SlideShare a Scribd company logo
Novateur Publication’s
International Journal of Innovation in Engineering, Research and Technology [IJIERT]
ICITDCEME’15 Conference Proceedings
ISSN No - 2394-3696
1 | P a g e
DATA INTEGRITY PROOF (DIP) IN CLOUD STORAGE
Pratik Bhujbal
Department of Computer, SCSCOE, Rahuri Factory, India
* pratikbhujbal1994@gmail.com
Anupam Pahnale
Department of Computer, SCSCOE, Rahuri Factory, India
* anupampanhale73@gmail.com
Parve Gorakh
Department of Computer, SCSCOE, Rahuri Factory, India
* parvegorakh@gmail.com
Prof. Mohit Dighe
Asst. Professor, Department of Computer, SCSCOE, Rahuri Factory, India
* dighe.mohit@gmail.com
ABSTRACT
Nowadays, Data is rising over internet in terabytes and Exabyte. So, there is a need of storing these data which
has been fulfilled by cloud computing. Though the service of cloud appear to be efficient and cost effective. Yet
there are some challenges which are faced in cloud computing such as Data security and Authentication. In cloud
Storage the data of Owner is stored in cloud where the cloud servers are remotely located the owner of the data
does not have any direct control over the data. If the data over cloud is modified by the cloud, Third Party
Auditor (TPA) or any other person there is no precision such that the owner of the data gets the information
about the modification of the data. TPA is a Third Party Auditor who has
Experience in checking the integrity of data. TPA verifies the files stored over the cloud if they are modified or
not. Our scheme provides the solution to this problem such that if there is any modification in the data the owner
will get information about the change in the data. Our scheme only provides the information about the change in
data it does not keep data intact or secure from modification over cloud.
KEYWORDS - Third Party Auditor (TPA), Cloud Storage, Cryptography, Data integrity.
INTRODUCTION
The usage of computers, mobile gadgets and social networking sites is now part of common mans day to day life.
Sharing of information, photos, video and audio files have enabled user to communicate and utilize virtual
storage space in the Internet without worrying to buy physical storage locally. All these data need to be stored
somewhere in Internet and Cloud happens to be a default choice.
In order to reap the operational and financial benefits of Cloud, the enterprises are also storing data with third
parties in Cloud. It is challenging for small and medium company to keep updating hardware according to
increasing data [1]. Cloud service provides flexibility to use storage services on demand according to ever
changing requirement of enterprise. Storage as service is popular model, where data storage is outsourced by
enterprise to third party service provider (Cloud Provider) [2] who charges as per the usage of storage facility.
On the other side of spectrum, there is increasing trend these days, in the form of ubiquitous presence of mobile
devices and the wide variety of functions for which they are used. Most of these functions are data generating
(like photography, video shooting etc
A. CLOUD COMPUTING
The cloud in cloud computing provides the means through which everything from computing power to
computing infrastructure, applications, business processes to personal collaboration can be delivered to you as a
service wherever and whenever you need.
Cloud computing is offered in different forms:
• :Public clouds
• Private clouds
• Hybrid clouds, which combine both public and private
The cloud itself is a set of hardware, networks, storage, services, and interfaces that enable the delivery of
computing as a service. Cloud services provide delivery of software, infrastructure, and storage on the Internet
(either as separated components or as a complete platform) based on the user demand.
Novateur Publication’s
International Journal of Innovation in Engineering, Research and Technology [IJIERT]
ICITDCEME’15 Conference Proceedings
ISSN No - 2394-3696
2 | P a g e
B. CLOUD DATA CENTERS
cloud data centers means the data centers with 10,000 or more servers on sites, all are devoted to running very
few applications that are to be built with consistent infrastructure components (such as Hardware, racks,
networking, OS, and so on).
Cloud data centers are
• Constructed for different purposes.
• Created at different times than traditional data center.
• Built on a different scale.
• Not constrained by same limitations.
• Perform different workload than classic data centers.
C. DATA INTEGRITY IN CLOUD STORAGE
Integrity, in terms of Network and data security, is assurance that information could only be accessed and
modified by those authorized for it. Measures are taken to ensure Data integrity includes controlling physical
environment of network terminals and the servers, restricting access of data, and maintaining strict authentication
practice. Data integrity can also threatened by environmental hazards, such as heat, dust, and electrical surges.
Data Integrity is most important of all security issues and privacy in cloud data storages because it not only
ensures completeness and correctness of data but also ensure that data is consistent, correct, correct and of high
quality.
LITERATURE REVIEW
In Literature survey the study of cloud services and study of data integrity proof in cloud storage. Many solutions
have been provided to focus on resolving the issues of integrity. Juels and Kaliski[1] proposed a model Proofs of
Retrievability(POR) was one of the first most important attempts to formulize the notion guaranteed remotely
and reliable integrity of the data without the retrieving of data file. It is basically a data encryption mechanism
which detects data corruptions and retrieve the complete the data without any damage. Shacham and
Waters[2]gave a new model for POR enabling verifiability of unlimited number of queries by user with reduced
overhead. Later Bowels and Juels[3] gave a theoretical model for the implementing of POR, but all these
mechanisms proposed were weak from the security point because they all work for single server. Therefore
Bowels [4] in their further work gave a HAIL protocol extending the POR mechanism for multiple servers. Priya
Metri and Geeta Sarote[5] proposed a threat model to overcome the threat of integrity and provide data privacy
in the cloud storage. It uses TPA(Third Party Auditor) and digital signature mechanism for the purpose of
reliable data retrievable. The TPA being used notifies any unauthorized access attempting to make changes,
avoiding the changes in data and maintaining the originality of data. Atienies and Burns[6] gave Provable Data
Possession(PDP) mechanism which verifies the integrity of data being outsourced, detecting all kind of errors
occurring in data but doesn’t guarantee complete data retrievable. In their later work Atienies and Pietro[7]
proposed a scheme which overcome all problems in PDP, but the main and basic problem on both proposed
system didn’t overcome was they work on single server. Therefore, later Curtmola [8].
DATA INTEGRITY PROOF SCHEMES
A. OVERVIEW OF DATA INTEGRITY SCHEMES
As the word suggests itself data integrity means completeness or wholeness and it is basic requirement of
information technology [7]. Data integrity refers to maintaining and assuring the accuracy and consistency of
data over its entire life-cycle [8]. Data corruption is a form of data loss and data integrity is opposite of data
corruption [8]. Data integrity ensures the data is the same as it was when it was originally recorded.
B. PROOF OF RETRIEVABILITY
In the Proof of Retrivability (POR) scheme this scheme using keyed hash function is the simplest scheme than
any other scheme for proof of retrivability of data files [5]. In this scheme the data file is stored in the cloud
storage but before storing it in the cloud storage that file is pre-processed and Encryption cryptographic hash is
computed [5]. After calculating hash value the file is stored in the cloud storage or Data Center [5]. The
Encryption cryptographic key which is used to calculate hash value is then released to cloud storage and value
calculated by the cloud storage are compare with each other [5]. From that comparison final conclusion is
considered [5]. The main advantage of this scheme is simple to implementation. Limitation of this scheme is, it is
computational burdensome or difficult for devices like Laptops, mobile phones, PDAs etc. [5].
Novateur Publication’s
International Journal of Innovation in Engineering, Research and Technology [IJIERT]
ICITDCEME’15 Conference Proceedings
ISSN No - 2394-3696
3 | P a g e
Fig.1: A Diagram of a proof of retrievability
Insert random sentinels in data files F
Next scheme for proof retrivability is using position of bits or sentinels [3].This concept is proposed by Ari Juels
and Burton S. Kaliski Jr [3]. Sentinels are the special blocks which are used in this scheme to verify the integrity.
Sentinels are embedded in the data blocks randomly during setup phase by the verifier in the setup phase [3]. The
integrity of the data file is calculate by challenge and response. The verifier or TPA throws challenge to the
cloud storage by specifying the position of the collection of the sentinels and the cloud storage has to return the
associated sentinels or TPA values to the verifier[3][5]. If the file stored by the client is modified then the
associated sentinels values also get changed and the cloud will return wrong values to verifier. From this
integrity of the file is checked [3][5]. Limitation of this scheme is that this scheme involves encryption of file so
this is computationally cumbersome for the small devices like mobile phones, PDA etc. [5].
Also Sravan Kumar R. and Ashutosh Saxena present this scheme [5] which involves selection of random bits per
blocks of data due to this computational overhead of the client is reduced. File is processed by the verifier before
storing it in the cloud storage [5]. After that verifier attaches some metadata to the file [5].This meta data is used
at the time of verification of the integrity of the file [5]. The limitation of this scheme is this scheme applies only
static data [5].
Fig.3.2: File is divided into number of Data Blocks
Fig.3.3: File is appending the Meta Data and made
Encryption file F’
1) setup phase:
Let the verifier V wishes to the store the file F with the archive. Let this file F consist of n file blocks.
We initially preprocess the file and create metadata to be appended to the file. Let each of the n data blocks
have m bits in them. A typical data file F which the client wishes to store in the cloud is shown in Figure 3.2.
2) verification phase:
Let the verifier or TPA V wants to verifying the integrity of the file F. It throws challenge to archive and
asks it to respond. The challenge and response are compared and the verifiers accept or reject the integrity
proof. Suppose verifier wishes to check integrity of nth block. The verifier challenge cloud storage server by
specify the block number i and bit number j generated by using function g which only verifier knows. The
verifier also specifies position at which the meta data correspond the block i is append. This Meta data will be a
k-bit number. Hence cloud storage server is required to send k + 1 bits for verification process by the client. The
Meta data sent by cloud is decrypted by using number i and corresponding bit in this decrypted Meta data is
Novateur Publication’s
International Journal of Innovation in Engineering, Research and Technology [IJIERT]
ICITDCEME’15 Conference Proceedings
ISSN No - 2394-3696
4 | P a g e
comparing with bit that is sent by the cloud. Any not match between two would mean a loss of the integrity of
the client data at the cloud storage.
CONCLUSION
In this paper, we have proposed next generation for cloud storage which provides a scheme to address storage,
management and the analysis of the rapidly growing machine Generated information. This paper explains about
cloud storage, advantages along with its characteristics. Our scheme is proposed to reduce computational data
and the storage Overhead of the cloud storage server. We also have proposed to minimize the size of proof of
data integrity so that to reduce network bandwidth consumption. At client we only store the two functions, bit
generator function g, and function h which can be used for encrypting data. Hence storage at client is very small
as compared to other schemes that were developed. In our scheme encryption task is very limited to only fraction
of whole data thus saving computational time of client. Many of schemes proposed earlier require the archive to
perform processes that need lot of computation power to generate proof of the data integrity. But in proposed
scheme archive just need to fetch and send few bits of data to client. And also evaluate performance of cloud
storage performance.
REFERENCES
[1] Daliya Attas, Omar Batrafi, Efficient integrity checking technique for securing client data in cloud
computing, IJECS Vol:11 No:05.,2011.
[2] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song,
Provable data possession at untrusted stores, New York, NY, USA: ACM, 2007, pp. 5986095.
[3] A. Juels and B.S. Kaliski Jr., Pors: Proofs of Retrievability for Large Files, Proc. 14th ACM Conf.
Computer and Comm. Security, pp. 584-597, 2007.
[4] Amazon.com. Amazon simple storage service (Amazon S3), 2007.
[5] Sravan Kumar R, Ashutosh Saxena, Data Integrity Proofs in Cloud Storage,2011
[6] Satyakshma Rawat, Richa Chowdhary, Dr. Abhay Bansal, Data integrity of cloud data storage (CDSs) in
cloud ijarcsse Vol. 3, Issue 3, March 2013.
[7] Saranya Eswaran, Dr. Sunitha Abburu Identifying Data integrity in cloud storage, IJCSI Vol. 9, Issue 2, No 1,
March 2012.
[8] E. Mykletun, M. Narasimha, and G. Tsudik, Authentication and integrity in outsourced databases, Trans.
Storage, vol. 2, no. 2, pp. 107138, 2006.

More Related Content

What's hot

A Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-DuplicationA Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-Duplication
Editor IJMTER
 
Kamal Jyoti V3I5-0161
Kamal Jyoti V3I5-0161Kamal Jyoti V3I5-0161
Kamal Jyoti V3I5-0161Kamal Jyoti
 
An4201262267
An4201262267An4201262267
An4201262267
IJERA Editor
 
Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Editor IJARCET
 
Secure Auditing and Deduplicating Data in Cloud
Secure Auditing and Deduplicating Data in CloudSecure Auditing and Deduplicating Data in Cloud
Secure Auditing and Deduplicating Data in Cloud
1crore projects
 
Guaranteed Availability of Cloud Data with Efficient Cost
Guaranteed Availability of Cloud Data with Efficient CostGuaranteed Availability of Cloud Data with Efficient Cost
Guaranteed Availability of Cloud Data with Efficient Cost
IRJET Journal
 
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET Journal
 
Improving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using HadoopImproving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using Hadoop
IJERA Editor
 
ANALYSIS OF ATTACK TECHNIQUES ON CLOUD BASED DATA DEDUPLICATION TECHNIQUES
ANALYSIS OF ATTACK TECHNIQUES ON CLOUD BASED DATA DEDUPLICATION TECHNIQUESANALYSIS OF ATTACK TECHNIQUES ON CLOUD BASED DATA DEDUPLICATION TECHNIQUES
ANALYSIS OF ATTACK TECHNIQUES ON CLOUD BASED DATA DEDUPLICATION TECHNIQUES
neirew J
 
iaetsd Controlling data deuplication in cloud storage
iaetsd Controlling data deuplication in cloud storageiaetsd Controlling data deuplication in cloud storage
iaetsd Controlling data deuplication in cloud storage
Iaetsd Iaetsd
 
an enhanced multi layered cryptosystem based secure
an enhanced multi layered cryptosystem based securean enhanced multi layered cryptosystem based secure
an enhanced multi layered cryptosystem based secure
IJAEMSJORNAL
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
IRJET- Securely Performing Operations on Images using PSNR
IRJET-  	  Securely Performing Operations on Images using PSNRIRJET-  	  Securely Performing Operations on Images using PSNR
IRJET- Securely Performing Operations on Images using PSNR
IRJET Journal
 
Remote data integrity checking with a third party auditor in public cloud usi...
Remote data integrity checking with a third party auditor in public cloud usi...Remote data integrity checking with a third party auditor in public cloud usi...
Remote data integrity checking with a third party auditor in public cloud usi...
IJSRED
 
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud StoragePrivacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
1crore projects
 
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...
IJERA Editor
 
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
ijsrd.com
 
Cyclone DDS: Sharing Data in the IoT Age
Cyclone DDS: Sharing Data in the IoT AgeCyclone DDS: Sharing Data in the IoT Age
Cyclone DDS: Sharing Data in the IoT Age
Angelo Corsaro
 

What's hot (18)

A Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-DuplicationA Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-Duplication
 
Kamal Jyoti V3I5-0161
Kamal Jyoti V3I5-0161Kamal Jyoti V3I5-0161
Kamal Jyoti V3I5-0161
 
An4201262267
An4201262267An4201262267
An4201262267
 
Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409
 
Secure Auditing and Deduplicating Data in Cloud
Secure Auditing and Deduplicating Data in CloudSecure Auditing and Deduplicating Data in Cloud
Secure Auditing and Deduplicating Data in Cloud
 
Guaranteed Availability of Cloud Data with Efficient Cost
Guaranteed Availability of Cloud Data with Efficient CostGuaranteed Availability of Cloud Data with Efficient Cost
Guaranteed Availability of Cloud Data with Efficient Cost
 
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
 
Improving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using HadoopImproving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using Hadoop
 
ANALYSIS OF ATTACK TECHNIQUES ON CLOUD BASED DATA DEDUPLICATION TECHNIQUES
ANALYSIS OF ATTACK TECHNIQUES ON CLOUD BASED DATA DEDUPLICATION TECHNIQUESANALYSIS OF ATTACK TECHNIQUES ON CLOUD BASED DATA DEDUPLICATION TECHNIQUES
ANALYSIS OF ATTACK TECHNIQUES ON CLOUD BASED DATA DEDUPLICATION TECHNIQUES
 
iaetsd Controlling data deuplication in cloud storage
iaetsd Controlling data deuplication in cloud storageiaetsd Controlling data deuplication in cloud storage
iaetsd Controlling data deuplication in cloud storage
 
an enhanced multi layered cryptosystem based secure
an enhanced multi layered cryptosystem based securean enhanced multi layered cryptosystem based secure
an enhanced multi layered cryptosystem based secure
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
IRJET- Securely Performing Operations on Images using PSNR
IRJET-  	  Securely Performing Operations on Images using PSNRIRJET-  	  Securely Performing Operations on Images using PSNR
IRJET- Securely Performing Operations on Images using PSNR
 
Remote data integrity checking with a third party auditor in public cloud usi...
Remote data integrity checking with a third party auditor in public cloud usi...Remote data integrity checking with a third party auditor in public cloud usi...
Remote data integrity checking with a third party auditor in public cloud usi...
 
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud StoragePrivacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
 
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...
 
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
 
Cyclone DDS: Sharing Data in the IoT Age
Cyclone DDS: Sharing Data in the IoT AgeCyclone DDS: Sharing Data in the IoT Age
Cyclone DDS: Sharing Data in the IoT Age
 

Similar to DATA INTEGRITY PROOF (DIP) IN CLOUD STORAGE

Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
IDES Editor
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
AIRCC Publishing Corporation
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
ijcsit
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
AIRCC Publishing Corporation
 
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTINGSECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
IJNSA Journal
 
Challenges and Proposed Solutions for Cloud Forensic
Challenges and Proposed Solutions for Cloud ForensicChallenges and Proposed Solutions for Cloud Forensic
Challenges and Proposed Solutions for Cloud Forensic
IJERA Editor
 
B1802041217
B1802041217B1802041217
B1802041217
IOSR Journals
 
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentInsuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud Environment
Editor IJCATR
 
A proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud ComputingA proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud Computing
CSCJournals
 
A novel cloud storage system with support of sensitive data application
A novel cloud storage system with support of sensitive data applicationA novel cloud storage system with support of sensitive data application
A novel cloud storage system with support of sensitive data application
ijmnct
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
eSAT Journals
 
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloud
eSAT Journals
 
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloud
eSAT Publishing House
 
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageBio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
IJERA Editor
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
eSAT Publishing House
 
Excellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingExcellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computing
Editor IJMTER
 
Authenticated and unrestricted auditing of big data space on cloud through v...
Authenticated and unrestricted auditing of big data space on  cloud through v...Authenticated and unrestricted auditing of big data space on  cloud through v...
Authenticated and unrestricted auditing of big data space on cloud through v...
IJMER
 
IRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET- Data Security in Cloud Computing through AES under DrivehqIRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET Journal
 
Enabling Integrity for the Compressed Files in Cloud Server
Enabling Integrity for the Compressed Files in Cloud ServerEnabling Integrity for the Compressed Files in Cloud Server
Enabling Integrity for the Compressed Files in Cloud Server
IOSR Journals
 
50120140503020
5012014050302050120140503020
50120140503020
IAEME Publication
 

Similar to DATA INTEGRITY PROOF (DIP) IN CLOUD STORAGE (20)

Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTINGSECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
 
Challenges and Proposed Solutions for Cloud Forensic
Challenges and Proposed Solutions for Cloud ForensicChallenges and Proposed Solutions for Cloud Forensic
Challenges and Proposed Solutions for Cloud Forensic
 
B1802041217
B1802041217B1802041217
B1802041217
 
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentInsuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud Environment
 
A proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud ComputingA proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud Computing
 
A novel cloud storage system with support of sensitive data application
A novel cloud storage system with support of sensitive data applicationA novel cloud storage system with support of sensitive data application
A novel cloud storage system with support of sensitive data application
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloud
 
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloud
 
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageBio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
 
Excellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingExcellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computing
 
Authenticated and unrestricted auditing of big data space on cloud through v...
Authenticated and unrestricted auditing of big data space on  cloud through v...Authenticated and unrestricted auditing of big data space on  cloud through v...
Authenticated and unrestricted auditing of big data space on cloud through v...
 
IRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET- Data Security in Cloud Computing through AES under DrivehqIRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET- Data Security in Cloud Computing through AES under Drivehq
 
Enabling Integrity for the Compressed Files in Cloud Server
Enabling Integrity for the Compressed Files in Cloud ServerEnabling Integrity for the Compressed Files in Cloud Server
Enabling Integrity for the Compressed Files in Cloud Server
 
50120140503020
5012014050302050120140503020
50120140503020
 

More from ijiert bestjournal

CRACKS IN STEEL CASTING FOR VOLUTE CASING OF A PUMP
 CRACKS IN STEEL CASTING FOR VOLUTE CASING OF A PUMP CRACKS IN STEEL CASTING FOR VOLUTE CASING OF A PUMP
CRACKS IN STEEL CASTING FOR VOLUTE CASING OF A PUMP
ijiert bestjournal
 
A COMPARATIVE STUDY OF DESIGN OF SIMPLE SPUR GEAR TRAIN AND HELICAL GEAR TRAI...
A COMPARATIVE STUDY OF DESIGN OF SIMPLE SPUR GEAR TRAIN AND HELICAL GEAR TRAI...A COMPARATIVE STUDY OF DESIGN OF SIMPLE SPUR GEAR TRAIN AND HELICAL GEAR TRAI...
A COMPARATIVE STUDY OF DESIGN OF SIMPLE SPUR GEAR TRAIN AND HELICAL GEAR TRAI...
ijiert bestjournal
 
COMPARATIVE ANALYSIS OF CONVENTIONAL LEAF SPRING AND COMPOSITE LEAF
COMPARATIVE ANALYSIS OF CONVENTIONAL LEAF SPRING AND COMPOSITE LEAFCOMPARATIVE ANALYSIS OF CONVENTIONAL LEAF SPRING AND COMPOSITE LEAF
COMPARATIVE ANALYSIS OF CONVENTIONAL LEAF SPRING AND COMPOSITE LEAF
ijiert bestjournal
 
POWER GENERATION BY DIFFUSER AUGMENTED WIND TURBINE
 POWER GENERATION BY DIFFUSER AUGMENTED WIND TURBINE POWER GENERATION BY DIFFUSER AUGMENTED WIND TURBINE
POWER GENERATION BY DIFFUSER AUGMENTED WIND TURBINE
ijiert bestjournal
 
FINITE ELEMENT ANALYSIS OF CONNECTING ROD OF MG-ALLOY
FINITE ELEMENT ANALYSIS OF CONNECTING ROD OF MG-ALLOY FINITE ELEMENT ANALYSIS OF CONNECTING ROD OF MG-ALLOY
FINITE ELEMENT ANALYSIS OF CONNECTING ROD OF MG-ALLOY
ijiert bestjournal
 
REVIEW ON CRITICAL SPEED IMPROVEMENT IN SINGLE CYLINDER ENGINE VALVE TRAIN
REVIEW ON CRITICAL SPEED IMPROVEMENT IN SINGLE CYLINDER ENGINE VALVE TRAINREVIEW ON CRITICAL SPEED IMPROVEMENT IN SINGLE CYLINDER ENGINE VALVE TRAIN
REVIEW ON CRITICAL SPEED IMPROVEMENT IN SINGLE CYLINDER ENGINE VALVE TRAIN
ijiert bestjournal
 
ENERGY CONVERSION PHENOMENON IN IMPLEMENTATION OF WATER LIFTING BY USING PEND...
ENERGY CONVERSION PHENOMENON IN IMPLEMENTATION OF WATER LIFTING BY USING PEND...ENERGY CONVERSION PHENOMENON IN IMPLEMENTATION OF WATER LIFTING BY USING PEND...
ENERGY CONVERSION PHENOMENON IN IMPLEMENTATION OF WATER LIFTING BY USING PEND...
ijiert bestjournal
 
SCUDERI SPLIT CYCLE ENGINE: REVOLUTIONARY TECHNOLOGY & EVOLUTIONARY DESIGN RE...
SCUDERI SPLIT CYCLE ENGINE: REVOLUTIONARY TECHNOLOGY & EVOLUTIONARY DESIGN RE...SCUDERI SPLIT CYCLE ENGINE: REVOLUTIONARY TECHNOLOGY & EVOLUTIONARY DESIGN RE...
SCUDERI SPLIT CYCLE ENGINE: REVOLUTIONARY TECHNOLOGY & EVOLUTIONARY DESIGN RE...
ijiert bestjournal
 
EXPERIMENTAL EVALUATION OF TEMPERATURE DISTRIBUTION IN JOURNAL BEARING OPERAT...
EXPERIMENTAL EVALUATION OF TEMPERATURE DISTRIBUTION IN JOURNAL BEARING OPERAT...EXPERIMENTAL EVALUATION OF TEMPERATURE DISTRIBUTION IN JOURNAL BEARING OPERAT...
EXPERIMENTAL EVALUATION OF TEMPERATURE DISTRIBUTION IN JOURNAL BEARING OPERAT...
ijiert bestjournal
 
STUDY OF SOLAR THERMAL CAVITY RECEIVER FOR PARABOLIC CONCENTRATING COLLECTOR
STUDY OF SOLAR THERMAL CAVITY RECEIVER FOR PARABOLIC CONCENTRATING COLLECTOR STUDY OF SOLAR THERMAL CAVITY RECEIVER FOR PARABOLIC CONCENTRATING COLLECTOR
STUDY OF SOLAR THERMAL CAVITY RECEIVER FOR PARABOLIC CONCENTRATING COLLECTOR
ijiert bestjournal
 
DESIGN, OPTIMIZATION AND FINITE ELEMENT ANALYSIS OF CRANKSHAFT
DESIGN, OPTIMIZATION AND FINITE ELEMENT ANALYSIS OF CRANKSHAFTDESIGN, OPTIMIZATION AND FINITE ELEMENT ANALYSIS OF CRANKSHAFT
DESIGN, OPTIMIZATION AND FINITE ELEMENT ANALYSIS OF CRANKSHAFT
ijiert bestjournal
 
ELECTRO CHEMICAL MACHINING AND ELECTRICAL DISCHARGE MACHINING PROCESSES MICRO...
ELECTRO CHEMICAL MACHINING AND ELECTRICAL DISCHARGE MACHINING PROCESSES MICRO...ELECTRO CHEMICAL MACHINING AND ELECTRICAL DISCHARGE MACHINING PROCESSES MICRO...
ELECTRO CHEMICAL MACHINING AND ELECTRICAL DISCHARGE MACHINING PROCESSES MICRO...
ijiert bestjournal
 
HEAT TRANSFER ENHANCEMENT BY USING NANOFLUID JET IMPINGEMENT
HEAT TRANSFER ENHANCEMENT BY USING NANOFLUID JET IMPINGEMENTHEAT TRANSFER ENHANCEMENT BY USING NANOFLUID JET IMPINGEMENT
HEAT TRANSFER ENHANCEMENT BY USING NANOFLUID JET IMPINGEMENT
ijiert bestjournal
 
MODIFICATION AND OPTIMIZATION IN STEEL SANDWICH PANELS USING ANSYS WORKBENCH
MODIFICATION AND OPTIMIZATION IN STEEL SANDWICH PANELS USING ANSYS WORKBENCH MODIFICATION AND OPTIMIZATION IN STEEL SANDWICH PANELS USING ANSYS WORKBENCH
MODIFICATION AND OPTIMIZATION IN STEEL SANDWICH PANELS USING ANSYS WORKBENCH
ijiert bestjournal
 
IMPACT ANALYSIS OF ALUMINUM HONEYCOMB SANDWICH PANEL BUMPER BEAM: A REVIEW
IMPACT ANALYSIS OF ALUMINUM HONEYCOMB SANDWICH PANEL BUMPER BEAM: A REVIEW IMPACT ANALYSIS OF ALUMINUM HONEYCOMB SANDWICH PANEL BUMPER BEAM: A REVIEW
IMPACT ANALYSIS OF ALUMINUM HONEYCOMB SANDWICH PANEL BUMPER BEAM: A REVIEW
ijiert bestjournal
 
DESIGN OF WELDING FIXTURES AND POSITIONERS
DESIGN OF WELDING FIXTURES AND POSITIONERSDESIGN OF WELDING FIXTURES AND POSITIONERS
DESIGN OF WELDING FIXTURES AND POSITIONERS
ijiert bestjournal
 
ADVANCED TRANSIENT THERMAL AND STRUCTURAL ANALYSIS OF DISC BRAKE BY USING ANS...
ADVANCED TRANSIENT THERMAL AND STRUCTURAL ANALYSIS OF DISC BRAKE BY USING ANS...ADVANCED TRANSIENT THERMAL AND STRUCTURAL ANALYSIS OF DISC BRAKE BY USING ANS...
ADVANCED TRANSIENT THERMAL AND STRUCTURAL ANALYSIS OF DISC BRAKE BY USING ANS...
ijiert bestjournal
 
REVIEW ON MECHANICAL PROPERTIES OF NON-ASBESTOS COMPOSITE MATERIAL USED IN BR...
REVIEW ON MECHANICAL PROPERTIES OF NON-ASBESTOS COMPOSITE MATERIAL USED IN BR...REVIEW ON MECHANICAL PROPERTIES OF NON-ASBESTOS COMPOSITE MATERIAL USED IN BR...
REVIEW ON MECHANICAL PROPERTIES OF NON-ASBESTOS COMPOSITE MATERIAL USED IN BR...
ijiert bestjournal
 
PERFORMANCE EVALUATION OF TRIBOLOGICAL PROPERTIES OF COTTON SEED OIL FOR MULT...
PERFORMANCE EVALUATION OF TRIBOLOGICAL PROPERTIES OF COTTON SEED OIL FOR MULT...PERFORMANCE EVALUATION OF TRIBOLOGICAL PROPERTIES OF COTTON SEED OIL FOR MULT...
PERFORMANCE EVALUATION OF TRIBOLOGICAL PROPERTIES OF COTTON SEED OIL FOR MULT...
ijiert bestjournal
 
MAGNETIC ABRASIVE FINISHING
MAGNETIC ABRASIVE FINISHINGMAGNETIC ABRASIVE FINISHING
MAGNETIC ABRASIVE FINISHING
ijiert bestjournal
 

More from ijiert bestjournal (20)

CRACKS IN STEEL CASTING FOR VOLUTE CASING OF A PUMP
 CRACKS IN STEEL CASTING FOR VOLUTE CASING OF A PUMP CRACKS IN STEEL CASTING FOR VOLUTE CASING OF A PUMP
CRACKS IN STEEL CASTING FOR VOLUTE CASING OF A PUMP
 
A COMPARATIVE STUDY OF DESIGN OF SIMPLE SPUR GEAR TRAIN AND HELICAL GEAR TRAI...
A COMPARATIVE STUDY OF DESIGN OF SIMPLE SPUR GEAR TRAIN AND HELICAL GEAR TRAI...A COMPARATIVE STUDY OF DESIGN OF SIMPLE SPUR GEAR TRAIN AND HELICAL GEAR TRAI...
A COMPARATIVE STUDY OF DESIGN OF SIMPLE SPUR GEAR TRAIN AND HELICAL GEAR TRAI...
 
COMPARATIVE ANALYSIS OF CONVENTIONAL LEAF SPRING AND COMPOSITE LEAF
COMPARATIVE ANALYSIS OF CONVENTIONAL LEAF SPRING AND COMPOSITE LEAFCOMPARATIVE ANALYSIS OF CONVENTIONAL LEAF SPRING AND COMPOSITE LEAF
COMPARATIVE ANALYSIS OF CONVENTIONAL LEAF SPRING AND COMPOSITE LEAF
 
POWER GENERATION BY DIFFUSER AUGMENTED WIND TURBINE
 POWER GENERATION BY DIFFUSER AUGMENTED WIND TURBINE POWER GENERATION BY DIFFUSER AUGMENTED WIND TURBINE
POWER GENERATION BY DIFFUSER AUGMENTED WIND TURBINE
 
FINITE ELEMENT ANALYSIS OF CONNECTING ROD OF MG-ALLOY
FINITE ELEMENT ANALYSIS OF CONNECTING ROD OF MG-ALLOY FINITE ELEMENT ANALYSIS OF CONNECTING ROD OF MG-ALLOY
FINITE ELEMENT ANALYSIS OF CONNECTING ROD OF MG-ALLOY
 
REVIEW ON CRITICAL SPEED IMPROVEMENT IN SINGLE CYLINDER ENGINE VALVE TRAIN
REVIEW ON CRITICAL SPEED IMPROVEMENT IN SINGLE CYLINDER ENGINE VALVE TRAINREVIEW ON CRITICAL SPEED IMPROVEMENT IN SINGLE CYLINDER ENGINE VALVE TRAIN
REVIEW ON CRITICAL SPEED IMPROVEMENT IN SINGLE CYLINDER ENGINE VALVE TRAIN
 
ENERGY CONVERSION PHENOMENON IN IMPLEMENTATION OF WATER LIFTING BY USING PEND...
ENERGY CONVERSION PHENOMENON IN IMPLEMENTATION OF WATER LIFTING BY USING PEND...ENERGY CONVERSION PHENOMENON IN IMPLEMENTATION OF WATER LIFTING BY USING PEND...
ENERGY CONVERSION PHENOMENON IN IMPLEMENTATION OF WATER LIFTING BY USING PEND...
 
SCUDERI SPLIT CYCLE ENGINE: REVOLUTIONARY TECHNOLOGY & EVOLUTIONARY DESIGN RE...
SCUDERI SPLIT CYCLE ENGINE: REVOLUTIONARY TECHNOLOGY & EVOLUTIONARY DESIGN RE...SCUDERI SPLIT CYCLE ENGINE: REVOLUTIONARY TECHNOLOGY & EVOLUTIONARY DESIGN RE...
SCUDERI SPLIT CYCLE ENGINE: REVOLUTIONARY TECHNOLOGY & EVOLUTIONARY DESIGN RE...
 
EXPERIMENTAL EVALUATION OF TEMPERATURE DISTRIBUTION IN JOURNAL BEARING OPERAT...
EXPERIMENTAL EVALUATION OF TEMPERATURE DISTRIBUTION IN JOURNAL BEARING OPERAT...EXPERIMENTAL EVALUATION OF TEMPERATURE DISTRIBUTION IN JOURNAL BEARING OPERAT...
EXPERIMENTAL EVALUATION OF TEMPERATURE DISTRIBUTION IN JOURNAL BEARING OPERAT...
 
STUDY OF SOLAR THERMAL CAVITY RECEIVER FOR PARABOLIC CONCENTRATING COLLECTOR
STUDY OF SOLAR THERMAL CAVITY RECEIVER FOR PARABOLIC CONCENTRATING COLLECTOR STUDY OF SOLAR THERMAL CAVITY RECEIVER FOR PARABOLIC CONCENTRATING COLLECTOR
STUDY OF SOLAR THERMAL CAVITY RECEIVER FOR PARABOLIC CONCENTRATING COLLECTOR
 
DESIGN, OPTIMIZATION AND FINITE ELEMENT ANALYSIS OF CRANKSHAFT
DESIGN, OPTIMIZATION AND FINITE ELEMENT ANALYSIS OF CRANKSHAFTDESIGN, OPTIMIZATION AND FINITE ELEMENT ANALYSIS OF CRANKSHAFT
DESIGN, OPTIMIZATION AND FINITE ELEMENT ANALYSIS OF CRANKSHAFT
 
ELECTRO CHEMICAL MACHINING AND ELECTRICAL DISCHARGE MACHINING PROCESSES MICRO...
ELECTRO CHEMICAL MACHINING AND ELECTRICAL DISCHARGE MACHINING PROCESSES MICRO...ELECTRO CHEMICAL MACHINING AND ELECTRICAL DISCHARGE MACHINING PROCESSES MICRO...
ELECTRO CHEMICAL MACHINING AND ELECTRICAL DISCHARGE MACHINING PROCESSES MICRO...
 
HEAT TRANSFER ENHANCEMENT BY USING NANOFLUID JET IMPINGEMENT
HEAT TRANSFER ENHANCEMENT BY USING NANOFLUID JET IMPINGEMENTHEAT TRANSFER ENHANCEMENT BY USING NANOFLUID JET IMPINGEMENT
HEAT TRANSFER ENHANCEMENT BY USING NANOFLUID JET IMPINGEMENT
 
MODIFICATION AND OPTIMIZATION IN STEEL SANDWICH PANELS USING ANSYS WORKBENCH
MODIFICATION AND OPTIMIZATION IN STEEL SANDWICH PANELS USING ANSYS WORKBENCH MODIFICATION AND OPTIMIZATION IN STEEL SANDWICH PANELS USING ANSYS WORKBENCH
MODIFICATION AND OPTIMIZATION IN STEEL SANDWICH PANELS USING ANSYS WORKBENCH
 
IMPACT ANALYSIS OF ALUMINUM HONEYCOMB SANDWICH PANEL BUMPER BEAM: A REVIEW
IMPACT ANALYSIS OF ALUMINUM HONEYCOMB SANDWICH PANEL BUMPER BEAM: A REVIEW IMPACT ANALYSIS OF ALUMINUM HONEYCOMB SANDWICH PANEL BUMPER BEAM: A REVIEW
IMPACT ANALYSIS OF ALUMINUM HONEYCOMB SANDWICH PANEL BUMPER BEAM: A REVIEW
 
DESIGN OF WELDING FIXTURES AND POSITIONERS
DESIGN OF WELDING FIXTURES AND POSITIONERSDESIGN OF WELDING FIXTURES AND POSITIONERS
DESIGN OF WELDING FIXTURES AND POSITIONERS
 
ADVANCED TRANSIENT THERMAL AND STRUCTURAL ANALYSIS OF DISC BRAKE BY USING ANS...
ADVANCED TRANSIENT THERMAL AND STRUCTURAL ANALYSIS OF DISC BRAKE BY USING ANS...ADVANCED TRANSIENT THERMAL AND STRUCTURAL ANALYSIS OF DISC BRAKE BY USING ANS...
ADVANCED TRANSIENT THERMAL AND STRUCTURAL ANALYSIS OF DISC BRAKE BY USING ANS...
 
REVIEW ON MECHANICAL PROPERTIES OF NON-ASBESTOS COMPOSITE MATERIAL USED IN BR...
REVIEW ON MECHANICAL PROPERTIES OF NON-ASBESTOS COMPOSITE MATERIAL USED IN BR...REVIEW ON MECHANICAL PROPERTIES OF NON-ASBESTOS COMPOSITE MATERIAL USED IN BR...
REVIEW ON MECHANICAL PROPERTIES OF NON-ASBESTOS COMPOSITE MATERIAL USED IN BR...
 
PERFORMANCE EVALUATION OF TRIBOLOGICAL PROPERTIES OF COTTON SEED OIL FOR MULT...
PERFORMANCE EVALUATION OF TRIBOLOGICAL PROPERTIES OF COTTON SEED OIL FOR MULT...PERFORMANCE EVALUATION OF TRIBOLOGICAL PROPERTIES OF COTTON SEED OIL FOR MULT...
PERFORMANCE EVALUATION OF TRIBOLOGICAL PROPERTIES OF COTTON SEED OIL FOR MULT...
 
MAGNETIC ABRASIVE FINISHING
MAGNETIC ABRASIVE FINISHINGMAGNETIC ABRASIVE FINISHING
MAGNETIC ABRASIVE FINISHING
 

Recently uploaded

Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
Online aptitude test management system project report.pdf
Online aptitude test management system project report.pdfOnline aptitude test management system project report.pdf
Online aptitude test management system project report.pdf
Kamal Acharya
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
ChristineTorrepenida1
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
ssuser36d3051
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
AIR POLLUTION lecture EnE203 updated.pdf
AIR POLLUTION lecture EnE203 updated.pdfAIR POLLUTION lecture EnE203 updated.pdf
AIR POLLUTION lecture EnE203 updated.pdf
RicletoEspinosa1
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
heavyhaig
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
drwaing
 
Water billing management system project report.pdf
Water billing management system project report.pdfWater billing management system project report.pdf
Water billing management system project report.pdf
Kamal Acharya
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
symbo111
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
aqil azizi
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 

Recently uploaded (20)

Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
Online aptitude test management system project report.pdf
Online aptitude test management system project report.pdfOnline aptitude test management system project report.pdf
Online aptitude test management system project report.pdf
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
AIR POLLUTION lecture EnE203 updated.pdf
AIR POLLUTION lecture EnE203 updated.pdfAIR POLLUTION lecture EnE203 updated.pdf
AIR POLLUTION lecture EnE203 updated.pdf
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
 
Water billing management system project report.pdf
Water billing management system project report.pdfWater billing management system project report.pdf
Water billing management system project report.pdf
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 

DATA INTEGRITY PROOF (DIP) IN CLOUD STORAGE

  • 1. Novateur Publication’s International Journal of Innovation in Engineering, Research and Technology [IJIERT] ICITDCEME’15 Conference Proceedings ISSN No - 2394-3696 1 | P a g e DATA INTEGRITY PROOF (DIP) IN CLOUD STORAGE Pratik Bhujbal Department of Computer, SCSCOE, Rahuri Factory, India * pratikbhujbal1994@gmail.com Anupam Pahnale Department of Computer, SCSCOE, Rahuri Factory, India * anupampanhale73@gmail.com Parve Gorakh Department of Computer, SCSCOE, Rahuri Factory, India * parvegorakh@gmail.com Prof. Mohit Dighe Asst. Professor, Department of Computer, SCSCOE, Rahuri Factory, India * dighe.mohit@gmail.com ABSTRACT Nowadays, Data is rising over internet in terabytes and Exabyte. So, there is a need of storing these data which has been fulfilled by cloud computing. Though the service of cloud appear to be efficient and cost effective. Yet there are some challenges which are faced in cloud computing such as Data security and Authentication. In cloud Storage the data of Owner is stored in cloud where the cloud servers are remotely located the owner of the data does not have any direct control over the data. If the data over cloud is modified by the cloud, Third Party Auditor (TPA) or any other person there is no precision such that the owner of the data gets the information about the modification of the data. TPA is a Third Party Auditor who has Experience in checking the integrity of data. TPA verifies the files stored over the cloud if they are modified or not. Our scheme provides the solution to this problem such that if there is any modification in the data the owner will get information about the change in the data. Our scheme only provides the information about the change in data it does not keep data intact or secure from modification over cloud. KEYWORDS - Third Party Auditor (TPA), Cloud Storage, Cryptography, Data integrity. INTRODUCTION The usage of computers, mobile gadgets and social networking sites is now part of common mans day to day life. Sharing of information, photos, video and audio files have enabled user to communicate and utilize virtual storage space in the Internet without worrying to buy physical storage locally. All these data need to be stored somewhere in Internet and Cloud happens to be a default choice. In order to reap the operational and financial benefits of Cloud, the enterprises are also storing data with third parties in Cloud. It is challenging for small and medium company to keep updating hardware according to increasing data [1]. Cloud service provides flexibility to use storage services on demand according to ever changing requirement of enterprise. Storage as service is popular model, where data storage is outsourced by enterprise to third party service provider (Cloud Provider) [2] who charges as per the usage of storage facility. On the other side of spectrum, there is increasing trend these days, in the form of ubiquitous presence of mobile devices and the wide variety of functions for which they are used. Most of these functions are data generating (like photography, video shooting etc A. CLOUD COMPUTING The cloud in cloud computing provides the means through which everything from computing power to computing infrastructure, applications, business processes to personal collaboration can be delivered to you as a service wherever and whenever you need. Cloud computing is offered in different forms: • :Public clouds • Private clouds • Hybrid clouds, which combine both public and private The cloud itself is a set of hardware, networks, storage, services, and interfaces that enable the delivery of computing as a service. Cloud services provide delivery of software, infrastructure, and storage on the Internet (either as separated components or as a complete platform) based on the user demand.
  • 2. Novateur Publication’s International Journal of Innovation in Engineering, Research and Technology [IJIERT] ICITDCEME’15 Conference Proceedings ISSN No - 2394-3696 2 | P a g e B. CLOUD DATA CENTERS cloud data centers means the data centers with 10,000 or more servers on sites, all are devoted to running very few applications that are to be built with consistent infrastructure components (such as Hardware, racks, networking, OS, and so on). Cloud data centers are • Constructed for different purposes. • Created at different times than traditional data center. • Built on a different scale. • Not constrained by same limitations. • Perform different workload than classic data centers. C. DATA INTEGRITY IN CLOUD STORAGE Integrity, in terms of Network and data security, is assurance that information could only be accessed and modified by those authorized for it. Measures are taken to ensure Data integrity includes controlling physical environment of network terminals and the servers, restricting access of data, and maintaining strict authentication practice. Data integrity can also threatened by environmental hazards, such as heat, dust, and electrical surges. Data Integrity is most important of all security issues and privacy in cloud data storages because it not only ensures completeness and correctness of data but also ensure that data is consistent, correct, correct and of high quality. LITERATURE REVIEW In Literature survey the study of cloud services and study of data integrity proof in cloud storage. Many solutions have been provided to focus on resolving the issues of integrity. Juels and Kaliski[1] proposed a model Proofs of Retrievability(POR) was one of the first most important attempts to formulize the notion guaranteed remotely and reliable integrity of the data without the retrieving of data file. It is basically a data encryption mechanism which detects data corruptions and retrieve the complete the data without any damage. Shacham and Waters[2]gave a new model for POR enabling verifiability of unlimited number of queries by user with reduced overhead. Later Bowels and Juels[3] gave a theoretical model for the implementing of POR, but all these mechanisms proposed were weak from the security point because they all work for single server. Therefore Bowels [4] in their further work gave a HAIL protocol extending the POR mechanism for multiple servers. Priya Metri and Geeta Sarote[5] proposed a threat model to overcome the threat of integrity and provide data privacy in the cloud storage. It uses TPA(Third Party Auditor) and digital signature mechanism for the purpose of reliable data retrievable. The TPA being used notifies any unauthorized access attempting to make changes, avoiding the changes in data and maintaining the originality of data. Atienies and Burns[6] gave Provable Data Possession(PDP) mechanism which verifies the integrity of data being outsourced, detecting all kind of errors occurring in data but doesn’t guarantee complete data retrievable. In their later work Atienies and Pietro[7] proposed a scheme which overcome all problems in PDP, but the main and basic problem on both proposed system didn’t overcome was they work on single server. Therefore, later Curtmola [8]. DATA INTEGRITY PROOF SCHEMES A. OVERVIEW OF DATA INTEGRITY SCHEMES As the word suggests itself data integrity means completeness or wholeness and it is basic requirement of information technology [7]. Data integrity refers to maintaining and assuring the accuracy and consistency of data over its entire life-cycle [8]. Data corruption is a form of data loss and data integrity is opposite of data corruption [8]. Data integrity ensures the data is the same as it was when it was originally recorded. B. PROOF OF RETRIEVABILITY In the Proof of Retrivability (POR) scheme this scheme using keyed hash function is the simplest scheme than any other scheme for proof of retrivability of data files [5]. In this scheme the data file is stored in the cloud storage but before storing it in the cloud storage that file is pre-processed and Encryption cryptographic hash is computed [5]. After calculating hash value the file is stored in the cloud storage or Data Center [5]. The Encryption cryptographic key which is used to calculate hash value is then released to cloud storage and value calculated by the cloud storage are compare with each other [5]. From that comparison final conclusion is considered [5]. The main advantage of this scheme is simple to implementation. Limitation of this scheme is, it is computational burdensome or difficult for devices like Laptops, mobile phones, PDAs etc. [5].
  • 3. Novateur Publication’s International Journal of Innovation in Engineering, Research and Technology [IJIERT] ICITDCEME’15 Conference Proceedings ISSN No - 2394-3696 3 | P a g e Fig.1: A Diagram of a proof of retrievability Insert random sentinels in data files F Next scheme for proof retrivability is using position of bits or sentinels [3].This concept is proposed by Ari Juels and Burton S. Kaliski Jr [3]. Sentinels are the special blocks which are used in this scheme to verify the integrity. Sentinels are embedded in the data blocks randomly during setup phase by the verifier in the setup phase [3]. The integrity of the data file is calculate by challenge and response. The verifier or TPA throws challenge to the cloud storage by specifying the position of the collection of the sentinels and the cloud storage has to return the associated sentinels or TPA values to the verifier[3][5]. If the file stored by the client is modified then the associated sentinels values also get changed and the cloud will return wrong values to verifier. From this integrity of the file is checked [3][5]. Limitation of this scheme is that this scheme involves encryption of file so this is computationally cumbersome for the small devices like mobile phones, PDA etc. [5]. Also Sravan Kumar R. and Ashutosh Saxena present this scheme [5] which involves selection of random bits per blocks of data due to this computational overhead of the client is reduced. File is processed by the verifier before storing it in the cloud storage [5]. After that verifier attaches some metadata to the file [5].This meta data is used at the time of verification of the integrity of the file [5]. The limitation of this scheme is this scheme applies only static data [5]. Fig.3.2: File is divided into number of Data Blocks Fig.3.3: File is appending the Meta Data and made Encryption file F’ 1) setup phase: Let the verifier V wishes to the store the file F with the archive. Let this file F consist of n file blocks. We initially preprocess the file and create metadata to be appended to the file. Let each of the n data blocks have m bits in them. A typical data file F which the client wishes to store in the cloud is shown in Figure 3.2. 2) verification phase: Let the verifier or TPA V wants to verifying the integrity of the file F. It throws challenge to archive and asks it to respond. The challenge and response are compared and the verifiers accept or reject the integrity proof. Suppose verifier wishes to check integrity of nth block. The verifier challenge cloud storage server by specify the block number i and bit number j generated by using function g which only verifier knows. The verifier also specifies position at which the meta data correspond the block i is append. This Meta data will be a k-bit number. Hence cloud storage server is required to send k + 1 bits for verification process by the client. The Meta data sent by cloud is decrypted by using number i and corresponding bit in this decrypted Meta data is
  • 4. Novateur Publication’s International Journal of Innovation in Engineering, Research and Technology [IJIERT] ICITDCEME’15 Conference Proceedings ISSN No - 2394-3696 4 | P a g e comparing with bit that is sent by the cloud. Any not match between two would mean a loss of the integrity of the client data at the cloud storage. CONCLUSION In this paper, we have proposed next generation for cloud storage which provides a scheme to address storage, management and the analysis of the rapidly growing machine Generated information. This paper explains about cloud storage, advantages along with its characteristics. Our scheme is proposed to reduce computational data and the storage Overhead of the cloud storage server. We also have proposed to minimize the size of proof of data integrity so that to reduce network bandwidth consumption. At client we only store the two functions, bit generator function g, and function h which can be used for encrypting data. Hence storage at client is very small as compared to other schemes that were developed. In our scheme encryption task is very limited to only fraction of whole data thus saving computational time of client. Many of schemes proposed earlier require the archive to perform processes that need lot of computation power to generate proof of the data integrity. But in proposed scheme archive just need to fetch and send few bits of data to client. And also evaluate performance of cloud storage performance. REFERENCES [1] Daliya Attas, Omar Batrafi, Efficient integrity checking technique for securing client data in cloud computing, IJECS Vol:11 No:05.,2011. [2] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, Provable data possession at untrusted stores, New York, NY, USA: ACM, 2007, pp. 5986095. [3] A. Juels and B.S. Kaliski Jr., Pors: Proofs of Retrievability for Large Files, Proc. 14th ACM Conf. Computer and Comm. Security, pp. 584-597, 2007. [4] Amazon.com. Amazon simple storage service (Amazon S3), 2007. [5] Sravan Kumar R, Ashutosh Saxena, Data Integrity Proofs in Cloud Storage,2011 [6] Satyakshma Rawat, Richa Chowdhary, Dr. Abhay Bansal, Data integrity of cloud data storage (CDSs) in cloud ijarcsse Vol. 3, Issue 3, March 2013. [7] Saranya Eswaran, Dr. Sunitha Abburu Identifying Data integrity in cloud storage, IJCSI Vol. 9, Issue 2, No 1, March 2012. [8] E. Mykletun, M. Narasimha, and G. Tsudik, Authentication and integrity in outsourced databases, Trans. Storage, vol. 2, no. 2, pp. 107138, 2006.