Submit Search
Upload
A Survey on Batch Auditing Systems for Cloud Storage
•
0 likes
•
44 views
IRJET Journal
Follow
https://www.irjet.net/archives/V4/i6/IRJET-V4I6204.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 3
Download now
Download to read offline
Recommended
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET Journal
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction
paperpublications3
Implementing Proof of Retriavaibility for Multiple Replica of Data File using...
Implementing Proof of Retriavaibility for Multiple Replica of Data File using...
IRJET Journal
Development of Effective Audit Service to Maintain Integrity of Migrated Data...
Development of Effective Audit Service to Maintain Integrity of Migrated Data...
IRJET Journal
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud Environment
Editor IJCATR
High performance intrusion detection using modified k mean & naïve bayes
High performance intrusion detection using modified k mean & naïve bayes
eSAT Journals
Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds
IRJET Journal
Authenticated and unrestricted auditing of big data space on cloud through v...
Authenticated and unrestricted auditing of big data space on cloud through v...
IJMER
Recommended
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET Journal
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction
paperpublications3
Implementing Proof of Retriavaibility for Multiple Replica of Data File using...
Implementing Proof of Retriavaibility for Multiple Replica of Data File using...
IRJET Journal
Development of Effective Audit Service to Maintain Integrity of Migrated Data...
Development of Effective Audit Service to Maintain Integrity of Migrated Data...
IRJET Journal
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud Environment
Editor IJCATR
High performance intrusion detection using modified k mean & naïve bayes
High performance intrusion detection using modified k mean & naïve bayes
eSAT Journals
Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds
IRJET Journal
Authenticated and unrestricted auditing of big data space on cloud through v...
Authenticated and unrestricted auditing of big data space on cloud through v...
IJMER
IRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud Data
IRJET Journal
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
INFOGAIN PUBLICATION
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
ijiert bestjournal
IRJET- A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...
IRJET- A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...
IRJET Journal
IEEE Projects 2013 For ME Cse @ Seabirds ( Trichy, Thanjavur, Perambalur, Di...
IEEE Projects 2013 For ME Cse @ Seabirds ( Trichy, Thanjavur, Perambalur, Di...
SBGC
Paper review
Paper review
Md. Mahedi Mahfuj
Ieee projects-2014-java-cloud-computing
Ieee projects-2014-java-cloud-computing
SBGC
IEEE Projects 2013 For ME Cse Seabirds ( Trichy, Thanjavur, Karur, Perambalur )
IEEE Projects 2013 For ME Cse Seabirds ( Trichy, Thanjavur, Karur, Perambalur )
SBGC
Efficient Implementation of Proof of Retrievability (OPOR) In Cloud Computing...
Efficient Implementation of Proof of Retrievability (OPOR) In Cloud Computing...
IJERA Editor
Ieee projects 2012 for cse
Ieee projects 2012 for cse
SBGC
IRJET- Enhancement of Security in Cloud Storage of Electronic Health Reco...
IRJET- Enhancement of Security in Cloud Storage of Electronic Health Reco...
IRJET Journal
A Novel privacy preserving public auditing for shared data in cloud
A Novel privacy preserving public auditing for shared data in cloud
JAVVAJI VENKATA RAO
SECURE & EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA INTEGRITY IN CLOUDS
SECURE & EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA INTEGRITY IN CLOUDS
Gyan Prakash
Svm Classifier Algorithm for Data Stream Mining Using Hive and R
Svm Classifier Algorithm for Data Stream Mining Using Hive and R
IRJET Journal
IRJET- Improvement of Security and Trustworthiness in Cloud Computing usi...
IRJET- Improvement of Security and Trustworthiness in Cloud Computing usi...
IRJET Journal
A Novel Method of Directly Auditing Integrity On Encrypted Data
A Novel Method of Directly Auditing Integrity On Encrypted Data
IRJET Journal
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
IOSR Journals
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET Journal
Review_2013
Review_2013
Jonathan Sinclair
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
IRJET Journal
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET Journal
Enabling Cloud Storage Auditing with Key Exposure Resistance
Enabling Cloud Storage Auditing with Key Exposure Resistance
IRJET Journal
More Related Content
What's hot
IRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud Data
IRJET Journal
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
INFOGAIN PUBLICATION
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
ijiert bestjournal
IRJET- A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...
IRJET- A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...
IRJET Journal
IEEE Projects 2013 For ME Cse @ Seabirds ( Trichy, Thanjavur, Perambalur, Di...
IEEE Projects 2013 For ME Cse @ Seabirds ( Trichy, Thanjavur, Perambalur, Di...
SBGC
Paper review
Paper review
Md. Mahedi Mahfuj
Ieee projects-2014-java-cloud-computing
Ieee projects-2014-java-cloud-computing
SBGC
IEEE Projects 2013 For ME Cse Seabirds ( Trichy, Thanjavur, Karur, Perambalur )
IEEE Projects 2013 For ME Cse Seabirds ( Trichy, Thanjavur, Karur, Perambalur )
SBGC
Efficient Implementation of Proof of Retrievability (OPOR) In Cloud Computing...
Efficient Implementation of Proof of Retrievability (OPOR) In Cloud Computing...
IJERA Editor
Ieee projects 2012 for cse
Ieee projects 2012 for cse
SBGC
IRJET- Enhancement of Security in Cloud Storage of Electronic Health Reco...
IRJET- Enhancement of Security in Cloud Storage of Electronic Health Reco...
IRJET Journal
A Novel privacy preserving public auditing for shared data in cloud
A Novel privacy preserving public auditing for shared data in cloud
JAVVAJI VENKATA RAO
SECURE & EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA INTEGRITY IN CLOUDS
SECURE & EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA INTEGRITY IN CLOUDS
Gyan Prakash
Svm Classifier Algorithm for Data Stream Mining Using Hive and R
Svm Classifier Algorithm for Data Stream Mining Using Hive and R
IRJET Journal
IRJET- Improvement of Security and Trustworthiness in Cloud Computing usi...
IRJET- Improvement of Security and Trustworthiness in Cloud Computing usi...
IRJET Journal
A Novel Method of Directly Auditing Integrity On Encrypted Data
A Novel Method of Directly Auditing Integrity On Encrypted Data
IRJET Journal
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
IOSR Journals
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET Journal
Review_2013
Review_2013
Jonathan Sinclair
What's hot
(19)
IRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud Data
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
IRJET- A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...
IRJET- A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...
IEEE Projects 2013 For ME Cse @ Seabirds ( Trichy, Thanjavur, Perambalur, Di...
IEEE Projects 2013 For ME Cse @ Seabirds ( Trichy, Thanjavur, Perambalur, Di...
Paper review
Paper review
Ieee projects-2014-java-cloud-computing
Ieee projects-2014-java-cloud-computing
IEEE Projects 2013 For ME Cse Seabirds ( Trichy, Thanjavur, Karur, Perambalur )
IEEE Projects 2013 For ME Cse Seabirds ( Trichy, Thanjavur, Karur, Perambalur )
Efficient Implementation of Proof of Retrievability (OPOR) In Cloud Computing...
Efficient Implementation of Proof of Retrievability (OPOR) In Cloud Computing...
Ieee projects 2012 for cse
Ieee projects 2012 for cse
IRJET- Enhancement of Security in Cloud Storage of Electronic Health Reco...
IRJET- Enhancement of Security in Cloud Storage of Electronic Health Reco...
A Novel privacy preserving public auditing for shared data in cloud
A Novel privacy preserving public auditing for shared data in cloud
SECURE & EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA INTEGRITY IN CLOUDS
SECURE & EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA INTEGRITY IN CLOUDS
Svm Classifier Algorithm for Data Stream Mining Using Hive and R
Svm Classifier Algorithm for Data Stream Mining Using Hive and R
IRJET- Improvement of Security and Trustworthiness in Cloud Computing usi...
IRJET- Improvement of Security and Trustworthiness in Cloud Computing usi...
A Novel Method of Directly Auditing Integrity On Encrypted Data
A Novel Method of Directly Auditing Integrity On Encrypted Data
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
Review_2013
Review_2013
Similar to A Survey on Batch Auditing Systems for Cloud Storage
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
IRJET Journal
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET Journal
Enabling Cloud Storage Auditing with Key Exposure Resistance
Enabling Cloud Storage Auditing with Key Exposure Resistance
IRJET Journal
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET Journal
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET Journal
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
IJERA Editor
Cloud Computing Task Scheduling Algorithm Based on Modified Genetic Algorithm
Cloud Computing Task Scheduling Algorithm Based on Modified Genetic Algorithm
IRJET Journal
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...
IEEEGLOBALSOFTTECHNOLOGIES
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing for ...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing for ...
IEEEGLOBALSOFTTECHNOLOGIES
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storage
IEEEFINALYEARPROJECTS
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET Journal
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storage
JPINFOTECH JAYAPRAKASH
Secure Multi-Owner Group Signature Based Secure M-Health Records in Cloud
Secure Multi-Owner Group Signature Based Secure M-Health Records in Cloud
IJMER
Ijmer 41025357
Ijmer 41025357
IJMER
Ijmer 41025357
Ijmer 41025357
IJMER
Ijmer 41025357
Ijmer 41025357
IJMER
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET Journal
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
IRJET Journal
50120140507005 2
50120140507005 2
IAEME Publication
50120140507005
50120140507005
IAEME Publication
Similar to A Survey on Batch Auditing Systems for Cloud Storage
(20)
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
Enabling Cloud Storage Auditing with Key Exposure Resistance
Enabling Cloud Storage Auditing with Key Exposure Resistance
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Cloud Computing Task Scheduling Algorithm Based on Modified Genetic Algorithm
Cloud Computing Task Scheduling Algorithm Based on Modified Genetic Algorithm
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing for ...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing for ...
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storage
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storage
Secure Multi-Owner Group Signature Based Secure M-Health Records in Cloud
Secure Multi-Owner Group Signature Based Secure M-Health Records in Cloud
Ijmer 41025357
Ijmer 41025357
Ijmer 41025357
Ijmer 41025357
Ijmer 41025357
Ijmer 41025357
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
50120140507005 2
50120140507005 2
50120140507005
50120140507005
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
britheesh05
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
roselinkalist12
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
GDSCAESB
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
Mark Billinghurst
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting .
Satyam Kumar
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
KartikeyaDwivedi3
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
ROCENODodongVILLACER
Past, Present and Future of Generative AI
Past, Present and Future of Generative AI
abhishek36461
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Dr.Costas Sachpazis
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
me23b1001
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
Dr SOUNDIRARAJ N
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
PoojaBan
Internship report on mechanical engineering
Internship report on mechanical engineering
malavadedarshan25
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
asadnawaz62
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
959SahilShah
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
SAURABHKUMAR892774
Recently uploaded
(20)
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting .
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
Past, Present and Future of Generative AI
Past, Present and Future of Generative AI
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
Internship report on mechanical engineering
Internship report on mechanical engineering
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
A Survey on Batch Auditing Systems for Cloud Storage
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1107 A Survey on Batch Auditing Systems for Cloud Storage Darshan Kumar G 1, Dr. K .Thippeswamy2 1 Student, Department CS&E, VTU Centre for PG Studies, Mysuru, Karnataka. 2Professor & Head of Department CS&E, VTU Centre for PG Studies, Mysuru, Karnataka. ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract – As the Emergent technology in the IT world, Cloud Computing has spread over different facets of IT industry in software, platform & Infrastructure as service streams. The skill allows us to store the data in the place where we are allow access it anywhere and anytime we need. Its popularity is in its peak because ofits potentialandservices given to use for cheap cost by Cloud Service Providers. as the technology is more complex and its internal organization is clumsy still toddy, many challenges it has faced andstillfacing in the terms of availability and many more but most challenges are faced regarding the security of e datastoredby the user in cloud. There are many methodologies are introduced for overcoming the security issues .Auditing systems are the system which is intended to work on the security issues which utilizes complex and secure algorithms .Public Auditing & Private Auditing are the auditing systems used. This paper shows the Batch Auditing systems from the beginning and present ongoing researches on it. Key Words: Cloud Computing, Security Issues, Batch Auditing, Cloud Service Providers, Public Auditing, Private Auditing. 1. INTRODUCTION With the entry of cloud computing, which give foundation, stage, programming and different administrations for cloud clients, individuals can without much of a stretch access to less expensive and all the more capable processors and capacity. Client can facilitate the weight of putting away colossal information in neighborhood frameworks, with the cloud computing worldview client can ready to store the information into cloud and can recover at whatever point client needs. The cloud demonstrate has inspired industry and the scholarly community to receive distributed computing to have a wide range of uses running from high computationally concentrated applications down to light weight administrations. As per a Gartner study on distributed computing incomes, thecloudmarketwasworth USD 58.6B in 2009 , is required to be USD 68B in 2010 and will reach USD 148B by 2014. Theseincomesinferthatcloud computing is a promising stage. Then again, it builds the assailants' enthusiasm for finding existing vulnerabilities in the model. Regardless of the potential advantages and incomes that could be picked up from the distributed computing model, themodel still hasa considerablemeasure of open issues that effect the model respectability and inescapability. Merchant secure, multi-tenure and disconnection, information administration, benefit compactness, flexibility motors, SLA administration, and cloud security . The Cloud computing paradigm is built onseveralimportant modules among them the most important are : Cloud User Cloud Service Provider and Third party Auditor The First two components are the basicandmoreimportant, Cloud User is one who Uses the services provided by the Cloud service providers. And the basic, managing services, maintaining &storing data are done by cloud service provider who provides services for user. The third party auditor comes when the cloud is seen in the security perspective of both user and Provider. Heistheentitywhois independent and has connected to both User and the cloud service provider, and has the most experienceandcapability on the verification which is the aim of auditing and solution to the security issues. 2. RELATED WORKS There are many papers, Methods, Techniques are proposed in the view of Auditing for security purpose of cloudstorage. Before that let us know the Existing auditing systems in use: Public Auditing Private Auditing These two types of auditing are most popular. Private auditing allows user to challenge the provider to check the integrity of his data .In single task highefficiencyis achievable in this case but it is burden to user although efficiency is high. Public auditing scheme allows data owner i.e. user to delegate a component who is expertise in it and most promisable and trustworthy next to Provider. And with the help of Component he/she can check their integrity .the component is TPA known as Third Party Auditor. According to Ateniese’s theProvabledata Possessionmodel , defines the public auditing using the technique which uses RSA based homomorphic tag. This is thefirstmodel todefine the public auditing. The Tag length is 1024 bits long andalso it solves the private validation problem. According to juels and kaliskithemethodwhichusestheBLS signature and pseudorandom function which they proposed popularly known as “Proof of Retrivability” in which the
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1108 signature length is 160bts long .and query time to challangers is limited to limit secret keys.its working is high pottential and heavy thay they can’t be done is smaller platforms like mobiles,cellphones etc…. According the Shah who is from HP company puts a new plan to this and gives ““Auditing to keep online storage services honest” where the conceptofTPAcametoexistence .he says the user need to delegate the Thirdparty who is expertise in this atsk i.e. TPA.the MAC keys are used in this plan. “privacy- preserving public data auditing by using homomorphic authenticator with random masking” is the new method realized by Wang in this technique user need not be online always. Wang improves the “Proof of retrievability” model and uses Merkley Hash Tree to complete dynamic data operations such as data modification, data insertion and data deletion for cloud data storage. Moreover, Wang also explores the technology of Bi-linear aggregate signature to realize batch auditing. The data dynamic auditing scheme meets the users’ demand of data operation and greatly improves Cloud Computing’s computing efficiency when dealing with huge amount of data. At present the Aggregate signature technique is used in verification.the techniqueis composedof Bi-linearaggregate signature technique where the data from different users are digitally signed by the different signers are aggregated into single signature if the aggregate signatures passes the verification then the data correspond to that signature are not affected.if in case it doesn’t pass the verificationthen itis the job of TPA to verify it one by one. 3. METHEDOLOGY The Bi-linear aggregate method is fast and efficient but it fails when the Aggregate signature do not pass the verification .at this moment the verifier should verify one by one ,which for small piece of data .Since the data is huge in realtime and the Many users are using it on same time . So a method or technique is need to overcome this problem. In this context ,a new method is proposed which uses the Map reduce framework for this [1]. In this proposed system Auditing is done in two phases In first phase the user generates the public keys and private keys along with the data is upload to CSP(Cloud Service Provider). In second phase the User request the TPA(Third Party Auditor) to check whether his/her file is safe or not. As soon as request is recived form user.TPA challenges the CSP .CSP sends the data related to TPA request which is called proof . TPA check the data and replies to user with TRUE/FALSE. If not it should verify it . at this particular point the map reduce framework is introduce in order to map the signatures with data and reduce it to check TRUE/FALSE. MAP function Map(Text value, Context context) Input: PKFile_1, …, paramFile_1, … Output: <dataTag, PK_1>, …, <dataTag, Para_1>, … REDUCE function Input: K key-value pairs of <key, values> Output: K results of <dataTag, true/false> 4. CONCLUSION In this paper, we have come across different process of the advancement and advancement in the existing methods in batch auditing for cloud storage from the early days.the initial techniques from Provable data Possession to the Bi- linear aggregate signature technique.the securitychallenges are minimized to some extentbutnotcompletely.inthisview we also seen the new technique of MapReduce framework incorporated in the existing Batch Auditing system.From early time the performance and efficiency are increased more but he integrity verification pace is still is in its slower rate.A new method can be introduced in view of process which computes parallelly and many advancements can be made in various ,small,and complex part of cloud paradigm. ACKNOWLEDGEMENT I Thank my Professor & HOD Dr.K.Thippeswamy For his Vauable Guidelines. REFERENCES [1] Yu Jin,Dong Yan,Heng He, 2016 IEEE 11th Conference on Industrial Electronics and Applications (ICIEA). [2] Mohamed Al Morsy, John Grundy and Ingo Müller, “An Analysis of the Cloud Computing Security Problem,” In Proceedings of APSEC 2010 Cloud Workshop, Sydney, Australia, 2010. [3] Wang Q, Wang C, Li J, “Enabling public verifiability and data dynamics for storage security in cloud computing,” Proceedings of the 14th European conference on Research in computer security Springer- Verlag, 2009, pp. 355-370. [4] Chen H F, Lin B G, Yang Y, “Public Batch Auditing for 2M-PDP Based on BLS in Cloud Storage,”Journal of Cryptologic Research, 2014.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1109 [5] [Syam K P, Subramanian R, “An Efficient and Secure Protocol for EnsuringData StorageSecurityinCloud Computing,” International Journal of Computer Science Issues, 2011. [6] Ateniese G, Burns R, Curtmola R, “Provable data possession at untrusted stores,”Ccs’07Proceedings of Acm Conference onComputer&Communications Security, 2007, pp. 1165-1182. [7] Fischlin M, “The Cramer-Shoup Strong-RSA signature scheme revisited,” Proceedings of Pkc’03 Lncs, 2003, pp. 116-129. [8] Juels A, Kaliski B S, “Pors: proofs of retrievabilityfor large files,” In CCS’07 Proceedings of the 14th ACM conference on Computer and communications security, 2007, pp. 584-597. [9] Wang C, Wang Q, Ren K, “Privacy-preserving public auditing for data storage security in cloud computing,” INFOCOM, 2010 Proceedings IEEE, 2010, pp. 1-9. BIOGRAPHIES Darshan Kumar G Presently Pursuing his M.Tech Degree in department of CS&E at Visvesvaraya Technological University, PG Centre, Mysuru 570029. He completed B.E in CS&E branch at SJMIT Chitradurga, Karnataka in the year 2015. His M.Tech project Research on Map Reduce based Cloud Storage Batch Auditing. His area of interest in programming in C#, PHP, Web Development, Artificial Intelligence, Search Engine Optimization, Search engines, Research in Big Data. Dr. K. Thippeswamy Receivedhis Ph. D degree from the Department of CS&E in Jawaharlal Neharu Technological University, Ananthapur, Andra Pradesh in the year 2012, M.EdegreeinComputer Science and Engineering from University Visvesvaraya College of Engineering (UVCE), Bangalore in 2004. and Bachelor’s Degree in Computer Science and Engineering from University B.D.T College of Engineering(UBDTCE),Davangerein the year 1998. He is currently heading theDepartmentofComputer Science and Engineering, Visvesvaraya Technological University, PG Center, Mysore, He is having 18 years of Teaching and 3 years Research experience. He has published around 40 papers which include International Journals, International Conferences and Notional Conferences; he has conducted two national one International conference and many workshops successfully. He is a Life member of India Society for Technical Education (LMISTE), Computer Society of India (CSI) & International Association of Engineers (IAENG). He is Reviewer Committee Member for the international Journal Bioinformatics and Data Mining. Mysuru.
Download now