Submit Search
Upload
IRJET- A Survey on Remote Data Possession Verification Protocol in Cloud Storage
•
0 likes
•
20 views
IRJET Journal
Follow
https://www.irjet.net/archives/V5/i4/IRJET-V5I4193.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 4
Download now
Download to read offline
Recommended
Provable Multicopy Dynamic Data Possession in Cloud Computing Systems
Provable Multicopy Dynamic Data Possession in Cloud Computing Systems
1crore projects
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET Journal
A Novel Method of Directly Auditing Integrity On Encrypted Data
A Novel Method of Directly Auditing Integrity On Encrypted Data
IRJET Journal
Efficient Implementation of Proof of Retrievability (OPOR) In Cloud Computing...
Efficient Implementation of Proof of Retrievability (OPOR) In Cloud Computing...
IJERA Editor
Enabling Integrity for the Compressed Files in Cloud Server
Enabling Integrity for the Compressed Files in Cloud Server
IOSR Journals
Data integrity proof techniques in cloud storage
Data integrity proof techniques in cloud storage
IAEME Publication
Development of Effective Audit Service to Maintain Integrity of Migrated Data...
Development of Effective Audit Service to Maintain Integrity of Migrated Data...
IRJET Journal
V04405122126
V04405122126
IJERA Editor
Recommended
Provable Multicopy Dynamic Data Possession in Cloud Computing Systems
Provable Multicopy Dynamic Data Possession in Cloud Computing Systems
1crore projects
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET Journal
A Novel Method of Directly Auditing Integrity On Encrypted Data
A Novel Method of Directly Auditing Integrity On Encrypted Data
IRJET Journal
Efficient Implementation of Proof of Retrievability (OPOR) In Cloud Computing...
Efficient Implementation of Proof of Retrievability (OPOR) In Cloud Computing...
IJERA Editor
Enabling Integrity for the Compressed Files in Cloud Server
Enabling Integrity for the Compressed Files in Cloud Server
IOSR Journals
Data integrity proof techniques in cloud storage
Data integrity proof techniques in cloud storage
IAEME Publication
Development of Effective Audit Service to Maintain Integrity of Migrated Data...
Development of Effective Audit Service to Maintain Integrity of Migrated Data...
IRJET Journal
V04405122126
V04405122126
IJERA Editor
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
Provable multicopy dynamic data possession in cloud computing systems
Provable multicopy dynamic data possession in cloud computing systems
Pvrtechnologies Nellore
PROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMS
PROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMS
Nexgen Technology
PROVABLE DATA PROCESSING (PDP) A MODEL FOR CLIENT'S SECURED DATA ON CLOUD
PROVABLE DATA PROCESSING (PDP) A MODEL FOR CLIENT'S SECURED DATA ON CLOUD
Journal For Research
Mn3422372248
Mn3422372248
IJERA Editor
Deduplication on Encrypted Big Data in HDFS
Deduplication on Encrypted Big Data in HDFS
IRJET Journal
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET Journal
Provable data possession for securing the data from untrusted server
Provable data possession for securing the data from untrusted server
IJERA Editor
Periodic Auditing of Data in Cloud Using Random Bits
Periodic Auditing of Data in Cloud Using Random Bits
IJTET Journal
Securing Multi-copy Dynamic Data in Cloud using AES
Securing Multi-copy Dynamic Data in Cloud using AES
IRJET Journal
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET Journal
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
1crore projects
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
IEEEFINALYEARPROJECTS
A Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-Duplication
Editor IJMTER
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
IJMER
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
IEEEFINALYEARPROJECTS
DDS-XRCE (Extremely Resource Constrained Environments)
DDS-XRCE (Extremely Resource Constrained Environments)
Gerardo Pardo-Castellote
IRJET - A Secure Access Policies based on Data Deduplication System
IRJET - A Secure Access Policies based on Data Deduplication System
IRJET Journal
M.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing Projects
Vijay Karan
An4201262267
An4201262267
IJERA Editor
Flaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple clouds
IRJET Journal
M.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing Projects
Vijay Karan
More Related Content
What's hot
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
Provable multicopy dynamic data possession in cloud computing systems
Provable multicopy dynamic data possession in cloud computing systems
Pvrtechnologies Nellore
PROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMS
PROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMS
Nexgen Technology
PROVABLE DATA PROCESSING (PDP) A MODEL FOR CLIENT'S SECURED DATA ON CLOUD
PROVABLE DATA PROCESSING (PDP) A MODEL FOR CLIENT'S SECURED DATA ON CLOUD
Journal For Research
Mn3422372248
Mn3422372248
IJERA Editor
Deduplication on Encrypted Big Data in HDFS
Deduplication on Encrypted Big Data in HDFS
IRJET Journal
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET Journal
Provable data possession for securing the data from untrusted server
Provable data possession for securing the data from untrusted server
IJERA Editor
Periodic Auditing of Data in Cloud Using Random Bits
Periodic Auditing of Data in Cloud Using Random Bits
IJTET Journal
Securing Multi-copy Dynamic Data in Cloud using AES
Securing Multi-copy Dynamic Data in Cloud using AES
IRJET Journal
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET Journal
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
1crore projects
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
IEEEFINALYEARPROJECTS
A Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-Duplication
Editor IJMTER
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
IJMER
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
IEEEFINALYEARPROJECTS
DDS-XRCE (Extremely Resource Constrained Environments)
DDS-XRCE (Extremely Resource Constrained Environments)
Gerardo Pardo-Castellote
IRJET - A Secure Access Policies based on Data Deduplication System
IRJET - A Secure Access Policies based on Data Deduplication System
IRJET Journal
M.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing Projects
Vijay Karan
What's hot
(19)
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
Provable multicopy dynamic data possession in cloud computing systems
Provable multicopy dynamic data possession in cloud computing systems
PROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMS
PROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMS
PROVABLE DATA PROCESSING (PDP) A MODEL FOR CLIENT'S SECURED DATA ON CLOUD
PROVABLE DATA PROCESSING (PDP) A MODEL FOR CLIENT'S SECURED DATA ON CLOUD
Mn3422372248
Mn3422372248
Deduplication on Encrypted Big Data in HDFS
Deduplication on Encrypted Big Data in HDFS
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
Provable data possession for securing the data from untrusted server
Provable data possession for securing the data from untrusted server
Periodic Auditing of Data in Cloud Using Random Bits
Periodic Auditing of Data in Cloud Using Random Bits
Securing Multi-copy Dynamic Data in Cloud using AES
Securing Multi-copy Dynamic Data in Cloud using AES
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
A Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-Duplication
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
DDS-XRCE (Extremely Resource Constrained Environments)
DDS-XRCE (Extremely Resource Constrained Environments)
IRJET - A Secure Access Policies based on Data Deduplication System
IRJET - A Secure Access Policies based on Data Deduplication System
M.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing Projects
Similar to IRJET- A Survey on Remote Data Possession Verification Protocol in Cloud Storage
An4201262267
An4201262267
IJERA Editor
Flaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple clouds
IRJET Journal
M.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing Projects
Vijay Karan
M.E Computer Science Cloud Computing Projects
M.E Computer Science Cloud Computing Projects
Vijay Karan
IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...
IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...
IRJET Journal
Data Access Control Schemes in Cloud Computing: A Review
Data Access Control Schemes in Cloud Computing: A Review
IRJET Journal
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
IRJET Journal
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
ijsrd.com
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
AIRCC Publishing Corporation
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
AIRCC Publishing Corporation
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
ijcsit
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
IRJET Journal
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Editor IJMTER
IRJET- Improving Data Availability by using VPC Strategy in Cloud Environ...
IRJET- Improving Data Availability by using VPC Strategy in Cloud Environ...
IRJET Journal
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
IJNSA Journal
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
IJNSA Journal
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
IJMER
IRJET- An Efficient Data Replication in Salesforce Cloud Environment
IRJET- An Efficient Data Replication in Salesforce Cloud Environment
IRJET Journal
50120140507005 2
50120140507005 2
IAEME Publication
50120140507005
50120140507005
IAEME Publication
Similar to IRJET- A Survey on Remote Data Possession Verification Protocol in Cloud Storage
(20)
An4201262267
An4201262267
Flaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple clouds
M.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing Projects
M.E Computer Science Cloud Computing Projects
M.E Computer Science Cloud Computing Projects
IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...
IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...
Data Access Control Schemes in Cloud Computing: A Review
Data Access Control Schemes in Cloud Computing: A Review
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data Services
IRJET- Improving Data Availability by using VPC Strategy in Cloud Environ...
IRJET- Improving Data Availability by using VPC Strategy in Cloud Environ...
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
IRJET- An Efficient Data Replication in Salesforce Cloud Environment
IRJET- An Efficient Data Replication in Salesforce Cloud Environment
50120140507005 2
50120140507005 2
50120140507005
50120140507005
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
ranjana rawat
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
KurinjimalarL3
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
null - The Open Security Community
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
Asutosh Ranjan
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
NikhilNagaraju
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
pranjaldaimarysona
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Dr.Costas Sachpazis
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Dr.Costas Sachpazis
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
SIVASHANKAR N
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
SIVASHANKAR N
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
Suhani Kapoor
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
upamatechverse
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
purnimasatapathy1234
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
humanexperienceaaa
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
ranjana rawat
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
wendy cai
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
ranjana rawat
Recently uploaded
(20)
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
IRJET- A Survey on Remote Data Possession Verification Protocol in Cloud Storage
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 883 A Survey on Remote Data Possession Verification Protocol in Cloud Storage Sandesh R1, Shashi Rekha H2 1Fourth Sem M.Tech, Department of Studies in CS&E, VTU PG Center, Mysuru 2Assistant professor, Department of Studies in CS&E, VTU PG Center, Mysuru ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract –As a leading cloud computing application, cloud storage offers scalable, flexible, and high quality services for data storage and processing. An increasing number of data owners are choosing to outsource data files to the cloud. Because cloud storage servers are not completely reliable, data owners need reliable tools to verify that their files are outsourced to remote cloud servers. To solve this crucial problem, a Remote Data Possession Verification (RDPV) protocol has been introduced. But many existing systemshave vulnerabilities in data efficiency or dynamics. In this article, we provide a new efficient RDPV protocol based on the homomorphic hash function. The new system is surely secure against forgery attacks, replacing attacks by attack and copy based on a typical security model. To support data dynamics, an ORT (Operations Record Table) is introduced to track file block operations. We also provide a new optimized implementation for ORT that makes ORT access costs almost constant. In addition, we perform a complete performance analysis that shows that our system has advantages in terms of calculation and communication costs. The implementation of the prototype and the experiments show that the scheme is feasible for real applications. Key Words: Cloud computing, RDPV: Remote Data Possession Verification, ORT: Operation Record Table, Data Dynamics, Homomorphic Hash Functions. 1. INTRODUCTION Cloud computing appears as a new paradigm of calculation after grid computing. By managing a large number of computing resources across the Internet, it has a huge computing capacity and virtualized storage space. Asa result, cloud computing is widely accepted and usedinmany real world applications. Asa leading cloud service, the cloud service provider provides users with reliable, scalable and low-cost outsourced storage services. It providesuserswith a more flexible means called pay-as-you-go model for computing and on-demand storage resources. Based on this model, users can engage the necessary IT infrastructure for initial user investments that will be significantly reduced. In addition, it is convenient for them to adjust the capacity of the leased resource by changing the scale of their applications. The cloud service provider tries to provide a promising service for data storage, saving users the investment and resource costs. However, cloud storage also involves various security issues for outsourced data. Although some security issues have been resolved, important issues related to data falsification and data loss are still present in cloud storage. On the one hand, the crash disk error or the cloud storage server (CSS) hardwarefailure can cause unexpected corruption of outsourced files. On the other hand, CSS is not completely reliable from the point of view of the data owner; it can actively delete or modify files for huge economic benefits. At the same time, CSS can hide the data owner's incorrect behavior and data loss incidents in order to maintain a good reputation. Therefore, it is crucial that the data owner uses an effective means of verifying the integrity of data outsourcing. Remote Data Possession Verification Protocol (RDPV) isan effective technique for ensuring the integrityof data files stored on CSS. RDPV provides a data owner method to effectively check whether the cloud service provider is faithfully storing the original files without recovering them. In RDPV, the data owner can challenge the CSS on the integrity of the destination file. CSS can generate evidence to show that it maintains complete and incorrect data. The basic requirement is that the data ownercanverify the integrity of the files without accessing the complete original file. Another desired requirement is that dynamic data operations must be supported by the protocol. In general, the data owner can add, insert, delete, or modifyfile blocks as needed. In addition, the complexity of the calculation and the communicationoverhead oftheprotocol must be taken into account for real applications. 2. RELATED WORK Cloud computing is an emerging model in which IT infrastructure resources are provided as a service on the Internet. Data owners can outsource their data by remotely storing them in the cloud and enjoying high-quality on- demand services from a shared pool of configurable computing resources. However, because data owners and cloud servers are not in the same trusted domain, outsourced data can be at risk because the cloud serverisno longer fully reliable. Therefore, the confidentiality, availability and integrity of the data are of crucial importance in such a scenario. The data owner encrypts the data before storing it on the cloud to ensure data privacy. The cloud should allow owners or a trusted third party to verify the integrity of their data storage without requiring a local copy of the data. Owners often replicate their data acrosscloud servers acrossmultipledatacenters toprovidea higher level of scalability, availability, and durability. When
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 884 data owners request the cloud service provider (CSP) to replicate data, they are charged higher storage fees by the CSP. Therefore, data owners must strongly believe that the CSP stores copies of data agreed in the SLA, and that data updates have been successfully performed on all remote- stored copies. To deal with such problems, previous multi- copy verification schemesfocused on static filesorincurring huge update costs in a dynamic file scenario. In this paper, we propose a Dynamic Multi-Replicable Proving Data Possession Scheme (DMR-PDP) that, while preserving data confidentiality, prevents the CSP from cheating by keeping fewer copies than paid and / or falsified. In addition, we are also expanding the schema of support for a basic file versioning system where only the difference between the original file and the updated file is propagated rather than the propagation of operations for reasons of confidentiality. DMR-PDP also supports efficient dynamicoperationssuchas block modification, insertion and deletion on replicas on cloud servers. Through safety analysis and experimental results, we demonstrate that the proposed system is secure and works better than other recently published ideas [2]. In cloud computing, customers put large data files on the cloud storage server unreliable, how to ensure that the integrity of outsourced data becomes a big problem. To solve this problem, Hao et al. proposed a protocol that supports public verifiability and data dynamics. However, the protocol of Hao et al. sufferstwo disadvantages. Firstthe protocol of Hao et al. Not sure and cannot resist the active opponent. Second, the protocol of Hao et al. Supports only fixed-size blocks as a base unit. As a result, the insertion of a short message will result in a considerable waste of storage space. In this article, we propose an enhanced remote data integrity verification protocol that can support blocks of varying size. In addition, the enhanced protocol can withstand the attack of the active adversary,anditisobvious to verify that the enhanced protocol still preserves the properties of the Hao et al. Like the public audit and the confidentiality audit [9]. While storage outsourcing and resource sharing networks have become popular, the problem of effectively proving the integrity of data stored on untrusted servershas received increased attention. In the Proving DataPossession (PDP) model, the client preprocesses the data and then sends it to an insecure server for storage, while retaining a small amount of metadata. The client then asksthe server to prove that the stored data has not been falsified or deleted (without downloading actual data). However, the original PDP schema applies only to static files (or append-only) [3]. The definition frameworkandeffectiveconstructs for Proven Data Retention (DPDP), where it extendsthePDP model to support provable updates to stored data. We use a new version of authenticated dictionaries based on ranking information. The price of dynamic updates is a change in performance from O (1) to O (log n) (or O (n ǫ log n)), for a file consisting of n blocks, while maintaining the same probability (or better, respectively) detecting misbehavior. Our experiments show that this slowdown is very low in practice (for example, proof size of 415 KB and calculation overhead of 30 ms for a 1 GB file). We also show how to apply our DPDP system to outsourced file systems and version control systems (for example, CVS). Many storage systems rely on replication to increase the availability and durability of data on unreliable storage systems. At present, such storage systems provide no solid evidence that multiple copiesof the data are actually stored. Storage servers can get along to give the impression that they store many copies of the data, when in reality they only store one copy. We are remedying this gap through the possession of multiple replicable provable data(MR-PDP):A secure schema that allows a client that stores replicas of a file in a storage system to verify through a replica protocol. Only one can be produced at the time of the challenge and the storage system uses one time the storage required to store a single replica. MR-PDP extendsthe previousworkon proof of data ownership for a single copy of a file in a client / server storage system. Using MR-PDP to store replicas is much more computationally efficient than using a single- replica PDP schema to store unrelated separate files (for example, by encrypting each file separately before store it). Another advantage of MR-PDP is that it can generate other replicason demand, at low cost, when some existingreplicas fail [4]. The HAIL (High-Availability and Integrity Layer), a distributed cryptographic system that allows a set of servers to prove to a client that a stored file is intact and recoverable. HAIL strengthens, formalizes and streamlines the distinct approaches of cryptographic communities and distributed systems. The HAIL proofs are efficiently calculable by the servers and very compact - usually tens or hundreds of bytes, regardless of the size of the file. HAIL checks cryptographically and reactively reallocates the file shares. It is robust against an active and mobile opponent, that is to say capable of progressively corruptingall servers. We propose a strong and formal accusatory model for HAIL, as well as a rigorous analysis and choice of parameters. We show how HAIL improves the security and efficiency of existing tools, such as proof of retrievability (POR) deployed on individual servers. We also report on a prototype implementation [8]. 3. PRELIMINARIS A. System Framework In cloud computing, cloud storage provides the user with scalable, flexible and high quality data storageand computing services. An increasing number of data owners are choosing to outsource data filesto the cloud. Since cloud storage servers are not completely reliable, data owners need reliable ways to verify ownership of their outsourced fileson remote cloud servers. We provide a newandefficient RDPV protocol based on the homomorphic hashingfunction. The new system is surely secure against falsificationattacks,
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 885 replaces attacks, and replays attacks based on a typical security model. To support data dynamics, an ORT (Operation Record Table) is introduced to track file block operations. the cloud storage system consisting of two participants: CSS and data owner. CSS has powerful storage and compute capabilities, it accepts data owner requests to store externalized data files and providesaccessservice.The data owner benefits from the CSS service and puts a large amount of CSS files without backup copieslocally. AstheCSS is not supposed reliable and sometimes behaves badly. B. Remote Data Possession Checking Protocol Remote Data Possession Verification(RDPV)isan effective technique for ensuring the integrity of data files stored on CSS. RDPV provides a method for the data owner to effectively check if the cloud service provider is faithfully storing the original files without recovering them. In RDPV, the data owner can challenge the CSS on the integrity of the target file. CSS can generate evidence to prove that it keeps the data complete and uncorrupted. The basic requirement is that the data owner can perform file integrity checking without accessing the complete original file. In addition, the protocol must withstand the malicious server attempting to verify the integrity of the data without accessing the complete and uncorrupted data. Because CSS is not supposed to be reliable and sometimes behaves badly, for example by modifying or deleting partial data files, the data owner can effectively check the integrity of the outsourced data. An RDPV schema includes the following process. They are KeyGen, TagGen, Challenge, ProofGen, Check, PrepareUpdate, ExecUpdate. C. Homomorphic Hash Function The RDPV scheme uses a homomorphic hash function technique, in which the hash value of the sum for two blocks is equal to the product for two hash values of the corresponding blocks. We introduce alineartablecalledORT to record data operations to support data dynamics such as block modification, block insertion, and block deletion. To improve the efficiency of accessto ORT, the table is reserved on the data owner side and used to record all dynamic behaviors on the file blocks. We use a doubly linked list and matrix to present an optimized implementation of ORT that reduces the cost to an almost constant level. We prove that the presented system is secure against forgery attacks, replay attacks, and replace attacks based on a typical security model. 4. CONCLUSION In this article, we examine the problem of controlling the integrity of remote-processed data filestotheremoteserver, and we propose an efficient and secure RDPV protocol with dynamic data. Our schema uses a homomorphic hash function to check the integrity of the files stored on the remote server and reduces the storage costs and computational costs of the data owner. We are designing a new lightweight RDPV protocol to support dynamic block operations that result in minimal computational costs by reducing the number of node moves. Thankstoournewdata structure, the data owner can perform file insertion, modification or deletion operations with great efficiency. The presented schema is safe in the existing security model. The results of the experiment will indicate that oursystemis convenient in cloud storage ACKNOWLEDGEMENT The author would like to thank Dr. K Thippeswamy, Professor and chairman, Dept. of studiesincomputerscience and engineering, VTU Regional office, Mysuru and anonymous reviewers encouragement and constructive piece of advice that of prompted us for new round of rethinking of our research, additional experiments and clearer presentation of technical content. REFERENCES [1]. R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, and I. Brandic,“Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility,” Future Gener. Comp. Sy., vol. 25, no. 6, pp. 599 – 616, 2016. [2]. R. Mukundan, S. Madria and M. Linderman, ‘‘Efficient integrity verification of replicated data in cloud using homomorphic encryption,’’ Distrib. Parallel Dat., vol. 32, no. 4, pp. 507-534, 2014. [3]. C. Erway, A. Küpçü, C. Papamanthou, and R. Tamassia, “Dynamic Provable Data Possession,’’ in Proc. 16th ACM Conf. on Comput. And Commun. Security (CCS), 2009, pp. 213-222. [4]. R. Curtmola, O. Khan, R. Burns, and G. Ateniese, ‘‘MR- PDP: Multiple-replica provable data possession,’’ in Proc. 28th IEEE Conf. on Distrib. Comput. Syst.(ICDCS), 2008, pp. 411-420. [5]. J. Li, Y. Shi and Y. Zhang, “Searchable ciphertext-policy attribute-based encryption with revocation in cloud storage,” Int. J. Commun. Syst., DOI: 10.1002/dac.2942. [6]. J.G. Han, W. Susilo, Y. Mu and J. Yan, “Privacy- Preserving Decentralized DKiesytr-iPboultiecdy SAystttreimbust,e v-Bola. s2e3d, nEon.1c1ry, pptpio. n2,1”5 0IE-2E1E62 ,T 2r0an1s2a ctions on Paralleland [7]. Z. J. Fu, X. M. Sun, Q. Liu, L. Zhou, and J. G. Shu, “Achieving efficient cloud search services: multi- keyword ranked search over encrypted cloud data supporting parallel computing,” IEICE Transactionson Communications, vol. E98-B, no. 1, pp.190-200, 2015. [8]. K. D. Bowers, A. Juels, and A. Oprea, “Hail: A high- availability and integrity layer for cloud storage,” in
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 886 Proc. 16th ACM Conf. on Comput. and Commun. Security (CCS), 2009, pp. 187–198. [9]. E. Zhou and Z. Li, ‘‘An improved remotedatapossession checking protocol in cloud storage,’’ in Proc. 14th Int'l Conf. on Algs. and Archs. for Parall Proc. (ICA3PP), 2014, pp. 611-617 [10]. T.J. Ren, J. Shen,J. G. Wang, “Mutual verifiable provable data auditing in public cloud storage,” BIOGRAPHIES Sandesh R presently pursuing his M.Tech degree in department of studies in CSE at Visvesvaraya Technological University, PG Center, Mysuru 570029. He hascompletedB.E in CSE branch at Vidyavardhaka College of Engineering, Mysuru, Karnataka in the year 2016. His M.Tech project area is on Cloud Computing. This paper is a survey paper of his M.Tech project. Shashi Rekha H presently working as Asst. Professor in DOS in CS & E , VTU- PG Center , Mysuru since 2013. Her qualification is B.E, M.tech, (Ph.D). She has 11 years of teaching experience. She is currently pursuing research in the area of Big Data analytics. Her research interests are Image classification, Pattern recognition, Data Mining in E- healthcare. She has presented many papers in various journals and few conferences. She is a member of CSI, Research Gate Forum.
Download now