SlideShare a Scribd company logo
1 of 5
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 8164
SECURITY ENHANCE USING HASH AND CHAOSTIC ALGORITHM IN
CLOUD
Asst. Prof. Naziya Pathan, Sneha Chouriya,Arti Choure,Priyanka Chikhle,Shraddha Ninave
1Asst.Prof. Naziya Pathan C.E.Department Nuva College of Engineering & Technology, Nagpur
2Sneha Chouriya ,Arti Choure,Priyanka Chikhle,Shraddha Ninave,student C.E. Dept. NCET, Nagpur
---------------------------------------------------------------------***--------------------------------------------------------------------
Abstract - Most of the security solutions use routers,
firewalls, and intrusion detection systems implemented
to tightly control, access to networks from outside
authors. Cloud computing breaks these organizational
bounds. When the data is present in the cloud, it resides
outside the organizational bounds. Hence, a user loses
control over their data. Another problem is most of the
time users are anxious about uploading private and
confidential files for online backup due to concern that
the service provider might use it inappropriately. So,
providing security at the required level is a major
concern. This existing system presents a data-centric
access control solution with enriched role-based
expressiveness in which security is focused on
protecting user data regardless the Cloud service
provider that holds it.
1. INTRODUCTION
Cloud computing could be a revolutionary
mechanism that ever-changing way to enterprise
hardware and software system style and
procurements. The cloudcomputing providesmade
advantages to the cloud clients like complimentary
services, elasticity of resources, easy accessibility
through net, etc. From little to massive enterprises
poignant towards cloud computing to extend their
business and tie-ups with different enterprises [1].
Although cloud computing has huge advantages,
cloud user are unwilling to place their confidential
or sensitive information, it includes personal health
records, emails and government sensitive files.
Suppose once information is placed in cloud
information center; the cloud consumer lost their
direct control over their data sources. The Cloud
Service supplier (CSPs) has promise to confirm the
information. Security over hold on information of
cloud shoppers by using strategies likefirewallsand
virtualization. These mechanisms wouldn'tofferthe
entire information protection due to its
vulnerabilities’ over the network and CSPs have full
command on cloud applications, hardware and
client’s information. Encrypting sensitive
information before hosting will be information
privacy and confidentiality against CSP. A typical
drawback with encryption scheme is that it's
impractical due to large quantity communication
overheads overthecloudaccesspatterns.Therefore,
cloud desires secure strategies to storage and
management to preserve the information
confidentiality and privacy [2].Cloud computing
security is that the major concern to be addressed
these days. If security measures aren't provided
properly for information operations and
transmissions then information is at high risk [3].
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 8165
Figure 1.1 Cloud data storage model
2 .LITERATURE SURVEY
A. Proofs of Ownership in Remote Storage Systems Author
Shai Halevi Cloud stockpiling frameworks are ending up
increasingly famous. A promising innovation that holds their
cost down is de duplication, which stores just a solitary
duplicate of copying information. Customer side de
duplication endeavors to recognize de duplication openings
as of now at the customer side and spare the data
transmission of transferring duplicates of existing records to
the server. In this work we distinguish assaults that endeavor
customer side de duplication, allowing an aggressor to
access selfassertive size records of different clients in light
of a little hash mark of these documents. All the more
particularly, an aggressor who knows the hash mark of a
record can guarantee the capacitybenefit that it possesses
that document; subsequently the server gives the
assailant a chance to download the whole record [2].
B. DupLESS: Server-AidedEncryptionforDecopiedStorage
Author: MihirBellare and Sriram Keelveedhi.de
duplication to spare space by just putting away one
duplicate of each record transferred. Should customers
oftentimes encode their documents, in any case, reserve
funds are lost. Message-bolted encryption (the most
exceptional appearance ofwhichisfocalizedencryption)
settles this strain.Notwithstandingitischaracteristically
powerless against savage - compel assaults that can
recoup documents falling intoaknownset.Weproposea
design that gives securedecopiedcapacitycontradicting
beast drive assaults, and acknowledge it in a framework
called DupLESS. In DupLESS, clients scramble the under
message-based keys got from a key-server by methods
for a truant PRF tradition.It empowers customers to
store encoded information with a present
administration, have the administration perform de
duplication fortheir benefit, but then accomplishessolid
secrecy ensures. We demonstrate that encryption for de
copied capacity can accomplish execution and space
funds close to that of utilizing the capacity benefit with
plaintext data [3].
C. Provable Data Possession at Untrusted Stores Authors:
Giuseppe Ateniese We present a model for provable
information ownership (PDP) that permits a customer
that has put away information at an untrusted server to
confirm that the server has the first information without
recovering it. The model creates probabilistic
confirmations of ownership by examining irregular
arrangementsofsquaresfromtheserver,whichradically
lessens I/O costs. The client keeps up an unfaltering
measure of metadata to check the confirmation. The
test/response tradition transmits an s strip mall,
consistent measure of data, which limits sort out
correspondence. In this way, the PDP exhibit for remote
data checking supports extensive educational
accumulations in comprehensively - dispersed limit
structures [4].
D. Remote Data Checking Using Provable Data Possession
Authors: Giuseppe Ateniese We proposes a model for
provable information ownership (PDP) that can be
utilized for remote information checking: A customer
that has put away information atanuntrustedservercan
confirm that the server has the first information without
recovering it. The model creates probabilistic
confirmations of ownership by examining irregular
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 8166
arrangements of pieces from the server, which radically
decreases I/O costs. The customer keeps up a steady
measure of metadata to check the verification. The
test/reaction convention transmits a little, steady
measure of information, which limits organize
correspondence. In this way, the PDP show for remote
information checking is lightweight and backings vast
informationalindexesincirculatedcapacityframeworks.
The model is likewise hearty in that it fuses systems for
alleviating discretionary measures of information de
basement [5]
3. PROPOSED PLAN OF WORK
To solve the problem on exiting system we propose
two secure systems Sec Cloud andSec Cloud+while
generated better and efficient system for accessing
massive data on cloud. In this, firstly encrypted the
plain data file and performintegrityauditingonthat
encrypted file. Sec Cloud system has achieved both
integrity auditing and file de duplication in this
process Server doesn’t known the contain in file. In
other word the functionalities of integrity auditing
and secure de duplication areonlyimposedonplain
text.SecCloud + managing de duplication on
encrypted files. On other word operation perform
on secure file.
Module:
Module 1:- User / End User: - user responsible
to upload the Data in cloud and that file send to
Auditor.
Module 2: -Auditor: - Auditor check the file of
user and check file copy is already present or not
and Encryption at file level.
Module 3:- Cloud ServerProvider:-CSPcheck
the user details and Encrypted at second level and
generated the key.
REQUIREMENTS –
Technology Used –
Language – MATLAB
Front end – MATLAB
Backend – MATLAB Version (13R)
Database – MySQL Version (5.5.16)
System Requirement –
Minimum RAM –60 MB
Hard Disk –2 GB
Processor –I3 Processor
Operating System – Windows XP Service Pack
4. METHODOLOGY
In the proposed scheme, an image owner having a low
computational power (e.g., mobile devices) connectsto
the cloud. The user desires to use the storage capacity
and cloud computational power. He/She stores the
images securely and wants to retrieve or access them
afterwards. The image owner has a collection of his
sensitive images. However, theimageownerwantsthat
his collection must be secure enough before
outsourcing to the cloud for further processing. Figure
3.1 shows the System framework of proposed
algorithm. In this figure only encryption algorithm has
been explored.Userauthenticationusingimagecaptcha
is explored in section while reusing the system
framework of Figure 3.1. The security enhancing
process which performsinimageowner’smachineuses
images obtained from social media sites such as flicker
to create masks for the original image with a
lightweight encryption algorithm to further enhance
the security of the image. The identity of the masks
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 8167
called flk_ID and the keys whichareusedforencryption
process are kept secret. The image owner creates the
key matrix of the keys used for encryption and ID ofthe
masks. Then the key matrix encryption isperformed by
the image owner. In key encryption λ-values and λ-
vector are created with a secret index of the image.
More about λ-values and λ-vector is explained in
section. Here in this section λ-values and λ-vector are
created. After encrypting the image and keys, image
owner sends the encrypted image to the cloud for
storage with the λ-values and secret index and λ-
vectors are sent to the authorized cloud user. When a
cloud user wants to retrieve the image, it sends the
request to the cloud. For sending the request he/she
extracts the keys and creates the index for searching
the remotely stored image collection, and then sends
the index to the cloud server. The cloud performs the
requested computation on the encrypted images and
returns the results in the encoded forms to the image
owner. The image owner decodes the received resuits
to get the image on which the requested computational
are done by the cloud.
5.CONCLUSIONS
Aiming at achieving both data integrity and de
duplication in cloud. We propose Sec Cloud and Sec
Cloud+. Sec Cloud introduces anauditingentity with
maintenances of Data Reduce cloud, which helps
client generate data tag before uploading as well as
audit integrity of data having been stored in cloud.
In addition, Sec Cloud (Public Cloud)enablessecure
de duplication through introducing a Proof of
Ownership protocol and preventing the leakage of
side channel information in data de duplication.
Compared with previous work, the computation by
user in Sec Cloud is greatly reduced during the file
uploading and auditing phases. File uploading by
user then check by auditing phase by auditor. An
advanced construction motivated by the fact that
customers always want to encrypt their data before
uploading, and allows for integrity auditing and
secure de duplication directly on encrypted data.
This would allow extending the privileges of the
authorization model with more actions like modify
and delete. Another interesting point is the
obfuscation of the authorization model for privacy
reasons. Although the usage of pseudonyms is
proposed but more advanced obfuscation
techniques can be researched to achieve a higher
level of privacy.
6. REFERENCES
[1] T.Y. Youn, K.Y. Chang, K. R. Rhee, and S. U. shin,
Efficient Client-Side De-duplication of Encrypted Data with
Public Auditing in Cloud Storage, IEEE Access, 2018,2169-
3536
[2]S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg,
―Proofs of ownership in remote storage systems,‖ in
Proceedings of the 18th ACM Conference on Computer and
Communications Security . ACM, 2011, pp. 491–500.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 8168
[3] S. Keelveedhi, M. Bellare,and T. Ristenpart, ―Dupless:
Serveraided encryption for deduplicated storage,‖ in
Proceedings of the 22Nd USENIX ConferenceonSecurity,ser.
SEC’13.Washington,D.C.:USENIXAssociation,2013,pp.179–
194. [Online].
Available:https://www.usenix.org/conference/usenixsecurit
y13/technicalsessions/presentation/bellare.
[4] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L.
Kissner, Z. Peterson, and D. Song, ―Provable data possession
at untrusted stores,‖ in Proceedings of the 14th ACM
Conference on Computer and Communications Security, ser.
CCS ’07. New York, NY, USA: ACM, 2007, pp. 598–609.
[5] G. Ateniese, R. Burns, R. Curtmola, J. Herring, O. Khan,
L. Kissner, Z. Peterson, and D. Song, ―Remote data checking
using provable data possession,‖ ACM Trans. Inf. Syst.
Secure., 2011, pp. 12:1–12:34,vol. 14, no. 1.

More Related Content

What's hot

Big data security_issues_research_paper
Big data security_issues_research_paperBig data security_issues_research_paper
Big data security_issues_research_paperLuisa Francisco
 
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET Journal
 
An Auditing Protocol for Protected Data Storage in Cloud Computing
An Auditing Protocol for Protected Data Storage in Cloud ComputingAn Auditing Protocol for Protected Data Storage in Cloud Computing
An Auditing Protocol for Protected Data Storage in Cloud Computingijceronline
 
An efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environmentAn efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environmenteSAT Journals
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEditor IJMTER
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET Journal
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)IJNSA Journal
 
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd Iaetsd
 
Using DDS to Secure the Industrial Internet of Things (IIoT)
Using DDS to Secure the Industrial Internet of Things (IIoT)Using DDS to Secure the Industrial Internet of Things (IIoT)
Using DDS to Secure the Industrial Internet of Things (IIoT)Gerardo Pardo-Castellote
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...IRJET Journal
 
Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Editor IJARCET
 
IRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET- Extended Cloud Security for Trust-Based Cloud Service ProvidersIRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET- Extended Cloud Security for Trust-Based Cloud Service ProvidersIRJET Journal
 
IRJET- Adaptable Wildcard Searchable Encryption System
IRJET- Adaptable Wildcard Searchable Encryption SystemIRJET- Adaptable Wildcard Searchable Encryption System
IRJET- Adaptable Wildcard Searchable Encryption SystemIRJET Journal
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET Journal
 
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...pharmaindexing
 
IJSRED-V2I1P29
IJSRED-V2I1P29IJSRED-V2I1P29
IJSRED-V2I1P29IJSRED
 
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET Journal
 
IRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET- A Survey: Data Security in Cloud using Cryptography and SteganographyIRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET- A Survey: Data Security in Cloud using Cryptography and SteganographyIRJET Journal
 
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET -  	  DOD Data Hiding Technique using Advanced LSB with AES-256 AlgorithmIRJET -  	  DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 AlgorithmIRJET Journal
 

What's hot (20)

Big data security_issues_research_paper
Big data security_issues_research_paperBig data security_issues_research_paper
Big data security_issues_research_paper
 
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud Computing
 
An Auditing Protocol for Protected Data Storage in Cloud Computing
An Auditing Protocol for Protected Data Storage in Cloud ComputingAn Auditing Protocol for Protected Data Storage in Cloud Computing
An Auditing Protocol for Protected Data Storage in Cloud Computing
 
An efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environmentAn efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environment
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
 
Ijaiem 2014-11-30-122
Ijaiem 2014-11-30-122Ijaiem 2014-11-30-122
Ijaiem 2014-11-30-122
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challenges
 
Using DDS to Secure the Industrial Internet of Things (IIoT)
Using DDS to Secure the Industrial Internet of Things (IIoT)Using DDS to Secure the Industrial Internet of Things (IIoT)
Using DDS to Secure the Industrial Internet of Things (IIoT)
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
 
Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409
 
IRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET- Extended Cloud Security for Trust-Based Cloud Service ProvidersIRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
 
IRJET- Adaptable Wildcard Searchable Encryption System
IRJET- Adaptable Wildcard Searchable Encryption SystemIRJET- Adaptable Wildcard Searchable Encryption System
IRJET- Adaptable Wildcard Searchable Encryption System
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
 
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
 
IJSRED-V2I1P29
IJSRED-V2I1P29IJSRED-V2I1P29
IJSRED-V2I1P29
 
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
 
IRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET- A Survey: Data Security in Cloud using Cryptography and SteganographyIRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
 
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET -  	  DOD Data Hiding Technique using Advanced LSB with AES-256 AlgorithmIRJET -  	  DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
 

Similar to IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud

Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudEfficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudIRJET Journal
 
IRJET- An Efficient Data Replication in Salesforce Cloud Environment
IRJET-  	  An Efficient Data Replication in Salesforce Cloud EnvironmentIRJET-  	  An Efficient Data Replication in Salesforce Cloud Environment
IRJET- An Efficient Data Replication in Salesforce Cloud EnvironmentIRJET Journal
 
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on CloudIRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on CloudIRJET Journal
 
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud DataA Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud DataIRJET Journal
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET Journal
 
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...Migrant Systems
 
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud ComputingIRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud ComputingIRJET Journal
 
DATA SHARING PROTOCOL TO MINIMIZE THE SECURITY AND PRIVACY RISKS OF CLOUD STO...
DATA SHARING PROTOCOL TO MINIMIZE THE SECURITY AND PRIVACY RISKS OF CLOUD STO...DATA SHARING PROTOCOL TO MINIMIZE THE SECURITY AND PRIVACY RISKS OF CLOUD STO...
DATA SHARING PROTOCOL TO MINIMIZE THE SECURITY AND PRIVACY RISKS OF CLOUD STO...IRJET Journal
 
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud StorageA Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud StorageIRJET Journal
 
Excellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingExcellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingEditor IJMTER
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET Journal
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET Journal
 
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageBio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageIJERA Editor
 
Iaetsd storage privacy protection against data
Iaetsd storage privacy protection against dataIaetsd storage privacy protection against data
Iaetsd storage privacy protection against dataIaetsd Iaetsd
 
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...IRJET Journal
 
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET Journal
 
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingIRJET Journal
 
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...IRJET Journal
 
Public Auditing for Regenerating Code Based Cloud Storage
Public Auditing for Regenerating Code Based Cloud StoragePublic Auditing for Regenerating Code Based Cloud Storage
Public Auditing for Regenerating Code Based Cloud StorageIRJET Journal
 

Similar to IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud (20)

Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudEfficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using Cloud
 
IRJET- An Efficient Data Replication in Salesforce Cloud Environment
IRJET-  	  An Efficient Data Replication in Salesforce Cloud EnvironmentIRJET-  	  An Efficient Data Replication in Salesforce Cloud Environment
IRJET- An Efficient Data Replication in Salesforce Cloud Environment
 
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on CloudIRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on Cloud
 
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud DataA Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
 
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
 
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud ComputingIRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
 
DATA SHARING PROTOCOL TO MINIMIZE THE SECURITY AND PRIVACY RISKS OF CLOUD STO...
DATA SHARING PROTOCOL TO MINIMIZE THE SECURITY AND PRIVACY RISKS OF CLOUD STO...DATA SHARING PROTOCOL TO MINIMIZE THE SECURITY AND PRIVACY RISKS OF CLOUD STO...
DATA SHARING PROTOCOL TO MINIMIZE THE SECURITY AND PRIVACY RISKS OF CLOUD STO...
 
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud StorageA Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
 
Excellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingExcellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computing
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
 
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageBio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
 
Iaetsd storage privacy protection against data
Iaetsd storage privacy protection against dataIaetsd storage privacy protection against data
Iaetsd storage privacy protection against data
 
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
 
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
 
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
 
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
 
Fs2510501055
Fs2510501055Fs2510501055
Fs2510501055
 
Public Auditing for Regenerating Code Based Cloud Storage
Public Auditing for Regenerating Code Based Cloud StoragePublic Auditing for Regenerating Code Based Cloud Storage
Public Auditing for Regenerating Code Based Cloud Storage
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 

Recently uploaded (20)

Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 

IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 8164 SECURITY ENHANCE USING HASH AND CHAOSTIC ALGORITHM IN CLOUD Asst. Prof. Naziya Pathan, Sneha Chouriya,Arti Choure,Priyanka Chikhle,Shraddha Ninave 1Asst.Prof. Naziya Pathan C.E.Department Nuva College of Engineering & Technology, Nagpur 2Sneha Chouriya ,Arti Choure,Priyanka Chikhle,Shraddha Ninave,student C.E. Dept. NCET, Nagpur ---------------------------------------------------------------------***-------------------------------------------------------------------- Abstract - Most of the security solutions use routers, firewalls, and intrusion detection systems implemented to tightly control, access to networks from outside authors. Cloud computing breaks these organizational bounds. When the data is present in the cloud, it resides outside the organizational bounds. Hence, a user loses control over their data. Another problem is most of the time users are anxious about uploading private and confidential files for online backup due to concern that the service provider might use it inappropriately. So, providing security at the required level is a major concern. This existing system presents a data-centric access control solution with enriched role-based expressiveness in which security is focused on protecting user data regardless the Cloud service provider that holds it. 1. INTRODUCTION Cloud computing could be a revolutionary mechanism that ever-changing way to enterprise hardware and software system style and procurements. The cloudcomputing providesmade advantages to the cloud clients like complimentary services, elasticity of resources, easy accessibility through net, etc. From little to massive enterprises poignant towards cloud computing to extend their business and tie-ups with different enterprises [1]. Although cloud computing has huge advantages, cloud user are unwilling to place their confidential or sensitive information, it includes personal health records, emails and government sensitive files. Suppose once information is placed in cloud information center; the cloud consumer lost their direct control over their data sources. The Cloud Service supplier (CSPs) has promise to confirm the information. Security over hold on information of cloud shoppers by using strategies likefirewallsand virtualization. These mechanisms wouldn'tofferthe entire information protection due to its vulnerabilities’ over the network and CSPs have full command on cloud applications, hardware and client’s information. Encrypting sensitive information before hosting will be information privacy and confidentiality against CSP. A typical drawback with encryption scheme is that it's impractical due to large quantity communication overheads overthecloudaccesspatterns.Therefore, cloud desires secure strategies to storage and management to preserve the information confidentiality and privacy [2].Cloud computing security is that the major concern to be addressed these days. If security measures aren't provided properly for information operations and transmissions then information is at high risk [3].
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 8165 Figure 1.1 Cloud data storage model 2 .LITERATURE SURVEY A. Proofs of Ownership in Remote Storage Systems Author Shai Halevi Cloud stockpiling frameworks are ending up increasingly famous. A promising innovation that holds their cost down is de duplication, which stores just a solitary duplicate of copying information. Customer side de duplication endeavors to recognize de duplication openings as of now at the customer side and spare the data transmission of transferring duplicates of existing records to the server. In this work we distinguish assaults that endeavor customer side de duplication, allowing an aggressor to access selfassertive size records of different clients in light of a little hash mark of these documents. All the more particularly, an aggressor who knows the hash mark of a record can guarantee the capacitybenefit that it possesses that document; subsequently the server gives the assailant a chance to download the whole record [2]. B. DupLESS: Server-AidedEncryptionforDecopiedStorage Author: MihirBellare and Sriram Keelveedhi.de duplication to spare space by just putting away one duplicate of each record transferred. Should customers oftentimes encode their documents, in any case, reserve funds are lost. Message-bolted encryption (the most exceptional appearance ofwhichisfocalizedencryption) settles this strain.Notwithstandingitischaracteristically powerless against savage - compel assaults that can recoup documents falling intoaknownset.Weproposea design that gives securedecopiedcapacitycontradicting beast drive assaults, and acknowledge it in a framework called DupLESS. In DupLESS, clients scramble the under message-based keys got from a key-server by methods for a truant PRF tradition.It empowers customers to store encoded information with a present administration, have the administration perform de duplication fortheir benefit, but then accomplishessolid secrecy ensures. We demonstrate that encryption for de copied capacity can accomplish execution and space funds close to that of utilizing the capacity benefit with plaintext data [3]. C. Provable Data Possession at Untrusted Stores Authors: Giuseppe Ateniese We present a model for provable information ownership (PDP) that permits a customer that has put away information at an untrusted server to confirm that the server has the first information without recovering it. The model creates probabilistic confirmations of ownership by examining irregular arrangementsofsquaresfromtheserver,whichradically lessens I/O costs. The client keeps up an unfaltering measure of metadata to check the confirmation. The test/response tradition transmits an s strip mall, consistent measure of data, which limits sort out correspondence. In this way, the PDP exhibit for remote data checking supports extensive educational accumulations in comprehensively - dispersed limit structures [4]. D. Remote Data Checking Using Provable Data Possession Authors: Giuseppe Ateniese We proposes a model for provable information ownership (PDP) that can be utilized for remote information checking: A customer that has put away information atanuntrustedservercan confirm that the server has the first information without recovering it. The model creates probabilistic confirmations of ownership by examining irregular
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 8166 arrangements of pieces from the server, which radically decreases I/O costs. The customer keeps up a steady measure of metadata to check the verification. The test/reaction convention transmits a little, steady measure of information, which limits organize correspondence. In this way, the PDP show for remote information checking is lightweight and backings vast informationalindexesincirculatedcapacityframeworks. The model is likewise hearty in that it fuses systems for alleviating discretionary measures of information de basement [5] 3. PROPOSED PLAN OF WORK To solve the problem on exiting system we propose two secure systems Sec Cloud andSec Cloud+while generated better and efficient system for accessing massive data on cloud. In this, firstly encrypted the plain data file and performintegrityauditingonthat encrypted file. Sec Cloud system has achieved both integrity auditing and file de duplication in this process Server doesn’t known the contain in file. In other word the functionalities of integrity auditing and secure de duplication areonlyimposedonplain text.SecCloud + managing de duplication on encrypted files. On other word operation perform on secure file. Module: Module 1:- User / End User: - user responsible to upload the Data in cloud and that file send to Auditor. Module 2: -Auditor: - Auditor check the file of user and check file copy is already present or not and Encryption at file level. Module 3:- Cloud ServerProvider:-CSPcheck the user details and Encrypted at second level and generated the key. REQUIREMENTS – Technology Used – Language – MATLAB Front end – MATLAB Backend – MATLAB Version (13R) Database – MySQL Version (5.5.16) System Requirement – Minimum RAM –60 MB Hard Disk –2 GB Processor –I3 Processor Operating System – Windows XP Service Pack 4. METHODOLOGY In the proposed scheme, an image owner having a low computational power (e.g., mobile devices) connectsto the cloud. The user desires to use the storage capacity and cloud computational power. He/She stores the images securely and wants to retrieve or access them afterwards. The image owner has a collection of his sensitive images. However, theimageownerwantsthat his collection must be secure enough before outsourcing to the cloud for further processing. Figure 3.1 shows the System framework of proposed algorithm. In this figure only encryption algorithm has been explored.Userauthenticationusingimagecaptcha is explored in section while reusing the system framework of Figure 3.1. The security enhancing process which performsinimageowner’smachineuses images obtained from social media sites such as flicker to create masks for the original image with a lightweight encryption algorithm to further enhance the security of the image. The identity of the masks
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 8167 called flk_ID and the keys whichareusedforencryption process are kept secret. The image owner creates the key matrix of the keys used for encryption and ID ofthe masks. Then the key matrix encryption isperformed by the image owner. In key encryption λ-values and λ- vector are created with a secret index of the image. More about λ-values and λ-vector is explained in section. Here in this section λ-values and λ-vector are created. After encrypting the image and keys, image owner sends the encrypted image to the cloud for storage with the λ-values and secret index and λ- vectors are sent to the authorized cloud user. When a cloud user wants to retrieve the image, it sends the request to the cloud. For sending the request he/she extracts the keys and creates the index for searching the remotely stored image collection, and then sends the index to the cloud server. The cloud performs the requested computation on the encrypted images and returns the results in the encoded forms to the image owner. The image owner decodes the received resuits to get the image on which the requested computational are done by the cloud. 5.CONCLUSIONS Aiming at achieving both data integrity and de duplication in cloud. We propose Sec Cloud and Sec Cloud+. Sec Cloud introduces anauditingentity with maintenances of Data Reduce cloud, which helps client generate data tag before uploading as well as audit integrity of data having been stored in cloud. In addition, Sec Cloud (Public Cloud)enablessecure de duplication through introducing a Proof of Ownership protocol and preventing the leakage of side channel information in data de duplication. Compared with previous work, the computation by user in Sec Cloud is greatly reduced during the file uploading and auditing phases. File uploading by user then check by auditing phase by auditor. An advanced construction motivated by the fact that customers always want to encrypt their data before uploading, and allows for integrity auditing and secure de duplication directly on encrypted data. This would allow extending the privileges of the authorization model with more actions like modify and delete. Another interesting point is the obfuscation of the authorization model for privacy reasons. Although the usage of pseudonyms is proposed but more advanced obfuscation techniques can be researched to achieve a higher level of privacy. 6. REFERENCES [1] T.Y. Youn, K.Y. Chang, K. R. Rhee, and S. U. shin, Efficient Client-Side De-duplication of Encrypted Data with Public Auditing in Cloud Storage, IEEE Access, 2018,2169- 3536 [2]S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg, ―Proofs of ownership in remote storage systems,‖ in Proceedings of the 18th ACM Conference on Computer and Communications Security . ACM, 2011, pp. 491–500.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 8168 [3] S. Keelveedhi, M. Bellare,and T. Ristenpart, ―Dupless: Serveraided encryption for deduplicated storage,‖ in Proceedings of the 22Nd USENIX ConferenceonSecurity,ser. SEC’13.Washington,D.C.:USENIXAssociation,2013,pp.179– 194. [Online]. Available:https://www.usenix.org/conference/usenixsecurit y13/technicalsessions/presentation/bellare. [4] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, ―Provable data possession at untrusted stores,‖ in Proceedings of the 14th ACM Conference on Computer and Communications Security, ser. CCS ’07. New York, NY, USA: ACM, 2007, pp. 598–609. [5] G. Ateniese, R. Burns, R. Curtmola, J. Herring, O. Khan, L. Kissner, Z. Peterson, and D. Song, ―Remote data checking using provable data possession,‖ ACM Trans. Inf. Syst. Secure., 2011, pp. 12:1–12:34,vol. 14, no. 1.