SlideShare a Scribd company logo
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 11, Issue 1 (May. - Jun. 2013), PP 39-45
www.iosrjournals.org
www.iosrjournals.org 39 | Page
Public Verifiability in Cloud Computing Using Signcryption
Based on Elliptic Curves
Jahnvi S. Kapadia1
, Prof. Mehul P. Barot2
1
(Computer engineering, LDRP ITR, Gandhinagar/GTU university, India)
2
(Computer engineering, LDRP ITR, Gandhinagar/GTU university, India)
Abstract : Cloud computing is a computing paradigm that involves outsourcing of computing
resources with the capabilities of expendable resource scalability, on-demand provisioning with little
or no up-front IT infrastructure investment costs. It has recently emerged as a promising hosting
platform that performs an intelligent usage of a collection of services, applications, information and
infrastructure comprised of pools of computer, network, information and storage resources. However
along with these advantages, storing a large amount of data including critical information on the
cloud motivates highly skilled hackers thus creating a need for the security to be considered as one of
the top issues while considering Cloud Computing. In the cloud storage model, data is stored on
multiple virtualized servers. Physically the resources will span multiple servers and can even span
storage sites. We have proposed an effective scheme to ensure the correctness of user’s data on cloud
data storage and public verifiability without demanding user’s time, feasibility or resources.
Whenever data corruption is detected during the storage correctness verification, this scheme can
almost guarantee the simultaneous localization of data errors and the identification of the
misbehaving server(s).
Keywords - Elliptic Curves, Homomorphic, Signcryption, Unsigncryption.
I. INTRODUCTION
Let's say you're an executive at a large corporation. Your particular responsibilities include making
sure that all of your employees have the right hardware and software they need to do their jobs. Buying
computers for everyone isn't enough; you also have to purchase software or software licenses to give employees
the tools they require. Whenever you have a new hire, you have to buy more software or make sure your current
software license allows another user. It's a stressful work.
Soon, there may be an alternative for executives like you. Instead of installing a suite of software for
each computer, you'd only have to load one application. That application would allow workers to log into a
Web-based service which hosts all the programs the user would need for his or her job. Remote machines owned
by another company would run everything from e-mail to word processing to complex data analysis programs.
It's called cloud computing, and it could change the entire computer industry.
Cloud computing is a computing paradigm that involves outsourcing of computing resources with the
capabilities of expendable resource scalability, on-demand provisioning with little or no up-front IT
infrastructure investment costs[1]. It has recently emerged as a promising hosting platform that performs an
intelligent usage of a collection of services, applications, information and infrastructure comprised of pools of
computer, network, information and storage resources. Moving data into the cloud offers great convenience to
users since they donβ€Ÿt have to care about the complexities of direct hardware management. The pioneer of Cloud
Computing vendors, Amazon Simple Storage Service (S3) and Amazon Elastic Compute Cloud (EC2) [web-
ensuring] are both well known examples. While these internet-based online services do provide huge amounts of
storage space and customizable computing resources, this computing platform shift, however, is eliminating the
responsibility of local machines for data maintenance at the same time. As a result, users are at the mercy of
their cloud service providers for the availability and integrity of their data.
However along with this advantage of storing a large amount of data including critical information on
the cloud motivates highly skilled hackers and creates a need for the security to be considered as one of the top
issues while considering Cloud Computing. Data security for such a cloud service encompasses several aspects
including secure channels, access controls, and encryption. And, when we consider the security of data in a
cloud, we must consider the security triad: confidentiality, integrity, and availability [2]. In the cloud storage
model, data is stored on multiple virtualized servers. Physically the resources will span multiple servers and can
even span storage sites. Thus an effective scheme to ensure the correctness of userβ€Ÿs data on cloud must be
utilized.
Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic Curves
www.iosrjournals.org 40 | Page
The scheme proposed here relies on erasure-correcting code in the file distribution preparation to
provide redundancies and guarantee the data dependability. By utilizing the homomorphic token with distributed
verification of erasure-coded data, this scheme achieves the storage correctness insurance as well as data error
localization. Whenever data corruption has been detected during the storage correctness verification, this
scheme can almost guarantee the simultaneous localization of data errors and the identification of the
misbehaving server(s).The key feature of this scheme is that it uses signcryption/unsigncryption schemes based
on elliptic curves to enforce public verifiability which is an enhancement to a previously described cloud system
model in [3]
II. PROPOSED SYSTEM
1. SYSTEM’S COMPONENTS
Representative network architecture for cloud data storage for the system we have proposed is
illustrated in figure 1.
Four different network entities of this system can be identified as follows:
 User: users, who have data to be stored in the cloud and rely on the cloud for data computation, consist
of both individual consumers and organizations.
 Cloud Service Provider (CSP): a CSP, who has significant resources and expertise in building and
managing distributed cloud storage servers, owns and operates live Cloud Computing systems.
 Authentication Server (AS): an authentication server, who has expertise and capabilities that users
may not have, is trusted to assess and expose risk of cloud storage services on behalf of the users upon
request.
 Certificate Authority (CA): a certification authority provides certificates for authentication and
identification to User and AS.
In cloud data storage, a user stores his data through a CSP into a set of cloud servers, which are running
in a simultaneous, cooperated and distributed manner. Data redundancy can be employed with technique of
erasure-correcting code to further tolerate faults or server crash as userβ€Ÿs data grows in size and importance.
Thereafter, for application purposes, the user interacts with the cloud servers via CSP to access or retrieve his
data. In some cases, the user may need to perform block level operations on his data. The most general forms of
these operations considered are block update, delete, insert and append.
As users no longer possess their data locally, it is of critical importance to assure users that their data
are being correctly stored and maintained. That is, users should be equipped with security means so that they
can make continuous correctness assurance of their stored data even without the existence of local copies. As
the users do not necessarily have the time, feasibility or resources to monitor their data, this task is delegated the
Authentication Server which uses signcryption scheme based on Elliptic Curves has been used for this purpose.
One of the key issues is to effectively detect any unauthorized data modification and corruption, possibly due to
server compromise and/or random Byzantine failures [3]. Besides, in the distributed case when such
inconsistencies are successfully detected, to find which server the data error lies in is also of great significance,
since it can be the first step to fast recover the storage errors. To address these problems, the main scheme for
ensuring cloud data storage is presented in next section.
Fig 1: proposed system model
Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic Curves
www.iosrjournals.org 41 | Page
1.1 NOTATION AND PRELIMINARIES
Domain parameters of the proposed scheme consist of a suitably selected elliptic curve E defined over
a finite field Fq with the Weierstrass equation of the form y2
= x3
+ ax + b and a base point G Π„ E(Fq ) in which
q is a large prime number. In order to make the elliptic curve non-singular, a,b Π„ Fq should satisfy 4a3
+ 27b2
β‰ 
0(mod q) . To guard against small subgroup attacks, the point G should be of a prime order n or equivalently,
nG = O where O denotes the point of elliptic curve at infinity, and we should have n > 4 √q. To protect against
other known attacks on special classes of elliptic curves, n should not divide qi
-1 for all 1 ≀ i ≀V (V = 20
suffices in practice), n β‰  q should be satisfied, and the curve should be non-super singular [4].To retain the
intractability of ECDLP, n should at least satisfy n > 2160
for the common applications.
WU: A randomly select integer which is a Private Key of User (π‘ŠU Π„R[1, 𝑛 βˆ’ 1])
WU: Public Key of User calculates as WU = wUG
IDU: A unique User identifier.
WA: A randomly select integer which is a Private Key of AS (π‘ŠA Π„R[1, 𝑛 βˆ’ 1]).
WA: Public Key of User calculates as WA = wAG
IDA: A unique AS identifier.
CertU: Digital certificate for public key of user from CA
CertA: Digital certificate for public key of AS from CA
If CA is not involved in the public key generation, it is necessary for CA to verify that each entity
really possesses the corresponding private key of its claimed public key. This can be accomplished by a zero-
knowledge technique. It should also be verified that the public keys belong to the main group.
𝐅: The data file to be stored. It is assumed that 𝐹 can be denoted as a matrix of π‘š equal-sized data vectors, each
consisting of 𝑙 blocks. Data blocks are all well represented as elements in Galois Field 𝐺𝐹(2𝑝) for 𝑝 =
8 π‘œπ‘Ÿ 16.
𝐀: The dispersal matrix used for Reed-Solomon coding.
𝐆: The encoded file matrix, which includes a set of 𝑛 = π‘š + π‘˜ vectors, each consisting of 𝑙 blocks.
π’‡π’Œπ’†π’š(Β·): Pseudorandom function (PRF), which is defined as 𝑓 ∢ {0, 1} βˆ— Γ— π‘˜π‘’π‘¦ β†’ 𝐺𝐹(2𝑝).
Π€π’Œπ’†π’š (Β·): Pseudorandom permutation (PRP), which is defined as Π€: {0, 1}π‘™π‘œπ‘”2(𝑙) Γ— π‘˜π‘’π‘¦ β†’ {0, 1} π‘™π‘œπ‘”2(𝑙).
𝑽𝒆𝒓: A version number bound with the index for individual blocks, which records the times the block has been
modified. Initially it is assumed that π‘£π‘’π‘Ÿ is 0 for all data blocks.
𝑺 π’Šπ’‹ 𝒗𝒆𝒓: The seed for PRF, which depends on the file name, block index𝑖, the server position 𝑗 as well as the
optional block version numberπ‘£π‘’π‘Ÿ.
1.2 PHASES AND FLOW OF THE PROPOSED SCHEME
Different phases of the scheme where different techniques applied and the flow of data distribution,
encryption and authentication is listed as follows:
Phase 1: file distribution preparation.
 Done by user
 Using erasure-correcting code
Phase 2: Token Pre-computation.
 Done by User
 Homomorpic tokens are generated using token pre-computation algorithm
Phase 3: Signcryption of pre-computed Tokens.
 Done by User
 Using Signcrption Scheme based on elliptic curves
Phase 4: Unsigncryption of Tokens.
 Done by AS
 Using Unsigncryption Scheme
Phase 5: Correctness Verification and Error Localization.
 Using Challenge Token Pre-computation algorithm
Phase 6: File Retrieval and Error Recovery.
 Using Error Recovery algorithm
III. FILE DISTRIBUTION PREPARATION
It is well known that erasure-correcting code may be used to tolerate multiple failures in distributed
storage systems. In cloud data storage, we relay on this technique to disperse the data file 𝐹 redundantly across a
set of 𝑛 = π‘š + π‘˜ distributed servers. A (π‘š + π‘˜, π‘˜) Reed-Solomon erasure-correcting code is used to create k
Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic Curves
www.iosrjournals.org 42 | Page
redundancy parity vectors from π‘š data vectors in such a way that the original π‘š data vectors can be
reconstructed from any π‘š out of the m + k data and parity vectors. By placing each of the m + k vectors on a
different server, the original data file can survive the failure of any π‘˜ of the π‘š + π‘˜ servers without any data
loss, with a space overhead of π‘˜/π‘š. For support of efficient sequential I/O to the original file, our file layout is
systematic, i.e., the unmodified π‘š data file vectors together with π‘˜ parity vectors are distributed across π‘š + π‘˜
different servers [3].
Let 𝑭 = (𝐹1, 𝐹2, . . . , πΉπ‘š) and 𝐹𝑖 = (𝑓1𝑖, 𝑓2𝑖, . . . , 𝑓𝑙𝑖)𝑇 (𝑖 ∈ {1, . . . , π‘š}), where 𝑙 ≀ 2𝑝 βˆ’ 1.
Note all these blocks are elements of 𝐺𝐹(2𝑝). The systematic layout with parity vectors is achieved with the
information dispersal matrix𝐴, derived from π‘š Γ— (π‘š + π‘˜) Vandermonde matrix.
, where 𝛽𝑗 (𝑗 ∈ {1, . . . , 𝑛}) are distinct elements
randomly picked from𝐺𝐹(2𝑝). After a sequence of elementary row transformations, the desired matrix 𝐴 can be
written as
Where 𝐼 is a π‘š Γ— π‘š identity matrix and 𝑃 is the secret parity generation matrix with size π‘š Γ— π‘˜. Note that 𝐴 is
derived from a Vandermonde matrix, thus it has the property that any π‘š out of the π‘š + π‘˜ columns form an
invertible matrix. By multiplying 𝑭 by 𝑨, the user obtains the encoded file:
𝐺 = 𝐹 Β· 𝐴 = (𝐺(1), 𝐺(2), . . . , 𝐺(π‘š), 𝐺(π‘š + 1), . . . , 𝐺(𝑛)) = (𝐹1, 𝐹2, . . . , πΉπ‘š, 𝐺(π‘š + 1), . . . , 𝐺(𝑛)),
where 𝐺(𝑗) = (𝑔(𝑗)1 , 𝑔(𝑗)2 , . . . , 𝑔(𝑗) 𝑙 )𝑇 (𝑗 ∈ {1, . . . , 𝑛}).
As noticed, the multiplication reproduces the original data file vectors of 𝑭 and the remaining part (𝐺 π‘š +
1,…,𝐺(𝑛)) are π‘˜ parity vectors generated based on 𝑭.
IV. CHALLENGE TOKEN PRECOMPUTATION
In order to achieve assurance of data storage correctness and data error localization simultaneously, this
scheme entirely relies on the pre-computed verification tokens. The main idea is as follows: before file
distribution the user pre-computes a certain number of short verification tokens on individual vector G(j) (j ∈
{1, . . . , n}), each token covering a random subset of data blocks. Later, when the user wants to make sure the
storage correctness for the data in the cloud, he challenges the cloud servers with a set of randomly generated
block indices. Upon receiving challenge, each cloud server computes a short β€œsignature” over the specified
blocks and returns them to the user. The values of these signatures should match the corresponding tokens pre-
computed by the user. Meanwhile, as all servers operate over the same subset of the indices, the requested
response values for integrity check must also be a valid codeword determined by secret matrix P.
Suppose the user wants to challenge the cloud servers 𝑑 times to ensure the correctness of data storage.
Then, he must pre-compute 𝑑 verification tokens for each 𝐺(𝑗) (𝑗 ∈ {1, . . . , 𝑛}), using a PRF 𝑓(Β·), a PRP Π€(Β·),
a challenge key π‘˜π‘π‘•π‘Žπ‘™ and a master permutation key 𝐾PRP. To generate the 𝑖th
token for server 𝑗, the user acts as
follows:
1. Derive a random challenge value ⍺i of GF(2p
) by ⍺i = fkchal (i) and a permutation key k(i)
prp based on
KPRP .
2. Compute the set of π‘Ÿ randomly-chosen indices: {πΌπ‘ž ∈ [1, . . . , 𝑙]|1 ≀ π‘ž ≀ π‘Ÿ},where Iq = Π€kprp
(i)
(q).
3. Calculate the token as:
Note that v(j)i , which is an element of GF(2p) with small size, is the response the user expects to receive from
server j when he challenges it on the specified data blocks.
The details of token generation are shown in Algorithm 1.
Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic Curves
www.iosrjournals.org 43 | Page
Algorithm 3.1: Token Pre-computation
V. SIGNCRYPTION OF PRE-COMPUTED TOKENS
After token generation, the user generates the signcrypted text (R,C, s) by following the below steps
[4][5]:
1) Checks the validity of CertA and uses it for verifying WA.
The process of certificate validation includes:
a. Verifying the integrity and authenticity of the certificate by verifying the CA's signature on
the certificate.
b. Verifying that the certificate is not expired.
c. Verifying that the certificate is not revoked.
2) Randomly selects an integer π‘Ÿ Π„R[1, 𝑛 βˆ’ 1] .
3) Computes 𝑅 = π‘ŸπΊ where 𝑅 = (xR , yR ) in which xR / yR denotes the π‘₯/𝑦-coordinate of the point 𝑅.
4) Computes 𝐾 = (r + ẍRwU )WA where 𝐾 = (xK , yK ) ,and in which
is the bit length of n, denotes the floor, and indicates the ceiling. If
𝐾 = 𝑂 user goes back to step 2 otherwise, it drives the session key of encryption as k = H(xK || IDU ||
yK || IDc ) in which H is a oneway hash function that generates the required number of bits as the secret
key of deployed symmetric encryption algorithm, and || denotes the concatenation.
5) Computes the ciphertext as 𝐢 = πΈπ‘˜ (𝑀) in which Ek(.) denotes a strong symmetric encryption
algorithm (e.g. AES) that uses session key k for the encryption.
6) Computes the digital signature as 𝑠 = 𝑑𝑀A βˆ’ π‘Ÿ(π‘šπ‘œπ‘‘ 𝑛) in which t = H(C || xR || IDU || yR || IDc ) .
7) Sends the signcrypted text i.e token (R,C, s) to Authentication Server.
VI. UNSIGNCRYPTION OF TOKENS.
AS who received the signcrypted text (R,C, s) , follows the below steps to extract the plaintext and
verify the signature[4][5]:
1) Checks the validity of CertU and uses it for verifying WU.
2) Computes K = wA (R + ẍRWU ) = (xK , yK ) and derives the session key as k = H(xK || IDU || yK || IDA ) .
3) Decrypts the ciphertext as 𝑀 = 𝐷k (𝐢).
4) Computes t = H(C || xR || IDU || yR || IDA).
5) Accepts M as the correct plaintext of User if and only if 𝑠𝐺 + 𝑅 = π‘‘π‘Šπ΄ .Otherwise, he rejects M.
Once all tokens are computed, sent encrypted and success acknowledgement message is received from
AS to User, the final step before file distribution is to blind each parity block gi
(j)
in (𝐺(π‘š + 1), . . . , 𝐺(𝑛)) by
𝑔(𝑗)𝑖 ← 𝑔(𝑗) 𝑖 + π‘“π‘˜π‘— (𝑠𝑖𝑗 ), 𝑖 ∈ {1, . . . , 𝑙}, where π‘˜j is the secret key for parity vector 𝐺(𝑗) (𝑗 ∈ {π‘š +
Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic Curves
www.iosrjournals.org 44 | Page
1, . . . , 𝑛}). This is for protection of the secret matrix 𝑃. After blinding the parity information, the user disperses
all the 𝑛 encoded vectors 𝐺(𝑗) (𝑗 ∈ {1, . . . , 𝑛}) across the cloud servers 𝑆1, 𝑆2, . . . , 𝑆𝑛.
VII. CORRECTNESS VERIFICATION AND ERROR LOCALIZATION
Error localization is a key prerequisite for eliminating errors in storage systems. However, many
previous schemes do not explicitly consider the problem of data error localization, thus only provide binary
results for the storage verification. Proposed scheme outperforms those by integrating the correctness
verification and error localization in the challenge-response protocol: the response values from servers for each
challenge not only determine the correctness of the distributed storage, but also contain information to locate
potential data error(s). Specifically, the procedure of the i-th challenge-response for a cross-check over the 𝑛
servers is described as follows:
 The user reveals the ⍺i as well as the i-th permutation key k(i)
prp to each servers.
 The server storing vector G(j)
aggregates those π‘Ÿ rows specified by index k(i)
prp into a linear
combination:
 Upon receiving R(j)
is from all the servers, the user takes away blind values in R(j)
(j ∈ {m+ 1, . . . , n})
by:
 Then the user verifies whether the received values remain a valid codeword determined by secret
matrix P:
Because all the servers operate over the same subset of indices, the linear aggregation of these r specified rows
(R(1)i , . . . ,R(n)i ) has to be a codeword in the encoded file matrix. If the above equation holds, the challenge is
passed. Otherwise, it indicates that among those specified rows, there exist file block corruptions. Once the
inconsistency among the storage has been successfully detected, one can rely on the pre-computed verification
tokens to further determine where the potential data error(s) lies in. Note that each response R(j) i is computed
exactly in the same way as token v(j) i , thus the user can simply find which server is misbehaving by verifying
the following n equations:
Algorithm 2 gives the details of correctness verification and error localization.
Algorithm 2
Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic Curves
www.iosrjournals.org 45 | Page
VIII. FILE RETRIEVAL AND ERROR RECOVERY
Since the layout of file matrix is systematic, the user can reconstruct the original file by downloading
the data vectors from the first m servers, assuming that they return the correct response values. Notice that the
verification scheme is based on random spot-checking, so the storage correctness assurance is a probabilistic
one. However, by choosing system parameters (e.g., r, l, t) appropriately and conducting enough times of
verification, this scheme can guarantee the successful file retrieval with high probability. On the other hand,
whenever the data corruption is detected, the comparison of pre-computed tokens and received response values
can guarantee the identification of misbehaving server(s), again with high probability, which will be discussed
shortly. Therefore, the user can always ask servers to send back blocks of the r rows specified in the challenge
and regenerate the correct blocks by erasure correction, shown in Algorithm 3, as long as there are at most k
misbehaving servers are identified. The newly recovered blocks can then be redistributed to the misbehaving
servers to maintain the correctness of storage.
Algorithm 3
IX. CONCLUSION
Cloud Computing is gaining remarkable popularity in the recent years for its benefits in terms of
flexibility, scalability, reliability and cost effectiveness. Despite all the promises however, Cloud Computing has
one problem, Security so in this thesis, we have studied the problem of data security in cloud data storage,
various schemes proposed to ensure the correctness of usersβ€Ÿs data in the cloud server and have proposed a
scheme which includes Public Verifiability using signcryption.
In this scheme signature generation algorithm and key pair generation algorithm needs a random
number to be generated. Using this random number as seed private keys is generated. Similarly secret integer
β€žKβ€Ÿ generated during signature verification algorithm should also be random in nature. An attacker can exploit
this vulnerability if the algorithm used to generate the random number is not cryptographically secure i.e. it
should be unpredictable. So probability of any given value being selected should be very small. As a future
scope of this work cryptographically secure random number should be included while generating private keys.
REFERENCES
[1] Keane an NTT DATA Company, β€œCloud Computing”.
[2] K. Kajendran, J.James Jeyaseelan J. Jakkulin Joshi, β€œAn Approach For Secured Data Storage Using Cloud Computing”,
International Journal of Computer Trends and Technology, 2011.
[3] Cong Wang, Qian Wang, Kui Ren , Wenjing Lou, β€œEnsuring Data Storage Security in Cloud Computing”.
[4] Yuliang Zheng, β€œSigncryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) +Cost(Encryption)”,1999.
[5] Yuliang Zheng, Hideki Imai, β€œHow to construct efficient signcryption schemes on elliptic curves”, Information Processing Letters
68 (1998) 227–233,1988.

More Related Content

What's hot

SECURE OPTIMIZATION COMPUTATION OUTSOURCING IN CLOUD COMPUTING: A CASE STUDY ...
SECURE OPTIMIZATION COMPUTATION OUTSOURCING IN CLOUD COMPUTING: A CASE STUDY ...SECURE OPTIMIZATION COMPUTATION OUTSOURCING IN CLOUD COMPUTING: A CASE STUDY ...
SECURE OPTIMIZATION COMPUTATION OUTSOURCING IN CLOUD COMPUTING: A CASE STUDY ...
Shakas Technologies
Β 
Two Level Auditing Architecture to Maintain Consistent In Cloud
Two Level Auditing Architecture to Maintain Consistent In CloudTwo Level Auditing Architecture to Maintain Consistent In Cloud
Two Level Auditing Architecture to Maintain Consistent In Cloud
theijes
Β 
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHMDATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
ijsrd.com
Β 
Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic AlgorithmEnhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
IOSR Journals
Β 
Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...
Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...
Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...
IJCSIS Research Publications
Β 
El35782786
El35782786El35782786
El35782786
IJERA Editor
Β 
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGSURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
Editor IJMTER
Β 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
ijcsit
Β 
Fs2510501055
Fs2510501055Fs2510501055
Fs2510501055
IJERA Editor
Β 
Cloud Computing- Proposal (Autosaved)
Cloud Computing- Proposal (Autosaved)Cloud Computing- Proposal (Autosaved)
Cloud Computing- Proposal (Autosaved)Zuhair Haroon khan
Β 
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC AlgorithmIRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET Journal
Β 
Improving security for data migration in cloud computing using randomized enc...
Improving security for data migration in cloud computing using randomized enc...Improving security for data migration in cloud computing using randomized enc...
Improving security for data migration in cloud computing using randomized enc...
IOSR Journals
Β 
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
IJSRD
Β 
Moving to the Cloud When & Where
Moving to the Cloud When & WhereMoving to the Cloud When & Where
Moving to the Cloud When & Where
Mohammed Sajjad Ali
Β 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
inventionjournals
Β 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
IDES Editor
Β 
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
ijiert bestjournal
Β 

What's hot (17)

SECURE OPTIMIZATION COMPUTATION OUTSOURCING IN CLOUD COMPUTING: A CASE STUDY ...
SECURE OPTIMIZATION COMPUTATION OUTSOURCING IN CLOUD COMPUTING: A CASE STUDY ...SECURE OPTIMIZATION COMPUTATION OUTSOURCING IN CLOUD COMPUTING: A CASE STUDY ...
SECURE OPTIMIZATION COMPUTATION OUTSOURCING IN CLOUD COMPUTING: A CASE STUDY ...
Β 
Two Level Auditing Architecture to Maintain Consistent In Cloud
Two Level Auditing Architecture to Maintain Consistent In CloudTwo Level Auditing Architecture to Maintain Consistent In Cloud
Two Level Auditing Architecture to Maintain Consistent In Cloud
Β 
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHMDATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
Β 
Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic AlgorithmEnhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Β 
Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...
Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...
Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...
Β 
El35782786
El35782786El35782786
El35782786
Β 
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGSURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
Β 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
Β 
Fs2510501055
Fs2510501055Fs2510501055
Fs2510501055
Β 
Cloud Computing- Proposal (Autosaved)
Cloud Computing- Proposal (Autosaved)Cloud Computing- Proposal (Autosaved)
Cloud Computing- Proposal (Autosaved)
Β 
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC AlgorithmIRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
Β 
Improving security for data migration in cloud computing using randomized enc...
Improving security for data migration in cloud computing using randomized enc...Improving security for data migration in cloud computing using randomized enc...
Improving security for data migration in cloud computing using randomized enc...
Β 
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
Β 
Moving to the Cloud When & Where
Moving to the Cloud When & WhereMoving to the Cloud When & Where
Moving to the Cloud When & Where
Β 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
Β 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
Β 
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
Β 

Viewers also liked

G0345259
G0345259G0345259
G0345259
IOSR Journals
Β 
Context Based Web Indexing For Semantic Web
Context Based Web Indexing For Semantic WebContext Based Web Indexing For Semantic Web
Context Based Web Indexing For Semantic Web
IOSR Journals
Β 
Network Lifespan Maximization For Wireless Sensor Networks Using Nature-Inspi...
Network Lifespan Maximization For Wireless Sensor Networks Using Nature-Inspi...Network Lifespan Maximization For Wireless Sensor Networks Using Nature-Inspi...
Network Lifespan Maximization For Wireless Sensor Networks Using Nature-Inspi...
IOSR Journals
Β 
Data Classification Algorithm Using k-Nearest Neighbour Method Applied to ECG...
Data Classification Algorithm Using k-Nearest Neighbour Method Applied to ECG...Data Classification Algorithm Using k-Nearest Neighbour Method Applied to ECG...
Data Classification Algorithm Using k-Nearest Neighbour Method Applied to ECG...
IOSR Journals
Β 
Chaos Based Direct Public Verifiable Signcryption Scheme
Chaos Based Direct Public Verifiable Signcryption SchemeChaos Based Direct Public Verifiable Signcryption Scheme
Chaos Based Direct Public Verifiable Signcryption Scheme
IOSR Journals
Β 
Motivation for Green Computing, an Analytical Approach
Motivation for Green Computing, an Analytical ApproachMotivation for Green Computing, an Analytical Approach
Motivation for Green Computing, an Analytical Approach
IOSR Journals
Β 
Searching and Analyzing Qualitative Data on Personal Computer
Searching and Analyzing Qualitative Data on Personal ComputerSearching and Analyzing Qualitative Data on Personal Computer
Searching and Analyzing Qualitative Data on Personal Computer
IOSR Journals
Β 
Shakira 4 1
Shakira 4 1Shakira 4 1
Shakira 4 1laurasantac
Β 
Studying the Impact of the Solar Activity on the Maximum Usable Frequency Pa...
Studying the Impact of the Solar Activity on the Maximum  Usable Frequency Pa...Studying the Impact of the Solar Activity on the Maximum  Usable Frequency Pa...
Studying the Impact of the Solar Activity on the Maximum Usable Frequency Pa...
IOSR Journals
Β 
Survey: Problems Related to Human in Software Projects
Survey: Problems Related to Human in Software ProjectsSurvey: Problems Related to Human in Software Projects
Survey: Problems Related to Human in Software Projects
IOSR Journals
Β 
E0532630
E0532630E0532630
E0532630
IOSR Journals
Β 
Analysis of Rate Based Congestion Control Algorithms in Wireless Technologies
Analysis of Rate Based Congestion Control Algorithms in Wireless TechnologiesAnalysis of Rate Based Congestion Control Algorithms in Wireless Technologies
Analysis of Rate Based Congestion Control Algorithms in Wireless Technologies
IOSR Journals
Β 
A Distinctive Scheme for Extraction of Symmetrical Components along with Harm...
A Distinctive Scheme for Extraction of Symmetrical Components along with Harm...A Distinctive Scheme for Extraction of Symmetrical Components along with Harm...
A Distinctive Scheme for Extraction of Symmetrical Components along with Harm...
IOSR Journals
Β 
J0335961
J0335961J0335961
J0335961
IOSR Journals
Β 
Knowledge Management in Software Enterprise
Knowledge Management in Software EnterpriseKnowledge Management in Software Enterprise
Knowledge Management in Software Enterprise
IOSR Journals
Β 
Why U.S. Bank Lost Its Case against Ibanez on a Foreclosed Property
Why U.S. Bank Lost Its Case against Ibanez on a Foreclosed Property Why U.S. Bank Lost Its Case against Ibanez on a Foreclosed Property
Why U.S. Bank Lost Its Case against Ibanez on a Foreclosed Property
David Zak Lawyer
Β 
Performance Analysis of New Light Weight Cryptographic Algorithms
Performance Analysis of New Light Weight Cryptographic  AlgorithmsPerformance Analysis of New Light Weight Cryptographic  Algorithms
Performance Analysis of New Light Weight Cryptographic Algorithms
IOSR Journals
Β 

Viewers also liked (20)

G0345259
G0345259G0345259
G0345259
Β 
Context Based Web Indexing For Semantic Web
Context Based Web Indexing For Semantic WebContext Based Web Indexing For Semantic Web
Context Based Web Indexing For Semantic Web
Β 
Network Lifespan Maximization For Wireless Sensor Networks Using Nature-Inspi...
Network Lifespan Maximization For Wireless Sensor Networks Using Nature-Inspi...Network Lifespan Maximization For Wireless Sensor Networks Using Nature-Inspi...
Network Lifespan Maximization For Wireless Sensor Networks Using Nature-Inspi...
Β 
Data Classification Algorithm Using k-Nearest Neighbour Method Applied to ECG...
Data Classification Algorithm Using k-Nearest Neighbour Method Applied to ECG...Data Classification Algorithm Using k-Nearest Neighbour Method Applied to ECG...
Data Classification Algorithm Using k-Nearest Neighbour Method Applied to ECG...
Β 
Chaos Based Direct Public Verifiable Signcryption Scheme
Chaos Based Direct Public Verifiable Signcryption SchemeChaos Based Direct Public Verifiable Signcryption Scheme
Chaos Based Direct Public Verifiable Signcryption Scheme
Β 
Motivation for Green Computing, an Analytical Approach
Motivation for Green Computing, an Analytical ApproachMotivation for Green Computing, an Analytical Approach
Motivation for Green Computing, an Analytical Approach
Β 
Searching and Analyzing Qualitative Data on Personal Computer
Searching and Analyzing Qualitative Data on Personal ComputerSearching and Analyzing Qualitative Data on Personal Computer
Searching and Analyzing Qualitative Data on Personal Computer
Β 
Shakira 4 1
Shakira 4 1Shakira 4 1
Shakira 4 1
Β 
Studying the Impact of the Solar Activity on the Maximum Usable Frequency Pa...
Studying the Impact of the Solar Activity on the Maximum  Usable Frequency Pa...Studying the Impact of the Solar Activity on the Maximum  Usable Frequency Pa...
Studying the Impact of the Solar Activity on the Maximum Usable Frequency Pa...
Β 
D0941824
D0941824D0941824
D0941824
Β 
Survey: Problems Related to Human in Software Projects
Survey: Problems Related to Human in Software ProjectsSurvey: Problems Related to Human in Software Projects
Survey: Problems Related to Human in Software Projects
Β 
E0532630
E0532630E0532630
E0532630
Β 
Analysis of Rate Based Congestion Control Algorithms in Wireless Technologies
Analysis of Rate Based Congestion Control Algorithms in Wireless TechnologiesAnalysis of Rate Based Congestion Control Algorithms in Wireless Technologies
Analysis of Rate Based Congestion Control Algorithms in Wireless Technologies
Β 
A Distinctive Scheme for Extraction of Symmetrical Components along with Harm...
A Distinctive Scheme for Extraction of Symmetrical Components along with Harm...A Distinctive Scheme for Extraction of Symmetrical Components along with Harm...
A Distinctive Scheme for Extraction of Symmetrical Components along with Harm...
Β 
C0441923
C0441923C0441923
C0441923
Β 
J0335961
J0335961J0335961
J0335961
Β 
Knowledge Management in Software Enterprise
Knowledge Management in Software EnterpriseKnowledge Management in Software Enterprise
Knowledge Management in Software Enterprise
Β 
C0461624
C0461624C0461624
C0461624
Β 
Why U.S. Bank Lost Its Case against Ibanez on a Foreclosed Property
Why U.S. Bank Lost Its Case against Ibanez on a Foreclosed Property Why U.S. Bank Lost Its Case against Ibanez on a Foreclosed Property
Why U.S. Bank Lost Its Case against Ibanez on a Foreclosed Property
Β 
Performance Analysis of New Light Weight Cryptographic Algorithms
Performance Analysis of New Light Weight Cryptographic  AlgorithmsPerformance Analysis of New Light Weight Cryptographic  Algorithms
Performance Analysis of New Light Weight Cryptographic Algorithms
Β 

Similar to F01113945

A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
IJTET Journal
Β 
A Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud ComputingA Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud Computing
IJMER
Β 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
IJTET Journal
Β 
A017620123
A017620123A017620123
A017620123
IOSR Journals
Β 
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
iosrjce
Β 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
AIRCC Publishing Corporation
Β 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
AIRCC Publishing Corporation
Β 
improve cloud security
improve cloud securityimprove cloud security
improve cloud security
Balkees Shereek
Β 
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
ijsrd.com
Β 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Editor IJMTER
Β 
Data Security in Cloud Computing Using Linear Programming
Data Security in Cloud Computing Using Linear ProgrammingData Security in Cloud Computing Using Linear Programming
Data Security in Cloud Computing Using Linear Programming
IOSR Journals
Β 
Excellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingExcellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computing
Editor IJMTER
Β 
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...
JPINFOTECH JAYAPRAKASH
Β 
Privacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage DevicesPrivacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage Devices
IOSR Journals
Β 
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Harnessing the cloud for securely outso...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Harnessing the cloud for securely outso...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Harnessing the cloud for securely outso...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Harnessing the cloud for securely outso...
IEEEGLOBALSOFTTECHNOLOGIES
Β 
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...
IEEEFINALYEARPROJECTS
Β 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud Computing
IOSR Journals
Β 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
eSAT Journals
Β 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Editor IJMTER
Β 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
eSAT Publishing House
Β 

Similar to F01113945 (20)

A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
Β 
A Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud ComputingA Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud Computing
Β 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
Β 
A017620123
A017620123A017620123
A017620123
Β 
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
Β 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Β 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
Β 
improve cloud security
improve cloud securityimprove cloud security
improve cloud security
Β 
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Β 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Β 
Data Security in Cloud Computing Using Linear Programming
Data Security in Cloud Computing Using Linear ProgrammingData Security in Cloud Computing Using Linear Programming
Data Security in Cloud Computing Using Linear Programming
Β 
Excellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingExcellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computing
Β 
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Β 
Privacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage DevicesPrivacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage Devices
Β 
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Harnessing the cloud for securely outso...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Harnessing the cloud for securely outso...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Harnessing the cloud for securely outso...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Harnessing the cloud for securely outso...
Β 
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Β 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud Computing
Β 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
Β 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Β 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
Β 

More from IOSR Journals

A011140104
A011140104A011140104
A011140104
IOSR Journals
Β 
M0111397100
M0111397100M0111397100
M0111397100
IOSR Journals
Β 
L011138596
L011138596L011138596
L011138596
IOSR Journals
Β 
K011138084
K011138084K011138084
K011138084
IOSR Journals
Β 
J011137479
J011137479J011137479
J011137479
IOSR Journals
Β 
I011136673
I011136673I011136673
I011136673
IOSR Journals
Β 
G011134454
G011134454G011134454
G011134454
IOSR Journals
Β 
H011135565
H011135565H011135565
H011135565
IOSR Journals
Β 
F011134043
F011134043F011134043
F011134043
IOSR Journals
Β 
E011133639
E011133639E011133639
E011133639
IOSR Journals
Β 
D011132635
D011132635D011132635
D011132635
IOSR Journals
Β 
C011131925
C011131925C011131925
C011131925
IOSR Journals
Β 
B011130918
B011130918B011130918
B011130918
IOSR Journals
Β 
A011130108
A011130108A011130108
A011130108
IOSR Journals
Β 
I011125160
I011125160I011125160
I011125160
IOSR Journals
Β 
H011124050
H011124050H011124050
H011124050
IOSR Journals
Β 
G011123539
G011123539G011123539
G011123539
IOSR Journals
Β 
F011123134
F011123134F011123134
F011123134
IOSR Journals
Β 
E011122530
E011122530E011122530
E011122530
IOSR Journals
Β 
D011121524
D011121524D011121524
D011121524
IOSR Journals
Β 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
Β 
M0111397100
M0111397100M0111397100
M0111397100
Β 
L011138596
L011138596L011138596
L011138596
Β 
K011138084
K011138084K011138084
K011138084
Β 
J011137479
J011137479J011137479
J011137479
Β 
I011136673
I011136673I011136673
I011136673
Β 
G011134454
G011134454G011134454
G011134454
Β 
H011135565
H011135565H011135565
H011135565
Β 
F011134043
F011134043F011134043
F011134043
Β 
E011133639
E011133639E011133639
E011133639
Β 
D011132635
D011132635D011132635
D011132635
Β 
C011131925
C011131925C011131925
C011131925
Β 
B011130918
B011130918B011130918
B011130918
Β 
A011130108
A011130108A011130108
A011130108
Β 
I011125160
I011125160I011125160
I011125160
Β 
H011124050
H011124050H011124050
H011124050
Β 
G011123539
G011123539G011123539
G011123539
Β 
F011123134
F011123134F011123134
F011123134
Β 
E011122530
E011122530E011122530
E011122530
Β 
D011121524
D011121524D011121524
D011121524
Β 

Recently uploaded

Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
Β 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
Β 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
Β 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
Β 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
Β 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
Β 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
Β 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
Β 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
Β 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
Β 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
Β 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
Β 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
Β 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
Β 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
Β 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
Β 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
Β 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
Β 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
Β 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
Β 

Recently uploaded (20)

Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Β 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
Β 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Β 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Β 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Β 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Β 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Β 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
Β 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
Β 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
Β 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Β 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Β 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Β 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
Β 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Β 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Β 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
Β 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Β 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Β 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
Β 

F01113945

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 11, Issue 1 (May. - Jun. 2013), PP 39-45 www.iosrjournals.org www.iosrjournals.org 39 | Page Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic Curves Jahnvi S. Kapadia1 , Prof. Mehul P. Barot2 1 (Computer engineering, LDRP ITR, Gandhinagar/GTU university, India) 2 (Computer engineering, LDRP ITR, Gandhinagar/GTU university, India) Abstract : Cloud computing is a computing paradigm that involves outsourcing of computing resources with the capabilities of expendable resource scalability, on-demand provisioning with little or no up-front IT infrastructure investment costs. It has recently emerged as a promising hosting platform that performs an intelligent usage of a collection of services, applications, information and infrastructure comprised of pools of computer, network, information and storage resources. However along with these advantages, storing a large amount of data including critical information on the cloud motivates highly skilled hackers thus creating a need for the security to be considered as one of the top issues while considering Cloud Computing. In the cloud storage model, data is stored on multiple virtualized servers. Physically the resources will span multiple servers and can even span storage sites. We have proposed an effective scheme to ensure the correctness of user’s data on cloud data storage and public verifiability without demanding user’s time, feasibility or resources. Whenever data corruption is detected during the storage correctness verification, this scheme can almost guarantee the simultaneous localization of data errors and the identification of the misbehaving server(s). Keywords - Elliptic Curves, Homomorphic, Signcryption, Unsigncryption. I. INTRODUCTION Let's say you're an executive at a large corporation. Your particular responsibilities include making sure that all of your employees have the right hardware and software they need to do their jobs. Buying computers for everyone isn't enough; you also have to purchase software or software licenses to give employees the tools they require. Whenever you have a new hire, you have to buy more software or make sure your current software license allows another user. It's a stressful work. Soon, there may be an alternative for executives like you. Instead of installing a suite of software for each computer, you'd only have to load one application. That application would allow workers to log into a Web-based service which hosts all the programs the user would need for his or her job. Remote machines owned by another company would run everything from e-mail to word processing to complex data analysis programs. It's called cloud computing, and it could change the entire computer industry. Cloud computing is a computing paradigm that involves outsourcing of computing resources with the capabilities of expendable resource scalability, on-demand provisioning with little or no up-front IT infrastructure investment costs[1]. It has recently emerged as a promising hosting platform that performs an intelligent usage of a collection of services, applications, information and infrastructure comprised of pools of computer, network, information and storage resources. Moving data into the cloud offers great convenience to users since they donβ€Ÿt have to care about the complexities of direct hardware management. The pioneer of Cloud Computing vendors, Amazon Simple Storage Service (S3) and Amazon Elastic Compute Cloud (EC2) [web- ensuring] are both well known examples. While these internet-based online services do provide huge amounts of storage space and customizable computing resources, this computing platform shift, however, is eliminating the responsibility of local machines for data maintenance at the same time. As a result, users are at the mercy of their cloud service providers for the availability and integrity of their data. However along with this advantage of storing a large amount of data including critical information on the cloud motivates highly skilled hackers and creates a need for the security to be considered as one of the top issues while considering Cloud Computing. Data security for such a cloud service encompasses several aspects including secure channels, access controls, and encryption. And, when we consider the security of data in a cloud, we must consider the security triad: confidentiality, integrity, and availability [2]. In the cloud storage model, data is stored on multiple virtualized servers. Physically the resources will span multiple servers and can even span storage sites. Thus an effective scheme to ensure the correctness of userβ€Ÿs data on cloud must be utilized.
  • 2. Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic Curves www.iosrjournals.org 40 | Page The scheme proposed here relies on erasure-correcting code in the file distribution preparation to provide redundancies and guarantee the data dependability. By utilizing the homomorphic token with distributed verification of erasure-coded data, this scheme achieves the storage correctness insurance as well as data error localization. Whenever data corruption has been detected during the storage correctness verification, this scheme can almost guarantee the simultaneous localization of data errors and the identification of the misbehaving server(s).The key feature of this scheme is that it uses signcryption/unsigncryption schemes based on elliptic curves to enforce public verifiability which is an enhancement to a previously described cloud system model in [3] II. PROPOSED SYSTEM 1. SYSTEM’S COMPONENTS Representative network architecture for cloud data storage for the system we have proposed is illustrated in figure 1. Four different network entities of this system can be identified as follows:  User: users, who have data to be stored in the cloud and rely on the cloud for data computation, consist of both individual consumers and organizations.  Cloud Service Provider (CSP): a CSP, who has significant resources and expertise in building and managing distributed cloud storage servers, owns and operates live Cloud Computing systems.  Authentication Server (AS): an authentication server, who has expertise and capabilities that users may not have, is trusted to assess and expose risk of cloud storage services on behalf of the users upon request.  Certificate Authority (CA): a certification authority provides certificates for authentication and identification to User and AS. In cloud data storage, a user stores his data through a CSP into a set of cloud servers, which are running in a simultaneous, cooperated and distributed manner. Data redundancy can be employed with technique of erasure-correcting code to further tolerate faults or server crash as userβ€Ÿs data grows in size and importance. Thereafter, for application purposes, the user interacts with the cloud servers via CSP to access or retrieve his data. In some cases, the user may need to perform block level operations on his data. The most general forms of these operations considered are block update, delete, insert and append. As users no longer possess their data locally, it is of critical importance to assure users that their data are being correctly stored and maintained. That is, users should be equipped with security means so that they can make continuous correctness assurance of their stored data even without the existence of local copies. As the users do not necessarily have the time, feasibility or resources to monitor their data, this task is delegated the Authentication Server which uses signcryption scheme based on Elliptic Curves has been used for this purpose. One of the key issues is to effectively detect any unauthorized data modification and corruption, possibly due to server compromise and/or random Byzantine failures [3]. Besides, in the distributed case when such inconsistencies are successfully detected, to find which server the data error lies in is also of great significance, since it can be the first step to fast recover the storage errors. To address these problems, the main scheme for ensuring cloud data storage is presented in next section. Fig 1: proposed system model
  • 3. Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic Curves www.iosrjournals.org 41 | Page 1.1 NOTATION AND PRELIMINARIES Domain parameters of the proposed scheme consist of a suitably selected elliptic curve E defined over a finite field Fq with the Weierstrass equation of the form y2 = x3 + ax + b and a base point G Π„ E(Fq ) in which q is a large prime number. In order to make the elliptic curve non-singular, a,b Π„ Fq should satisfy 4a3 + 27b2 β‰  0(mod q) . To guard against small subgroup attacks, the point G should be of a prime order n or equivalently, nG = O where O denotes the point of elliptic curve at infinity, and we should have n > 4 √q. To protect against other known attacks on special classes of elliptic curves, n should not divide qi -1 for all 1 ≀ i ≀V (V = 20 suffices in practice), n β‰  q should be satisfied, and the curve should be non-super singular [4].To retain the intractability of ECDLP, n should at least satisfy n > 2160 for the common applications. WU: A randomly select integer which is a Private Key of User (π‘ŠU Π„R[1, 𝑛 βˆ’ 1]) WU: Public Key of User calculates as WU = wUG IDU: A unique User identifier. WA: A randomly select integer which is a Private Key of AS (π‘ŠA Π„R[1, 𝑛 βˆ’ 1]). WA: Public Key of User calculates as WA = wAG IDA: A unique AS identifier. CertU: Digital certificate for public key of user from CA CertA: Digital certificate for public key of AS from CA If CA is not involved in the public key generation, it is necessary for CA to verify that each entity really possesses the corresponding private key of its claimed public key. This can be accomplished by a zero- knowledge technique. It should also be verified that the public keys belong to the main group. 𝐅: The data file to be stored. It is assumed that 𝐹 can be denoted as a matrix of π‘š equal-sized data vectors, each consisting of 𝑙 blocks. Data blocks are all well represented as elements in Galois Field 𝐺𝐹(2𝑝) for 𝑝 = 8 π‘œπ‘Ÿ 16. 𝐀: The dispersal matrix used for Reed-Solomon coding. 𝐆: The encoded file matrix, which includes a set of 𝑛 = π‘š + π‘˜ vectors, each consisting of 𝑙 blocks. π’‡π’Œπ’†π’š(Β·): Pseudorandom function (PRF), which is defined as 𝑓 ∢ {0, 1} βˆ— Γ— π‘˜π‘’π‘¦ β†’ 𝐺𝐹(2𝑝). Π€π’Œπ’†π’š (Β·): Pseudorandom permutation (PRP), which is defined as Π€: {0, 1}π‘™π‘œπ‘”2(𝑙) Γ— π‘˜π‘’π‘¦ β†’ {0, 1} π‘™π‘œπ‘”2(𝑙). 𝑽𝒆𝒓: A version number bound with the index for individual blocks, which records the times the block has been modified. Initially it is assumed that π‘£π‘’π‘Ÿ is 0 for all data blocks. 𝑺 π’Šπ’‹ 𝒗𝒆𝒓: The seed for PRF, which depends on the file name, block index𝑖, the server position 𝑗 as well as the optional block version numberπ‘£π‘’π‘Ÿ. 1.2 PHASES AND FLOW OF THE PROPOSED SCHEME Different phases of the scheme where different techniques applied and the flow of data distribution, encryption and authentication is listed as follows: Phase 1: file distribution preparation.  Done by user  Using erasure-correcting code Phase 2: Token Pre-computation.  Done by User  Homomorpic tokens are generated using token pre-computation algorithm Phase 3: Signcryption of pre-computed Tokens.  Done by User  Using Signcrption Scheme based on elliptic curves Phase 4: Unsigncryption of Tokens.  Done by AS  Using Unsigncryption Scheme Phase 5: Correctness Verification and Error Localization.  Using Challenge Token Pre-computation algorithm Phase 6: File Retrieval and Error Recovery.  Using Error Recovery algorithm III. FILE DISTRIBUTION PREPARATION It is well known that erasure-correcting code may be used to tolerate multiple failures in distributed storage systems. In cloud data storage, we relay on this technique to disperse the data file 𝐹 redundantly across a set of 𝑛 = π‘š + π‘˜ distributed servers. A (π‘š + π‘˜, π‘˜) Reed-Solomon erasure-correcting code is used to create k
  • 4. Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic Curves www.iosrjournals.org 42 | Page redundancy parity vectors from π‘š data vectors in such a way that the original π‘š data vectors can be reconstructed from any π‘š out of the m + k data and parity vectors. By placing each of the m + k vectors on a different server, the original data file can survive the failure of any π‘˜ of the π‘š + π‘˜ servers without any data loss, with a space overhead of π‘˜/π‘š. For support of efficient sequential I/O to the original file, our file layout is systematic, i.e., the unmodified π‘š data file vectors together with π‘˜ parity vectors are distributed across π‘š + π‘˜ different servers [3]. Let 𝑭 = (𝐹1, 𝐹2, . . . , πΉπ‘š) and 𝐹𝑖 = (𝑓1𝑖, 𝑓2𝑖, . . . , 𝑓𝑙𝑖)𝑇 (𝑖 ∈ {1, . . . , π‘š}), where 𝑙 ≀ 2𝑝 βˆ’ 1. Note all these blocks are elements of 𝐺𝐹(2𝑝). The systematic layout with parity vectors is achieved with the information dispersal matrix𝐴, derived from π‘š Γ— (π‘š + π‘˜) Vandermonde matrix. , where 𝛽𝑗 (𝑗 ∈ {1, . . . , 𝑛}) are distinct elements randomly picked from𝐺𝐹(2𝑝). After a sequence of elementary row transformations, the desired matrix 𝐴 can be written as Where 𝐼 is a π‘š Γ— π‘š identity matrix and 𝑃 is the secret parity generation matrix with size π‘š Γ— π‘˜. Note that 𝐴 is derived from a Vandermonde matrix, thus it has the property that any π‘š out of the π‘š + π‘˜ columns form an invertible matrix. By multiplying 𝑭 by 𝑨, the user obtains the encoded file: 𝐺 = 𝐹 Β· 𝐴 = (𝐺(1), 𝐺(2), . . . , 𝐺(π‘š), 𝐺(π‘š + 1), . . . , 𝐺(𝑛)) = (𝐹1, 𝐹2, . . . , πΉπ‘š, 𝐺(π‘š + 1), . . . , 𝐺(𝑛)), where 𝐺(𝑗) = (𝑔(𝑗)1 , 𝑔(𝑗)2 , . . . , 𝑔(𝑗) 𝑙 )𝑇 (𝑗 ∈ {1, . . . , 𝑛}). As noticed, the multiplication reproduces the original data file vectors of 𝑭 and the remaining part (𝐺 π‘š + 1,…,𝐺(𝑛)) are π‘˜ parity vectors generated based on 𝑭. IV. CHALLENGE TOKEN PRECOMPUTATION In order to achieve assurance of data storage correctness and data error localization simultaneously, this scheme entirely relies on the pre-computed verification tokens. The main idea is as follows: before file distribution the user pre-computes a certain number of short verification tokens on individual vector G(j) (j ∈ {1, . . . , n}), each token covering a random subset of data blocks. Later, when the user wants to make sure the storage correctness for the data in the cloud, he challenges the cloud servers with a set of randomly generated block indices. Upon receiving challenge, each cloud server computes a short β€œsignature” over the specified blocks and returns them to the user. The values of these signatures should match the corresponding tokens pre- computed by the user. Meanwhile, as all servers operate over the same subset of the indices, the requested response values for integrity check must also be a valid codeword determined by secret matrix P. Suppose the user wants to challenge the cloud servers 𝑑 times to ensure the correctness of data storage. Then, he must pre-compute 𝑑 verification tokens for each 𝐺(𝑗) (𝑗 ∈ {1, . . . , 𝑛}), using a PRF 𝑓(Β·), a PRP Π€(Β·), a challenge key π‘˜π‘π‘•π‘Žπ‘™ and a master permutation key 𝐾PRP. To generate the 𝑖th token for server 𝑗, the user acts as follows: 1. Derive a random challenge value ⍺i of GF(2p ) by ⍺i = fkchal (i) and a permutation key k(i) prp based on KPRP . 2. Compute the set of π‘Ÿ randomly-chosen indices: {πΌπ‘ž ∈ [1, . . . , 𝑙]|1 ≀ π‘ž ≀ π‘Ÿ},where Iq = Π€kprp (i) (q). 3. Calculate the token as: Note that v(j)i , which is an element of GF(2p) with small size, is the response the user expects to receive from server j when he challenges it on the specified data blocks. The details of token generation are shown in Algorithm 1.
  • 5. Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic Curves www.iosrjournals.org 43 | Page Algorithm 3.1: Token Pre-computation V. SIGNCRYPTION OF PRE-COMPUTED TOKENS After token generation, the user generates the signcrypted text (R,C, s) by following the below steps [4][5]: 1) Checks the validity of CertA and uses it for verifying WA. The process of certificate validation includes: a. Verifying the integrity and authenticity of the certificate by verifying the CA's signature on the certificate. b. Verifying that the certificate is not expired. c. Verifying that the certificate is not revoked. 2) Randomly selects an integer π‘Ÿ Π„R[1, 𝑛 βˆ’ 1] . 3) Computes 𝑅 = π‘ŸπΊ where 𝑅 = (xR , yR ) in which xR / yR denotes the π‘₯/𝑦-coordinate of the point 𝑅. 4) Computes 𝐾 = (r + ẍRwU )WA where 𝐾 = (xK , yK ) ,and in which is the bit length of n, denotes the floor, and indicates the ceiling. If 𝐾 = 𝑂 user goes back to step 2 otherwise, it drives the session key of encryption as k = H(xK || IDU || yK || IDc ) in which H is a oneway hash function that generates the required number of bits as the secret key of deployed symmetric encryption algorithm, and || denotes the concatenation. 5) Computes the ciphertext as 𝐢 = πΈπ‘˜ (𝑀) in which Ek(.) denotes a strong symmetric encryption algorithm (e.g. AES) that uses session key k for the encryption. 6) Computes the digital signature as 𝑠 = 𝑑𝑀A βˆ’ π‘Ÿ(π‘šπ‘œπ‘‘ 𝑛) in which t = H(C || xR || IDU || yR || IDc ) . 7) Sends the signcrypted text i.e token (R,C, s) to Authentication Server. VI. UNSIGNCRYPTION OF TOKENS. AS who received the signcrypted text (R,C, s) , follows the below steps to extract the plaintext and verify the signature[4][5]: 1) Checks the validity of CertU and uses it for verifying WU. 2) Computes K = wA (R + ẍRWU ) = (xK , yK ) and derives the session key as k = H(xK || IDU || yK || IDA ) . 3) Decrypts the ciphertext as 𝑀 = 𝐷k (𝐢). 4) Computes t = H(C || xR || IDU || yR || IDA). 5) Accepts M as the correct plaintext of User if and only if 𝑠𝐺 + 𝑅 = π‘‘π‘Šπ΄ .Otherwise, he rejects M. Once all tokens are computed, sent encrypted and success acknowledgement message is received from AS to User, the final step before file distribution is to blind each parity block gi (j) in (𝐺(π‘š + 1), . . . , 𝐺(𝑛)) by 𝑔(𝑗)𝑖 ← 𝑔(𝑗) 𝑖 + π‘“π‘˜π‘— (𝑠𝑖𝑗 ), 𝑖 ∈ {1, . . . , 𝑙}, where π‘˜j is the secret key for parity vector 𝐺(𝑗) (𝑗 ∈ {π‘š +
  • 6. Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic Curves www.iosrjournals.org 44 | Page 1, . . . , 𝑛}). This is for protection of the secret matrix 𝑃. After blinding the parity information, the user disperses all the 𝑛 encoded vectors 𝐺(𝑗) (𝑗 ∈ {1, . . . , 𝑛}) across the cloud servers 𝑆1, 𝑆2, . . . , 𝑆𝑛. VII. CORRECTNESS VERIFICATION AND ERROR LOCALIZATION Error localization is a key prerequisite for eliminating errors in storage systems. However, many previous schemes do not explicitly consider the problem of data error localization, thus only provide binary results for the storage verification. Proposed scheme outperforms those by integrating the correctness verification and error localization in the challenge-response protocol: the response values from servers for each challenge not only determine the correctness of the distributed storage, but also contain information to locate potential data error(s). Specifically, the procedure of the i-th challenge-response for a cross-check over the 𝑛 servers is described as follows:  The user reveals the ⍺i as well as the i-th permutation key k(i) prp to each servers.  The server storing vector G(j) aggregates those π‘Ÿ rows specified by index k(i) prp into a linear combination:  Upon receiving R(j) is from all the servers, the user takes away blind values in R(j) (j ∈ {m+ 1, . . . , n}) by:  Then the user verifies whether the received values remain a valid codeword determined by secret matrix P: Because all the servers operate over the same subset of indices, the linear aggregation of these r specified rows (R(1)i , . . . ,R(n)i ) has to be a codeword in the encoded file matrix. If the above equation holds, the challenge is passed. Otherwise, it indicates that among those specified rows, there exist file block corruptions. Once the inconsistency among the storage has been successfully detected, one can rely on the pre-computed verification tokens to further determine where the potential data error(s) lies in. Note that each response R(j) i is computed exactly in the same way as token v(j) i , thus the user can simply find which server is misbehaving by verifying the following n equations: Algorithm 2 gives the details of correctness verification and error localization. Algorithm 2
  • 7. Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic Curves www.iosrjournals.org 45 | Page VIII. FILE RETRIEVAL AND ERROR RECOVERY Since the layout of file matrix is systematic, the user can reconstruct the original file by downloading the data vectors from the first m servers, assuming that they return the correct response values. Notice that the verification scheme is based on random spot-checking, so the storage correctness assurance is a probabilistic one. However, by choosing system parameters (e.g., r, l, t) appropriately and conducting enough times of verification, this scheme can guarantee the successful file retrieval with high probability. On the other hand, whenever the data corruption is detected, the comparison of pre-computed tokens and received response values can guarantee the identification of misbehaving server(s), again with high probability, which will be discussed shortly. Therefore, the user can always ask servers to send back blocks of the r rows specified in the challenge and regenerate the correct blocks by erasure correction, shown in Algorithm 3, as long as there are at most k misbehaving servers are identified. The newly recovered blocks can then be redistributed to the misbehaving servers to maintain the correctness of storage. Algorithm 3 IX. CONCLUSION Cloud Computing is gaining remarkable popularity in the recent years for its benefits in terms of flexibility, scalability, reliability and cost effectiveness. Despite all the promises however, Cloud Computing has one problem, Security so in this thesis, we have studied the problem of data security in cloud data storage, various schemes proposed to ensure the correctness of usersβ€Ÿs data in the cloud server and have proposed a scheme which includes Public Verifiability using signcryption. In this scheme signature generation algorithm and key pair generation algorithm needs a random number to be generated. Using this random number as seed private keys is generated. Similarly secret integer β€žKβ€Ÿ generated during signature verification algorithm should also be random in nature. An attacker can exploit this vulnerability if the algorithm used to generate the random number is not cryptographically secure i.e. it should be unpredictable. So probability of any given value being selected should be very small. As a future scope of this work cryptographically secure random number should be included while generating private keys. REFERENCES [1] Keane an NTT DATA Company, β€œCloud Computing”. [2] K. Kajendran, J.James Jeyaseelan J. Jakkulin Joshi, β€œAn Approach For Secured Data Storage Using Cloud Computing”, International Journal of Computer Trends and Technology, 2011. [3] Cong Wang, Qian Wang, Kui Ren , Wenjing Lou, β€œEnsuring Data Storage Security in Cloud Computing”. [4] Yuliang Zheng, β€œSigncryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) +Cost(Encryption)”,1999. [5] Yuliang Zheng, Hideki Imai, β€œHow to construct efficient signcryption schemes on elliptic curves”, Information Processing Letters 68 (1998) 227–233,1988.