SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 883
A Survey on Remote Data Possession Verification Protocol in Cloud
Storage
Sandesh R1, Shashi Rekha H2
1Fourth Sem M.Tech, Department of Studies in CS&E, VTU PG Center, Mysuru
2Assistant professor, Department of Studies in CS&E, VTU PG Center, Mysuru
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract –As a leading cloud computing application, cloud
storage offers scalable, flexible, and high quality services for
data storage and processing. An increasing number of data
owners are choosing to outsource data files to the cloud.
Because cloud storage servers are not completely reliable,
data owners need reliable tools to verify that their files are
outsourced to remote cloud servers. To solve this crucial
problem, a Remote Data Possession Verification (RDPV)
protocol has been introduced. But many existing systemshave
vulnerabilities in data efficiency or dynamics. In this article,
we provide a new efficient RDPV protocol based on the
homomorphic hash function. The new system is surely secure
against forgery attacks, replacing attacks by attack and copy
based on a typical security model. To support data dynamics,
an ORT (Operations Record Table) is introduced to track file
block operations. We also provide a new optimized
implementation for ORT that makes ORT access costs almost
constant. In addition, we perform a complete performance
analysis that shows that our system has advantages in terms
of calculation and communication costs. The implementation
of the prototype and the experiments show that the scheme is
feasible for real applications.
Key Words: Cloud computing, RDPV: Remote Data
Possession Verification, ORT: Operation Record Table,
Data Dynamics, Homomorphic Hash Functions.
1. INTRODUCTION
Cloud computing appears as a new paradigm of
calculation after grid computing. By managing a large
number of computing resources across the Internet, it has a
huge computing capacity and virtualized storage space. Asa
result, cloud computing is widely accepted and usedinmany
real world applications. Asa leading cloud service, the cloud
service provider provides users with reliable, scalable and
low-cost outsourced storage services. It providesuserswith
a more flexible means called pay-as-you-go model for
computing and on-demand storage resources. Based on this
model, users can engage the necessary IT infrastructure for
initial user investments that will be significantly reduced. In
addition, it is convenient for them to adjust the capacity of
the leased resource by changing the scale of their
applications.
The cloud service provider tries to provide a
promising service for data storage, saving users the
investment and resource costs. However, cloud storage also
involves various security issues for outsourced data.
Although some security issues have been resolved,
important issues related to data falsification and data loss
are still present in cloud storage. On the one hand, the crash
disk error or the cloud storage server (CSS) hardwarefailure
can cause unexpected corruption of outsourced files. On the
other hand, CSS is not completely reliable from the point of
view of the data owner; it can actively delete or modify files
for huge economic benefits. At the same time, CSS can hide
the data owner's incorrect behavior and data loss incidents
in order to maintain a good reputation. Therefore, it is
crucial that the data owner uses an effective means of
verifying the integrity of data outsourcing.
Remote Data Possession Verification Protocol
(RDPV) isan effective technique for ensuring the integrityof
data files stored on CSS. RDPV provides a data owner
method to effectively check whether the cloud service
provider is faithfully storing the original files without
recovering them. In RDPV, the data owner can challenge the
CSS on the integrity of the destination file. CSS can generate
evidence to show that it maintains complete and incorrect
data. The basic requirement is that the data ownercanverify
the integrity of the files without accessing the complete
original file. Another desired requirement is that dynamic
data operations must be supported by the protocol. In
general, the data owner can add, insert, delete, or modifyfile
blocks as needed. In addition, the complexity of the
calculation and the communicationoverhead oftheprotocol
must be taken into account for real applications.
2. RELATED WORK
Cloud computing is an emerging model in which
IT infrastructure resources are provided as a service on the
Internet. Data owners can outsource their data by remotely
storing them in the cloud and enjoying high-quality on-
demand services from a shared pool of configurable
computing resources. However, because data owners and
cloud servers are not in the same trusted domain,
outsourced data can be at risk because the cloud serverisno
longer fully reliable. Therefore, the confidentiality,
availability and integrity of the data are of crucial
importance in such a scenario. The data owner encrypts the
data before storing it on the cloud to ensure data privacy.
The cloud should allow owners or a trusted third party to
verify the integrity of their data storage without requiring a
local copy of the data. Owners often replicate their data
acrosscloud servers acrossmultipledatacenters toprovidea
higher level of scalability, availability, and durability. When
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 884
data owners request the cloud service provider (CSP) to
replicate data, they are charged higher storage fees by the
CSP. Therefore, data owners must strongly believe that the
CSP stores copies of data agreed in the SLA, and that data
updates have been successfully performed on all remote-
stored copies. To deal with such problems, previous multi-
copy verification schemesfocused on static filesorincurring
huge update costs in a dynamic file scenario. In this paper,
we propose a Dynamic Multi-Replicable Proving Data
Possession Scheme (DMR-PDP) that, while preserving data
confidentiality, prevents the CSP from cheating by keeping
fewer copies than paid and / or falsified. In addition, we are
also expanding the schema of support for a basic file
versioning system where only the difference between the
original file and the updated file is propagated rather than
the propagation of operations for reasons of confidentiality.
DMR-PDP also supports efficient dynamicoperationssuchas
block modification, insertion and deletion on replicas on
cloud servers. Through safety analysis and experimental
results, we demonstrate that the proposed system is secure
and works better than other recently published ideas [2].
In cloud computing, customers put large data files
on the cloud storage server unreliable, how to ensure that
the integrity of outsourced data becomes a big problem. To
solve this problem, Hao et al. proposed a protocol that
supports public verifiability and data dynamics. However,
the protocol of Hao et al. sufferstwo disadvantages. Firstthe
protocol of Hao et al. Not sure and cannot resist the active
opponent. Second, the protocol of Hao et al. Supports only
fixed-size blocks as a base unit. As a result, the insertion of a
short message will result in a considerable waste of storage
space. In this article, we propose an enhanced remote data
integrity verification protocol that can support blocks of
varying size. In addition, the enhanced protocol can
withstand the attack of the active adversary,anditisobvious
to verify that the enhanced protocol still preserves the
properties of the Hao et al. Like the public audit and the
confidentiality audit [9].
While storage outsourcing and resource sharing
networks have become popular, the problem of effectively
proving the integrity of data stored on untrusted servershas
received increased attention. In the Proving DataPossession
(PDP) model, the client preprocesses the data and then
sends it to an insecure server for storage, while retaining a
small amount of metadata. The client then asksthe server to
prove that the stored data has not been falsified or deleted
(without downloading actual data). However, the original
PDP schema applies only to static files (or append-only) [3].
The definition frameworkandeffectiveconstructs
for Proven Data Retention (DPDP), where it extendsthePDP
model to support provable updates to stored data. We use a
new version of authenticated dictionaries based on ranking
information. The price of dynamic updates is a change in
performance from O (1) to O (log n) (or O (n ǫ log n)), for a
file consisting of n blocks, while maintaining the same
probability (or better, respectively) detecting misbehavior.
Our experiments show that this slowdown is very low in
practice (for example, proof size of 415 KB and calculation
overhead of 30 ms for a 1 GB file). We also show how to
apply our DPDP system to outsourced file systems and
version control systems (for example, CVS).
Many storage systems rely on replication to increase the
availability and durability of data on unreliable storage
systems. At present, such storage systems provide no solid
evidence that multiple copiesof the data are actually stored.
Storage servers can get along to give the impression that
they store many copies of the data, when in reality they only
store one copy. We are remedying this gap through the
possession of multiple replicable provable data(MR-PDP):A
secure schema that allows a client that stores replicas of a
file in a storage system to verify through a replica protocol.
Only one can be produced at the time of the challenge and
the storage system uses one time the storage required to
store a single replica. MR-PDP extendsthe previousworkon
proof of data ownership for a single copy of a file in a client /
server storage system. Using MR-PDP to store replicas is
much more computationally efficient than using a single-
replica PDP schema to store unrelated separate files (for
example, by encrypting each file separately before store it).
Another advantage of MR-PDP is that it can generate other
replicason demand, at low cost, when some existingreplicas
fail [4].
The HAIL (High-Availability and Integrity Layer),
a distributed cryptographic system that allows a set of
servers to prove to a client that a stored file is intact and
recoverable. HAIL strengthens, formalizes and streamlines
the distinct approaches of cryptographic communities and
distributed systems. The HAIL proofs are efficiently
calculable by the servers and very compact - usually tens or
hundreds of bytes, regardless of the size of the file. HAIL
checks cryptographically and reactively reallocates the file
shares. It is robust against an active and mobile opponent,
that is to say capable of progressively corruptingall servers.
We propose a strong and formal accusatory model for HAIL,
as well as a rigorous analysis and choice of parameters. We
show how HAIL improves the security and efficiency of
existing tools, such as proof of retrievability (POR) deployed
on individual servers. We also report on a prototype
implementation [8].
3. PRELIMINARIS
A. System Framework
In cloud computing, cloud storage provides the
user with scalable, flexible and high quality data storageand
computing services. An increasing number of data owners
are choosing to outsource data filesto the cloud. Since cloud
storage servers are not completely reliable, data owners
need reliable ways to verify ownership of their outsourced
fileson remote cloud servers. We provide a newandefficient
RDPV protocol based on the homomorphic hashingfunction.
The new system is surely secure against falsificationattacks,
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 885
replaces attacks, and replays attacks based on a typical
security model. To support data dynamics, an ORT
(Operation Record Table) is introduced to track file block
operations. the cloud storage system consisting of two
participants: CSS and data owner. CSS has powerful storage
and compute capabilities, it accepts data owner requests to
store externalized data files and providesaccessservice.The
data owner benefits from the CSS service and puts a large
amount of CSS files without backup copieslocally. AstheCSS
is not supposed reliable and sometimes behaves badly.
B. Remote Data Possession Checking Protocol
Remote Data Possession Verification(RDPV)isan
effective technique for ensuring the integrity of data files
stored on CSS. RDPV provides a method for the data owner
to effectively check if the cloud service provider is faithfully
storing the original files without recovering them. In RDPV,
the data owner can challenge the CSS on the integrity of the
target file. CSS can generate evidence to prove that it keeps
the data complete and uncorrupted. The basic requirement
is that the data owner can perform file integrity checking
without accessing the complete original file. In addition, the
protocol must withstand the malicious server attempting to
verify the integrity of the data without accessing the
complete and uncorrupted data. Because CSS is not
supposed to be reliable and sometimes behaves badly, for
example by modifying or deleting partial data files, the data
owner can effectively check the integrity of the outsourced
data. An RDPV schema includes the following process. They
are KeyGen, TagGen, Challenge, ProofGen, Check,
PrepareUpdate, ExecUpdate.
C. Homomorphic Hash Function
The RDPV scheme uses a homomorphic hash
function technique, in which the hash value of the sum for
two blocks is equal to the product for two hash values of the
corresponding blocks. We introduce alineartablecalledORT
to record data operations to support data dynamics such as
block modification, block insertion, and block deletion. To
improve the efficiency of accessto ORT, the table is reserved
on the data owner side and used to record all dynamic
behaviors on the file blocks. We use a doubly linked list and
matrix to present an optimized implementation of ORT that
reduces the cost to an almost constant level. We prove that
the presented system is secure against forgery attacks,
replay attacks, and replace attacks based on a typical
security model.
4. CONCLUSION
In this article, we examine the problem of controlling the
integrity of remote-processed data filestotheremoteserver,
and we propose an efficient and secure RDPV protocol with
dynamic data. Our schema uses a homomorphic hash
function to check the integrity of the files stored on the
remote server and reduces the storage costs and
computational costs of the data owner. We are designing a
new lightweight RDPV protocol to support dynamic block
operations that result in minimal computational costs by
reducing the number of node moves. Thankstoournewdata
structure, the data owner can perform file insertion,
modification or deletion operations with great efficiency.
The presented schema is safe in the existing security model.
The results of the experiment will indicate that oursystemis
convenient in cloud storage
ACKNOWLEDGEMENT
The author would like to thank Dr. K Thippeswamy,
Professor and chairman, Dept. of studiesincomputerscience
and engineering, VTU Regional office, Mysuru and
anonymous reviewers encouragement and constructive
piece of advice that of prompted us for new round of
rethinking of our research, additional experiments and
clearer presentation of technical content.
REFERENCES
[1]. R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, and I.
Brandic,“Cloud computing and emerging IT platforms:
Vision, hype, and reality for delivering computing as
the 5th utility,” Future Gener. Comp. Sy., vol. 25, no. 6,
pp. 599 – 616, 2016.
[2]. R. Mukundan, S. Madria and M. Linderman, ‘‘Efficient
integrity verification of replicated data in cloud using
homomorphic encryption,’’ Distrib. Parallel Dat., vol.
32, no. 4, pp. 507-534, 2014.
[3]. C. Erway, A. Küpçü, C. Papamanthou, and R. Tamassia,
“Dynamic Provable Data Possession,’’ in Proc. 16th
ACM Conf. on Comput. And Commun. Security (CCS),
2009, pp. 213-222.
[4]. R. Curtmola, O. Khan, R. Burns, and G. Ateniese, ‘‘MR-
PDP: Multiple-replica provable data possession,’’ in
Proc. 28th IEEE Conf. on Distrib. Comput. Syst.(ICDCS),
2008, pp. 411-420.
[5]. J. Li, Y. Shi and Y. Zhang, “Searchable ciphertext-policy
attribute-based encryption with revocation in cloud
storage,” Int. J. Commun. Syst., DOI: 10.1002/dac.2942.
[6]. J.G. Han, W. Susilo, Y. Mu and J. Yan, “Privacy-
Preserving Decentralized DKiesytr-iPboultiecdy
SAystttreimbust,e v-Bola. s2e3d, nEon.1c1ry, pptpio.
n2,1”5 0IE-2E1E62 ,T 2r0an1s2a ctions on Paralleland
[7]. Z. J. Fu, X. M. Sun, Q. Liu, L. Zhou, and J. G. Shu,
“Achieving efficient cloud search services: multi-
keyword ranked search over encrypted cloud data
supporting parallel computing,” IEICE Transactionson
Communications, vol. E98-B, no. 1, pp.190-200, 2015.
[8]. K. D. Bowers, A. Juels, and A. Oprea, “Hail: A high-
availability and integrity layer for cloud storage,” in
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 886
Proc. 16th ACM Conf. on Comput. and Commun.
Security (CCS), 2009, pp. 187–198.
[9]. E. Zhou and Z. Li, ‘‘An improved remotedatapossession
checking protocol in cloud storage,’’ in Proc. 14th Int'l
Conf. on Algs. and Archs. for Parall Proc. (ICA3PP),
2014, pp. 611-617
[10]. T.J. Ren, J. Shen,J. G. Wang, “Mutual verifiable provable
data auditing in public cloud storage,”
BIOGRAPHIES
Sandesh R presently pursuing his
M.Tech degree in department of
studies in CSE at Visvesvaraya
Technological University, PG Center,
Mysuru 570029. He hascompletedB.E
in CSE branch at Vidyavardhaka
College of Engineering, Mysuru,
Karnataka in the year 2016. His
M.Tech project area is on Cloud
Computing. This paper is a survey
paper of his M.Tech project.
Shashi Rekha H presently working as
Asst. Professor in DOS in CS & E , VTU-
PG Center , Mysuru since 2013. Her
qualification is B.E, M.tech, (Ph.D). She
has 11 years of teaching experience.
She is currently pursuing research in
the area of Big Data analytics. Her
research interests are Image
classification, Pattern recognition,
Data Mining in E- healthcare. She has
presented many papers in various
journals and few conferences. She is a
member of CSI, Research Gate Forum.

More Related Content

What's hot

International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Provable multicopy dynamic data possession in cloud computing systems
Provable multicopy dynamic data possession in cloud computing systemsProvable multicopy dynamic data possession in cloud computing systems
Provable multicopy dynamic data possession in cloud computing systemsPvrtechnologies Nellore
 
PROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMS
PROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMSPROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMS
PROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMSNexgen Technology
 
PROVABLE DATA PROCESSING (PDP) A MODEL FOR CLIENT'S SECURED DATA ON CLOUD
PROVABLE DATA PROCESSING (PDP) A MODEL FOR CLIENT'S SECURED DATA ON CLOUDPROVABLE DATA PROCESSING (PDP) A MODEL FOR CLIENT'S SECURED DATA ON CLOUD
PROVABLE DATA PROCESSING (PDP) A MODEL FOR CLIENT'S SECURED DATA ON CLOUDJournal For Research
 
Deduplication on Encrypted Big Data in HDFS
Deduplication on Encrypted Big Data in HDFSDeduplication on Encrypted Big Data in HDFS
Deduplication on Encrypted Big Data in HDFSIRJET Journal
 
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC AlgorithmIRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC AlgorithmIRJET Journal
 
Provable data possession for securing the data from untrusted server
Provable data possession for securing the data from untrusted serverProvable data possession for securing the data from untrusted server
Provable data possession for securing the data from untrusted serverIJERA Editor
 
Periodic Auditing of Data in Cloud Using Random Bits
Periodic Auditing of Data in Cloud Using Random BitsPeriodic Auditing of Data in Cloud Using Random Bits
Periodic Auditing of Data in Cloud Using Random BitsIJTET Journal
 
Securing Multi-copy Dynamic Data in Cloud using AES
Securing Multi-copy Dynamic Data in Cloud using AESSecuring Multi-copy Dynamic Data in Cloud using AES
Securing Multi-copy Dynamic Data in Cloud using AESIRJET Journal
 
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud StorageIRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud StorageIRJET Journal
 
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud StoragePrivacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage1crore projects
 
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...IEEEFINALYEARPROJECTS
 
A Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-DuplicationA Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-DuplicationEditor IJMTER
 
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...IJMER
 
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...IEEEFINALYEARPROJECTS
 
DDS-XRCE (Extremely Resource Constrained Environments)
DDS-XRCE (Extremely Resource Constrained Environments)DDS-XRCE (Extremely Resource Constrained Environments)
DDS-XRCE (Extremely Resource Constrained Environments)Gerardo Pardo-Castellote
 
IRJET - A Secure Access Policies based on Data Deduplication System
IRJET - A Secure Access Policies based on Data Deduplication SystemIRJET - A Secure Access Policies based on Data Deduplication System
IRJET - A Secure Access Policies based on Data Deduplication SystemIRJET Journal
 
M.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing ProjectsM.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing ProjectsVijay Karan
 

What's hot (19)

International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Provable multicopy dynamic data possession in cloud computing systems
Provable multicopy dynamic data possession in cloud computing systemsProvable multicopy dynamic data possession in cloud computing systems
Provable multicopy dynamic data possession in cloud computing systems
 
PROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMS
PROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMSPROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMS
PROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMS
 
PROVABLE DATA PROCESSING (PDP) A MODEL FOR CLIENT'S SECURED DATA ON CLOUD
PROVABLE DATA PROCESSING (PDP) A MODEL FOR CLIENT'S SECURED DATA ON CLOUDPROVABLE DATA PROCESSING (PDP) A MODEL FOR CLIENT'S SECURED DATA ON CLOUD
PROVABLE DATA PROCESSING (PDP) A MODEL FOR CLIENT'S SECURED DATA ON CLOUD
 
Mn3422372248
Mn3422372248Mn3422372248
Mn3422372248
 
Deduplication on Encrypted Big Data in HDFS
Deduplication on Encrypted Big Data in HDFSDeduplication on Encrypted Big Data in HDFS
Deduplication on Encrypted Big Data in HDFS
 
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC AlgorithmIRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
 
Provable data possession for securing the data from untrusted server
Provable data possession for securing the data from untrusted serverProvable data possession for securing the data from untrusted server
Provable data possession for securing the data from untrusted server
 
Periodic Auditing of Data in Cloud Using Random Bits
Periodic Auditing of Data in Cloud Using Random BitsPeriodic Auditing of Data in Cloud Using Random Bits
Periodic Auditing of Data in Cloud Using Random Bits
 
Securing Multi-copy Dynamic Data in Cloud using AES
Securing Multi-copy Dynamic Data in Cloud using AESSecuring Multi-copy Dynamic Data in Cloud using AES
Securing Multi-copy Dynamic Data in Cloud using AES
 
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud StorageIRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
 
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud StoragePrivacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
 
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
 
A Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-DuplicationA Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-Duplication
 
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
 
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
 
DDS-XRCE (Extremely Resource Constrained Environments)
DDS-XRCE (Extremely Resource Constrained Environments)DDS-XRCE (Extremely Resource Constrained Environments)
DDS-XRCE (Extremely Resource Constrained Environments)
 
IRJET - A Secure Access Policies based on Data Deduplication System
IRJET - A Secure Access Policies based on Data Deduplication SystemIRJET - A Secure Access Policies based on Data Deduplication System
IRJET - A Secure Access Policies based on Data Deduplication System
 
M.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing ProjectsM.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing Projects
 

Similar to IRJET- A Survey on Remote Data Possession Verification Protocol in Cloud Storage

Flaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple cloudsFlaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple cloudsIRJET Journal
 
M.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing ProjectsM.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing ProjectsVijay Karan
 
M.E Computer Science Cloud Computing Projects
M.E Computer Science Cloud Computing ProjectsM.E Computer Science Cloud Computing Projects
M.E Computer Science Cloud Computing ProjectsVijay Karan
 
IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...
IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...
IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...IRJET Journal
 
Data Access Control Schemes in Cloud Computing: A Review
Data Access Control Schemes in Cloud Computing: A ReviewData Access Control Schemes in Cloud Computing: A Review
Data Access Control Schemes in Cloud Computing: A ReviewIRJET Journal
 
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTIONSECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTIONIRJET Journal
 
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...ijsrd.com
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingAIRCC Publishing Corporation
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGAIRCC Publishing Corporation
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGijcsit
 
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...IRJET Journal
 
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesCentralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesEditor IJMTER
 
IRJET- Improving Data Availability by using VPC Strategy in Cloud Environ...
IRJET-  	  Improving Data Availability by using VPC Strategy in Cloud Environ...IRJET-  	  Improving Data Availability by using VPC Strategy in Cloud Environ...
IRJET- Improving Data Availability by using VPC Strategy in Cloud Environ...IRJET Journal
 
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTINGSECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTINGIJNSA Journal
 
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTINGSECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTINGIJNSA Journal
 
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...IJMER
 
IRJET- An Efficient Data Replication in Salesforce Cloud Environment
IRJET-  	  An Efficient Data Replication in Salesforce Cloud EnvironmentIRJET-  	  An Efficient Data Replication in Salesforce Cloud Environment
IRJET- An Efficient Data Replication in Salesforce Cloud EnvironmentIRJET Journal
 

Similar to IRJET- A Survey on Remote Data Possession Verification Protocol in Cloud Storage (20)

An4201262267
An4201262267An4201262267
An4201262267
 
Flaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple cloudsFlaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple clouds
 
M.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing ProjectsM.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing Projects
 
M.E Computer Science Cloud Computing Projects
M.E Computer Science Cloud Computing ProjectsM.E Computer Science Cloud Computing Projects
M.E Computer Science Cloud Computing Projects
 
IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...
IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...
IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...
 
Data Access Control Schemes in Cloud Computing: A Review
Data Access Control Schemes in Cloud Computing: A ReviewData Access Control Schemes in Cloud Computing: A Review
Data Access Control Schemes in Cloud Computing: A Review
 
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTIONSECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
 
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
 
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesCentralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data Services
 
IRJET- Improving Data Availability by using VPC Strategy in Cloud Environ...
IRJET-  	  Improving Data Availability by using VPC Strategy in Cloud Environ...IRJET-  	  Improving Data Availability by using VPC Strategy in Cloud Environ...
IRJET- Improving Data Availability by using VPC Strategy in Cloud Environ...
 
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTINGSECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
 
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTINGSECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
 
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
 
IRJET- An Efficient Data Replication in Salesforce Cloud Environment
IRJET-  	  An Efficient Data Replication in Salesforce Cloud EnvironmentIRJET-  	  An Efficient Data Replication in Salesforce Cloud Environment
IRJET- An Efficient Data Replication in Salesforce Cloud Environment
 
50120140507005 2
50120140507005 250120140507005 2
50120140507005 2
 
50120140507005
5012014050700550120140507005
50120140507005
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 

Recently uploaded (20)

High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 

IRJET- A Survey on Remote Data Possession Verification Protocol in Cloud Storage

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 883 A Survey on Remote Data Possession Verification Protocol in Cloud Storage Sandesh R1, Shashi Rekha H2 1Fourth Sem M.Tech, Department of Studies in CS&E, VTU PG Center, Mysuru 2Assistant professor, Department of Studies in CS&E, VTU PG Center, Mysuru ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract –As a leading cloud computing application, cloud storage offers scalable, flexible, and high quality services for data storage and processing. An increasing number of data owners are choosing to outsource data files to the cloud. Because cloud storage servers are not completely reliable, data owners need reliable tools to verify that their files are outsourced to remote cloud servers. To solve this crucial problem, a Remote Data Possession Verification (RDPV) protocol has been introduced. But many existing systemshave vulnerabilities in data efficiency or dynamics. In this article, we provide a new efficient RDPV protocol based on the homomorphic hash function. The new system is surely secure against forgery attacks, replacing attacks by attack and copy based on a typical security model. To support data dynamics, an ORT (Operations Record Table) is introduced to track file block operations. We also provide a new optimized implementation for ORT that makes ORT access costs almost constant. In addition, we perform a complete performance analysis that shows that our system has advantages in terms of calculation and communication costs. The implementation of the prototype and the experiments show that the scheme is feasible for real applications. Key Words: Cloud computing, RDPV: Remote Data Possession Verification, ORT: Operation Record Table, Data Dynamics, Homomorphic Hash Functions. 1. INTRODUCTION Cloud computing appears as a new paradigm of calculation after grid computing. By managing a large number of computing resources across the Internet, it has a huge computing capacity and virtualized storage space. Asa result, cloud computing is widely accepted and usedinmany real world applications. Asa leading cloud service, the cloud service provider provides users with reliable, scalable and low-cost outsourced storage services. It providesuserswith a more flexible means called pay-as-you-go model for computing and on-demand storage resources. Based on this model, users can engage the necessary IT infrastructure for initial user investments that will be significantly reduced. In addition, it is convenient for them to adjust the capacity of the leased resource by changing the scale of their applications. The cloud service provider tries to provide a promising service for data storage, saving users the investment and resource costs. However, cloud storage also involves various security issues for outsourced data. Although some security issues have been resolved, important issues related to data falsification and data loss are still present in cloud storage. On the one hand, the crash disk error or the cloud storage server (CSS) hardwarefailure can cause unexpected corruption of outsourced files. On the other hand, CSS is not completely reliable from the point of view of the data owner; it can actively delete or modify files for huge economic benefits. At the same time, CSS can hide the data owner's incorrect behavior and data loss incidents in order to maintain a good reputation. Therefore, it is crucial that the data owner uses an effective means of verifying the integrity of data outsourcing. Remote Data Possession Verification Protocol (RDPV) isan effective technique for ensuring the integrityof data files stored on CSS. RDPV provides a data owner method to effectively check whether the cloud service provider is faithfully storing the original files without recovering them. In RDPV, the data owner can challenge the CSS on the integrity of the destination file. CSS can generate evidence to show that it maintains complete and incorrect data. The basic requirement is that the data ownercanverify the integrity of the files without accessing the complete original file. Another desired requirement is that dynamic data operations must be supported by the protocol. In general, the data owner can add, insert, delete, or modifyfile blocks as needed. In addition, the complexity of the calculation and the communicationoverhead oftheprotocol must be taken into account for real applications. 2. RELATED WORK Cloud computing is an emerging model in which IT infrastructure resources are provided as a service on the Internet. Data owners can outsource their data by remotely storing them in the cloud and enjoying high-quality on- demand services from a shared pool of configurable computing resources. However, because data owners and cloud servers are not in the same trusted domain, outsourced data can be at risk because the cloud serverisno longer fully reliable. Therefore, the confidentiality, availability and integrity of the data are of crucial importance in such a scenario. The data owner encrypts the data before storing it on the cloud to ensure data privacy. The cloud should allow owners or a trusted third party to verify the integrity of their data storage without requiring a local copy of the data. Owners often replicate their data acrosscloud servers acrossmultipledatacenters toprovidea higher level of scalability, availability, and durability. When
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 884 data owners request the cloud service provider (CSP) to replicate data, they are charged higher storage fees by the CSP. Therefore, data owners must strongly believe that the CSP stores copies of data agreed in the SLA, and that data updates have been successfully performed on all remote- stored copies. To deal with such problems, previous multi- copy verification schemesfocused on static filesorincurring huge update costs in a dynamic file scenario. In this paper, we propose a Dynamic Multi-Replicable Proving Data Possession Scheme (DMR-PDP) that, while preserving data confidentiality, prevents the CSP from cheating by keeping fewer copies than paid and / or falsified. In addition, we are also expanding the schema of support for a basic file versioning system where only the difference between the original file and the updated file is propagated rather than the propagation of operations for reasons of confidentiality. DMR-PDP also supports efficient dynamicoperationssuchas block modification, insertion and deletion on replicas on cloud servers. Through safety analysis and experimental results, we demonstrate that the proposed system is secure and works better than other recently published ideas [2]. In cloud computing, customers put large data files on the cloud storage server unreliable, how to ensure that the integrity of outsourced data becomes a big problem. To solve this problem, Hao et al. proposed a protocol that supports public verifiability and data dynamics. However, the protocol of Hao et al. sufferstwo disadvantages. Firstthe protocol of Hao et al. Not sure and cannot resist the active opponent. Second, the protocol of Hao et al. Supports only fixed-size blocks as a base unit. As a result, the insertion of a short message will result in a considerable waste of storage space. In this article, we propose an enhanced remote data integrity verification protocol that can support blocks of varying size. In addition, the enhanced protocol can withstand the attack of the active adversary,anditisobvious to verify that the enhanced protocol still preserves the properties of the Hao et al. Like the public audit and the confidentiality audit [9]. While storage outsourcing and resource sharing networks have become popular, the problem of effectively proving the integrity of data stored on untrusted servershas received increased attention. In the Proving DataPossession (PDP) model, the client preprocesses the data and then sends it to an insecure server for storage, while retaining a small amount of metadata. The client then asksthe server to prove that the stored data has not been falsified or deleted (without downloading actual data). However, the original PDP schema applies only to static files (or append-only) [3]. The definition frameworkandeffectiveconstructs for Proven Data Retention (DPDP), where it extendsthePDP model to support provable updates to stored data. We use a new version of authenticated dictionaries based on ranking information. The price of dynamic updates is a change in performance from O (1) to O (log n) (or O (n ǫ log n)), for a file consisting of n blocks, while maintaining the same probability (or better, respectively) detecting misbehavior. Our experiments show that this slowdown is very low in practice (for example, proof size of 415 KB and calculation overhead of 30 ms for a 1 GB file). We also show how to apply our DPDP system to outsourced file systems and version control systems (for example, CVS). Many storage systems rely on replication to increase the availability and durability of data on unreliable storage systems. At present, such storage systems provide no solid evidence that multiple copiesof the data are actually stored. Storage servers can get along to give the impression that they store many copies of the data, when in reality they only store one copy. We are remedying this gap through the possession of multiple replicable provable data(MR-PDP):A secure schema that allows a client that stores replicas of a file in a storage system to verify through a replica protocol. Only one can be produced at the time of the challenge and the storage system uses one time the storage required to store a single replica. MR-PDP extendsthe previousworkon proof of data ownership for a single copy of a file in a client / server storage system. Using MR-PDP to store replicas is much more computationally efficient than using a single- replica PDP schema to store unrelated separate files (for example, by encrypting each file separately before store it). Another advantage of MR-PDP is that it can generate other replicason demand, at low cost, when some existingreplicas fail [4]. The HAIL (High-Availability and Integrity Layer), a distributed cryptographic system that allows a set of servers to prove to a client that a stored file is intact and recoverable. HAIL strengthens, formalizes and streamlines the distinct approaches of cryptographic communities and distributed systems. The HAIL proofs are efficiently calculable by the servers and very compact - usually tens or hundreds of bytes, regardless of the size of the file. HAIL checks cryptographically and reactively reallocates the file shares. It is robust against an active and mobile opponent, that is to say capable of progressively corruptingall servers. We propose a strong and formal accusatory model for HAIL, as well as a rigorous analysis and choice of parameters. We show how HAIL improves the security and efficiency of existing tools, such as proof of retrievability (POR) deployed on individual servers. We also report on a prototype implementation [8]. 3. PRELIMINARIS A. System Framework In cloud computing, cloud storage provides the user with scalable, flexible and high quality data storageand computing services. An increasing number of data owners are choosing to outsource data filesto the cloud. Since cloud storage servers are not completely reliable, data owners need reliable ways to verify ownership of their outsourced fileson remote cloud servers. We provide a newandefficient RDPV protocol based on the homomorphic hashingfunction. The new system is surely secure against falsificationattacks,
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 885 replaces attacks, and replays attacks based on a typical security model. To support data dynamics, an ORT (Operation Record Table) is introduced to track file block operations. the cloud storage system consisting of two participants: CSS and data owner. CSS has powerful storage and compute capabilities, it accepts data owner requests to store externalized data files and providesaccessservice.The data owner benefits from the CSS service and puts a large amount of CSS files without backup copieslocally. AstheCSS is not supposed reliable and sometimes behaves badly. B. Remote Data Possession Checking Protocol Remote Data Possession Verification(RDPV)isan effective technique for ensuring the integrity of data files stored on CSS. RDPV provides a method for the data owner to effectively check if the cloud service provider is faithfully storing the original files without recovering them. In RDPV, the data owner can challenge the CSS on the integrity of the target file. CSS can generate evidence to prove that it keeps the data complete and uncorrupted. The basic requirement is that the data owner can perform file integrity checking without accessing the complete original file. In addition, the protocol must withstand the malicious server attempting to verify the integrity of the data without accessing the complete and uncorrupted data. Because CSS is not supposed to be reliable and sometimes behaves badly, for example by modifying or deleting partial data files, the data owner can effectively check the integrity of the outsourced data. An RDPV schema includes the following process. They are KeyGen, TagGen, Challenge, ProofGen, Check, PrepareUpdate, ExecUpdate. C. Homomorphic Hash Function The RDPV scheme uses a homomorphic hash function technique, in which the hash value of the sum for two blocks is equal to the product for two hash values of the corresponding blocks. We introduce alineartablecalledORT to record data operations to support data dynamics such as block modification, block insertion, and block deletion. To improve the efficiency of accessto ORT, the table is reserved on the data owner side and used to record all dynamic behaviors on the file blocks. We use a doubly linked list and matrix to present an optimized implementation of ORT that reduces the cost to an almost constant level. We prove that the presented system is secure against forgery attacks, replay attacks, and replace attacks based on a typical security model. 4. CONCLUSION In this article, we examine the problem of controlling the integrity of remote-processed data filestotheremoteserver, and we propose an efficient and secure RDPV protocol with dynamic data. Our schema uses a homomorphic hash function to check the integrity of the files stored on the remote server and reduces the storage costs and computational costs of the data owner. We are designing a new lightweight RDPV protocol to support dynamic block operations that result in minimal computational costs by reducing the number of node moves. Thankstoournewdata structure, the data owner can perform file insertion, modification or deletion operations with great efficiency. The presented schema is safe in the existing security model. The results of the experiment will indicate that oursystemis convenient in cloud storage ACKNOWLEDGEMENT The author would like to thank Dr. K Thippeswamy, Professor and chairman, Dept. of studiesincomputerscience and engineering, VTU Regional office, Mysuru and anonymous reviewers encouragement and constructive piece of advice that of prompted us for new round of rethinking of our research, additional experiments and clearer presentation of technical content. REFERENCES [1]. R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, and I. Brandic,“Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility,” Future Gener. Comp. Sy., vol. 25, no. 6, pp. 599 – 616, 2016. [2]. R. Mukundan, S. Madria and M. Linderman, ‘‘Efficient integrity verification of replicated data in cloud using homomorphic encryption,’’ Distrib. Parallel Dat., vol. 32, no. 4, pp. 507-534, 2014. [3]. C. Erway, A. Küpçü, C. Papamanthou, and R. Tamassia, “Dynamic Provable Data Possession,’’ in Proc. 16th ACM Conf. on Comput. And Commun. Security (CCS), 2009, pp. 213-222. [4]. R. Curtmola, O. Khan, R. Burns, and G. Ateniese, ‘‘MR- PDP: Multiple-replica provable data possession,’’ in Proc. 28th IEEE Conf. on Distrib. Comput. Syst.(ICDCS), 2008, pp. 411-420. [5]. J. Li, Y. Shi and Y. Zhang, “Searchable ciphertext-policy attribute-based encryption with revocation in cloud storage,” Int. J. Commun. Syst., DOI: 10.1002/dac.2942. [6]. J.G. Han, W. Susilo, Y. Mu and J. Yan, “Privacy- Preserving Decentralized DKiesytr-iPboultiecdy SAystttreimbust,e v-Bola. s2e3d, nEon.1c1ry, pptpio. n2,1”5 0IE-2E1E62 ,T 2r0an1s2a ctions on Paralleland [7]. Z. J. Fu, X. M. Sun, Q. Liu, L. Zhou, and J. G. Shu, “Achieving efficient cloud search services: multi- keyword ranked search over encrypted cloud data supporting parallel computing,” IEICE Transactionson Communications, vol. E98-B, no. 1, pp.190-200, 2015. [8]. K. D. Bowers, A. Juels, and A. Oprea, “Hail: A high- availability and integrity layer for cloud storage,” in
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 886 Proc. 16th ACM Conf. on Comput. and Commun. Security (CCS), 2009, pp. 187–198. [9]. E. Zhou and Z. Li, ‘‘An improved remotedatapossession checking protocol in cloud storage,’’ in Proc. 14th Int'l Conf. on Algs. and Archs. for Parall Proc. (ICA3PP), 2014, pp. 611-617 [10]. T.J. Ren, J. Shen,J. G. Wang, “Mutual verifiable provable data auditing in public cloud storage,” BIOGRAPHIES Sandesh R presently pursuing his M.Tech degree in department of studies in CSE at Visvesvaraya Technological University, PG Center, Mysuru 570029. He hascompletedB.E in CSE branch at Vidyavardhaka College of Engineering, Mysuru, Karnataka in the year 2016. His M.Tech project area is on Cloud Computing. This paper is a survey paper of his M.Tech project. Shashi Rekha H presently working as Asst. Professor in DOS in CS & E , VTU- PG Center , Mysuru since 2013. Her qualification is B.E, M.tech, (Ph.D). She has 11 years of teaching experience. She is currently pursuing research in the area of Big Data analytics. Her research interests are Image classification, Pattern recognition, Data Mining in E- healthcare. She has presented many papers in various journals and few conferences. She is a member of CSI, Research Gate Forum.