Kalpana. et al., Inter. J. Int. Adv. & Res. In Engg. Comp., Vol.–01 (01) 2013 [26-30]
Copyrights © International Journal of Intellectual Advancements and Research in Engineering Computations, www.ijiarec.com
therefore revocation of individual users or user groups
should be possible using broadcast transmissions, only,
and without affecting any remaining users.
Simulated graph:
A group signature scheme GS = (GKg, GSig, GVf,
Open) consists of four polynomial-time algorithms:
1. The randomized group key generation algorithm
GKg takes input 1k , 1n , where k ∈ N is the security
parameter and n ∈ N is the group size (ie. the number of
members of the group), and returns a tuple (gpk, gmsk,
gsk), where gpk is the group public key, gmsk is the
group manager’s secret key, and gsk is an n-vector of
keys with gsk[i] being a secret signing key for player i
∈ [n].
2. The randomized group signing algorithm GSig takes
as input a secret signing key gsk[i] and a message m to
return a signature of m under gsk[i] (i ∈ [n]).
3. The deterministic group signature verification
algorithm GVf takes as input the group public key gpk,
a message m, and a candidate signature σ for m to
return either 1 or 0.
0
5
10
15
20
25
C D T + B T
+
D Y N AMI
C
B R OAD
C AS T
E N C R Y P
T ION
AL G OR I
T H M
c onte nt
dis tribut
ion a nd
bit
torre nt(
C D T + B T
)
c onte nt
dis tribut
ion
The graph results are shown here:
4. The deterministic opening algorithm Open takes as
input the group manager secret key gmsk, a message m,
and a signature σ of m to return an identity i or the
symbol ⊥ The first graph results depicts the result On
the Basis of applying the technique of Content
distribution. Once the file is get Uploaded in the cloud
its distribution time Of uploading is get minimized
.This feature Is obtained by combining the technique
the Bit torrent and content distribution algorithm After
uploaded the file the third graph Represents the
Security enhancement.
IV CONCLUSION
The overarching goal of this setting is to get
minimizing the maximum time of bulk synchronous
content distribution where it takes any client in a set to
download content of the required file. In the paper, we
have developed a formulation of Bit Torrent to split the
content over the file, through the cloud resources .In
our future work we use another content distribution
algorithm by implementing RSA algorithm along with
dynamic broadcast encryption algorithm to provide
security in the cloud.
REFERENCES:
[1]. Raymond sweha, vatche Ishakian, Azer
Bestavros, Angels in the Cloud, 2011 IEEE
4th International conference.
[2]. M. Piatek, T. Isdal, T. Anderson, A.
Krishnamurthy, and Venkataramani ―Do
incentives build robustness in BitTorrent,‖ in
NSDI, 2007. International conference on cloud
computing.
[3]. Qian Wang, Cong Wang, Kui Ren, Wenjing
Lou, Jin Li ,―Enabling Public Auditability and
Data Dynamics for Storage Security in Cloud
Computing", IEEE Transactions On Parallel
And Distributed Systems, Vol. 22, No. 5,
2011.
[4]. Robert Gellman and World Privacy Forum,
―Privacy in the Clouds: Risks to Privacy and
Confidentiality from Cloud Computing‖,
February 23, 2009.
[5]. K. D. Bowers, A. Jules, and A. Opera, ―HAIL:
A High-Availability and Integrity Layer for
30
R.Malar Priya, R.Kalpana. et al., Inter. J. Int. Adv. & Res. In Engg. Comp., Vol.–01 (01) 2013 [26-30]
Copyrights © International Journal of Intellectual Advancements and Research in Engineering Computations, www.ijiarec.com
Cloud Storage,‖
http://eprint.iacr.org/2008/489.
[6]. Reducing upload and Download Time on
Cloud using Content Distribution Algorithm
published at International Journal on Recent
and Innovation Trends in Computing and
Communication, ISSN 2321 – 8169.
[7]. Pardeep Kumar, Vivek Kumar Sehgal,
DurgSingh Chauhan, P. K. Gupta, Manoj
Diwakar, "Effective Ways of Secure, Private
and Trusted Cloud Computing‖, IJCSI
International Journal of Computer Science
Issues, Vol. 8, Issue 3, No.2, 2011.
[8]. Cong Wang, Qian Wang, Kui Ren, Wenjing
Lou, "Ensuring Data Storage Security in Cloud
Computing‖, 2009. L. Ferrara, M. Green, S.
Hohen Berger, M. Pedersen (2009),"Practical
short signature batch verification", in
Proceedings of CT-RSA, volume 5473 of
LNCS. Springer-Verlag, pp. 309–324.
[9]. Cloud Security Alliance, (2009) ―Security
guidance for critical areas Of focus in cloud
computing,‖ Available
http://www.cloudsecurityalliance.org
[10]. H. Sachem, B. Waters (Dec 2008), "Compact
proofs of secure irretrievability", In Proc. of
Asia crypt 2008, vol. 5350, pp. 90–107
[11]. P. Mell, T. Grance, (2009) ―Draftnist working
definition of cloud computing,‖ Referenced on
June. 3rd, 2009 on linear http:
//csrc.nist.gov/groups/SNS/cloud-
computing/index.html.

More Related Content

What's hot

Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudeSAT Journals
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
A Secure Model for Cloud Computing Based Storage and Retrieval
A Secure Model for Cloud Computing Based Storage and  RetrievalA Secure Model for Cloud Computing Based Storage and  Retrieval
A Secure Model for Cloud Computing Based Storage and RetrievalIOSR Journals
 
Data Partitioning Technique In Cloud: A Survey On Limitation And Benefits
Data Partitioning Technique In Cloud: A Survey On Limitation And BenefitsData Partitioning Technique In Cloud: A Survey On Limitation And Benefits
Data Partitioning Technique In Cloud: A Survey On Limitation And BenefitsIJERA Editor
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationEditor IJMTER
 
Data Security in Cloud Computing Using Linear Programming
Data Security in Cloud Computing Using Linear ProgrammingData Security in Cloud Computing Using Linear Programming
Data Security in Cloud Computing Using Linear ProgrammingIOSR Journals
 
Trust Your Cloud Service Provider: User Based Crypto Model
Trust Your Cloud Service Provider: User Based Crypto ModelTrust Your Cloud Service Provider: User Based Crypto Model
Trust Your Cloud Service Provider: User Based Crypto ModelIJERA Editor
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudIJERA Editor
 
Dynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudDynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudAM Publications
 
Enhancement of the Cloud Data Storage Architectural Framework in Private Cloud
Enhancement of the Cloud Data Storage Architectural Framework in Private CloudEnhancement of the Cloud Data Storage Architectural Framework in Private Cloud
Enhancement of the Cloud Data Storage Architectural Framework in Private CloudINFOGAIN PUBLICATION
 
Paper id 27201433
Paper id 27201433Paper id 27201433
Paper id 27201433IJRAT
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
 

What's hot (18)

Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloud
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Fog doc
Fog doc Fog doc
Fog doc
 
Cloud Security Mechanisms
Cloud Security MechanismsCloud Security Mechanisms
Cloud Security Mechanisms
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
A Secure Model for Cloud Computing Based Storage and Retrieval
A Secure Model for Cloud Computing Based Storage and  RetrievalA Secure Model for Cloud Computing Based Storage and  Retrieval
A Secure Model for Cloud Computing Based Storage and Retrieval
 
El35782786
El35782786El35782786
El35782786
 
Data Partitioning Technique In Cloud: A Survey On Limitation And Benefits
Data Partitioning Technique In Cloud: A Survey On Limitation And BenefitsData Partitioning Technique In Cloud: A Survey On Limitation And Benefits
Data Partitioning Technique In Cloud: A Survey On Limitation And Benefits
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
 
Data Security in Cloud Computing Using Linear Programming
Data Security in Cloud Computing Using Linear ProgrammingData Security in Cloud Computing Using Linear Programming
Data Security in Cloud Computing Using Linear Programming
 
Trust Your Cloud Service Provider: User Based Crypto Model
Trust Your Cloud Service Provider: User Based Crypto ModelTrust Your Cloud Service Provider: User Based Crypto Model
Trust Your Cloud Service Provider: User Based Crypto Model
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
 
J0423066069
J0423066069J0423066069
J0423066069
 
Dn35636640
Dn35636640Dn35636640
Dn35636640
 
Dynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudDynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for Cloud
 
Enhancement of the Cloud Data Storage Architectural Framework in Private Cloud
Enhancement of the Cloud Data Storage Architectural Framework in Private CloudEnhancement of the Cloud Data Storage Architectural Framework in Private Cloud
Enhancement of the Cloud Data Storage Architectural Framework in Private Cloud
 
Paper id 27201433
Paper id 27201433Paper id 27201433
Paper id 27201433
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 

Similar to ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTION, BIT TORRENT AND GROUP SIGNATURE

Security in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architectureSecurity in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architectureeSAT Journals
 
Security in multi cloud data storage with sic
Security in multi cloud data storage with sicSecurity in multi cloud data storage with sic
Security in multi cloud data storage with siceSAT Publishing House
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detectionijsrd.com
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Editor IJMTER
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data securityeSAT Publishing House
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloudpriyanka reddy
 
Secure cloud storage privacy preserving public auditing for data storage secu...
Secure cloud storage privacy preserving public auditing for data storage secu...Secure cloud storage privacy preserving public auditing for data storage secu...
Secure cloud storage privacy preserving public auditing for data storage secu...rajender147
 
Fog computing document
Fog computing documentFog computing document
Fog computing documentsravya raju
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
Preserving Privacy Policy- Preserving public auditing for data in the cloud
	Preserving Privacy Policy- Preserving public auditing for data in the cloud	Preserving Privacy Policy- Preserving public auditing for data in the cloud
Preserving Privacy Policy- Preserving public auditing for data in the cloudinventionjournals
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocolIaetsd Iaetsd
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
 
Security for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi CloudsSecurity for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi CloudsEditor IJCATR
 
Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...
Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...
Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...IIRindia
 

Similar to ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTION, BIT TORRENT AND GROUP SIGNATURE (20)

Security in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architectureSecurity in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architecture
 
Security in multi cloud data storage with sic
Security in multi cloud data storage with sicSecurity in multi cloud data storage with sic
Security in multi cloud data storage with sic
 
V04405122126
V04405122126V04405122126
V04405122126
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detection
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 
Secure cloud storage privacy preserving public auditing for data storage secu...
Secure cloud storage privacy preserving public auditing for data storage secu...Secure cloud storage privacy preserving public auditing for data storage secu...
Secure cloud storage privacy preserving public auditing for data storage secu...
 
Fog computing document
Fog computing documentFog computing document
Fog computing document
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
H017155360
H017155360H017155360
H017155360
 
Preserving Privacy Policy- Preserving public auditing for data in the cloud
	Preserving Privacy Policy- Preserving public auditing for data in the cloud	Preserving Privacy Policy- Preserving public auditing for data in the cloud
Preserving Privacy Policy- Preserving public auditing for data in the cloud
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocol
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Fs2510501055
Fs2510501055Fs2510501055
Fs2510501055
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 
Security for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi CloudsSecurity for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi Clouds
 
Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...
Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...
Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...
 
L04302088092
L04302088092L04302088092
L04302088092
 

More from pharmaindexing

Patient compliance: Challenges in management of cardiac diseases in Kuala Lum...
Patient compliance: Challenges in management of cardiac diseases in Kuala Lum...Patient compliance: Challenges in management of cardiac diseases in Kuala Lum...
Patient compliance: Challenges in management of cardiac diseases in Kuala Lum...pharmaindexing
 
Overview on Recurrence Pregnancy Loss etiology and risk factors
Overview on Recurrence Pregnancy Loss etiology and risk factorsOverview on Recurrence Pregnancy Loss etiology and risk factors
Overview on Recurrence Pregnancy Loss etiology and risk factorspharmaindexing
 
Novel treatments for asthma: Corticosteroids and other anti-inflammatory agents.
Novel treatments for asthma: Corticosteroids and other anti-inflammatory agents.Novel treatments for asthma: Corticosteroids and other anti-inflammatory agents.
Novel treatments for asthma: Corticosteroids and other anti-inflammatory agents.pharmaindexing
 
A review on liver disorders and screening models of hepatoprotective agents
A review on liver disorders and screening models of hepatoprotective agentsA review on liver disorders and screening models of hepatoprotective agents
A review on liver disorders and screening models of hepatoprotective agentspharmaindexing
 
Carbamazepine induced Steven Johnson syndrome: A case report
Carbamazepine induced Steven Johnson syndrome: A case reportCarbamazepine induced Steven Johnson syndrome: A case report
Carbamazepine induced Steven Johnson syndrome: A case reportpharmaindexing
 
Monoherbal formulation development for laxative activity
Monoherbal formulation development for laxative activityMonoherbal formulation development for laxative activity
Monoherbal formulation development for laxative activitypharmaindexing
 
Monoherbal formulation development for laxative activity
Monoherbal formulation development for laxative activityMonoherbal formulation development for laxative activity
Monoherbal formulation development for laxative activitypharmaindexing
 
Pneumonia and respiratory failure from swine origin influenza H1n1
Pneumonia and respiratory failure from swine origin influenza H1n1Pneumonia and respiratory failure from swine origin influenza H1n1
Pneumonia and respiratory failure from swine origin influenza H1n1pharmaindexing
 
A descriptive study on newborn care among postnatal mothers in selected mater...
A descriptive study on newborn care among postnatal mothers in selected mater...A descriptive study on newborn care among postnatal mothers in selected mater...
A descriptive study on newborn care among postnatal mothers in selected mater...pharmaindexing
 
Nano-Medicine Global Market
Nano-Medicine Global MarketNano-Medicine Global Market
Nano-Medicine Global Marketpharmaindexing
 
The Flaws in health practice in post-operative management of a patient in ter...
The Flaws in health practice in post-operative management of a patient in ter...The Flaws in health practice in post-operative management of a patient in ter...
The Flaws in health practice in post-operative management of a patient in ter...pharmaindexing
 
Corticosteroid induced disorders – An overview
Corticosteroid induced disorders – An overviewCorticosteroid induced disorders – An overview
Corticosteroid induced disorders – An overviewpharmaindexing
 
Anti-inflammatory activity of pupalia lappacea L. Juss
Anti-inflammatory activity of pupalia lappacea L. JussAnti-inflammatory activity of pupalia lappacea L. Juss
Anti-inflammatory activity of pupalia lappacea L. Jusspharmaindexing
 
Lucinactant: A new solution in treating neonatal respiratory distress syndrom...
Lucinactant: A new solution in treating neonatal respiratory distress syndrom...Lucinactant: A new solution in treating neonatal respiratory distress syndrom...
Lucinactant: A new solution in treating neonatal respiratory distress syndrom...pharmaindexing
 
Bioactivity screening of Soil bacteria against human pathogens
Bioactivity screening of Soil bacteria against human pathogensBioactivity screening of Soil bacteria against human pathogens
Bioactivity screening of Soil bacteria against human pathogenspharmaindexing
 
A study on sigmoid Volvulus presentation and management
A study on sigmoid Volvulus presentation and managementA study on sigmoid Volvulus presentation and management
A study on sigmoid Volvulus presentation and managementpharmaindexing
 
Evaluation of Preliminary phytochemical on various some medicinal plants
Evaluation of Preliminary phytochemical on various some medicinal plantsEvaluation of Preliminary phytochemical on various some medicinal plants
Evaluation of Preliminary phytochemical on various some medicinal plantspharmaindexing
 
Comparision of in vitro antibacterial activity of cefoperazone and levofloxac...
Comparision of in vitro antibacterial activity of cefoperazone and levofloxac...Comparision of in vitro antibacterial activity of cefoperazone and levofloxac...
Comparision of in vitro antibacterial activity of cefoperazone and levofloxac...pharmaindexing
 
Concept of srotas from ayurvedic perspective with special reference to neurology
Concept of srotas from ayurvedic perspective with special reference to neurologyConcept of srotas from ayurvedic perspective with special reference to neurology
Concept of srotas from ayurvedic perspective with special reference to neurologypharmaindexing
 
Health promotion survey in overweight and obese students of universities in n...
Health promotion survey in overweight and obese students of universities in n...Health promotion survey in overweight and obese students of universities in n...
Health promotion survey in overweight and obese students of universities in n...pharmaindexing
 

More from pharmaindexing (20)

Patient compliance: Challenges in management of cardiac diseases in Kuala Lum...
Patient compliance: Challenges in management of cardiac diseases in Kuala Lum...Patient compliance: Challenges in management of cardiac diseases in Kuala Lum...
Patient compliance: Challenges in management of cardiac diseases in Kuala Lum...
 
Overview on Recurrence Pregnancy Loss etiology and risk factors
Overview on Recurrence Pregnancy Loss etiology and risk factorsOverview on Recurrence Pregnancy Loss etiology and risk factors
Overview on Recurrence Pregnancy Loss etiology and risk factors
 
Novel treatments for asthma: Corticosteroids and other anti-inflammatory agents.
Novel treatments for asthma: Corticosteroids and other anti-inflammatory agents.Novel treatments for asthma: Corticosteroids and other anti-inflammatory agents.
Novel treatments for asthma: Corticosteroids and other anti-inflammatory agents.
 
A review on liver disorders and screening models of hepatoprotective agents
A review on liver disorders and screening models of hepatoprotective agentsA review on liver disorders and screening models of hepatoprotective agents
A review on liver disorders and screening models of hepatoprotective agents
 
Carbamazepine induced Steven Johnson syndrome: A case report
Carbamazepine induced Steven Johnson syndrome: A case reportCarbamazepine induced Steven Johnson syndrome: A case report
Carbamazepine induced Steven Johnson syndrome: A case report
 
Monoherbal formulation development for laxative activity
Monoherbal formulation development for laxative activityMonoherbal formulation development for laxative activity
Monoherbal formulation development for laxative activity
 
Monoherbal formulation development for laxative activity
Monoherbal formulation development for laxative activityMonoherbal formulation development for laxative activity
Monoherbal formulation development for laxative activity
 
Pneumonia and respiratory failure from swine origin influenza H1n1
Pneumonia and respiratory failure from swine origin influenza H1n1Pneumonia and respiratory failure from swine origin influenza H1n1
Pneumonia and respiratory failure from swine origin influenza H1n1
 
A descriptive study on newborn care among postnatal mothers in selected mater...
A descriptive study on newborn care among postnatal mothers in selected mater...A descriptive study on newborn care among postnatal mothers in selected mater...
A descriptive study on newborn care among postnatal mothers in selected mater...
 
Nano-Medicine Global Market
Nano-Medicine Global MarketNano-Medicine Global Market
Nano-Medicine Global Market
 
The Flaws in health practice in post-operative management of a patient in ter...
The Flaws in health practice in post-operative management of a patient in ter...The Flaws in health practice in post-operative management of a patient in ter...
The Flaws in health practice in post-operative management of a patient in ter...
 
Corticosteroid induced disorders – An overview
Corticosteroid induced disorders – An overviewCorticosteroid induced disorders – An overview
Corticosteroid induced disorders – An overview
 
Anti-inflammatory activity of pupalia lappacea L. Juss
Anti-inflammatory activity of pupalia lappacea L. JussAnti-inflammatory activity of pupalia lappacea L. Juss
Anti-inflammatory activity of pupalia lappacea L. Juss
 
Lucinactant: A new solution in treating neonatal respiratory distress syndrom...
Lucinactant: A new solution in treating neonatal respiratory distress syndrom...Lucinactant: A new solution in treating neonatal respiratory distress syndrom...
Lucinactant: A new solution in treating neonatal respiratory distress syndrom...
 
Bioactivity screening of Soil bacteria against human pathogens
Bioactivity screening of Soil bacteria against human pathogensBioactivity screening of Soil bacteria against human pathogens
Bioactivity screening of Soil bacteria against human pathogens
 
A study on sigmoid Volvulus presentation and management
A study on sigmoid Volvulus presentation and managementA study on sigmoid Volvulus presentation and management
A study on sigmoid Volvulus presentation and management
 
Evaluation of Preliminary phytochemical on various some medicinal plants
Evaluation of Preliminary phytochemical on various some medicinal plantsEvaluation of Preliminary phytochemical on various some medicinal plants
Evaluation of Preliminary phytochemical on various some medicinal plants
 
Comparision of in vitro antibacterial activity of cefoperazone and levofloxac...
Comparision of in vitro antibacterial activity of cefoperazone and levofloxac...Comparision of in vitro antibacterial activity of cefoperazone and levofloxac...
Comparision of in vitro antibacterial activity of cefoperazone and levofloxac...
 
Concept of srotas from ayurvedic perspective with special reference to neurology
Concept of srotas from ayurvedic perspective with special reference to neurologyConcept of srotas from ayurvedic perspective with special reference to neurology
Concept of srotas from ayurvedic perspective with special reference to neurology
 
Health promotion survey in overweight and obese students of universities in n...
Health promotion survey in overweight and obese students of universities in n...Health promotion survey in overweight and obese students of universities in n...
Health promotion survey in overweight and obese students of universities in n...
 

Recently uploaded

Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 

Recently uploaded (20)

Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 

ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTION, BIT TORRENT AND GROUP SIGNATURE

  • 1. www.ijiarec.com Author for Correspondence: *1 Ms.R.Malar Priya, PG Scholar, Department of CSE, Aditya Institute of Technology, Coimbatore, India. E-mail: malarpriya91@gmail.com *2 Ms.R.Kalpana, PG Scholar, Department of CSE, Aditya Institute of Technology, Coimbatore, India. E-mail: Kalpaname91@yahoo.com 3 Mr.S.Saravanakumar, M.E., Asst.Professor Department of CSE, Aditya Institute of Technology, Coimbatore, India. NOV 2013 International Journal of Intellectual Advancements and Research in Engineering Computations ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTION, BIT TORRENT AND GROUP SIGNATURE *1 Ms.R.Malar Priya, *2 Ms.R.Kalpana, 3 S.Saravanakumar,M.E., ABSTRACT Cloud computing refers to a network that distributes processing power, applications, and large systems among many computers. Cloud computing seems to offer some incredible benefits for communicators: the availability of an incredible array of software applications, access to lightning-quick processing power, unlimited storage, and the ability to easily share and process information. All of this is available through your browser any time you can access the Internet. While this might all appear enticing, there remain issues of reliability, portability, privacy, and security. Since the data transmission on the internet or over any networks are vulnerable to the hackers attack. We are in great need of encrypting the data. This paper combines the techniques of cloud data storage and content Distribution by dynamic broadcast encryption algorithm along with the Bit Torrent application results in minimizing the difficulties of bulky data and aims in resulting efficient sharing of the secure storage services in cloud computing. Index terms: Bit torrent, content distribution, Dynamic broadcast encryption, group signature. I INTRODUCTION Cloud computing is a subscription-based service where you can obtain networked storage space and computer resources .Cloud computing is the long dreamed vision of computing as a utility, where data owners can remotely store their data in the cloud to enjoy on-demand high-quality applications and services from a shared pool of configurable computing resources. Cloud computing is about moving services, computation and/or data—for cost and business advantage—off-site to an internal or external, location- transparent, centralized facility or contractor. By making data available in the cloud, it can be more easily and ubiquitously accessed, often at much lower cost, increasing its value by enabling opportunities for enhanced collaboration, integration, and analysis on a shared common platform. Considering the installation of network infrastructure a cloud environment can be broadly categorized into three types- public cloud, private cloud and hybrid cloud. Though from operation and maintenance point-of-view cloud computing is a great cost-effective IT solution for business of any magnitude, but it has at least two major concerns- technical developments, security and privacy. Since cloud computing is relatively a new technology in comparison to other existing computing solutions, it still has lots of scope of becoming a mature system as a reliable and cost-effective computing technology downloading a file provide content to other clients interested in the same file. II PROBLEM AND ANALYSIS The users require that their data remain secure and they need to have a strong assurance from the cloud servers to store their data correctly without tampering or partially deleting because the
  • 2. 27 R.Malar Priya, R.Kalpana. et al., Inter. J. Int. Adv. & Res. In Engg. Comp., Vol.–01 (01) 2013 [26-30] Copyrights © International Journal of Intellectual Advancements and Research in Engineering Computations, www.ijiarec.com internal operation details of service providers may not be known to the cloud users. In this paper, an efficient and secure scheme for cloud data storage has to be in a position to ensure the data integrity and confidentiality. From the perspective of data security, which has always been an important aspect of quality of service, Cloud Computing inevitably poses new challenging security threats for number of reasons.Considering various kinds of data for each user stored in the cloud and the demand of long term continuous assurance of their data safety, the problem of verifying correctness of data storage in the cloud becomes even more challenging. Objectives: The main goal is to provide the security and reduces the bulky data for the user data application in the cloud. 1. An effective and flexible distributed scheme with explicit dynamic data support to ensure the privacy of users’ data and guarantee the data dependability in the cloud. 2. Content distribution makes the bulky data to distribute in to various files and the file can be downloaded by using bit torrent application in the cloud. 3. The data mounted in the cloud can be well secured by providing group signature algorithm. III SOLUTION AND MECHANISM A. DATA STORAGE ON CLOUD: Cloud storage is a model of networked enterprise storage where data is stored in virtualized pools of storage which are generally hosted by third parties. Hosting companies operate large data centers, and people who require their data to be hosted buy or lease storage capacity from them. The data center operators, in the background, virtualize the resources according to the requirements of the customer and expose them as storage pools, which the customers can themselves use to store files or data objects. Physically, the resource may span across multiple servers and multiple locations. The safety of the files depends upon the hosting companies, and on the applications that leverage the cloud storage. When data is distributed it is stored at more locations increasing the risk of unauthorised physical access to the data. For example, in cloud based architecture, data is replicated and moved frequently so the risk of unauthorised data recovery increases dramatically. (e.g. disposal of old equipment, reuse of drives, reallocation of storage space) The Manner that data is replicated depends on the service level a customer chooses and on the service provided. Different cloud vendors offer different service levels. Risk of unauthorized access to data can be mitigated through the use of encryption, which can be applied to data as part of the storage service or by on-premises equipment that encrypts data prior to uploading it to the cloud. The number of people with access to the data who could be compromised (i.e. bribed or coerced) increases dramatically. A single company might have a small team of administrators, network engineers and technicians, but a cloud storage company will have many customers and thousands of servers and therefore a much larger team of technical staff with physical and electronic access to almost all of the data at the entire facility or perhaps the entire company. Encryption keys that are kept by the service user, as opposed to the service provider limit the access to data by service provider employees. It increases the number of networks over which the data travels. Instead of just a local area network (LAN) or storage area network (SAN), data stored on a cloud requires a WAN (wide area network) to connect them both. By sharing storage and networks with many other users/customers it is possible for other customers to access your data. Sometimes because of erroneous actions, faulty equipment, a bug and sometimes because of criminal intent. This risk applies to all types of storage and not only cloud storage. The risk of having data read during transmission can be mitigated through encryption technology. Encryption in transit protects data as it is being transmitted to and from the cloud service.
  • 3. 28 R.Malar Priya, R.Kalpana. et al., Inter. J. Int. Adv. & Res. In Engg. Comp., Vol.–01 (01) 2013 [26-30] Copyrights © International Journal of Intellectual Advancements and Research in Engineering Computations, www.ijiarec.com Encryption at rest protects data that is stored at the service provider. Encrypting data in an on-premises cloud service on-ramp system can provide both kinds of encryption protection. B. CONTENT DISTRIBUTION: A cloud provider provides two cloud-based services: storage and content delivery. A content provider utilizes these two services to store and distribute her content to multiple subscribers. The content provider and subscribers can access content via a cloud-based application service, which reads and manages the content stored in the storage service via cloud storage APIs. The application service is an application deployed in the cloud by the content provider or a third party. The content provider can use multiple cloud-based services from different cloud service providers to host her application service, content storage service, and content delivery service. The problem identifies in the systems with a Minimum distributed peer-to- peer systems. To achieve An MDT objective for a group of client requires judicious use of client uplink and downlink capacities, which are typically highly asymmetric as offer their clients, download speeds that are significantly larger than upload speeds. In support of the MDT objective for bulk-synchronous content distribution, in this paper we investigate the potential benefit from the on- demand deployment of cloud resources to upload capacity, we propose the use of Bit Torrent in receiving the entire content. Content distribution provides the major aspects are 1. Integrity and Authenticity: Safeguarding the accuracy and typically completeness of data and processing methods. Unauthorized a single entities cannot change data; adversaries cannot substitute a forged document for a requested one. 2. Availability and Persistence: Ensuring that authorized users have access to data and associated assets when required. For a content distribution system this often means always. This property entails stability in the presence of failure or changing node populations. 3. Performance: The time required for performing the operations allowed by the system, typically publication, searching and retrieval of documents. C. BIT TORRENT APPLICATION: A BitTorrent client is a computer program that manages downloads and uploads using the Bit Torrent protocol. Bit Torrent is for distributing large amounts of data over the Internet. Bit Torrent is one of the most common protocols for transferring large files and it has been estimated that networks collectively have accounted for roughly 43% to 70% of all Internet Traffic. The Bit Torrent protocol can be used to reduce the server and network impact of distributing large files. Rather than downloading a file from a single source server, the Bit Torrent protocol allows users to join a file of hosts to download and upload from each other simultaneously. BIT TORRENT APPLICATION RESULTS: D. DYNAMIC BROADCAST ENCRYPTION ALGORITHM: Broadcast encryption (BE) schemes enable the sender of a message to specify a subset of the registered (the target set or privileged set), who will be able to decrypt the cipher text sent to all users via a broadcast channel. The complement of the target set (in the set of the registered users) is called the revoked set. To accomplish user revocation when sending a message, a BE generally generates three parts: the Id Header, that is a bit-string that unambiguously identifies the target set/revoked set; the Key Header, that encapsulates a session key for the privileged users; and the Message Body, that contains the payload encrypted under the session key. Broadcast encryption is the cryptographic problem of delivering encrypted content (e.g. TV programs or data on DVDs) over a broadcast channel in such a way that only qualified users (e.g. subscribers who have paid their fees or DVD players conforming to a specification) can decrypt the content. The challenge arises from the requirement that the set of qualified users can change in each broadcast emission, and
  • 4. 29 R.Malar Priya, R.Kalpana. et al., Inter. J. Int. Adv. & Res. In Engg. Comp., Vol.–01 (01) 2013 [26-30] Copyrights © International Journal of Intellectual Advancements and Research in Engineering Computations, www.ijiarec.com therefore revocation of individual users or user groups should be possible using broadcast transmissions, only, and without affecting any remaining users. Simulated graph: A group signature scheme GS = (GKg, GSig, GVf, Open) consists of four polynomial-time algorithms: 1. The randomized group key generation algorithm GKg takes input 1k , 1n , where k ∈ N is the security parameter and n ∈ N is the group size (ie. the number of members of the group), and returns a tuple (gpk, gmsk, gsk), where gpk is the group public key, gmsk is the group manager’s secret key, and gsk is an n-vector of keys with gsk[i] being a secret signing key for player i ∈ [n]. 2. The randomized group signing algorithm GSig takes as input a secret signing key gsk[i] and a message m to return a signature of m under gsk[i] (i ∈ [n]). 3. The deterministic group signature verification algorithm GVf takes as input the group public key gpk, a message m, and a candidate signature σ for m to return either 1 or 0. 0 5 10 15 20 25 C D T + B T + D Y N AMI C B R OAD C AS T E N C R Y P T ION AL G OR I T H M c onte nt dis tribut ion a nd bit torre nt( C D T + B T ) c onte nt dis tribut ion The graph results are shown here: 4. The deterministic opening algorithm Open takes as input the group manager secret key gmsk, a message m, and a signature σ of m to return an identity i or the symbol ⊥ The first graph results depicts the result On the Basis of applying the technique of Content distribution. Once the file is get Uploaded in the cloud its distribution time Of uploading is get minimized .This feature Is obtained by combining the technique the Bit torrent and content distribution algorithm After uploaded the file the third graph Represents the Security enhancement. IV CONCLUSION The overarching goal of this setting is to get minimizing the maximum time of bulk synchronous content distribution where it takes any client in a set to download content of the required file. In the paper, we have developed a formulation of Bit Torrent to split the content over the file, through the cloud resources .In our future work we use another content distribution algorithm by implementing RSA algorithm along with dynamic broadcast encryption algorithm to provide security in the cloud. REFERENCES: [1]. Raymond sweha, vatche Ishakian, Azer Bestavros, Angels in the Cloud, 2011 IEEE 4th International conference. [2]. M. Piatek, T. Isdal, T. Anderson, A. Krishnamurthy, and Venkataramani ―Do incentives build robustness in BitTorrent,‖ in NSDI, 2007. International conference on cloud computing. [3]. Qian Wang, Cong Wang, Kui Ren, Wenjing Lou, Jin Li ,―Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing", IEEE Transactions On Parallel And Distributed Systems, Vol. 22, No. 5, 2011. [4]. Robert Gellman and World Privacy Forum, ―Privacy in the Clouds: Risks to Privacy and Confidentiality from Cloud Computing‖, February 23, 2009. [5]. K. D. Bowers, A. Jules, and A. Opera, ―HAIL: A High-Availability and Integrity Layer for
  • 5. 30 R.Malar Priya, R.Kalpana. et al., Inter. J. Int. Adv. & Res. In Engg. Comp., Vol.–01 (01) 2013 [26-30] Copyrights © International Journal of Intellectual Advancements and Research in Engineering Computations, www.ijiarec.com Cloud Storage,‖ http://eprint.iacr.org/2008/489. [6]. Reducing upload and Download Time on Cloud using Content Distribution Algorithm published at International Journal on Recent and Innovation Trends in Computing and Communication, ISSN 2321 – 8169. [7]. Pardeep Kumar, Vivek Kumar Sehgal, DurgSingh Chauhan, P. K. Gupta, Manoj Diwakar, "Effective Ways of Secure, Private and Trusted Cloud Computing‖, IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 3, No.2, 2011. [8]. Cong Wang, Qian Wang, Kui Ren, Wenjing Lou, "Ensuring Data Storage Security in Cloud Computing‖, 2009. L. Ferrara, M. Green, S. Hohen Berger, M. Pedersen (2009),"Practical short signature batch verification", in Proceedings of CT-RSA, volume 5473 of LNCS. Springer-Verlag, pp. 309–324. [9]. Cloud Security Alliance, (2009) ―Security guidance for critical areas Of focus in cloud computing,‖ Available http://www.cloudsecurityalliance.org [10]. H. Sachem, B. Waters (Dec 2008), "Compact proofs of secure irretrievability", In Proc. of Asia crypt 2008, vol. 5350, pp. 90–107 [11]. P. Mell, T. Grance, (2009) ―Draftnist working definition of cloud computing,‖ Referenced on June. 3rd, 2009 on linear http: //csrc.nist.gov/groups/SNS/cloud- computing/index.html.