SlideShare a Scribd company logo
1 of 5
Download to read offline
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 10 59 – 63
_______________________________________________________________________________________________
59
IJRITCC | October 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
To Improve Data Storage Security Levels in the Cloud
Kolluru Venkata Nagendra
Assistant Professor,
Department of CSE
Geethanjali Institute of Science and Technology.
Gangavaram,Nellore, Andhra Pradesh, India
kvnscholar@gmail.com
N. Haritha,
Assistant Professor,
Department of Computer Science,
Sriharsha Institute of PG Studies,
Nellore, Andhra Pradesh, India
nharithamca@gmail.com
Abstract: Now-a-Days Cloud Computing is an emerging technology, that works on the principle of pay-per-use. It offers services like Software-
as-a-Service (SaaS), Platform-as-a-Service (PaaS), Infrastructure-as-a-Service (IaaS), Storage as a Service and many more. Cloud computing
used for database and software applications to centralize the data. All the cloud users openly store their data on the cloud service provider’s
service centers. Here, the management of data and services are not fully confidential. So that the security of the cloud stored data becomes an
open challenging task in the field of Cloud Computing. To increase the levels of data security in the cloud, this paper deals with some techniques
like public auditability, Homomorphism Linear Authenticator (HLA).
Keywords: Cloud Computing, Data Security, public auditability, Homomorphism Linear Authenticator (HLA)
__________________________________________________*****_________________________________________________
I. INTRODUCTION
Cloud computing is a recent trending in IT that
where computing and data storage is done in data centers
rather than personal portable PC’s. It refers to applications
delivered as services over the internet as well as to the cloud
infrastructure – namely the hardware and system software in
data centers that provide this service. The sharing of
resources reduces the cost to individuals. The best definition
for Cloud is defined in as large pool of easily accessible and
virtualized resources which can be dynamically
reconfigured to adjust a variable load, allowing also for
optimum scale utilization. The key driving forces behind
cloud computing is the ubiquity of broadband and wireless
networking, falling storage costs, and progressive
improvements in Internet computing software. The main
technical supporting of cloud computing infrastructures and
services include virtualization, service-oriented software,
grid computing technologies, management of large facilities,
and power efficiency. The key features of the cloud are
agility, cost, device and location independence, multi
tenancy, reliability, scalability, maintenance etc.
The cloud can be deployed in three models. They
are described in different ways. In generalized it is described
as below:
A. Public Cloud:
Public cloud describes cloud computing in the traditional
mainstream sense, whereby resources are dynamically
provisioned on a fine-grained, self-service basis over the
Internet, via web applications/web services, from an off-site
third-party provider who bills on a fine-grained utility
computing basis. This is a general cloud available to public
over Internet.
B. Private Cloud:
A private cloud is one in which the services and
infrastructure are maintained on a private network. These
clouds offer the greatest level of security and control, but
they require the company to still purchase and maintain all
the software and infrastructure, which reduces the cost
savings.
C. Hybrid Cloud:
A hybrid cloud environment consisting of multiple internal
and/or external providers "will be typical for most
enterprises". By integrating multiple cloud services users
may be able to ease the transition to public cloud services
while avoiding issues such as PCI compliance.
Cloud computing is the provision of dynamically
scalable and often virtualized resources as services over the
internet. Users need not have knowledge of, expertise in, or
control over the technology infrastructure in the cloud that
supports them. Cloud computing represents a major change
in how we store information and run applications. Instead of
placing applications and data on an individual desktop
computer, everything is hosted in the cloud, through which a
collection of computers and servers accessed via the
Internet.
The services offered by the cloud computing include:
1. Software as a Service(SaaS)
2. Platform as a Service(PaaS)
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 10 59 – 63
_______________________________________________________________________________________________
60
IJRITCC | October 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
3. Infrastructure as a Service(IaaS)
4. Storage as a Service
Among all these services, this paper mainly focuses on
Storage as a Service, and the techniques for providing
security to the cloud stored data by the clients.
1) Public auditability: To allow TPA to verify the
correctness of the cloud data on demand without
retrieving a copy of the whole data or introducing
additional online burden to the cloud users.
2) Storage correctness: To ensure that there exists no
cheating cloud server that can pass the TPA’s audit
without indeed storing users’ data intact.
Figure: Cloud Data Storage Architecture
3) Batch auditing: To enable TPA with secure and
efficient auditing capability to cope with multiple
auditing delegations from possibly large number of
different users simultaneously.
4) Lightweight: To allow TPA to perform auditing
with minimum communication and computation
overhead.
As users no longer physically possess the storage of
their data, traditional cryptographic primitives for the
purpose of data security protection cannot be directly
adopted. In particular, simply downloading all the data for
its integrity verification is not a practical solution due to the
expensiveness in I/O and transmission cost across the
network. Besides, it is often insufficient to detect the data
corruption only when accessing the data, as it does not give
users correctness assurance for those unaccessed data and
might be too late to recover the data loss or damage.
Considering the large size of the outsourced data and the
user’s constrained resource capability, the tasks of auditing
the data correctness in a cloud environment can be
formidable and expensive for the cloud users. Moreover, the
overhead of using cloud storage should be minimized as
much as possible, such that user does not need to perform
too many operations to use the data.
To fully ensure the data integrity and save the cloud users’
computation resources as well as online burden, it is of
critical importance to enable public auditing service for
cloud data storage, so that users may resort to an
independent third party auditor (TPA) to audit the
outsourced data when needed. To address these problems,
this work utilizes the technique of public key based
homomorphic linear authenticator (HLA), which enables
TPA to perform the auditing without demanding the local
copy of data and thus drastically reduces the communication
and computation overhead as compared to the
straightforward data auditing approaches. By integrating the
HLA with random masking, our protocol guarantees that the
TPA could not learn any knowledge about the data content
stored in the cloud server during the efficient auditing
process. The aggregation and algebraic properties of the
authenticator further benefit this design for the batch
auditing.
II. PROBLEM STATEMENT
In the Existing systems, the notion of public
auditability[2] has been proposed in the context of ensuring
remotely stored data integrity[3] under different system and
security models. Public auditability allows an external party,
in addition to the user himself, to verify the correctness of
remotely stored data. However, most of these schemes do
not consider the privacy protection of users’ data against
external auditors. Indeed, they may potentially reveal user’s
data to auditors. This severe drawback greatly affects the
security of these protocols in cloud computing. From the
perspective of protecting data privacy, the users, who own
the data and rely on TPA[4] just for the storage security of
their data, do not want this auditing process introducing new
vulnerabilities of unauthorized information leakage toward
their data security.
To securely introduce an effective third party
auditor (TPA), the following two fundamental requirements
have to be met: 1) TPA should be able to efficiently audit
the cloud data storage without demanding the local copy of
data, and introduce no additional on-line burden to the cloud
user; 2) The third party auditing process should bring in no
new vulnerabilities towards user data privacy.
III. PROPOSED SYSTEM:
In this paper, we utilize the public key based homomorphic
authenticator[5] and uniquely integrate it with random mask
technique to achieve a privacy-preserving public auditing
system for cloud data storage security while keeping all
above requirements in mind. It includes protocols for data
integrity verification and data update.
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 10 59 – 63
_______________________________________________________________________________________________
61
IJRITCC | October 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
3.1 Protocols for default Integrity Verification
1.Protocolsfor Default IntegrityVerification:
TPA CSS
1.Generate a random set
challenge request chal
2.compute
datablocks
3.compute
signatureblock
Integrity ProofP
4.ComputeRoot
5.Verify the signature and output FALSE if fail
6.Verify data block
3.2 Protocol for Data Update
2.The protocol for Provable Data Update:
Client CSS
1.Generate new signature
update request update
2.Update file
and compute R’
update proof P_update
3.Compute Root
4.Verify the signature and
output FALSE if fail
5.Compute R_new and
verify update sig(H(R’))
6.Update R‘
signature
IV. HOMOMORPHICLINEAR
AUTHENTICATOR:
It is a way to assure an auditor that a linear combination of
data blocks is correctly computed by verifying only the
aggregated authenticator. It is a form of encryption which
allows specific types of computations to be carried out on
cipher text and generate an encrypted result which when
decrypted, matches the result of operations performed on the
plain text.
HLA-based Solution:
The HLA technique is used to effectively support
public auditability without having to retrieve the data blocks
themselves. HLAs, like MACs, are unforgivable
verification metadata that authenticate the integrity of a data
block. The difference is that HLAs can be aggregated. It is
possible to compute an aggregated HLA which authenticates
a linear combination of the individual data blocks.
At a high level, HLA-based proof of storage system works
as follows. The user still authenticates each element of
F = (m1, · · ·, mn) by a set of HLA. The cloud server stores
{F, φ}. The TPA verifies the cloud storage by sending a
random set of challenge {k}. (More precisely, F and {k} are
all vectors, so {k} is an ordered set or {k, kn} should be
sent). The cloud server then returns μ = Pi to mi and an
aggregated authenticator, that is supposed to authenticate μ.
Though allowing efficient data auditing and consuming only
constant bandwidth, the direct adoption of these HLA-based
techniques is still not suitable for our purposes. This is
because the linear combination of blocks, μ = Pk to mk, may
potentially reveal user data information to TPA, and violates
the privacy preserving guarantee. Specifically, if an enough
number of the linear combinations of the same blocks are
collected, the TPA can simply derive the user’s data content
by solving a system of linear equations.
SCREENSHOTS:
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 10 59 – 63
_______________________________________________________________________________________________
62
IJRITCC | October 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
Integrity Failure:
V. CONCLUSION:
The data storage security in Cloud Computing is discussed
in this paper. This security mechanism used public
auditability and homomorphism linear authenticator. The
information about the data content stored on cloud server
was not known by TPA. This effective and efficient auditing
process not only removes the heavy load of users of the
cloud. But also the user’s fear of their diminish outsourced
leakage of data. In this the TPA may use multiple audit
sessions from various users for their outstanding data files.
In a right and better way we extended our privacy-
preserving public auditing protocol into multiple auditing
tasks.
REFERENCES
[1] P. Mell and T. Grance, “Draft NIST working definition of
cloud computing,” Referenced on June. 3rd, 2009 Online at
http://csrc.nist.gov/groups/SNS/cloud-computing/index.
html, 2009.
[2] Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, “Enabling
public verifiability and data dynamics for storage security
in cloud computing,” in Proc. of ESORICS’09. Saint Malo,
France: Springer-Verlag, 2009, pp.355–370.
[3] C. Wang, Q. Wang, K. Ren, and W. Lou, “Ensuring data
storage security in cloud computing,” in Proc. of
IWQoS’09, Charleston,SouthCarolina,USA,2009.
[4] Shingare Vidya Marshal “Secure Audit Service by Using
TPA for Data Integrity in Cloud System” International
Journal of Innovative Technology and Exploring
Engineering (IJITEE) ISSN: 2278-3075, Volume-3,Issue-
4,September.
[5] Privacy-Preserving Public Auditing for Secure Cloud
Storage Cong Wang, Student Member, IEEE, Sherman S.-
M.Chow,Qian Wang,Student Member,IEEE,and Wenjing
Lou,Member,IEEE.
[6] A. van Raan, “Scientometrics: State-of-the-art,”
Scientometrics,vol. 38, no. 1, pp. 208–218, 1996.
[7] S. Schwarze, S. Voß, G. Zhou, and G. Zhou,
“Scientometric analysis of container terminals and ports
literature and interaction with publications on distribution
networks,” in Proc. 3rd Int. Conf. Comput.Logistics, 2012,
pp. 33–52.
[8] D. Straub, “The value of scientometric studies: An
introduction to a debate on IS as a reference discipline,” J.
Assoc. Inform. Syst., vol. 7, no. 5, pp. 241–246, 2006.
[9] A. Serenko and N. Bontis, “Meta-review of knowledge
management and intellectual capital literature: Citation
impact and research productivity rankings,” Knowl.
Process Manage., vol. 11,no. 3, pp. 185–198, 2004.
[10] W. Hood and C. Wilson, “The literature of bibliometrics,
scientometrics, and informetrics,” Scientometrics, vol. 52,
no. 2, pp. 291– 314, 2001.
[11] L. Leydesdorff, “Indicators of structural change in the
dynamics of science: Entropy statistics of the SCI journal
citation reports,” Scientometrics, vol. 53, no. 1, pp. 131–
159, 2002.
[12] S. Voß and X. Zhao, “Some steps towards a scientometric
analysis of publications in machine translation,” in Proc.
IASTED Int. Conf. Artif. Intell. Appl., 2005, pp. 651–655.
[13] L. Leydesdorff and T. Schank, “Dynamic animations of
journal maps: Indicators of structural changes and
interdisciplinary developments,” J. Am. Soc. Inform. Sci.
Technol., vol. 59, no. 11, pp. 1810–1818, 2008.
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 10 59 – 63
_______________________________________________________________________________________________
63
IJRITCC | October 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
[14] K. Sivakumaren, S. Swaminathan, and G. Karthikeyan,
“Growth and development of publications on cloud
computing: A scientometric study,” Int. J. Inform. Library
Soc., vol. 1, no. 1, pp. 37–43, 2012.
[15] Q. Bai and W.-h. Dong, “Scientometric analysis on the
papers of cloud computing,” Sci-Tech Inform. Develop.
Econ., vol. 5, no. 1, pp. 6–8, 2011.
[16] T. Wang and G. Huang, “Research progress of cloud
security from 2008 to 2011 in China,” Inform. Sci., no. 1,
pp. 153–160, 2013.
[17] I. Foster, Y. Zhao, I. Raicu, and S. Lu, “Cloud computing
and grid computing 360-degree compared,” in Proc. Grid
Comput. Environ. Workshop, 2008, pp. 1–10.
[18] R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, and I.
Brandic, “Cloud computing and emerging IT platforms:
Vision, hype, and reality for delivering computing as the
5th utility,” Future Gener. Comput. Syst., vol. 25, no. 6, pp.
599–616, 2009.
[19] M.Armbrust,A. Fox, R. Griffith,A.D. Joseph, R. Katz,A.
Konwinski, G. Lee, D. Patterson, A. Rabkin, and I. Stoica,
“A view of cloud computing,” Commun.ACM, vol. 53, no.
4, pp. 50–58, 2010.
[20] C. W. Holsapple, L. E. Johnson, H. Manakyan, and J.
Tanner, “Business computing research journals: A
normalized citation analysis,” J. Manage. Inform. Syst.,
vol. 11, no. 1, pp. 131–140, 1994.
[21] G. S. Howard, D. A. Cole, and S. E. Maxwell, “Research
productivity in psychology based on publication in the
journals of the American psychological association.,”
Amer. Psychol., vol. 42, no. 11, pp. 975–986, 1987.
[22] R. K. Merton, “The Matthew effect in science,” Science,
vol. 159, no. 3810, pp. 56–63, 1968.

More Related Content

What's hot

Security Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party AuditorSecurity Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party Auditorijsrd.com
 
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...IOSR Journals
 
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...INFOGAIN PUBLICATION
 
Effective Information Flow Control as a Service: EIFCaaS
Effective Information Flow Control as a Service: EIFCaaSEffective Information Flow Control as a Service: EIFCaaS
Effective Information Flow Control as a Service: EIFCaaSIRJET Journal
 
A Novel privacy preserving public auditing for shared data in cloud
A Novel privacy preserving public auditing for shared data in cloudA Novel privacy preserving public auditing for shared data in cloud
A Novel privacy preserving public auditing for shared data in cloudJAVVAJI VENKATA RAO
 
Iaetsd storage privacy protection against data
Iaetsd storage privacy protection against dataIaetsd storage privacy protection against data
Iaetsd storage privacy protection against dataIaetsd Iaetsd
 
IRJET- Blockchain based Data Sharing Framework
IRJET- Blockchain based Data Sharing FrameworkIRJET- Blockchain based Data Sharing Framework
IRJET- Blockchain based Data Sharing FrameworkIRJET Journal
 
Dynamic and public auditing with fair arbitration for cloud data
Dynamic and public auditing with fair arbitration for cloud dataDynamic and public auditing with fair arbitration for cloud data
Dynamic and public auditing with fair arbitration for cloud dataShakas Technologies
 
A Security Model for Virtual Infrastructure in the Cloud
A Security Model for Virtual Infrastructure in the CloudA Security Model for Virtual Infrastructure in the Cloud
A Security Model for Virtual Infrastructure in the CloudEditor IJCATR
 
Privacy preserving public auditing for
Privacy preserving public auditing forPrivacy preserving public auditing for
Privacy preserving public auditing forkarthika kathirvel
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storageMuthu Sybian
 
Authenticated and unrestricted auditing of big data space on cloud through v...
Authenticated and unrestricted auditing of big data space on  cloud through v...Authenticated and unrestricted auditing of big data space on  cloud through v...
Authenticated and unrestricted auditing of big data space on cloud through v...IJMER
 
Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Contr...
Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Contr...Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Contr...
Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Contr...ijsrd.com
 
Oruta phase1 report
Oruta phase1 reportOruta phase1 report
Oruta phase1 reportsuthi
 
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC AlgorithmIRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC AlgorithmIRJET Journal
 
BEST FINAL YEAR PROJECT IEEE 2015 BY SPECTRUM SOLUTIONS PONDICHERRY
BEST FINAL YEAR PROJECT IEEE 2015 BY SPECTRUM SOLUTIONS PONDICHERRYBEST FINAL YEAR PROJECT IEEE 2015 BY SPECTRUM SOLUTIONS PONDICHERRY
BEST FINAL YEAR PROJECT IEEE 2015 BY SPECTRUM SOLUTIONS PONDICHERRYRaushan Kumar Singh
 
5. ijece guideforauthors 2012 edit sat
5. ijece guideforauthors 2012 edit sat5. ijece guideforauthors 2012 edit sat
5. ijece guideforauthors 2012 edit satIAESIJEECS
 

What's hot (20)

Security Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party AuditorSecurity Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party Auditor
 
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
 
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
 
Effective Information Flow Control as a Service: EIFCaaS
Effective Information Flow Control as a Service: EIFCaaSEffective Information Flow Control as a Service: EIFCaaS
Effective Information Flow Control as a Service: EIFCaaS
 
A Novel privacy preserving public auditing for shared data in cloud
A Novel privacy preserving public auditing for shared data in cloudA Novel privacy preserving public auditing for shared data in cloud
A Novel privacy preserving public auditing for shared data in cloud
 
Iaetsd storage privacy protection against data
Iaetsd storage privacy protection against dataIaetsd storage privacy protection against data
Iaetsd storage privacy protection against data
 
L04302088092
L04302088092L04302088092
L04302088092
 
IRJET- Blockchain based Data Sharing Framework
IRJET- Blockchain based Data Sharing FrameworkIRJET- Blockchain based Data Sharing Framework
IRJET- Blockchain based Data Sharing Framework
 
Dynamic and public auditing with fair arbitration for cloud data
Dynamic and public auditing with fair arbitration for cloud dataDynamic and public auditing with fair arbitration for cloud data
Dynamic and public auditing with fair arbitration for cloud data
 
A Security Model for Virtual Infrastructure in the Cloud
A Security Model for Virtual Infrastructure in the CloudA Security Model for Virtual Infrastructure in the Cloud
A Security Model for Virtual Infrastructure in the Cloud
 
Privacy preserving public auditing for
Privacy preserving public auditing forPrivacy preserving public auditing for
Privacy preserving public auditing for
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storage
 
Authenticated and unrestricted auditing of big data space on cloud through v...
Authenticated and unrestricted auditing of big data space on  cloud through v...Authenticated and unrestricted auditing of big data space on  cloud through v...
Authenticated and unrestricted auditing of big data space on cloud through v...
 
Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Contr...
Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Contr...Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Contr...
Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Contr...
 
Oruta phase1 report
Oruta phase1 reportOruta phase1 report
Oruta phase1 report
 
50620130101004
5062013010100450620130101004
50620130101004
 
Oruta project report
Oruta project reportOruta project report
Oruta project report
 
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC AlgorithmIRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
 
BEST FINAL YEAR PROJECT IEEE 2015 BY SPECTRUM SOLUTIONS PONDICHERRY
BEST FINAL YEAR PROJECT IEEE 2015 BY SPECTRUM SOLUTIONS PONDICHERRYBEST FINAL YEAR PROJECT IEEE 2015 BY SPECTRUM SOLUTIONS PONDICHERRY
BEST FINAL YEAR PROJECT IEEE 2015 BY SPECTRUM SOLUTIONS PONDICHERRY
 
5. ijece guideforauthors 2012 edit sat
5. ijece guideforauthors 2012 edit sat5. ijece guideforauthors 2012 edit sat
5. ijece guideforauthors 2012 edit sat
 

Similar to To Improve Data Storage Security Levels in the Cloud

Methods of Data Access in Cloud Computing and It’s Challenges in Network Secu...
Methods of Data Access in Cloud Computing and It’s Challenges in Network Secu...Methods of Data Access in Cloud Computing and It’s Challenges in Network Secu...
Methods of Data Access in Cloud Computing and It’s Challenges in Network Secu...rahulmonikasharma
 
Secure cloud storage privacy preserving public auditing for data storage secu...
Secure cloud storage privacy preserving public auditing for data storage secu...Secure cloud storage privacy preserving public auditing for data storage secu...
Secure cloud storage privacy preserving public auditing for data storage secu...rajender147
 
Anonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in CloudAnonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in CloudIRJET Journal
 
Flaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple cloudsFlaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple cloudsIRJET Journal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menaceeSAT Publishing House
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menaceeSAT Journals
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menaceeSAT Publishing House
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data securityeSAT Publishing House
 
Data Security Approach in Cloud computing using SHA
Data Security Approach in Cloud computing using SHAData Security Approach in Cloud computing using SHA
Data Security Approach in Cloud computing using SHAIRJET Journal
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEditor IJMTER
 
A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...eSAT Journals
 
Excellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingExcellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingEditor IJMTER
 
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...IRJET Journal
 
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checki...
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checki...Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checki...
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checki...rahulmonikasharma
 
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checki...
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checki...Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checki...
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checki...rahulmonikasharma
 
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...idescitation
 
Total interpretive structural modelling on enablers of cloud computing
Total interpretive structural modelling on enablers of cloud computingTotal interpretive structural modelling on enablers of cloud computing
Total interpretive structural modelling on enablers of cloud computingeSAT Publishing House
 

Similar to To Improve Data Storage Security Levels in the Cloud (20)

Methods of Data Access in Cloud Computing and It’s Challenges in Network Secu...
Methods of Data Access in Cloud Computing and It’s Challenges in Network Secu...Methods of Data Access in Cloud Computing and It’s Challenges in Network Secu...
Methods of Data Access in Cloud Computing and It’s Challenges in Network Secu...
 
Secure cloud storage privacy preserving public auditing for data storage secu...
Secure cloud storage privacy preserving public auditing for data storage secu...Secure cloud storage privacy preserving public auditing for data storage secu...
Secure cloud storage privacy preserving public auditing for data storage secu...
 
Anonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in CloudAnonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in Cloud
 
Flaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple cloudsFlaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple clouds
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
.Net compiler using cloud computing
.Net compiler using cloud computing.Net compiler using cloud computing
.Net compiler using cloud computing
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menace
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menace
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menace
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
 
Data Security Approach in Cloud computing using SHA
Data Security Approach in Cloud computing using SHAData Security Approach in Cloud computing using SHA
Data Security Approach in Cloud computing using SHA
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
 
A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...
 
Excellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingExcellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computing
 
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
 
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checki...
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checki...Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checki...
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checki...
 
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checki...
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checki...Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checki...
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checki...
 
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
 
Total interpretive structural modelling on enablers of cloud computing
Total interpretive structural modelling on enablers of cloud computingTotal interpretive structural modelling on enablers of cloud computing
Total interpretive structural modelling on enablers of cloud computing
 

More from rahulmonikasharma

Data Mining Concepts - A survey paper
Data Mining Concepts - A survey paperData Mining Concepts - A survey paper
Data Mining Concepts - A survey paperrahulmonikasharma
 
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...rahulmonikasharma
 
Considering Two Sides of One Review Using Stanford NLP Framework
Considering Two Sides of One Review Using Stanford NLP FrameworkConsidering Two Sides of One Review Using Stanford NLP Framework
Considering Two Sides of One Review Using Stanford NLP Frameworkrahulmonikasharma
 
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication SystemsA New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systemsrahulmonikasharma
 
Broadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A SurveyBroadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A Surveyrahulmonikasharma
 
Sybil Attack Analysis and Detection Techniques in MANET
Sybil Attack Analysis and Detection Techniques in MANETSybil Attack Analysis and Detection Techniques in MANET
Sybil Attack Analysis and Detection Techniques in MANETrahulmonikasharma
 
A Landmark Based Shortest Path Detection by Using A* and Haversine Formula
A Landmark Based Shortest Path Detection by Using A* and Haversine FormulaA Landmark Based Shortest Path Detection by Using A* and Haversine Formula
A Landmark Based Shortest Path Detection by Using A* and Haversine Formularahulmonikasharma
 
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...rahulmonikasharma
 
Quality Determination and Grading of Tomatoes using Raspberry Pi
Quality Determination and Grading of Tomatoes using Raspberry PiQuality Determination and Grading of Tomatoes using Raspberry Pi
Quality Determination and Grading of Tomatoes using Raspberry Pirahulmonikasharma
 
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...rahulmonikasharma
 
DC Conductivity Study of Cadmium Sulfide Nanoparticles
DC Conductivity Study of Cadmium Sulfide NanoparticlesDC Conductivity Study of Cadmium Sulfide Nanoparticles
DC Conductivity Study of Cadmium Sulfide Nanoparticlesrahulmonikasharma
 
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDMA Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDMrahulmonikasharma
 
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
IOT Based Home Appliance Control System, Location Tracking and Energy MonitoringIOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoringrahulmonikasharma
 
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...rahulmonikasharma
 
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...rahulmonikasharma
 
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM SystemAlamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM Systemrahulmonikasharma
 
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Empirical Mode Decomposition Based Signal Analysis of Gear Fault DiagnosisEmpirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosisrahulmonikasharma
 
Short Term Load Forecasting Using ARIMA Technique
Short Term Load Forecasting Using ARIMA TechniqueShort Term Load Forecasting Using ARIMA Technique
Short Term Load Forecasting Using ARIMA Techniquerahulmonikasharma
 
Impact of Coupling Coefficient on Coupled Line Coupler
Impact of Coupling Coefficient on Coupled Line CouplerImpact of Coupling Coefficient on Coupled Line Coupler
Impact of Coupling Coefficient on Coupled Line Couplerrahulmonikasharma
 
Design Evaluation and Temperature Rise Test of Flameproof Induction Motor
Design Evaluation and Temperature Rise Test of Flameproof Induction MotorDesign Evaluation and Temperature Rise Test of Flameproof Induction Motor
Design Evaluation and Temperature Rise Test of Flameproof Induction Motorrahulmonikasharma
 

More from rahulmonikasharma (20)

Data Mining Concepts - A survey paper
Data Mining Concepts - A survey paperData Mining Concepts - A survey paper
Data Mining Concepts - A survey paper
 
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
 
Considering Two Sides of One Review Using Stanford NLP Framework
Considering Two Sides of One Review Using Stanford NLP FrameworkConsidering Two Sides of One Review Using Stanford NLP Framework
Considering Two Sides of One Review Using Stanford NLP Framework
 
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication SystemsA New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
 
Broadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A SurveyBroadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A Survey
 
Sybil Attack Analysis and Detection Techniques in MANET
Sybil Attack Analysis and Detection Techniques in MANETSybil Attack Analysis and Detection Techniques in MANET
Sybil Attack Analysis and Detection Techniques in MANET
 
A Landmark Based Shortest Path Detection by Using A* and Haversine Formula
A Landmark Based Shortest Path Detection by Using A* and Haversine FormulaA Landmark Based Shortest Path Detection by Using A* and Haversine Formula
A Landmark Based Shortest Path Detection by Using A* and Haversine Formula
 
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
 
Quality Determination and Grading of Tomatoes using Raspberry Pi
Quality Determination and Grading of Tomatoes using Raspberry PiQuality Determination and Grading of Tomatoes using Raspberry Pi
Quality Determination and Grading of Tomatoes using Raspberry Pi
 
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
 
DC Conductivity Study of Cadmium Sulfide Nanoparticles
DC Conductivity Study of Cadmium Sulfide NanoparticlesDC Conductivity Study of Cadmium Sulfide Nanoparticles
DC Conductivity Study of Cadmium Sulfide Nanoparticles
 
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDMA Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
 
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
IOT Based Home Appliance Control System, Location Tracking and Energy MonitoringIOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
 
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
 
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
 
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM SystemAlamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM System
 
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Empirical Mode Decomposition Based Signal Analysis of Gear Fault DiagnosisEmpirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
 
Short Term Load Forecasting Using ARIMA Technique
Short Term Load Forecasting Using ARIMA TechniqueShort Term Load Forecasting Using ARIMA Technique
Short Term Load Forecasting Using ARIMA Technique
 
Impact of Coupling Coefficient on Coupled Line Coupler
Impact of Coupling Coefficient on Coupled Line CouplerImpact of Coupling Coefficient on Coupled Line Coupler
Impact of Coupling Coefficient on Coupled Line Coupler
 
Design Evaluation and Temperature Rise Test of Flameproof Induction Motor
Design Evaluation and Temperature Rise Test of Flameproof Induction MotorDesign Evaluation and Temperature Rise Test of Flameproof Induction Motor
Design Evaluation and Temperature Rise Test of Flameproof Induction Motor
 

Recently uploaded

SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 

Recently uploaded (20)

SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 

To Improve Data Storage Security Levels in the Cloud

  • 1. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 10 59 – 63 _______________________________________________________________________________________________ 59 IJRITCC | October 2017, Available @ http://www.ijritcc.org _______________________________________________________________________________________ To Improve Data Storage Security Levels in the Cloud Kolluru Venkata Nagendra Assistant Professor, Department of CSE Geethanjali Institute of Science and Technology. Gangavaram,Nellore, Andhra Pradesh, India kvnscholar@gmail.com N. Haritha, Assistant Professor, Department of Computer Science, Sriharsha Institute of PG Studies, Nellore, Andhra Pradesh, India nharithamca@gmail.com Abstract: Now-a-Days Cloud Computing is an emerging technology, that works on the principle of pay-per-use. It offers services like Software- as-a-Service (SaaS), Platform-as-a-Service (PaaS), Infrastructure-as-a-Service (IaaS), Storage as a Service and many more. Cloud computing used for database and software applications to centralize the data. All the cloud users openly store their data on the cloud service provider’s service centers. Here, the management of data and services are not fully confidential. So that the security of the cloud stored data becomes an open challenging task in the field of Cloud Computing. To increase the levels of data security in the cloud, this paper deals with some techniques like public auditability, Homomorphism Linear Authenticator (HLA). Keywords: Cloud Computing, Data Security, public auditability, Homomorphism Linear Authenticator (HLA) __________________________________________________*****_________________________________________________ I. INTRODUCTION Cloud computing is a recent trending in IT that where computing and data storage is done in data centers rather than personal portable PC’s. It refers to applications delivered as services over the internet as well as to the cloud infrastructure – namely the hardware and system software in data centers that provide this service. The sharing of resources reduces the cost to individuals. The best definition for Cloud is defined in as large pool of easily accessible and virtualized resources which can be dynamically reconfigured to adjust a variable load, allowing also for optimum scale utilization. The key driving forces behind cloud computing is the ubiquity of broadband and wireless networking, falling storage costs, and progressive improvements in Internet computing software. The main technical supporting of cloud computing infrastructures and services include virtualization, service-oriented software, grid computing technologies, management of large facilities, and power efficiency. The key features of the cloud are agility, cost, device and location independence, multi tenancy, reliability, scalability, maintenance etc. The cloud can be deployed in three models. They are described in different ways. In generalized it is described as below: A. Public Cloud: Public cloud describes cloud computing in the traditional mainstream sense, whereby resources are dynamically provisioned on a fine-grained, self-service basis over the Internet, via web applications/web services, from an off-site third-party provider who bills on a fine-grained utility computing basis. This is a general cloud available to public over Internet. B. Private Cloud: A private cloud is one in which the services and infrastructure are maintained on a private network. These clouds offer the greatest level of security and control, but they require the company to still purchase and maintain all the software and infrastructure, which reduces the cost savings. C. Hybrid Cloud: A hybrid cloud environment consisting of multiple internal and/or external providers "will be typical for most enterprises". By integrating multiple cloud services users may be able to ease the transition to public cloud services while avoiding issues such as PCI compliance. Cloud computing is the provision of dynamically scalable and often virtualized resources as services over the internet. Users need not have knowledge of, expertise in, or control over the technology infrastructure in the cloud that supports them. Cloud computing represents a major change in how we store information and run applications. Instead of placing applications and data on an individual desktop computer, everything is hosted in the cloud, through which a collection of computers and servers accessed via the Internet. The services offered by the cloud computing include: 1. Software as a Service(SaaS) 2. Platform as a Service(PaaS)
  • 2. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 10 59 – 63 _______________________________________________________________________________________________ 60 IJRITCC | October 2017, Available @ http://www.ijritcc.org _______________________________________________________________________________________ 3. Infrastructure as a Service(IaaS) 4. Storage as a Service Among all these services, this paper mainly focuses on Storage as a Service, and the techniques for providing security to the cloud stored data by the clients. 1) Public auditability: To allow TPA to verify the correctness of the cloud data on demand without retrieving a copy of the whole data or introducing additional online burden to the cloud users. 2) Storage correctness: To ensure that there exists no cheating cloud server that can pass the TPA’s audit without indeed storing users’ data intact. Figure: Cloud Data Storage Architecture 3) Batch auditing: To enable TPA with secure and efficient auditing capability to cope with multiple auditing delegations from possibly large number of different users simultaneously. 4) Lightweight: To allow TPA to perform auditing with minimum communication and computation overhead. As users no longer physically possess the storage of their data, traditional cryptographic primitives for the purpose of data security protection cannot be directly adopted. In particular, simply downloading all the data for its integrity verification is not a practical solution due to the expensiveness in I/O and transmission cost across the network. Besides, it is often insufficient to detect the data corruption only when accessing the data, as it does not give users correctness assurance for those unaccessed data and might be too late to recover the data loss or damage. Considering the large size of the outsourced data and the user’s constrained resource capability, the tasks of auditing the data correctness in a cloud environment can be formidable and expensive for the cloud users. Moreover, the overhead of using cloud storage should be minimized as much as possible, such that user does not need to perform too many operations to use the data. To fully ensure the data integrity and save the cloud users’ computation resources as well as online burden, it is of critical importance to enable public auditing service for cloud data storage, so that users may resort to an independent third party auditor (TPA) to audit the outsourced data when needed. To address these problems, this work utilizes the technique of public key based homomorphic linear authenticator (HLA), which enables TPA to perform the auditing without demanding the local copy of data and thus drastically reduces the communication and computation overhead as compared to the straightforward data auditing approaches. By integrating the HLA with random masking, our protocol guarantees that the TPA could not learn any knowledge about the data content stored in the cloud server during the efficient auditing process. The aggregation and algebraic properties of the authenticator further benefit this design for the batch auditing. II. PROBLEM STATEMENT In the Existing systems, the notion of public auditability[2] has been proposed in the context of ensuring remotely stored data integrity[3] under different system and security models. Public auditability allows an external party, in addition to the user himself, to verify the correctness of remotely stored data. However, most of these schemes do not consider the privacy protection of users’ data against external auditors. Indeed, they may potentially reveal user’s data to auditors. This severe drawback greatly affects the security of these protocols in cloud computing. From the perspective of protecting data privacy, the users, who own the data and rely on TPA[4] just for the storage security of their data, do not want this auditing process introducing new vulnerabilities of unauthorized information leakage toward their data security. To securely introduce an effective third party auditor (TPA), the following two fundamental requirements have to be met: 1) TPA should be able to efficiently audit the cloud data storage without demanding the local copy of data, and introduce no additional on-line burden to the cloud user; 2) The third party auditing process should bring in no new vulnerabilities towards user data privacy. III. PROPOSED SYSTEM: In this paper, we utilize the public key based homomorphic authenticator[5] and uniquely integrate it with random mask technique to achieve a privacy-preserving public auditing system for cloud data storage security while keeping all above requirements in mind. It includes protocols for data integrity verification and data update.
  • 3. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 10 59 – 63 _______________________________________________________________________________________________ 61 IJRITCC | October 2017, Available @ http://www.ijritcc.org _______________________________________________________________________________________ 3.1 Protocols for default Integrity Verification 1.Protocolsfor Default IntegrityVerification: TPA CSS 1.Generate a random set challenge request chal 2.compute datablocks 3.compute signatureblock Integrity ProofP 4.ComputeRoot 5.Verify the signature and output FALSE if fail 6.Verify data block 3.2 Protocol for Data Update 2.The protocol for Provable Data Update: Client CSS 1.Generate new signature update request update 2.Update file and compute R’ update proof P_update 3.Compute Root 4.Verify the signature and output FALSE if fail 5.Compute R_new and verify update sig(H(R’)) 6.Update R‘ signature IV. HOMOMORPHICLINEAR AUTHENTICATOR: It is a way to assure an auditor that a linear combination of data blocks is correctly computed by verifying only the aggregated authenticator. It is a form of encryption which allows specific types of computations to be carried out on cipher text and generate an encrypted result which when decrypted, matches the result of operations performed on the plain text. HLA-based Solution: The HLA technique is used to effectively support public auditability without having to retrieve the data blocks themselves. HLAs, like MACs, are unforgivable verification metadata that authenticate the integrity of a data block. The difference is that HLAs can be aggregated. It is possible to compute an aggregated HLA which authenticates a linear combination of the individual data blocks. At a high level, HLA-based proof of storage system works as follows. The user still authenticates each element of F = (m1, · · ·, mn) by a set of HLA. The cloud server stores {F, φ}. The TPA verifies the cloud storage by sending a random set of challenge {k}. (More precisely, F and {k} are all vectors, so {k} is an ordered set or {k, kn} should be sent). The cloud server then returns μ = Pi to mi and an aggregated authenticator, that is supposed to authenticate μ. Though allowing efficient data auditing and consuming only constant bandwidth, the direct adoption of these HLA-based techniques is still not suitable for our purposes. This is because the linear combination of blocks, μ = Pk to mk, may potentially reveal user data information to TPA, and violates the privacy preserving guarantee. Specifically, if an enough number of the linear combinations of the same blocks are collected, the TPA can simply derive the user’s data content by solving a system of linear equations. SCREENSHOTS:
  • 4. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 10 59 – 63 _______________________________________________________________________________________________ 62 IJRITCC | October 2017, Available @ http://www.ijritcc.org _______________________________________________________________________________________ Integrity Failure: V. CONCLUSION: The data storage security in Cloud Computing is discussed in this paper. This security mechanism used public auditability and homomorphism linear authenticator. The information about the data content stored on cloud server was not known by TPA. This effective and efficient auditing process not only removes the heavy load of users of the cloud. But also the user’s fear of their diminish outsourced leakage of data. In this the TPA may use multiple audit sessions from various users for their outstanding data files. In a right and better way we extended our privacy- preserving public auditing protocol into multiple auditing tasks. REFERENCES [1] P. Mell and T. Grance, “Draft NIST working definition of cloud computing,” Referenced on June. 3rd, 2009 Online at http://csrc.nist.gov/groups/SNS/cloud-computing/index. html, 2009. [2] Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, “Enabling public verifiability and data dynamics for storage security in cloud computing,” in Proc. of ESORICS’09. Saint Malo, France: Springer-Verlag, 2009, pp.355–370. [3] C. Wang, Q. Wang, K. Ren, and W. Lou, “Ensuring data storage security in cloud computing,” in Proc. of IWQoS’09, Charleston,SouthCarolina,USA,2009. [4] Shingare Vidya Marshal “Secure Audit Service by Using TPA for Data Integrity in Cloud System” International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-3,Issue- 4,September. [5] Privacy-Preserving Public Auditing for Secure Cloud Storage Cong Wang, Student Member, IEEE, Sherman S.- M.Chow,Qian Wang,Student Member,IEEE,and Wenjing Lou,Member,IEEE. [6] A. van Raan, “Scientometrics: State-of-the-art,” Scientometrics,vol. 38, no. 1, pp. 208–218, 1996. [7] S. Schwarze, S. Voß, G. Zhou, and G. Zhou, “Scientometric analysis of container terminals and ports literature and interaction with publications on distribution networks,” in Proc. 3rd Int. Conf. Comput.Logistics, 2012, pp. 33–52. [8] D. Straub, “The value of scientometric studies: An introduction to a debate on IS as a reference discipline,” J. Assoc. Inform. Syst., vol. 7, no. 5, pp. 241–246, 2006. [9] A. Serenko and N. Bontis, “Meta-review of knowledge management and intellectual capital literature: Citation impact and research productivity rankings,” Knowl. Process Manage., vol. 11,no. 3, pp. 185–198, 2004. [10] W. Hood and C. Wilson, “The literature of bibliometrics, scientometrics, and informetrics,” Scientometrics, vol. 52, no. 2, pp. 291– 314, 2001. [11] L. Leydesdorff, “Indicators of structural change in the dynamics of science: Entropy statistics of the SCI journal citation reports,” Scientometrics, vol. 53, no. 1, pp. 131– 159, 2002. [12] S. Voß and X. Zhao, “Some steps towards a scientometric analysis of publications in machine translation,” in Proc. IASTED Int. Conf. Artif. Intell. Appl., 2005, pp. 651–655. [13] L. Leydesdorff and T. Schank, “Dynamic animations of journal maps: Indicators of structural changes and interdisciplinary developments,” J. Am. Soc. Inform. Sci. Technol., vol. 59, no. 11, pp. 1810–1818, 2008.
  • 5. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 10 59 – 63 _______________________________________________________________________________________________ 63 IJRITCC | October 2017, Available @ http://www.ijritcc.org _______________________________________________________________________________________ [14] K. Sivakumaren, S. Swaminathan, and G. Karthikeyan, “Growth and development of publications on cloud computing: A scientometric study,” Int. J. Inform. Library Soc., vol. 1, no. 1, pp. 37–43, 2012. [15] Q. Bai and W.-h. Dong, “Scientometric analysis on the papers of cloud computing,” Sci-Tech Inform. Develop. Econ., vol. 5, no. 1, pp. 6–8, 2011. [16] T. Wang and G. Huang, “Research progress of cloud security from 2008 to 2011 in China,” Inform. Sci., no. 1, pp. 153–160, 2013. [17] I. Foster, Y. Zhao, I. Raicu, and S. Lu, “Cloud computing and grid computing 360-degree compared,” in Proc. Grid Comput. Environ. Workshop, 2008, pp. 1–10. [18] R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, and I. Brandic, “Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility,” Future Gener. Comput. Syst., vol. 25, no. 6, pp. 599–616, 2009. [19] M.Armbrust,A. Fox, R. Griffith,A.D. Joseph, R. Katz,A. Konwinski, G. Lee, D. Patterson, A. Rabkin, and I. Stoica, “A view of cloud computing,” Commun.ACM, vol. 53, no. 4, pp. 50–58, 2010. [20] C. W. Holsapple, L. E. Johnson, H. Manakyan, and J. Tanner, “Business computing research journals: A normalized citation analysis,” J. Manage. Inform. Syst., vol. 11, no. 1, pp. 131–140, 1994. [21] G. S. Howard, D. A. Cole, and S. E. Maxwell, “Research productivity in psychology based on publication in the journals of the American psychological association.,” Amer. Psychol., vol. 42, no. 11, pp. 975–986, 1987. [22] R. K. Merton, “The Matthew effect in science,” Science, vol. 159, no. 3810, pp. 56–63, 1968.