SlideShare a Scribd company logo
1 of 3
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1107
A Survey on Batch Auditing Systems for Cloud Storage
Darshan Kumar G 1, Dr. K .Thippeswamy2
1 Student, Department CS&E, VTU Centre for PG Studies, Mysuru, Karnataka.
2Professor & Head of Department CS&E, VTU Centre for PG Studies, Mysuru, Karnataka.
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract – As the Emergent technology in the IT world,
Cloud Computing has spread over different facets of IT
industry in software, platform & Infrastructure as service
streams. The skill allows us to store the data in the place
where we are allow access it anywhere and anytime we need.
Its popularity is in its peak because ofits potentialandservices
given to use for cheap cost by Cloud Service Providers. as the
technology is more complex and its internal organization is
clumsy still toddy, many challenges it has faced andstillfacing
in the terms of availability and many more but most
challenges are faced regarding the security of e datastoredby
the user in cloud. There are many methodologies are
introduced for overcoming the security issues .Auditing
systems are the system which is intended to work on the
security issues which utilizes complex and secure algorithms
.Public Auditing & Private Auditing are the auditing systems
used. This paper shows the Batch Auditing systems from the
beginning and present ongoing researches on it.
Key Words: Cloud Computing, Security Issues, Batch
Auditing, Cloud Service Providers, Public Auditing, Private
Auditing.
1. INTRODUCTION
With the entry of cloud computing, which give foundation,
stage, programming and different administrations for cloud
clients, individuals can without much of a stretch access to
less expensive and all the more capable processors and
capacity. Client can facilitate the weight of putting away
colossal information in neighborhood frameworks, with the
cloud computing worldview client can ready to store the
information into cloud and can recover at whatever point
client needs. The cloud demonstrate has inspired industry
and the scholarly community to receive distributed
computing to have a wide range of uses running from high
computationally concentrated applications down to light
weight administrations. As per a Gartner study on
distributed computing incomes, thecloudmarketwasworth
USD 58.6B in 2009 , is required to be USD 68B in 2010 and
will reach USD 148B by 2014. Theseincomesinferthatcloud
computing is a promising stage. Then again, it builds the
assailants' enthusiasm for finding existing vulnerabilities in
the model. Regardless of the potential advantages and
incomes that could be picked up from the distributed
computing model, themodel still hasa considerablemeasure
of open issues that effect the model respectability and
inescapability. Merchant secure, multi-tenure and
disconnection, information administration, benefit
compactness, flexibility motors, SLA administration, and
cloud security .
The Cloud computing paradigm is built onseveralimportant
modules among them the most important are :
 Cloud User
 Cloud Service Provider and
 Third party Auditor
The First two components are the basicandmoreimportant,
Cloud User is one who Uses the services provided by the
Cloud service providers. And the basic, managing services,
maintaining &storing data are done by cloud service
provider who provides services for user. The third party
auditor comes when the cloud is seen in the security
perspective of both user and Provider. Heistheentitywhois
independent and has connected to both User and the cloud
service provider, and has the most experienceandcapability
on the verification which is the aim of auditing and solution
to the security issues.
2. RELATED WORKS
There are many papers, Methods, Techniques are proposed
in the view of Auditing for security purpose of cloudstorage.
Before that let us know the Existing auditing systems in use:
 Public Auditing
 Private Auditing
These two types of auditing are most popular.
Private auditing allows user to challenge the provider to
check the integrity of his data .In single task highefficiencyis
achievable in this case but it is burden to user although
efficiency is high.
Public auditing scheme allows data owner i.e. user to
delegate a component who is expertise in it and most
promisable and trustworthy next to Provider. And with the
help of Component he/she can check their integrity .the
component is TPA known as Third Party Auditor.
According to Ateniese’s theProvabledata Possessionmodel ,
defines the public auditing using the technique which uses
RSA based homomorphic tag. This is thefirstmodel todefine
the public auditing. The Tag length is 1024 bits long andalso
it solves the private validation problem.
According to juels and kaliskithemethodwhichusestheBLS
signature and pseudorandom function which they proposed
popularly known as “Proof of Retrivability” in which the
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1108
signature length is 160bts long .and query time to
challangers is limited to limit secret keys.its working is high
pottential and heavy thay they can’t be done is smaller
platforms like mobiles,cellphones etc….
According the Shah who is from HP company puts a new
plan to this and gives ““Auditing to keep online storage
services honest” where the conceptofTPAcametoexistence
.he says the user need to delegate the Thirdparty who is
expertise in this atsk i.e. TPA.the MAC keys are used in this
plan.
“privacy- preserving public data auditing by using
homomorphic authenticator with random masking” is the
new method realized by Wang in this technique user need
not be online always.
Wang improves the “Proof of retrievability” model and uses
Merkley Hash Tree to complete dynamic data operations
such as data modification, data insertion and data deletion
for cloud data storage.
Moreover, Wang also explores the technology of Bi-linear
aggregate signature to realize batch auditing. The data
dynamic auditing scheme meets the users’ demand of data
operation and greatly improves Cloud Computing’s
computing efficiency when dealing with huge amount of
data.
At present the Aggregate signature technique is used in
verification.the techniqueis composedof Bi-linearaggregate
signature technique where the data from different users are
digitally signed by the different signers are aggregated into
single signature if the aggregate signatures passes the
verification then the data correspond to that signature are
not affected.if in case it doesn’t pass the verificationthen itis
the job of TPA to verify it one by one.
3. METHEDOLOGY
The Bi-linear aggregate method is fast and efficient but it
fails when the Aggregate signature do not pass the
verification .at this moment the verifier should verify one by
one ,which for small piece of data .Since the data is huge in
realtime and the Many users are using it on same time . So a
method or technique is need to overcome this problem. In
this context ,a new method is proposed which uses the Map
reduce framework for this [1]. In this proposed system
Auditing is done in two phases
In first phase the user generates the public keys and private
keys along with the data is upload to CSP(Cloud Service
Provider).
In second phase the User request the TPA(Third Party
Auditor) to check whether his/her file is safe or not. As soon
as request is recived form user.TPA challenges the CSP .CSP
sends the data related to TPA request which is called proof .
TPA check the data and replies to user with TRUE/FALSE.
If not it should verify it . at this particular point the map
reduce framework is introduce in order to map the
signatures with data and reduce it to check TRUE/FALSE.
MAP function
Map(Text value, Context context)
Input: PKFile_1, …, paramFile_1, …
Output: <dataTag, PK_1>, …, <dataTag, Para_1>, …
REDUCE function
Input: K key-value pairs of <key, values>
Output: K results of <dataTag, true/false>
4. CONCLUSION
In this paper, we have come across different process of the
advancement and advancement in the existing methods in
batch auditing for cloud storage from the early days.the
initial techniques from Provable data Possession to the Bi-
linear aggregate signature technique.the securitychallenges
are minimized to some extentbutnotcompletely.inthisview
we also seen the new technique of MapReduce framework
incorporated in the existing Batch Auditing system.From
early time the performance and efficiency are increased
more but he integrity verification pace is still is in its slower
rate.A new method can be introduced in view of process
which computes parallelly and many advancements can be
made in various ,small,and complex part of cloud paradigm.
ACKNOWLEDGEMENT
I Thank my Professor & HOD Dr.K.Thippeswamy For his
Vauable Guidelines.
REFERENCES
[1] Yu Jin,Dong Yan,Heng He, 2016 IEEE 11th
Conference on Industrial Electronics and
Applications (ICIEA).
[2] Mohamed Al Morsy, John Grundy and Ingo Müller,
“An Analysis of the Cloud Computing Security
Problem,” In Proceedings of APSEC 2010 Cloud
Workshop, Sydney, Australia, 2010.
[3] Wang Q, Wang C, Li J, “Enabling public verifiability
and data dynamics for storage security in cloud
computing,” Proceedings of the 14th European
conference on Research in computer security
Springer- Verlag, 2009, pp. 355-370.
[4] Chen H F, Lin B G, Yang Y, “Public Batch Auditing
for 2M-PDP Based on BLS in Cloud Storage,”Journal
of Cryptologic Research, 2014.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1109
[5] [Syam K P, Subramanian R, “An Efficient and Secure
Protocol for EnsuringData StorageSecurityinCloud
Computing,” International Journal of Computer
Science Issues, 2011.
[6] Ateniese G, Burns R, Curtmola R, “Provable data
possession at untrusted stores,”Ccs’07Proceedings
of Acm Conference onComputer&Communications
Security, 2007, pp. 1165-1182.
[7] Fischlin M, “The Cramer-Shoup Strong-RSA
signature scheme revisited,” Proceedings of Pkc’03
Lncs, 2003, pp. 116-129.
[8] Juels A, Kaliski B S, “Pors: proofs of retrievabilityfor
large files,” In CCS’07 Proceedings of the 14th ACM
conference on Computer and communications
security, 2007, pp. 584-597.
[9] Wang C, Wang Q, Ren K, “Privacy-preserving public
auditing for data storage security in cloud
computing,” INFOCOM, 2010 Proceedings IEEE,
2010, pp. 1-9.
BIOGRAPHIES
Darshan Kumar G Presently
Pursuing his M.Tech Degree in
department of CS&E at
Visvesvaraya Technological
University, PG Centre, Mysuru
570029. He completed B.E in CS&E
branch at SJMIT Chitradurga,
Karnataka in the year 2015. His
M.Tech project Research on Map
Reduce based Cloud Storage Batch
Auditing. His area of interest in
programming in C#, PHP, Web
Development, Artificial
Intelligence, Search Engine
Optimization, Search engines,
Research in Big Data.
Dr. K. Thippeswamy Receivedhis
Ph. D degree from the Department
of CS&E in Jawaharlal Neharu
Technological University,
Ananthapur, Andra Pradesh in the
year 2012, M.EdegreeinComputer
Science and Engineering from
University Visvesvaraya College of
Engineering (UVCE), Bangalore in
2004.
and Bachelor’s Degree in Computer
Science and Engineering from
University B.D.T College of
Engineering(UBDTCE),Davangerein
the year 1998. He is currently
heading theDepartmentofComputer
Science and Engineering,
Visvesvaraya Technological
University, PG Center, Mysore, He is
having 18 years of Teaching and 3
years Research experience. He has
published around 40 papers which
include International Journals,
International Conferences and
Notional Conferences; he has
conducted two national one
International conference and many
workshops successfully.
He is a Life member of India Society
for Technical Education (LMISTE),
Computer Society of India (CSI) &
International Association of
Engineers (IAENG). He is Reviewer
Committee Member for the
international Journal Bioinformatics
and Data Mining. Mysuru.

More Related Content

What's hot

IRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud DataIRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud DataIRJET Journal
 
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...INFOGAIN PUBLICATION
 
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEMSURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEMijiert bestjournal
 
IRJET- A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...
IRJET-  	  A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...IRJET-  	  A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...
IRJET- A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...IRJET Journal
 
IEEE Projects 2013 For ME Cse @ Seabirds ( Trichy, Thanjavur, Perambalur, Di...
IEEE Projects 2013 For ME Cse @  Seabirds ( Trichy, Thanjavur, Perambalur, Di...IEEE Projects 2013 For ME Cse @  Seabirds ( Trichy, Thanjavur, Perambalur, Di...
IEEE Projects 2013 For ME Cse @ Seabirds ( Trichy, Thanjavur, Perambalur, Di...SBGC
 
Ieee projects-2014-java-cloud-computing
Ieee projects-2014-java-cloud-computingIeee projects-2014-java-cloud-computing
Ieee projects-2014-java-cloud-computingSBGC
 
IEEE Projects 2013 For ME Cse Seabirds ( Trichy, Thanjavur, Karur, Perambalur )
IEEE Projects 2013 For ME Cse Seabirds ( Trichy, Thanjavur, Karur, Perambalur )IEEE Projects 2013 For ME Cse Seabirds ( Trichy, Thanjavur, Karur, Perambalur )
IEEE Projects 2013 For ME Cse Seabirds ( Trichy, Thanjavur, Karur, Perambalur )SBGC
 
Efficient Implementation of Proof of Retrievability (OPOR) In Cloud Computing...
Efficient Implementation of Proof of Retrievability (OPOR) In Cloud Computing...Efficient Implementation of Proof of Retrievability (OPOR) In Cloud Computing...
Efficient Implementation of Proof of Retrievability (OPOR) In Cloud Computing...IJERA Editor
 
Ieee projects 2012 for cse
Ieee projects 2012 for cseIeee projects 2012 for cse
Ieee projects 2012 for cseSBGC
 
IRJET- Enhancement of Security in Cloud Storage of Electronic Health Reco...
IRJET-  	  Enhancement of Security in Cloud Storage of Electronic Health Reco...IRJET-  	  Enhancement of Security in Cloud Storage of Electronic Health Reco...
IRJET- Enhancement of Security in Cloud Storage of Electronic Health Reco...IRJET Journal
 
A Novel privacy preserving public auditing for shared data in cloud
A Novel privacy preserving public auditing for shared data in cloudA Novel privacy preserving public auditing for shared data in cloud
A Novel privacy preserving public auditing for shared data in cloudJAVVAJI VENKATA RAO
 
SECURE & EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA INTEGRITY IN CLOUDS
SECURE & EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA INTEGRITY IN CLOUDSSECURE & EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA INTEGRITY IN CLOUDS
SECURE & EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA INTEGRITY IN CLOUDSGyan Prakash
 
Svm Classifier Algorithm for Data Stream Mining Using Hive and R
Svm Classifier Algorithm for Data Stream Mining Using Hive and RSvm Classifier Algorithm for Data Stream Mining Using Hive and R
Svm Classifier Algorithm for Data Stream Mining Using Hive and RIRJET Journal
 
IRJET- Improvement of Security and Trustworthiness in Cloud Computing usi...
IRJET-  	  Improvement of Security and Trustworthiness in Cloud Computing usi...IRJET-  	  Improvement of Security and Trustworthiness in Cloud Computing usi...
IRJET- Improvement of Security and Trustworthiness in Cloud Computing usi...IRJET Journal
 
A Novel Method of Directly Auditing Integrity On Encrypted Data
A Novel Method of Directly Auditing Integrity On Encrypted DataA Novel Method of Directly Auditing Integrity On Encrypted Data
A Novel Method of Directly Auditing Integrity On Encrypted DataIRJET Journal
 
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...IOSR Journals
 
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
 IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET - Efficient and Verifiable Queries over Encrypted Data in CloudIRJET Journal
 

What's hot (19)

IRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud DataIRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud Data
 
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
 
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEMSURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
 
IRJET- A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...
IRJET-  	  A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...IRJET-  	  A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...
IRJET- A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...
 
IEEE Projects 2013 For ME Cse @ Seabirds ( Trichy, Thanjavur, Perambalur, Di...
IEEE Projects 2013 For ME Cse @  Seabirds ( Trichy, Thanjavur, Perambalur, Di...IEEE Projects 2013 For ME Cse @  Seabirds ( Trichy, Thanjavur, Perambalur, Di...
IEEE Projects 2013 For ME Cse @ Seabirds ( Trichy, Thanjavur, Perambalur, Di...
 
Paper review
Paper review Paper review
Paper review
 
Ieee projects-2014-java-cloud-computing
Ieee projects-2014-java-cloud-computingIeee projects-2014-java-cloud-computing
Ieee projects-2014-java-cloud-computing
 
IEEE Projects 2013 For ME Cse Seabirds ( Trichy, Thanjavur, Karur, Perambalur )
IEEE Projects 2013 For ME Cse Seabirds ( Trichy, Thanjavur, Karur, Perambalur )IEEE Projects 2013 For ME Cse Seabirds ( Trichy, Thanjavur, Karur, Perambalur )
IEEE Projects 2013 For ME Cse Seabirds ( Trichy, Thanjavur, Karur, Perambalur )
 
Efficient Implementation of Proof of Retrievability (OPOR) In Cloud Computing...
Efficient Implementation of Proof of Retrievability (OPOR) In Cloud Computing...Efficient Implementation of Proof of Retrievability (OPOR) In Cloud Computing...
Efficient Implementation of Proof of Retrievability (OPOR) In Cloud Computing...
 
Ieee projects 2012 for cse
Ieee projects 2012 for cseIeee projects 2012 for cse
Ieee projects 2012 for cse
 
IRJET- Enhancement of Security in Cloud Storage of Electronic Health Reco...
IRJET-  	  Enhancement of Security in Cloud Storage of Electronic Health Reco...IRJET-  	  Enhancement of Security in Cloud Storage of Electronic Health Reco...
IRJET- Enhancement of Security in Cloud Storage of Electronic Health Reco...
 
A Novel privacy preserving public auditing for shared data in cloud
A Novel privacy preserving public auditing for shared data in cloudA Novel privacy preserving public auditing for shared data in cloud
A Novel privacy preserving public auditing for shared data in cloud
 
SECURE & EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA INTEGRITY IN CLOUDS
SECURE & EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA INTEGRITY IN CLOUDSSECURE & EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA INTEGRITY IN CLOUDS
SECURE & EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA INTEGRITY IN CLOUDS
 
Svm Classifier Algorithm for Data Stream Mining Using Hive and R
Svm Classifier Algorithm for Data Stream Mining Using Hive and RSvm Classifier Algorithm for Data Stream Mining Using Hive and R
Svm Classifier Algorithm for Data Stream Mining Using Hive and R
 
IRJET- Improvement of Security and Trustworthiness in Cloud Computing usi...
IRJET-  	  Improvement of Security and Trustworthiness in Cloud Computing usi...IRJET-  	  Improvement of Security and Trustworthiness in Cloud Computing usi...
IRJET- Improvement of Security and Trustworthiness in Cloud Computing usi...
 
A Novel Method of Directly Auditing Integrity On Encrypted Data
A Novel Method of Directly Auditing Integrity On Encrypted DataA Novel Method of Directly Auditing Integrity On Encrypted Data
A Novel Method of Directly Auditing Integrity On Encrypted Data
 
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
 
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
 IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
 
Review_2013
Review_2013Review_2013
Review_2013
 

Similar to A Survey on Batch Auditing Systems for Cloud Storage

A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...IRJET Journal
 
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET Journal
 
Enabling Cloud Storage Auditing with Key Exposure Resistance
Enabling Cloud Storage Auditing with Key Exposure ResistanceEnabling Cloud Storage Auditing with Key Exposure Resistance
Enabling Cloud Storage Auditing with Key Exposure ResistanceIRJET Journal
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET Journal
 
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET Journal
 
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...IJERA Editor
 
Cloud Computing Task Scheduling Algorithm Based on Modified Genetic Algorithm
Cloud Computing Task Scheduling Algorithm Based on Modified Genetic AlgorithmCloud Computing Task Scheduling Algorithm Based on Modified Genetic Algorithm
Cloud Computing Task Scheduling Algorithm Based on Modified Genetic AlgorithmIRJET Journal
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...IEEEGLOBALSOFTTECHNOLOGIES
 
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing for ...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing for ...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing for ...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing for ...IEEEGLOBALSOFTTECHNOLOGIES
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storageIEEEFINALYEARPROJECTS
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...IRJET Journal
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storageJPINFOTECH JAYAPRAKASH
 
Secure Multi-Owner Group Signature Based Secure M-Health Records in Cloud
Secure Multi-Owner Group Signature Based Secure M-Health  Records in Cloud Secure Multi-Owner Group Signature Based Secure M-Health  Records in Cloud
Secure Multi-Owner Group Signature Based Secure M-Health Records in Cloud IJMER
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357IJMER
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357IJMER
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357IJMER
 
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVMIRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVMIRJET Journal
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesIRJET Journal
 

Similar to A Survey on Batch Auditing Systems for Cloud Storage (20)

A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
 
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
 
Enabling Cloud Storage Auditing with Key Exposure Resistance
Enabling Cloud Storage Auditing with Key Exposure ResistanceEnabling Cloud Storage Auditing with Key Exposure Resistance
Enabling Cloud Storage Auditing with Key Exposure Resistance
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
 
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
 
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
 
Cloud Computing Task Scheduling Algorithm Based on Modified Genetic Algorithm
Cloud Computing Task Scheduling Algorithm Based on Modified Genetic AlgorithmCloud Computing Task Scheduling Algorithm Based on Modified Genetic Algorithm
Cloud Computing Task Scheduling Algorithm Based on Modified Genetic Algorithm
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...
 
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing for ...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing for ...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing for ...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing for ...
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storage
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storage
 
Secure Multi-Owner Group Signature Based Secure M-Health Records in Cloud
Secure Multi-Owner Group Signature Based Secure M-Health  Records in Cloud Secure Multi-Owner Group Signature Based Secure M-Health  Records in Cloud
Secure Multi-Owner Group Signature Based Secure M-Health Records in Cloud
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357
 
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVMIRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
 
50120140507005 2
50120140507005 250120140507005 2
50120140507005 2
 
50120140507005
5012014050700550120140507005
50120140507005
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 

Recently uploaded (20)

Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 

A Survey on Batch Auditing Systems for Cloud Storage

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1107 A Survey on Batch Auditing Systems for Cloud Storage Darshan Kumar G 1, Dr. K .Thippeswamy2 1 Student, Department CS&E, VTU Centre for PG Studies, Mysuru, Karnataka. 2Professor & Head of Department CS&E, VTU Centre for PG Studies, Mysuru, Karnataka. ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract – As the Emergent technology in the IT world, Cloud Computing has spread over different facets of IT industry in software, platform & Infrastructure as service streams. The skill allows us to store the data in the place where we are allow access it anywhere and anytime we need. Its popularity is in its peak because ofits potentialandservices given to use for cheap cost by Cloud Service Providers. as the technology is more complex and its internal organization is clumsy still toddy, many challenges it has faced andstillfacing in the terms of availability and many more but most challenges are faced regarding the security of e datastoredby the user in cloud. There are many methodologies are introduced for overcoming the security issues .Auditing systems are the system which is intended to work on the security issues which utilizes complex and secure algorithms .Public Auditing & Private Auditing are the auditing systems used. This paper shows the Batch Auditing systems from the beginning and present ongoing researches on it. Key Words: Cloud Computing, Security Issues, Batch Auditing, Cloud Service Providers, Public Auditing, Private Auditing. 1. INTRODUCTION With the entry of cloud computing, which give foundation, stage, programming and different administrations for cloud clients, individuals can without much of a stretch access to less expensive and all the more capable processors and capacity. Client can facilitate the weight of putting away colossal information in neighborhood frameworks, with the cloud computing worldview client can ready to store the information into cloud and can recover at whatever point client needs. The cloud demonstrate has inspired industry and the scholarly community to receive distributed computing to have a wide range of uses running from high computationally concentrated applications down to light weight administrations. As per a Gartner study on distributed computing incomes, thecloudmarketwasworth USD 58.6B in 2009 , is required to be USD 68B in 2010 and will reach USD 148B by 2014. Theseincomesinferthatcloud computing is a promising stage. Then again, it builds the assailants' enthusiasm for finding existing vulnerabilities in the model. Regardless of the potential advantages and incomes that could be picked up from the distributed computing model, themodel still hasa considerablemeasure of open issues that effect the model respectability and inescapability. Merchant secure, multi-tenure and disconnection, information administration, benefit compactness, flexibility motors, SLA administration, and cloud security . The Cloud computing paradigm is built onseveralimportant modules among them the most important are :  Cloud User  Cloud Service Provider and  Third party Auditor The First two components are the basicandmoreimportant, Cloud User is one who Uses the services provided by the Cloud service providers. And the basic, managing services, maintaining &storing data are done by cloud service provider who provides services for user. The third party auditor comes when the cloud is seen in the security perspective of both user and Provider. Heistheentitywhois independent and has connected to both User and the cloud service provider, and has the most experienceandcapability on the verification which is the aim of auditing and solution to the security issues. 2. RELATED WORKS There are many papers, Methods, Techniques are proposed in the view of Auditing for security purpose of cloudstorage. Before that let us know the Existing auditing systems in use:  Public Auditing  Private Auditing These two types of auditing are most popular. Private auditing allows user to challenge the provider to check the integrity of his data .In single task highefficiencyis achievable in this case but it is burden to user although efficiency is high. Public auditing scheme allows data owner i.e. user to delegate a component who is expertise in it and most promisable and trustworthy next to Provider. And with the help of Component he/she can check their integrity .the component is TPA known as Third Party Auditor. According to Ateniese’s theProvabledata Possessionmodel , defines the public auditing using the technique which uses RSA based homomorphic tag. This is thefirstmodel todefine the public auditing. The Tag length is 1024 bits long andalso it solves the private validation problem. According to juels and kaliskithemethodwhichusestheBLS signature and pseudorandom function which they proposed popularly known as “Proof of Retrivability” in which the
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1108 signature length is 160bts long .and query time to challangers is limited to limit secret keys.its working is high pottential and heavy thay they can’t be done is smaller platforms like mobiles,cellphones etc…. According the Shah who is from HP company puts a new plan to this and gives ““Auditing to keep online storage services honest” where the conceptofTPAcametoexistence .he says the user need to delegate the Thirdparty who is expertise in this atsk i.e. TPA.the MAC keys are used in this plan. “privacy- preserving public data auditing by using homomorphic authenticator with random masking” is the new method realized by Wang in this technique user need not be online always. Wang improves the “Proof of retrievability” model and uses Merkley Hash Tree to complete dynamic data operations such as data modification, data insertion and data deletion for cloud data storage. Moreover, Wang also explores the technology of Bi-linear aggregate signature to realize batch auditing. The data dynamic auditing scheme meets the users’ demand of data operation and greatly improves Cloud Computing’s computing efficiency when dealing with huge amount of data. At present the Aggregate signature technique is used in verification.the techniqueis composedof Bi-linearaggregate signature technique where the data from different users are digitally signed by the different signers are aggregated into single signature if the aggregate signatures passes the verification then the data correspond to that signature are not affected.if in case it doesn’t pass the verificationthen itis the job of TPA to verify it one by one. 3. METHEDOLOGY The Bi-linear aggregate method is fast and efficient but it fails when the Aggregate signature do not pass the verification .at this moment the verifier should verify one by one ,which for small piece of data .Since the data is huge in realtime and the Many users are using it on same time . So a method or technique is need to overcome this problem. In this context ,a new method is proposed which uses the Map reduce framework for this [1]. In this proposed system Auditing is done in two phases In first phase the user generates the public keys and private keys along with the data is upload to CSP(Cloud Service Provider). In second phase the User request the TPA(Third Party Auditor) to check whether his/her file is safe or not. As soon as request is recived form user.TPA challenges the CSP .CSP sends the data related to TPA request which is called proof . TPA check the data and replies to user with TRUE/FALSE. If not it should verify it . at this particular point the map reduce framework is introduce in order to map the signatures with data and reduce it to check TRUE/FALSE. MAP function Map(Text value, Context context) Input: PKFile_1, …, paramFile_1, … Output: <dataTag, PK_1>, …, <dataTag, Para_1>, … REDUCE function Input: K key-value pairs of <key, values> Output: K results of <dataTag, true/false> 4. CONCLUSION In this paper, we have come across different process of the advancement and advancement in the existing methods in batch auditing for cloud storage from the early days.the initial techniques from Provable data Possession to the Bi- linear aggregate signature technique.the securitychallenges are minimized to some extentbutnotcompletely.inthisview we also seen the new technique of MapReduce framework incorporated in the existing Batch Auditing system.From early time the performance and efficiency are increased more but he integrity verification pace is still is in its slower rate.A new method can be introduced in view of process which computes parallelly and many advancements can be made in various ,small,and complex part of cloud paradigm. ACKNOWLEDGEMENT I Thank my Professor & HOD Dr.K.Thippeswamy For his Vauable Guidelines. REFERENCES [1] Yu Jin,Dong Yan,Heng He, 2016 IEEE 11th Conference on Industrial Electronics and Applications (ICIEA). [2] Mohamed Al Morsy, John Grundy and Ingo Müller, “An Analysis of the Cloud Computing Security Problem,” In Proceedings of APSEC 2010 Cloud Workshop, Sydney, Australia, 2010. [3] Wang Q, Wang C, Li J, “Enabling public verifiability and data dynamics for storage security in cloud computing,” Proceedings of the 14th European conference on Research in computer security Springer- Verlag, 2009, pp. 355-370. [4] Chen H F, Lin B G, Yang Y, “Public Batch Auditing for 2M-PDP Based on BLS in Cloud Storage,”Journal of Cryptologic Research, 2014.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1109 [5] [Syam K P, Subramanian R, “An Efficient and Secure Protocol for EnsuringData StorageSecurityinCloud Computing,” International Journal of Computer Science Issues, 2011. [6] Ateniese G, Burns R, Curtmola R, “Provable data possession at untrusted stores,”Ccs’07Proceedings of Acm Conference onComputer&Communications Security, 2007, pp. 1165-1182. [7] Fischlin M, “The Cramer-Shoup Strong-RSA signature scheme revisited,” Proceedings of Pkc’03 Lncs, 2003, pp. 116-129. [8] Juels A, Kaliski B S, “Pors: proofs of retrievabilityfor large files,” In CCS’07 Proceedings of the 14th ACM conference on Computer and communications security, 2007, pp. 584-597. [9] Wang C, Wang Q, Ren K, “Privacy-preserving public auditing for data storage security in cloud computing,” INFOCOM, 2010 Proceedings IEEE, 2010, pp. 1-9. BIOGRAPHIES Darshan Kumar G Presently Pursuing his M.Tech Degree in department of CS&E at Visvesvaraya Technological University, PG Centre, Mysuru 570029. He completed B.E in CS&E branch at SJMIT Chitradurga, Karnataka in the year 2015. His M.Tech project Research on Map Reduce based Cloud Storage Batch Auditing. His area of interest in programming in C#, PHP, Web Development, Artificial Intelligence, Search Engine Optimization, Search engines, Research in Big Data. Dr. K. Thippeswamy Receivedhis Ph. D degree from the Department of CS&E in Jawaharlal Neharu Technological University, Ananthapur, Andra Pradesh in the year 2012, M.EdegreeinComputer Science and Engineering from University Visvesvaraya College of Engineering (UVCE), Bangalore in 2004. and Bachelor’s Degree in Computer Science and Engineering from University B.D.T College of Engineering(UBDTCE),Davangerein the year 1998. He is currently heading theDepartmentofComputer Science and Engineering, Visvesvaraya Technological University, PG Center, Mysore, He is having 18 years of Teaching and 3 years Research experience. He has published around 40 papers which include International Journals, International Conferences and Notional Conferences; he has conducted two national one International conference and many workshops successfully. He is a Life member of India Society for Technical Education (LMISTE), Computer Society of India (CSI) & International Association of Engineers (IAENG). He is Reviewer Committee Member for the international Journal Bioinformatics and Data Mining. Mysuru.