SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 01 | Jan-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 576
An Algorithmic approach for Remote Data uploading and Integrity
Checking in Public Cloud
Gayathri Satish
Student/CNE/M.Tech, Dept. of ISE, The National Institute of Engineering, Mysuru, India
---------------------------------------------------------------------***--------------------------------------------------------------------
Abstract- As the technology is been contributing more and
more services for the end-user activity for the purpose of high
computing factors. There may be contribution from more
number of clients to store their information among cloud
servers (public).Introducing security problem solvingmethods
at the backend to process client data among different stakesof
public cloud. When the client faces some set of limitation in
accessing the pcs he might represent the proxy behavior for
storing and uploading of information this might helps in
resolving the security which id been integrated with client
information that need to be processed in public cloud.
Considering all these factors of processing with respect to
security a solution is been proposed for proxy integrated
systems in uploading the information to check the remote
integrity check module(ID-PUIC) is introduced for processing
in public cloud. Here we also represent definition for integrity
check and also respective modeling for system and security.
The ID-PUIC is much more efficient for integrity checking and
flexible enough and its mathematical computation isdrivenby
Diffie-Hellman problem.
Keywords— ID- PUIC.
I Introduction:
The deliverables of cloud services provides the service
among heterogeneous entity are treated as distributed
parameters which essentially requires both logical and
physical attributes to achieve better growth in business and
professional needs . Data governance isan important area in
distributed environment to deal with heterogeneous
platform to achieve common objective for both client and
organizations need. Client usually faces capital investing
issues to store their own information whicharesensitive and
prone to attacks. So clients store their information in a
monitored environment that provides security and
availability for the information. The rapidgrowthofbusiness
in IT in the field of service and Communication generates a
large amount of information or data. This huge amount of
information needs massive computational potential and
larges space for storage. As a result cloud computing was
introduced for satisfy the requirementsof bothend-userand
service providers by adopting on demand and on command
services. The deliverablesof cloud can be from applicationto
platform independent where it differentiates public and
private forms to behave as a different entity as a result client
are free enough and relaxed from investing on storage
infrastructure and management of data accessingaroundthe
globe from different locations.
The data or information which is stored in public cloud
doesn’t have complete control of client where they have
achieved their information outside their storage space as a
result there is lack of security and lack of trust inbetweenthe
public cloud and clients. The security termscan bedefinedby
three parameters Confidentiality, Availability and Integrity
Among the above set parameters integrity is an important
factor and primitive one for remote data integrity check. In
few instances the data owner may be declared as
unauthorized party to access to his own data from PCS. In
this case the owner will refer for accessing theinformationto
the third party like proxy. The other face of the entity must
provide a protocol likeremote integration checkingmodelin
order to make the system efficient and reliable.
II. Existing System
Many of the security problemsbeingencounteredincloudfor
processing of information work based on cryptography,ABE
schemes, Policy attributes and so on all these are correlated
with security measures to contribute for various reliable
factors. The existing system containsretrieval ofinformation
without data proofing and not delegatingthetwoinformation
proxy services. Also proof to retrieving the informationlacks
in higher security control when the data is distributedamong
different locations to process parallel. Below figure
represents the key generation and its attributes for existing
culture.
In public cloud there is no availability to solve integritycheck
and there is no efficient model for proxy service that deals
with public cloud services. In the existing system normally
reduplication takes place due to data redundancy.
Malicioususer Attacks at intrusion level withoutconsidering
larger data sets.
Fig 1
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 01 | Jan-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 577
III. Proposed System
 Mainly focus on proxy content and checks the
integrity of information remotely.
 Implanting ID-PUIC protocol and ignoring
certification management.
 Consideration of Bilinear pairing system for
Security model.
 Pioneering the ID-PUIC model to check private,
outsourced and public respectively.
IV. System Assumption:
Framework prototype and Reliability model of ID-PUIC has
ID-PUIC convention which can be isolated into four, for
example, Original Client Public Cloud Server, Proxy, Key
Generation Center. Fig1 speaks to Data stream outline of
System model and security display. Unique Client has
enormous measure of information which is transferred to a
substance which has monstrous information to be
transferred to Public cloud serversCS utilizingthesupportof
designated intermediary which play out the activities of
remote information trustworthiness checking. Open Cloud
public Server is component which is controlled by cloud
administrations which has proficient capacity zone and
whatever the customers transfer the information is kept up
by the calculation asset. Intermediary is a substance which
formsthe first customer'sinformation which is approved by
the intermediary when warrant m fulfilled as a substitute
and produced by the first customer which prepare and
transfers the information of unique customersorelsesystem
is not performed. Key Generation Center is additionally a
substance. While accepting a character Key Generation
Center which creates the private key compares to the
personality got.
V. Data Flow Model:
Fig 2
VI. Data flow diagram for ID-PUIC :
Step1: User Registration
Step2: Login to Public Cloud
Step3: Client Upload a documents.
Step4: Proxy checking verifying for duplication of files
Step5: Auditor will generate unique Integration key and
process the client request.
Fig 3
VII. Modules:
In the ID-PUIC modeling the actual owner will communicate
with PCS to verify the remote integrity factors. There by
providing a better proof system which interactive enough.
The data or information which is stored in public cloud
doesn’t have complete control of client where they have
achieved their information outside their storage space as a
result there is lack of security and lack of trust inbetweenthe
public cloud and clients. The security termscan bedefinedby
the parameters. Among the below set parametersintegrityis
an important factor and primitive one for remote data
integrity check. In few instances the data owner may be
declared as unauthorized party to access to his own data
from PCS. In this case the owner will refer for accessing the
information to the third party like proxy. The other face of
the entity must provide a protocol like remote integration
checking model in order to make the system efficient and
reliable.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 01 | Jan-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 578
 Extract,
 Proxy-key generations,
 TagGen
 Proofs.
A. Extract:
Consider K is the security parameter asinput, So thatwhenit
is an input then it leads to the system community framework
as output and the master secret key. The system community
framework are considers as made access to public and the
master secret key MSK is consider as made privy using KGC
which generates the output as individual private key sk and
identical to the corresponding ID.
B. Proxy-Key Generation:
Here authentic Client produces the warrant mω And signs
mω after warrant signature pair receivedbytheproxy.While
receiving the warrant signature pair from authentic Client,
the proxy produces the proxy-key by using its own private
key.
C. TagGen:
TagGen takes a input as File block Fi and another one proxy-
key, the proxy produces block tag. The respected then block
tag pair is uploading to public cloud service. The
intermediary creates the square'stag andtransferpiecelabel
sets to PCS after the contribution of information piece.
D. Proofs:
In the Proof, the communication withPCSwillhappenunique
customer and checks uprightnessof the remote information.
Unique Client has immense measure of information which is
transferred to a substance which hasmonstrousinformation
to be transferred to Public cloud servers CS utilizing the
support of appointed intermediary which play out the
activities of remote information respectability checking.
Without over-burdening the set with single bottleneck
circumstance. The principle factor of ABE utilization is toget
incorporated among heterogeneous operators intuitively to
structure a perfect basic leadership get to device.
VIII. Related Work
A. Framework form Attacks:
Securing the zone of the recipient is incredibly basic. And
underlined the noteworthiness and proposed the securities
against movement examination. The child centre point must
mix a fake package when it has no bundle to send.
Subsequently, the lifetime of the WSN is reduced. More-over,
the transmission times of the bundles are subjectively
conceded with a particular ultimate objective to hide the
movement plan. Later, watched out for the issue of how to
disguise the zone of the data gatherer. The makerswantedto
develop counter measuresagainst developmentexamination
strikes. Multi-way directing what's more, fake messages
spread is familiar all together with sells out and deludes an
adversary, so that the bona fide way can't be viably found. As
discussed over, the development examinationambushestake
longer time than the package taking after attack. In previous
work they did not consider the package taking after ambush.
In order to defend against the time connection ambush,
advanced work proposed to defer the transmission times of
the packages heedlessly remembering the true objective to
conceal the development outline, which is unsatisfactory for
the frameworks with unimportant framework action.
B. Zonal information:
The source-zone insurance issue this work proposes the
Phantom Routing tradition to counter foes taking after back
packsto the source centre. This tradition sendseachmessage
on an unpredictable or guided walk around an apparition
source, which finally progresses the bundle to the sink using
a flooding-based or a lone way controlling arrangement.
Thusly, every package appears to have begun from another
data source. This tradition shows a couple inconveniences
particularly in the walking stage, which has a tendency to
stay close-by to the principal source. New courses of action
have concentrated on controlling this walking stage while in
various game plans the ghost sources are set in a ring where
the messages are mixed with fake development. To hide the
closeness of eventsfrom adversarieswith an overall hearing
degree, in all sensors transmit messages at a settled rate
paying little regard to the nearness of honest to goodness
events.
C. Re-Encryption:
The idea of intermediary re-encryption (PRE), where asemi-
trusted intermediary can change a ciphertext for Alice into
another ciphertext that Bob can unscramble. Be that as it
may, the intermediary can get the hang of nothing about the
comparing plaintext. As per the course of change, PRE plans
can be arranged into two sorts, namely, bi-directional or
unidirectional. A PRE plot is called bidirectional if the
intermediary can utilize the re-encryption key to occupy
ciphertexts from Alice to Bob what's more, the other way
around. Else, it is called unidirectional. In unidirectional PRE
plans, the intermediary can as it were change in one heading.
A likewise gave another technique to order PRE plans, called
multi-utilize, i.e., the ciphertext can be changed from Alice to
Bob to Charlie and single-utilize, i.e., the ciphertext can be
changed just once. Because of its change property, PRE plans
can be utilized as a part of numerous applications, including
disentanglement of key conveyance.
IX Conclusion &Future Work:
Roused by the appliance needs, this work emphasizes the
novel protection thoughtof ID-PUIC out intheavailablecloud
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 01 | Jan-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 579
community. The work specifies ID-PUIC's system prototype
and framework illustrate. By then, the initial strong ID-PUIC
procedure is used by compiling the bilinear pairingssystem.
The robust ID-PUIC is provably privy and secured, and
coercive by using the conventional securityconfirmationand
capable of examine. On the other session, the suggested ID-
PUIC manner to recognize privy remote trusted data
checking, appointed remote data appropriateness checking
and available remote data uniqueness and genuineness
checking in aspect of the principal client's endorsement.
IX. REFERENCES:
[1] Z. Fu, X. Sun, Q. Liu, L. Zhou, and J. Shu, “Achieving
efficient cloud search services: Multi-keywordrankedsearch
over encrypted cloud data supporting parallel computing,”
IEICE Trans. Commun., vol. E98-B, no. 1, pp. 190–200, 2015.
[2] Y. Ren, J. Shen, J. Wang, J. Han, and S. Lee, “Mutual
verifiable provable data auditing in public cloud storage,” J.
Internet Technol., vol. 16, no. 2, pp. 317–323, 2015.
[3] M. Mambo, K. Usuda, and E. Okamoto, “Proxy signatures
for delegating signing operation,” in Proc. CCS, 1996, pp. 48–
57.
[4]E.-J. Yoon, Y. Choi, and C. Kim, “New ID-based proxy
signature scheme with message recovery,” in Grid and
Pervasive Computing (LectureNotes in Computer Science),
vol. 7861. Berlin, Germany: Springer- Verlag, 2013, pp. 945–
951.
[5]B.-C. Chen and H.-T. Yeh, “Secure proxy signatureschemes
from the weil pairing,” J. Supercomput., vol. 65, no. 2, pp.
496–506, 2013.
[6]X. Liu, J. Ma, J. Xiong, T. Zhang, and Q. Li, “Personal health
records integrity erification using attribute based proxy
signature in cloud computing,” in Internet and Distributed
Computing Systems (Lecture Notes in Computer Science),
vol. 8223. Berlin, Germany: Springer- Verlag, 2013, pp. 238–
251.
[7] H. Guo, Z. Zhang, and J. Zhang, “Proxy re-encryption with
unforgeable re-encryption keys,” in CryptologyandNetwork
Security (Lecture Notes in Computer Science), vol. 8813.
Berlin, Germany: Springer-Verlag,2014, pp. 20–33.
[8] E. Kirshanova, “Proxy re-encryption from lattices,” in
Public-KeyCryptography (Lecture Notes in Computer
Science), vol. 8383. Berlin, Germany: Springer-Verlag, 2014,
pp. 77–94.
[9]P. Xu, H. Chen, D. Zou, and H. Jin, “Fine-grained and
heterogeneous proxy re-encryption for secure cloud
storage,” Chin. Sci. Bull., vol. 59, no. 32, pp. 4201–4209,2014.
[10] S. Ohata, Y. Kawai, T. Matsuda, G. Hanaoka, and K.
Matsuura, “Re-encryption verifiability: How to detect
malicious activities of a proxy in proxy re-encryption,” in
Proc. CT-RSA Conf., vol. 9048. 2015, pp. 410–428.
[11] G. Ateniese et al., “Provable data possessionatuntrusted
stores,” in Proc. CCS, 2007, pp. 598–609.
[12] G. Ateniese, R. Di Pietro, L. V. Mancini, and G. Tsudik,
“Scalable and efficient provable data possession,” in Proc.
SecureComm, 2008, Art. ID 9.
[13] C. C. Erway, A. Küpçü, C. Papamanthou, and R. Tamassia,
“Dynamic provable data possession,” in Proc. CCS, 2009, pp.
213–222.
[14] E. Esiner, A. Küpçü, and Ö. Özkasap, “Analysis and
optimization on FlexDPDP: A practical solution for dynamic
provable data possession,” Intelligent Cloud Computing
(Lecture Notes in Computer Science), vol. 8993. Berlin,
Germany: Springer-Verlag, 2014, pp. 65–83.
[15]E. Zhou and Z. Li, “An improved remote data possession
checking protocol in cloud storage,” in Algorithms and
Architectures for Parallel Processing (Lecture Notes in
Computer Science), vol. 8631. Berlin, Germany: Springer-
Verlag, 2014, pp. 611– 617.
[16]H. Wang, “Proxy provable data possession in public
clouds,” IEEE Trans. Services Comput., vol. 6, no. 4, pp. 551–
559, Oct./Dec. 2013.
[17]H. Wang, “Identity-based distributed provable data
possession in multicloud storage,” IEEE Trans. Services
Comput., vol. 8, no. 2, pp. 328–340, Mar./Apr. 2015.
[18] H. Wang, Q. Wu, B. Qin, and J. Domingo-Ferrer,“FRR:Fair
remote retrieval of outsourced private medical records in
electronic health networks,” J. Biomed. Inform., vol. 50, pp.
226–233, Aug. 2014.
[19]H. Wang, “Anonymous multi-receiver remote data
retrieval for pay-TV in public clouds,” IET Inf. Secur., vol. 9,
no. 2, pp. 108–118, Mar. 2015.
[20]H. Shacham and B. Waters, “Compact proofs of
retrievability,” in Proc. ASIACRYPT, vol. 5350. 2008, pp. 90–
107.
[21]D. Cash, A. Küpçü, and D. Wichs, “Dynamic proofs of
retrievability via oblivious RAM,” in Proc.

More Related Content

What's hot

Detection of ICMPv6-based DDoS attacks using anomaly based intrusion detectio...
Detection of ICMPv6-based DDoS attacks using anomaly based intrusion detectio...Detection of ICMPv6-based DDoS attacks using anomaly based intrusion detectio...
Detection of ICMPv6-based DDoS attacks using anomaly based intrusion detectio...
IJECEIAES
 
Combating the enemy within – an elegant mathematical approach to insider thre...
Combating the enemy within – an elegant mathematical approach to insider thre...Combating the enemy within – an elegant mathematical approach to insider thre...
Combating the enemy within – an elegant mathematical approach to insider thre...Martin Ruubel
 
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET Journal
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
Shakas Technologies
 
The emerging pci dss and nist standards
The emerging pci dss and nist standardsThe emerging pci dss and nist standards
The emerging pci dss and nist standards
Ulf Mattsson
 
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward security
Pvrtechnologies Nellore
 
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward security
LeMeniz Infotech
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET Journal
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
Nexgen Technology
 
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET Journal
 
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET Journal
 
Final Year Project Titles 2013 2014
Final Year Project Titles 2013 2014Final Year Project Titles 2013 2014
Final Year Project Titles 2013 2014
sybiantech
 
pay as you decrypt decryption outsourcing for functional encryption using blo...
pay as you decrypt decryption outsourcing for functional encryption using blo...pay as you decrypt decryption outsourcing for functional encryption using blo...
pay as you decrypt decryption outsourcing for functional encryption using blo...
Venkat Projects
 
Systematic Review Automation in Cyber Security
Systematic Review Automation in Cyber SecuritySystematic Review Automation in Cyber Security
Systematic Review Automation in Cyber Security
YogeshIJTSRD
 
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute-Based Encryption for Access of Secured Data in Cloud StorageAttribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
IJSRD
 
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET Journal
 
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
Invincea, Inc.
 
IRJET- Attribute based Access Control for Cloud Data Storage
IRJET- Attribute based Access Control for Cloud Data StorageIRJET- Attribute based Access Control for Cloud Data Storage
IRJET- Attribute based Access Control for Cloud Data Storage
IRJET Journal
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
IRJET Journal
 

What's hot (19)

Detection of ICMPv6-based DDoS attacks using anomaly based intrusion detectio...
Detection of ICMPv6-based DDoS attacks using anomaly based intrusion detectio...Detection of ICMPv6-based DDoS attacks using anomaly based intrusion detectio...
Detection of ICMPv6-based DDoS attacks using anomaly based intrusion detectio...
 
Combating the enemy within – an elegant mathematical approach to insider thre...
Combating the enemy within – an elegant mathematical approach to insider thre...Combating the enemy within – an elegant mathematical approach to insider thre...
Combating the enemy within – an elegant mathematical approach to insider thre...
 
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
 
The emerging pci dss and nist standards
The emerging pci dss and nist standardsThe emerging pci dss and nist standards
The emerging pci dss and nist standards
 
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward security
 
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward security
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
 
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
 
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
 
Final Year Project Titles 2013 2014
Final Year Project Titles 2013 2014Final Year Project Titles 2013 2014
Final Year Project Titles 2013 2014
 
pay as you decrypt decryption outsourcing for functional encryption using blo...
pay as you decrypt decryption outsourcing for functional encryption using blo...pay as you decrypt decryption outsourcing for functional encryption using blo...
pay as you decrypt decryption outsourcing for functional encryption using blo...
 
Systematic Review Automation in Cyber Security
Systematic Review Automation in Cyber SecuritySystematic Review Automation in Cyber Security
Systematic Review Automation in Cyber Security
 
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute-Based Encryption for Access of Secured Data in Cloud StorageAttribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
 
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
 
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
 
IRJET- Attribute based Access Control for Cloud Data Storage
IRJET- Attribute based Access Control for Cloud Data StorageIRJET- Attribute based Access Control for Cloud Data Storage
IRJET- Attribute based Access Control for Cloud Data Storage
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
 

Similar to IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checking in Public Cloud

IRJET- Sensitive Data Sharing using QRCODE
IRJET-  	  Sensitive Data Sharing using QRCODEIRJET-  	  Sensitive Data Sharing using QRCODE
IRJET- Sensitive Data Sharing using QRCODE
IRJET Journal
 
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
IRJET Journal
 
IRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud DataIRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud Data
IRJET Journal
 
A Noval Method for Data Auditing and Integrity Checking in Public Cloud
A Noval Method for Data Auditing and Integrity Checking in Public CloudA Noval Method for Data Auditing and Integrity Checking in Public Cloud
A Noval Method for Data Auditing and Integrity Checking in Public Cloud
rahulmonikasharma
 
IRJET- Design and Analytical Study of Id Based Pixel Secured Cloud Enablem...
IRJET- 	  Design and Analytical Study of Id Based Pixel Secured Cloud Enablem...IRJET- 	  Design and Analytical Study of Id Based Pixel Secured Cloud Enablem...
IRJET- Design and Analytical Study of Id Based Pixel Secured Cloud Enablem...
IRJET Journal
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357IJMER
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357IJMER
 
Secure Multi-Owner Group Signature Based Secure M-Health Records in Cloud
Secure Multi-Owner Group Signature Based Secure M-Health  Records in Cloud Secure Multi-Owner Group Signature Based Secure M-Health  Records in Cloud
Secure Multi-Owner Group Signature Based Secure M-Health Records in Cloud
IJMER
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357IJMER
 
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDSDATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
IRJET Journal
 
Securing Liaison-Less Publisher/Subscriber Systems using Identity Based Encr...
Securing Liaison-Less Publisher/Subscriber Systems  using Identity Based Encr...Securing Liaison-Less Publisher/Subscriber Systems  using Identity Based Encr...
Securing Liaison-Less Publisher/Subscriber Systems using Identity Based Encr...
IRJET Journal
 
IRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor AuthenticationIRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor Authentication
IRJET Journal
 
IRJET- Model-Driven Platform for Service Security and Framework for Data ...
IRJET-  	  Model-Driven Platform for Service Security and Framework for Data ...IRJET-  	  Model-Driven Platform for Service Security and Framework for Data ...
IRJET- Model-Driven Platform for Service Security and Framework for Data ...
IRJET Journal
 
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
IRJET Journal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET Journal
 
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET-  	  Technical Review of different Methods for Multi Factor AuthenticationIRJET-  	  Technical Review of different Methods for Multi Factor Authentication
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET Journal
 
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-PaymentsSurvey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
IRJET Journal
 
IRJET- Data Privacy and Security Industry – Opportunities and Challenges
IRJET- Data Privacy and Security Industry – Opportunities and ChallengesIRJET- Data Privacy and Security Industry – Opportunities and Challenges
IRJET- Data Privacy and Security Industry – Opportunities and Challenges
IRJET Journal
 
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key Security
IRJET-  	  Authentic and Anonymous Data Sharing with Enhanced Key SecurityIRJET-  	  Authentic and Anonymous Data Sharing with Enhanced Key Security
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key Security
IRJET Journal
 

Similar to IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checking in Public Cloud (20)

IRJET- Sensitive Data Sharing using QRCODE
IRJET-  	  Sensitive Data Sharing using QRCODEIRJET-  	  Sensitive Data Sharing using QRCODE
IRJET- Sensitive Data Sharing using QRCODE
 
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
 
IRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud DataIRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud Data
 
A Noval Method for Data Auditing and Integrity Checking in Public Cloud
A Noval Method for Data Auditing and Integrity Checking in Public CloudA Noval Method for Data Auditing and Integrity Checking in Public Cloud
A Noval Method for Data Auditing and Integrity Checking in Public Cloud
 
IRJET- Design and Analytical Study of Id Based Pixel Secured Cloud Enablem...
IRJET- 	  Design and Analytical Study of Id Based Pixel Secured Cloud Enablem...IRJET- 	  Design and Analytical Study of Id Based Pixel Secured Cloud Enablem...
IRJET- Design and Analytical Study of Id Based Pixel Secured Cloud Enablem...
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357
 
Secure Multi-Owner Group Signature Based Secure M-Health Records in Cloud
Secure Multi-Owner Group Signature Based Secure M-Health  Records in Cloud Secure Multi-Owner Group Signature Based Secure M-Health  Records in Cloud
Secure Multi-Owner Group Signature Based Secure M-Health Records in Cloud
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357
 
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDSDATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
 
Securing Liaison-Less Publisher/Subscriber Systems using Identity Based Encr...
Securing Liaison-Less Publisher/Subscriber Systems  using Identity Based Encr...Securing Liaison-Less Publisher/Subscriber Systems  using Identity Based Encr...
Securing Liaison-Less Publisher/Subscriber Systems using Identity Based Encr...
 
IRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor AuthenticationIRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor Authentication
 
IRJET- Model-Driven Platform for Service Security and Framework for Data ...
IRJET-  	  Model-Driven Platform for Service Security and Framework for Data ...IRJET-  	  Model-Driven Platform for Service Security and Framework for Data ...
IRJET- Model-Driven Platform for Service Security and Framework for Data ...
 
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
 
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET-  	  Technical Review of different Methods for Multi Factor AuthenticationIRJET-  	  Technical Review of different Methods for Multi Factor Authentication
IRJET- Technical Review of different Methods for Multi Factor Authentication
 
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-PaymentsSurvey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
 
IRJET- Data Privacy and Security Industry – Opportunities and Challenges
IRJET- Data Privacy and Security Industry – Opportunities and ChallengesIRJET- Data Privacy and Security Industry – Opportunities and Challenges
IRJET- Data Privacy and Security Industry – Opportunities and Challenges
 
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key Security
IRJET-  	  Authentic and Anonymous Data Sharing with Enhanced Key SecurityIRJET-  	  Authentic and Anonymous Data Sharing with Enhanced Key Security
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key Security
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
SupreethSP4
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 

Recently uploaded (20)

ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 

IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checking in Public Cloud

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 01 | Jan-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 576 An Algorithmic approach for Remote Data uploading and Integrity Checking in Public Cloud Gayathri Satish Student/CNE/M.Tech, Dept. of ISE, The National Institute of Engineering, Mysuru, India ---------------------------------------------------------------------***-------------------------------------------------------------------- Abstract- As the technology is been contributing more and more services for the end-user activity for the purpose of high computing factors. There may be contribution from more number of clients to store their information among cloud servers (public).Introducing security problem solvingmethods at the backend to process client data among different stakesof public cloud. When the client faces some set of limitation in accessing the pcs he might represent the proxy behavior for storing and uploading of information this might helps in resolving the security which id been integrated with client information that need to be processed in public cloud. Considering all these factors of processing with respect to security a solution is been proposed for proxy integrated systems in uploading the information to check the remote integrity check module(ID-PUIC) is introduced for processing in public cloud. Here we also represent definition for integrity check and also respective modeling for system and security. The ID-PUIC is much more efficient for integrity checking and flexible enough and its mathematical computation isdrivenby Diffie-Hellman problem. Keywords— ID- PUIC. I Introduction: The deliverables of cloud services provides the service among heterogeneous entity are treated as distributed parameters which essentially requires both logical and physical attributes to achieve better growth in business and professional needs . Data governance isan important area in distributed environment to deal with heterogeneous platform to achieve common objective for both client and organizations need. Client usually faces capital investing issues to store their own information whicharesensitive and prone to attacks. So clients store their information in a monitored environment that provides security and availability for the information. The rapidgrowthofbusiness in IT in the field of service and Communication generates a large amount of information or data. This huge amount of information needs massive computational potential and larges space for storage. As a result cloud computing was introduced for satisfy the requirementsof bothend-userand service providers by adopting on demand and on command services. The deliverablesof cloud can be from applicationto platform independent where it differentiates public and private forms to behave as a different entity as a result client are free enough and relaxed from investing on storage infrastructure and management of data accessingaroundthe globe from different locations. The data or information which is stored in public cloud doesn’t have complete control of client where they have achieved their information outside their storage space as a result there is lack of security and lack of trust inbetweenthe public cloud and clients. The security termscan bedefinedby three parameters Confidentiality, Availability and Integrity Among the above set parameters integrity is an important factor and primitive one for remote data integrity check. In few instances the data owner may be declared as unauthorized party to access to his own data from PCS. In this case the owner will refer for accessing theinformationto the third party like proxy. The other face of the entity must provide a protocol likeremote integration checkingmodelin order to make the system efficient and reliable. II. Existing System Many of the security problemsbeingencounteredincloudfor processing of information work based on cryptography,ABE schemes, Policy attributes and so on all these are correlated with security measures to contribute for various reliable factors. The existing system containsretrieval ofinformation without data proofing and not delegatingthetwoinformation proxy services. Also proof to retrieving the informationlacks in higher security control when the data is distributedamong different locations to process parallel. Below figure represents the key generation and its attributes for existing culture. In public cloud there is no availability to solve integritycheck and there is no efficient model for proxy service that deals with public cloud services. In the existing system normally reduplication takes place due to data redundancy. Malicioususer Attacks at intrusion level withoutconsidering larger data sets. Fig 1
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 01 | Jan-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 577 III. Proposed System  Mainly focus on proxy content and checks the integrity of information remotely.  Implanting ID-PUIC protocol and ignoring certification management.  Consideration of Bilinear pairing system for Security model.  Pioneering the ID-PUIC model to check private, outsourced and public respectively. IV. System Assumption: Framework prototype and Reliability model of ID-PUIC has ID-PUIC convention which can be isolated into four, for example, Original Client Public Cloud Server, Proxy, Key Generation Center. Fig1 speaks to Data stream outline of System model and security display. Unique Client has enormous measure of information which is transferred to a substance which has monstrous information to be transferred to Public cloud serversCS utilizingthesupportof designated intermediary which play out the activities of remote information trustworthiness checking. Open Cloud public Server is component which is controlled by cloud administrations which has proficient capacity zone and whatever the customers transfer the information is kept up by the calculation asset. Intermediary is a substance which formsthe first customer'sinformation which is approved by the intermediary when warrant m fulfilled as a substitute and produced by the first customer which prepare and transfers the information of unique customersorelsesystem is not performed. Key Generation Center is additionally a substance. While accepting a character Key Generation Center which creates the private key compares to the personality got. V. Data Flow Model: Fig 2 VI. Data flow diagram for ID-PUIC : Step1: User Registration Step2: Login to Public Cloud Step3: Client Upload a documents. Step4: Proxy checking verifying for duplication of files Step5: Auditor will generate unique Integration key and process the client request. Fig 3 VII. Modules: In the ID-PUIC modeling the actual owner will communicate with PCS to verify the remote integrity factors. There by providing a better proof system which interactive enough. The data or information which is stored in public cloud doesn’t have complete control of client where they have achieved their information outside their storage space as a result there is lack of security and lack of trust inbetweenthe public cloud and clients. The security termscan bedefinedby the parameters. Among the below set parametersintegrityis an important factor and primitive one for remote data integrity check. In few instances the data owner may be declared as unauthorized party to access to his own data from PCS. In this case the owner will refer for accessing the information to the third party like proxy. The other face of the entity must provide a protocol like remote integration checking model in order to make the system efficient and reliable.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 01 | Jan-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 578  Extract,  Proxy-key generations,  TagGen  Proofs. A. Extract: Consider K is the security parameter asinput, So thatwhenit is an input then it leads to the system community framework as output and the master secret key. The system community framework are considers as made access to public and the master secret key MSK is consider as made privy using KGC which generates the output as individual private key sk and identical to the corresponding ID. B. Proxy-Key Generation: Here authentic Client produces the warrant mω And signs mω after warrant signature pair receivedbytheproxy.While receiving the warrant signature pair from authentic Client, the proxy produces the proxy-key by using its own private key. C. TagGen: TagGen takes a input as File block Fi and another one proxy- key, the proxy produces block tag. The respected then block tag pair is uploading to public cloud service. The intermediary creates the square'stag andtransferpiecelabel sets to PCS after the contribution of information piece. D. Proofs: In the Proof, the communication withPCSwillhappenunique customer and checks uprightnessof the remote information. Unique Client has immense measure of information which is transferred to a substance which hasmonstrousinformation to be transferred to Public cloud servers CS utilizing the support of appointed intermediary which play out the activities of remote information respectability checking. Without over-burdening the set with single bottleneck circumstance. The principle factor of ABE utilization is toget incorporated among heterogeneous operators intuitively to structure a perfect basic leadership get to device. VIII. Related Work A. Framework form Attacks: Securing the zone of the recipient is incredibly basic. And underlined the noteworthiness and proposed the securities against movement examination. The child centre point must mix a fake package when it has no bundle to send. Subsequently, the lifetime of the WSN is reduced. More-over, the transmission times of the bundles are subjectively conceded with a particular ultimate objective to hide the movement plan. Later, watched out for the issue of how to disguise the zone of the data gatherer. The makerswantedto develop counter measuresagainst developmentexamination strikes. Multi-way directing what's more, fake messages spread is familiar all together with sells out and deludes an adversary, so that the bona fide way can't be viably found. As discussed over, the development examinationambushestake longer time than the package taking after attack. In previous work they did not consider the package taking after ambush. In order to defend against the time connection ambush, advanced work proposed to defer the transmission times of the packages heedlessly remembering the true objective to conceal the development outline, which is unsatisfactory for the frameworks with unimportant framework action. B. Zonal information: The source-zone insurance issue this work proposes the Phantom Routing tradition to counter foes taking after back packsto the source centre. This tradition sendseachmessage on an unpredictable or guided walk around an apparition source, which finally progresses the bundle to the sink using a flooding-based or a lone way controlling arrangement. Thusly, every package appears to have begun from another data source. This tradition shows a couple inconveniences particularly in the walking stage, which has a tendency to stay close-by to the principal source. New courses of action have concentrated on controlling this walking stage while in various game plans the ghost sources are set in a ring where the messages are mixed with fake development. To hide the closeness of eventsfrom adversarieswith an overall hearing degree, in all sensors transmit messages at a settled rate paying little regard to the nearness of honest to goodness events. C. Re-Encryption: The idea of intermediary re-encryption (PRE), where asemi- trusted intermediary can change a ciphertext for Alice into another ciphertext that Bob can unscramble. Be that as it may, the intermediary can get the hang of nothing about the comparing plaintext. As per the course of change, PRE plans can be arranged into two sorts, namely, bi-directional or unidirectional. A PRE plot is called bidirectional if the intermediary can utilize the re-encryption key to occupy ciphertexts from Alice to Bob what's more, the other way around. Else, it is called unidirectional. In unidirectional PRE plans, the intermediary can as it were change in one heading. A likewise gave another technique to order PRE plans, called multi-utilize, i.e., the ciphertext can be changed from Alice to Bob to Charlie and single-utilize, i.e., the ciphertext can be changed just once. Because of its change property, PRE plans can be utilized as a part of numerous applications, including disentanglement of key conveyance. IX Conclusion &Future Work: Roused by the appliance needs, this work emphasizes the novel protection thoughtof ID-PUIC out intheavailablecloud
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 01 | Jan-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 579 community. The work specifies ID-PUIC's system prototype and framework illustrate. By then, the initial strong ID-PUIC procedure is used by compiling the bilinear pairingssystem. The robust ID-PUIC is provably privy and secured, and coercive by using the conventional securityconfirmationand capable of examine. On the other session, the suggested ID- PUIC manner to recognize privy remote trusted data checking, appointed remote data appropriateness checking and available remote data uniqueness and genuineness checking in aspect of the principal client's endorsement. IX. REFERENCES: [1] Z. Fu, X. Sun, Q. Liu, L. Zhou, and J. Shu, “Achieving efficient cloud search services: Multi-keywordrankedsearch over encrypted cloud data supporting parallel computing,” IEICE Trans. Commun., vol. E98-B, no. 1, pp. 190–200, 2015. [2] Y. Ren, J. Shen, J. Wang, J. Han, and S. Lee, “Mutual verifiable provable data auditing in public cloud storage,” J. Internet Technol., vol. 16, no. 2, pp. 317–323, 2015. [3] M. Mambo, K. Usuda, and E. Okamoto, “Proxy signatures for delegating signing operation,” in Proc. CCS, 1996, pp. 48– 57. [4]E.-J. Yoon, Y. Choi, and C. Kim, “New ID-based proxy signature scheme with message recovery,” in Grid and Pervasive Computing (LectureNotes in Computer Science), vol. 7861. Berlin, Germany: Springer- Verlag, 2013, pp. 945– 951. [5]B.-C. Chen and H.-T. Yeh, “Secure proxy signatureschemes from the weil pairing,” J. Supercomput., vol. 65, no. 2, pp. 496–506, 2013. [6]X. Liu, J. Ma, J. Xiong, T. Zhang, and Q. Li, “Personal health records integrity erification using attribute based proxy signature in cloud computing,” in Internet and Distributed Computing Systems (Lecture Notes in Computer Science), vol. 8223. Berlin, Germany: Springer- Verlag, 2013, pp. 238– 251. [7] H. Guo, Z. Zhang, and J. Zhang, “Proxy re-encryption with unforgeable re-encryption keys,” in CryptologyandNetwork Security (Lecture Notes in Computer Science), vol. 8813. Berlin, Germany: Springer-Verlag,2014, pp. 20–33. [8] E. Kirshanova, “Proxy re-encryption from lattices,” in Public-KeyCryptography (Lecture Notes in Computer Science), vol. 8383. Berlin, Germany: Springer-Verlag, 2014, pp. 77–94. [9]P. Xu, H. Chen, D. Zou, and H. Jin, “Fine-grained and heterogeneous proxy re-encryption for secure cloud storage,” Chin. Sci. Bull., vol. 59, no. 32, pp. 4201–4209,2014. [10] S. Ohata, Y. Kawai, T. Matsuda, G. Hanaoka, and K. Matsuura, “Re-encryption verifiability: How to detect malicious activities of a proxy in proxy re-encryption,” in Proc. CT-RSA Conf., vol. 9048. 2015, pp. 410–428. [11] G. Ateniese et al., “Provable data possessionatuntrusted stores,” in Proc. CCS, 2007, pp. 598–609. [12] G. Ateniese, R. Di Pietro, L. V. Mancini, and G. Tsudik, “Scalable and efficient provable data possession,” in Proc. SecureComm, 2008, Art. ID 9. [13] C. C. Erway, A. Küpçü, C. Papamanthou, and R. Tamassia, “Dynamic provable data possession,” in Proc. CCS, 2009, pp. 213–222. [14] E. Esiner, A. Küpçü, and Ö. Özkasap, “Analysis and optimization on FlexDPDP: A practical solution for dynamic provable data possession,” Intelligent Cloud Computing (Lecture Notes in Computer Science), vol. 8993. Berlin, Germany: Springer-Verlag, 2014, pp. 65–83. [15]E. Zhou and Z. Li, “An improved remote data possession checking protocol in cloud storage,” in Algorithms and Architectures for Parallel Processing (Lecture Notes in Computer Science), vol. 8631. Berlin, Germany: Springer- Verlag, 2014, pp. 611– 617. [16]H. Wang, “Proxy provable data possession in public clouds,” IEEE Trans. Services Comput., vol. 6, no. 4, pp. 551– 559, Oct./Dec. 2013. [17]H. Wang, “Identity-based distributed provable data possession in multicloud storage,” IEEE Trans. Services Comput., vol. 8, no. 2, pp. 328–340, Mar./Apr. 2015. [18] H. Wang, Q. Wu, B. Qin, and J. Domingo-Ferrer,“FRR:Fair remote retrieval of outsourced private medical records in electronic health networks,” J. Biomed. Inform., vol. 50, pp. 226–233, Aug. 2014. [19]H. Wang, “Anonymous multi-receiver remote data retrieval for pay-TV in public clouds,” IET Inf. Secur., vol. 9, no. 2, pp. 108–118, Mar. 2015. [20]H. Shacham and B. Waters, “Compact proofs of retrievability,” in Proc. ASIACRYPT, vol. 5350. 2008, pp. 90– 107. [21]D. Cash, A. Küpçü, and D. Wichs, “Dynamic proofs of retrievability via oblivious RAM,” in Proc.