SlideShare a Scribd company logo
1 of 8
Download to read offline
Advanced Computing: An International Journal (ACIJ), Vol.8, No.1/2, March 2017
DOI:10.5121/acij.2017.8201 1
MAINTAINING DATA INTEGRITY FOR SHARED
DATA IN CLOUD
Mrunal M.Ruke, Supriya Gore, Supriya Chavan and prof : Bhawana Dakhare
Bharati Vidyapeeth College of Engineering,
Sector-7,C.B.D,Belpada,Navi Mumbai-400614, India
ABSTRACT
Cloud computing is defined as a type of computing that relies on sharing computing resources rather than
having local servers or personal devices to handle the applications. User can easily modify the shared and
stored data in the cloud. To overcome this data modification in cloud the signature is provided to each
individual user who accesses the data in cloud.
Once the data is modified by the user on a block, the user must ensure that the signature is provided on that
specific block. When user misbehaves or misuses the system the admin has authority to revoke that
particular user from the group. After revoking that user, the existing user must re-sign the data signed by
the revoked user. In addition to this, the security of the data is also enhanced with the help of public
Auditor who is always able to audit the integrity of shared data without retrieving the entire data from the
cloud.
KEYWORDS
Cloud Computing, PublicAuditor, Revoke User, Signature, Data Integrity
1. INTRODUCTION
People can easily work together in a group by Sharing and storing the services in the cloud. More
specifically, once a user creates shared data in the cloud, every user in the group is able to not
only access and modify shared data, but also share the latest version of the shared data with the
rest of the group. To protect the integrity of data in the cloud, number of mechanisms have been
proposed. In these mechanisms, a signature is attached to each block in data, and the integrity of
data relies on the correctness of all the signatures. One of the most significant and common
features of these mechanisms is to allow a Public Auditor to efficiently check data integrity in the
cloud without downloading the entire data, referred to as public auditing. This Public Auditor
could be a client who would like to utilize cloud data for particular purposes (e.g., search,
computation, data mining, etc.) or Third Party Auditor(TPA) who is able to provide verification
services on data integrity to users. With shared data, once a user modifies a block, that user also
needs to compute a new signature for the modified block. Due to the modifications from different
users, different blocks are signed by different users.
For security reasons, when a user leaves the group or misbehaves, this user must be revoked from
the group. As a result, this revoked user should no longer be able to access and modify shared
Advanced Computing: An International Journal (ACIJ), Vol.8, No.1/2, March 2017
2
data, and the signatures generated by this revoked user are no longer valid to the group.
Therefore, although the content of shared data is not changed during user revocation, the blocks,
which were previously signed by the revoked user, still need to be re-signed by an existing user in
the group. As a result, the integrity of the entire data can still be verified with the public keys of
existing users only.
2. PROBLEM STATEMENT
Many public auditing mechanisms were introduced for efficient integrity checking. During public
auditing method it fails to preserve the identity privacy on shared data and results in reviling
significant confidential information to Public Auditor. In existing system once the user is revoked
from the system, the blocks which were previously signed by this revoked user used to be re-
signed with the help of straightforward method. In which the public auditor asked to existing user
to first download the blocks previously signed by the revoked user, then it verifies the correctness
of the blocks, then re-sign these blocks and finally upload the re-signature to the cloud. This
method cause huge amount of communication and computation resources by downloading and
verifying the blocks, but the content of the block remains same. This method is insecure because
the private data of revoked user is misused by an existing user.
The proposed mechanism allows a public Auditor to efficiently check the data integrity in the
cloud without downloading the entire data. This mechanism preserves the confidentiality of the
shared data by using the proxy re-signature mechanism. In this mechanism the blocks which were
previously assign to revoked user will be re-signed by the existing user. For the security purpose
secret key will be provided while login.
3. LITRATURE SURVEY
Qian Wang et.al. [1] has proposed a model to solve the problem of integrity of data stored in the
cloud. The TPA has allowed verifying data in cloud storage through auditing process and
motivating public auditing system in the cloud. TPA check the outsourced data integrity. The
advantages of auditing are to detect, prevent errors and maintain the database regularly. Auditing
should not bring any new vulnerability towards privacy of data. Based on the proxy re-signature
method designs a public auditing scheme for data storage with proficient user revocation in cloud.
The original user can acts as a group manager and able to retract the users if necessary. For each
block of data to be stored in cloud server, data owner is assigned with a signature and the
integrity of data relies in the correctness of all the signatures. In a cloud if a user modifies a single
block including insertion or deletion, the index of the modified block is changed and the user
needs to compute a new signature for the modified block. User access the modified data with the
new signature generated to perform. For security reasons, when a user leaves the group or
misbehaves, user is revoked from the group.
As a result, this revoked user should no longer able to access and modify shared data, and the
signatures generated by this revoked user are no longer valid to the group users. Therefore the
content of shared data is not changed during user revocation, the blocks which were previously
signed by the revoked user, still need to be re-signed by an existing user in the group. during user
revocation, an existing user need to first download the blocks previously signed by the revoked
user, verify the correctness of these blocks, then re-sign these blocks, and finally upload the new
signatures to the cloud.[4]
Advanced Computing: An International Journal (ACIJ), Vol.8, No.1/2, March 2017
3
The authors Buying Wang et.al [4] has envisioned that data can be easily shared by group. Proxy
re-signature technique was utilized with help of this method and the user can re-sign the revoked
user block and need not to download data from server to verify the shared data integrity and also
maintain the whole data integrity.
4. SYSTEM MODEL
In this proposed system the sharing of data between users in a group with highly secure manner
in the cloud. An authorized member in a group must access the shared data using HMAC
algorithm. During user revocation the block which were previously signed by revoke user will be
re-sign by an existing user in the group.
Also the public verifier is able to verify the integrity of shared data without retrieving the entire
data from the cloud. The Integrity of the data can be verified by using SHA-1 algorithm. Identity
of the signer on each block in shared data is kept private from the public verifier. This method
also supports a novel public auditing mechanism for the integrity of shared data with efficient
user revocation in cloud.
Figure1: Architecture Diagram
4.1 SYSTEM MODULE
The System consists of the following module.
4.1.1 User Module
User module can be divided into the following sub modules:
1. Registration
2. File upload
3. Download
Advanced Computing: An International Journal (ACIJ), Vol.8, No.1/2, March 2017
4
4. Re-upload
4.1.2 Auditor Module
Auditor Module can be divided into the following sub modules:
1. File Verification
2. View Verification Status
4.1.3 Owner Module
Owner Module can be divided into the following sub modules:
1. View Files
2. Revoke User
5. SECURITY MODEL
5.1 For signature generation
For generating signature on the blocks we have used Hmac algorithm.Hash-based message
authentication code (HMAC) provides the server and the client each with a public and private
key. The public key is known, but the private key is known only to that specific server and that
specific client. The client creates a unique HMAC, or hash, per request to the server by combing
the request data and hashing that data, along with a private key and sending it as part of a request.
The server receives the request and regenerates its own unique HMAC. The server compares the
two HMACs, and, if they're equal, the client is trusted and the request is executed.
HMAC can then be expressed:
1. Append zeros to the left end of K to create a b-bit string K+ (for example, if K is of length 160
bits and b = 512, then K will be appended with 44 zero bytes 0x00).
2. XOR (bitwise exclusive OR) K+ with ipad to produce the b-bit block Si.
3. Append M to Si.
4. Apply H to the stream generated in Step 3.
5. XOR K+ with opad to produce the b-bit block So.
6. Append the hash result from Step 4 to So.
7. Apply H to the stream generated in Step 6 and output the result.
Advanced Computing: An International Journal (ACIJ), Vol.8, No.1/2, March 2017
5
5.2 Integrity Verification
For verifying the data integrity SHA-1 algorithm is used.SHA-1 stands for Secure Hash
algorithm.
Figure 2: Basic hash function
SHA-1 (160 bit message) Algorithm Framework
Step 1: Append Padding Bits
Message is “padded” with a 1 and as many 0’s as necessary to bring the message length
to 64 bits fewer than an even multiple of 512.
Step 2: Append Length
64 bits are appended to the end of the padded message. These bits hold the binary format
of 64 bits indicating the length of the original message.
Step 3: Prepare Processing Functions
SHA1 requires 80 processing functions defined as:
f(t;B,C,D) = (B AND C) OR ((NOT B) AND D) ( 0 <= t <= 19)
f(t;B,C,D) = B XOR C XOR D (20 <= t <= 39)
f(t;B,C,D) = (B AND C) OR (B AND D) OR (C AND D) (40 <= t <=59)
f (t;B,C,D) = B XOR C XOR D (60 <= t <= 79)
Step 4: Prepare Processing Constants
SHA1 requires 80 processing constant words defined as:
K(t) = 0x5A827999 ( 0 <= t <= 19)
K(t) = 0x6ED9EBA1 (20 <= t <= 39)
Advanced Computing: An International Journal (ACIJ), Vol.8, No.1/2, March 2017
6
K(t) = 0x8F1BBCDC (40 <= t <= 59)
K(t) = 0xCA62C1D6 (60 <= t <= 79)
Step 5: Initialize Buffers
SHA1 requires 160 bits or 5 buffers of words (32 bits):
H0 = 0x67452301
H1 = 0xEFCDAB89
H2 = 0x98BADCFE
H3 = 0x10325476
H4 = 0xC3D2E1F0
Step 6: Pseudo Code
For loop on k = 1 to L
(W(0),W(1),...,W(15)) = M[k] /* Divide M[k] into 16 words */
For t = 16 to 79 do:
W(t) = (W(t-3) XOR W(t-8) XOR W(t-14) XOR W(t-16)) <<< 1
A = H0, B = H1, C = H2, D = H3, E = H4
For t = 0 to 79 do:
TEMP = A<<<5 + f(t;B,C,D) + E + W(t) + K(t) E = D, D = C,
C = B<<<30, B = A, A = TEMP
End of for loop
H0 = H0 + A, H1 = H1 + B, H2 = H2 + C, H3 = H3 + D, H4 = H4 + E
End of for loop
Output:
H0, H1, H2, H3, H4, H5: Word buffers with final message digest
Advanced Computing: An International Journal (ACIJ), Vol.8, No.1/2, March 2017
7
Figure 3: Message Diagram
6. CONCLUSION
“Maintaining Data Integrity for Shared Data in cloud” is required where, the cloud offers data
storage and sharing services to the group. By using the service user can easily modify and share
the confidential data in the system. To restrict the data modification the signature is assigned on
each block of the data. Due to which user will able to modify or access the data by the permission
of the owner of the data. If user tries to misuses the data in system, the data owner has authority
to revoke that user from the group and by using proxy re-signature mechanism the signature on
the data blocks of revoked user is overridden by the new signature. This helps in preserving the
security of the system. To extent the security the secret key is also provided to the user at the time
of login.
In addition to this, the security of the data is also enhanced with the help of public verifier, who is
always able to audit the integrity of shared data without retrieving the entire data from the cloud.
REFERENCES
[1] Q.Wang, C.Wang,J. Li,K. Ren, W. Lou Enabling Public Verifiability and Data Dynamic for Storage
Security in Cloud Computing,”4epp. 355-370
[2] Boyang Wang, Baochun Li, Hui Li, ” Panda: Public Auditing for Shared Data with Efficient User
Revocation in the Cloud” IEEE Trans.
[3] International Research Journal of Engineering and Technology (IRJET) ,”Public Auditing For
Shared Data with efficient manner in cloud”, In the preceding of irjet,- ISSN: e-ISSN: 2395 -0056
Volume: 02 Issue: 09 | Dec-2015
[4] B. Wang, B. Li, and H. Li, “Public Auditing for Shared Data with Efficient User Revocation in the
Cloud,” in the Proceedings of IEEE INFOCOM 2013, 2013, pp. 2904–2912
[5] International Journal of Scientific Engineering and Applied Science (IJSEAS), “Effective Privacy-
Preserving Public Auditing for Data Sharing in Cloud” , In the preceding of ijseas, - ISSN: 2395-3470
Volume-1, Issue-4| July-2015
Advanced Computing: An International Journal (ACIJ), Vol.8, No.1/2, March 2017
8
AUTHORS
Mrunal Ruke is a Final year engineering student from Bharati vidyapeeth college
of Engineering Kharghar,Navi mumbai,India
Supriya Gore is a Final year engineering student from Bharati vidyapeeth college
of Engineering Kharghar, Navi mumbai,India
Supriya Chavan is a Final year engineering student from Bharati vidyapeeth
college of Engineering Kharghar, Navi mumbai,India

More Related Content

What's hot

Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...Pvrtechnologies Nellore
 
PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO...
 PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO... PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO...
PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO...Nexgen Technology
 
Oruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloudOruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloudNexgen Technology
 
831 panda public-auditing-for-shared-data-with-efficient-user-revocation-in-t...
831 panda public-auditing-for-shared-data-with-efficient-user-revocation-in-t...831 panda public-auditing-for-shared-data-with-efficient-user-revocation-in-t...
831 panda public-auditing-for-shared-data-with-efficient-user-revocation-in-t...Raja Ram
 
Integrity Privacy to Public Auditing for Shared Data in Cloud Computing
Integrity Privacy to Public Auditing for Shared Data in Cloud ComputingIntegrity Privacy to Public Auditing for Shared Data in Cloud Computing
Integrity Privacy to Public Auditing for Shared Data in Cloud ComputingIJERA Editor
 
Oruta privacy preserving public auditing
Oruta privacy preserving public auditingOruta privacy preserving public auditing
Oruta privacy preserving public auditingPapitha Velumani
 
Oruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloud Oruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloud Adz91 Digital Ads Pvt Ltd
 
147bc3d2e2ffdb1c4f10d673600dd786.Maintaining Integrity and Security for the D...
147bc3d2e2ffdb1c4f10d673600dd786.Maintaining Integrity and Security for the D...147bc3d2e2ffdb1c4f10d673600dd786.Maintaining Integrity and Security for the D...
147bc3d2e2ffdb1c4f10d673600dd786.Maintaining Integrity and Security for the D...Gayathri Dili
 
Integrity Auditing Of Dynamic Cloud Data With Group User Revocation
Integrity Auditing Of Dynamic Cloud Data With Group User RevocationIntegrity Auditing Of Dynamic Cloud Data With Group User Revocation
Integrity Auditing Of Dynamic Cloud Data With Group User RevocationJSPM's JSCOE , Pune Maharashtra.
 
A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...eSAT Journals
 
111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud
111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud
111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloudNag Nani
 
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revoc...
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revoc...Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revoc...
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revoc...1crore projects
 
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEMSURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEMijiert bestjournal
 
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
PUBLIC AUDITING 	             FOR SECURE CLOUD STORAGE                       ...PUBLIC AUDITING 	             FOR SECURE CLOUD STORAGE                       ...
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...Bharath Nair
 

What's hot (16)

CSE-05-27-34
CSE-05-27-34CSE-05-27-34
CSE-05-27-34
 
Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...
 
PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO...
 PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO... PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO...
PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO...
 
Oruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloudOruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloud
 
831 panda public-auditing-for-shared-data-with-efficient-user-revocation-in-t...
831 panda public-auditing-for-shared-data-with-efficient-user-revocation-in-t...831 panda public-auditing-for-shared-data-with-efficient-user-revocation-in-t...
831 panda public-auditing-for-shared-data-with-efficient-user-revocation-in-t...
 
Integrity Privacy to Public Auditing for Shared Data in Cloud Computing
Integrity Privacy to Public Auditing for Shared Data in Cloud ComputingIntegrity Privacy to Public Auditing for Shared Data in Cloud Computing
Integrity Privacy to Public Auditing for Shared Data in Cloud Computing
 
Oruta privacy preserving public auditing
Oruta privacy preserving public auditingOruta privacy preserving public auditing
Oruta privacy preserving public auditing
 
Oruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloud Oruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloud
 
147bc3d2e2ffdb1c4f10d673600dd786.Maintaining Integrity and Security for the D...
147bc3d2e2ffdb1c4f10d673600dd786.Maintaining Integrity and Security for the D...147bc3d2e2ffdb1c4f10d673600dd786.Maintaining Integrity and Security for the D...
147bc3d2e2ffdb1c4f10d673600dd786.Maintaining Integrity and Security for the D...
 
Integrity Auditing Of Dynamic Cloud Data With Group User Revocation
Integrity Auditing Of Dynamic Cloud Data With Group User RevocationIntegrity Auditing Of Dynamic Cloud Data With Group User Revocation
Integrity Auditing Of Dynamic Cloud Data With Group User Revocation
 
A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...
 
111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud
111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud
111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud
 
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revoc...
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revoc...Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revoc...
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revoc...
 
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEMSURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
 
Oruta project report
Oruta project reportOruta project report
Oruta project report
 
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
PUBLIC AUDITING 	             FOR SECURE CLOUD STORAGE                       ...PUBLIC AUDITING 	             FOR SECURE CLOUD STORAGE                       ...
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
 

Similar to Maintaining Data Integrity for Shared Data in Cloud

Ieeepro techno solutions 2014 ieee java project -panda public auditing for ...
Ieeepro techno solutions   2014 ieee java project -panda public auditing for ...Ieeepro techno solutions   2014 ieee java project -panda public auditing for ...
Ieeepro techno solutions 2014 ieee java project -panda public auditing for ...hemanthbbc
 
Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...IGEEKS TECHNOLOGIES
 
PANDA: PUBLIC AUDITING FOR SHARED DATA WITH EFFICIENT USER REVOCATION IN THE ...
PANDA: PUBLIC AUDITING FOR SHARED DATA WITH EFFICIENT USER REVOCATION IN THE ...PANDA: PUBLIC AUDITING FOR SHARED DATA WITH EFFICIENT USER REVOCATION IN THE ...
PANDA: PUBLIC AUDITING FOR SHARED DATA WITH EFFICIENT USER REVOCATION IN THE ...I3E Technologies
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...IEEEFINALSEMSTUDENTPROJECTS
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...IEEEFINALYEARSTUDENTPROJECT
 
Secure Authorised De-duplication using Convergent Encryption Technique
Secure Authorised De-duplication using Convergent Encryption TechniqueSecure Authorised De-duplication using Convergent Encryption Technique
Secure Authorised De-duplication using Convergent Encryption TechniqueEswar Publications
 
Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
Oruta: Privacy-Preserving Public Auditing for Shared Data in the CloudOruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
Oruta: Privacy-Preserving Public Auditing for Shared Data in the CloudMigrant Systems
 
PANDA: PUBLIC AUDITING FOR SHARED DATA WITH EFFICIENT USER REVOCATION IN THE ...
PANDA: PUBLIC AUDITING FOR SHARED DATA WITH EFFICIENT USER REVOCATION IN THE ...PANDA: PUBLIC AUDITING FOR SHARED DATA WITH EFFICIENT USER REVOCATION IN THE ...
PANDA: PUBLIC AUDITING FOR SHARED DATA WITH EFFICIENT USER REVOCATION IN THE ...Shakas Technologies
 
PANDA: PUBLIC AUDITING FOR SHARED DATA WITH EFFICIENT USER REVOCATION IN THE ...
PANDA: PUBLIC AUDITING FOR SHARED DATA WITH EFFICIENT USER REVOCATION IN THE ...PANDA: PUBLIC AUDITING FOR SHARED DATA WITH EFFICIENT USER REVOCATION IN THE ...
PANDA: PUBLIC AUDITING FOR SHARED DATA WITH EFFICIENT USER REVOCATION IN THE ...Shakas Technologies
 
Secure data sharing for dynamic groups in multi-owner using cloud
Secure data sharing for dynamic groups in multi-owner using cloudSecure data sharing for dynamic groups in multi-owner using cloud
Secure data sharing for dynamic groups in multi-owner using cloudSagar Dhanake
 
A secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloudA secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloud1crore projects
 
A secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloudA secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloudNinad Samel
 
Access Control and Revocation for Digital Assets on Cloud with Consideration ...
Access Control and Revocation for Digital Assets on Cloud with Consideration ...Access Control and Revocation for Digital Assets on Cloud with Consideration ...
Access Control and Revocation for Digital Assets on Cloud with Consideration ...IJERA Editor
 
Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...Pvrtechnologies Nellore
 
Mona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudMona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudKrushna Panda
 
IRJET- Credible Data through Distributed Ledger Technology
IRJET-  	  Credible Data through Distributed Ledger TechnologyIRJET-  	  Credible Data through Distributed Ledger Technology
IRJET- Credible Data through Distributed Ledger TechnologyIRJET Journal
 
public truthfulness assessment for shared active cloud data storage with grou...
public truthfulness assessment for shared active cloud data storage with grou...public truthfulness assessment for shared active cloud data storage with grou...
public truthfulness assessment for shared active cloud data storage with grou...Ijripublishers Ijri
 
Ieeepro techno solutions ieee dotnet project - oruta privacy-preserving publ...
Ieeepro techno solutions  ieee dotnet project - oruta privacy-preserving publ...Ieeepro techno solutions  ieee dotnet project - oruta privacy-preserving publ...
Ieeepro techno solutions ieee dotnet project - oruta privacy-preserving publ...ASAITHAMBIRAJAA
 
Ieeepro techno solutions ieee java project - oruta privacy-preserving public...
Ieeepro techno solutions  ieee java project - oruta privacy-preserving public...Ieeepro techno solutions  ieee java project - oruta privacy-preserving public...
Ieeepro techno solutions ieee java project - oruta privacy-preserving public...hemanthbbc
 
Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds IRJET Journal
 

Similar to Maintaining Data Integrity for Shared Data in Cloud (20)

Ieeepro techno solutions 2014 ieee java project -panda public auditing for ...
Ieeepro techno solutions   2014 ieee java project -panda public auditing for ...Ieeepro techno solutions   2014 ieee java project -panda public auditing for ...
Ieeepro techno solutions 2014 ieee java project -panda public auditing for ...
 
Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...
 
PANDA: PUBLIC AUDITING FOR SHARED DATA WITH EFFICIENT USER REVOCATION IN THE ...
PANDA: PUBLIC AUDITING FOR SHARED DATA WITH EFFICIENT USER REVOCATION IN THE ...PANDA: PUBLIC AUDITING FOR SHARED DATA WITH EFFICIENT USER REVOCATION IN THE ...
PANDA: PUBLIC AUDITING FOR SHARED DATA WITH EFFICIENT USER REVOCATION IN THE ...
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
 
Secure Authorised De-duplication using Convergent Encryption Technique
Secure Authorised De-duplication using Convergent Encryption TechniqueSecure Authorised De-duplication using Convergent Encryption Technique
Secure Authorised De-duplication using Convergent Encryption Technique
 
Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
Oruta: Privacy-Preserving Public Auditing for Shared Data in the CloudOruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
 
PANDA: PUBLIC AUDITING FOR SHARED DATA WITH EFFICIENT USER REVOCATION IN THE ...
PANDA: PUBLIC AUDITING FOR SHARED DATA WITH EFFICIENT USER REVOCATION IN THE ...PANDA: PUBLIC AUDITING FOR SHARED DATA WITH EFFICIENT USER REVOCATION IN THE ...
PANDA: PUBLIC AUDITING FOR SHARED DATA WITH EFFICIENT USER REVOCATION IN THE ...
 
PANDA: PUBLIC AUDITING FOR SHARED DATA WITH EFFICIENT USER REVOCATION IN THE ...
PANDA: PUBLIC AUDITING FOR SHARED DATA WITH EFFICIENT USER REVOCATION IN THE ...PANDA: PUBLIC AUDITING FOR SHARED DATA WITH EFFICIENT USER REVOCATION IN THE ...
PANDA: PUBLIC AUDITING FOR SHARED DATA WITH EFFICIENT USER REVOCATION IN THE ...
 
Secure data sharing for dynamic groups in multi-owner using cloud
Secure data sharing for dynamic groups in multi-owner using cloudSecure data sharing for dynamic groups in multi-owner using cloud
Secure data sharing for dynamic groups in multi-owner using cloud
 
A secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloudA secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloud
 
A secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloudA secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloud
 
Access Control and Revocation for Digital Assets on Cloud with Consideration ...
Access Control and Revocation for Digital Assets on Cloud with Consideration ...Access Control and Revocation for Digital Assets on Cloud with Consideration ...
Access Control and Revocation for Digital Assets on Cloud with Consideration ...
 
Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...
 
Mona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudMona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloud
 
IRJET- Credible Data through Distributed Ledger Technology
IRJET-  	  Credible Data through Distributed Ledger TechnologyIRJET-  	  Credible Data through Distributed Ledger Technology
IRJET- Credible Data through Distributed Ledger Technology
 
public truthfulness assessment for shared active cloud data storage with grou...
public truthfulness assessment for shared active cloud data storage with grou...public truthfulness assessment for shared active cloud data storage with grou...
public truthfulness assessment for shared active cloud data storage with grou...
 
Ieeepro techno solutions ieee dotnet project - oruta privacy-preserving publ...
Ieeepro techno solutions  ieee dotnet project - oruta privacy-preserving publ...Ieeepro techno solutions  ieee dotnet project - oruta privacy-preserving publ...
Ieeepro techno solutions ieee dotnet project - oruta privacy-preserving publ...
 
Ieeepro techno solutions ieee java project - oruta privacy-preserving public...
Ieeepro techno solutions  ieee java project - oruta privacy-preserving public...Ieeepro techno solutions  ieee java project - oruta privacy-preserving public...
Ieeepro techno solutions ieee java project - oruta privacy-preserving public...
 
Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds
 

More from acijjournal

Jan_2024_Top_read_articles_in_ACIJ.pdf
Jan_2024_Top_read_articles_in_ACIJ.pdfJan_2024_Top_read_articles_in_ACIJ.pdf
Jan_2024_Top_read_articles_in_ACIJ.pdfacijjournal
 
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdf
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdfCall for Papers - Advanced Computing An International Journal (ACIJ) (2).pdf
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdfacijjournal
 
cs - ACIJ (4) (1).pdf
cs - ACIJ (4) (1).pdfcs - ACIJ (4) (1).pdf
cs - ACIJ (4) (1).pdfacijjournal
 
cs - ACIJ (2).pdf
cs - ACIJ (2).pdfcs - ACIJ (2).pdf
cs - ACIJ (2).pdfacijjournal
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)acijjournal
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)acijjournal
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)acijjournal
 
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)acijjournal
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)acijjournal
 
3rdInternational Conference on Natural Language Processingand Applications (N...
3rdInternational Conference on Natural Language Processingand Applications (N...3rdInternational Conference on Natural Language Processingand Applications (N...
3rdInternational Conference on Natural Language Processingand Applications (N...acijjournal
 
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)acijjournal
 
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable Development
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable DevelopmentGraduate School Cyber Portfolio: The Innovative Menu For Sustainable Development
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable Developmentacijjournal
 
Genetic Algorithms and Programming - An Evolutionary Methodology
Genetic Algorithms and Programming - An Evolutionary MethodologyGenetic Algorithms and Programming - An Evolutionary Methodology
Genetic Algorithms and Programming - An Evolutionary Methodologyacijjournal
 
Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...acijjournal
 
Advanced Computing: An International Journal (ACIJ)
Advanced Computing: An International Journal (ACIJ) Advanced Computing: An International Journal (ACIJ)
Advanced Computing: An International Journal (ACIJ) acijjournal
 
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principles
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & PrinciplesE-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principles
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principlesacijjournal
 
10th International Conference on Software Engineering and Applications (SEAPP...
10th International Conference on Software Engineering and Applications (SEAPP...10th International Conference on Software Engineering and Applications (SEAPP...
10th International Conference on Software Engineering and Applications (SEAPP...acijjournal
 
10th International conference on Parallel, Distributed Computing and Applicat...
10th International conference on Parallel, Distributed Computing and Applicat...10th International conference on Parallel, Distributed Computing and Applicat...
10th International conference on Parallel, Distributed Computing and Applicat...acijjournal
 
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...acijjournal
 
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...acijjournal
 

More from acijjournal (20)

Jan_2024_Top_read_articles_in_ACIJ.pdf
Jan_2024_Top_read_articles_in_ACIJ.pdfJan_2024_Top_read_articles_in_ACIJ.pdf
Jan_2024_Top_read_articles_in_ACIJ.pdf
 
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdf
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdfCall for Papers - Advanced Computing An International Journal (ACIJ) (2).pdf
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdf
 
cs - ACIJ (4) (1).pdf
cs - ACIJ (4) (1).pdfcs - ACIJ (4) (1).pdf
cs - ACIJ (4) (1).pdf
 
cs - ACIJ (2).pdf
cs - ACIJ (2).pdfcs - ACIJ (2).pdf
cs - ACIJ (2).pdf
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
 
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
 
3rdInternational Conference on Natural Language Processingand Applications (N...
3rdInternational Conference on Natural Language Processingand Applications (N...3rdInternational Conference on Natural Language Processingand Applications (N...
3rdInternational Conference on Natural Language Processingand Applications (N...
 
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
 
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable Development
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable DevelopmentGraduate School Cyber Portfolio: The Innovative Menu For Sustainable Development
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable Development
 
Genetic Algorithms and Programming - An Evolutionary Methodology
Genetic Algorithms and Programming - An Evolutionary MethodologyGenetic Algorithms and Programming - An Evolutionary Methodology
Genetic Algorithms and Programming - An Evolutionary Methodology
 
Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...
 
Advanced Computing: An International Journal (ACIJ)
Advanced Computing: An International Journal (ACIJ) Advanced Computing: An International Journal (ACIJ)
Advanced Computing: An International Journal (ACIJ)
 
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principles
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & PrinciplesE-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principles
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principles
 
10th International Conference on Software Engineering and Applications (SEAPP...
10th International Conference on Software Engineering and Applications (SEAPP...10th International Conference on Software Engineering and Applications (SEAPP...
10th International Conference on Software Engineering and Applications (SEAPP...
 
10th International conference on Parallel, Distributed Computing and Applicat...
10th International conference on Parallel, Distributed Computing and Applicat...10th International conference on Parallel, Distributed Computing and Applicat...
10th International conference on Parallel, Distributed Computing and Applicat...
 
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...
 
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...
 

Recently uploaded

Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهMohamed Sweelam
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfalexjohnson7307
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxMasterG
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfdanishmna97
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdfMuhammad Subhan
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimaginedpanagenda
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxjbellis
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 

Recently uploaded (20)

Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 

Maintaining Data Integrity for Shared Data in Cloud

  • 1. Advanced Computing: An International Journal (ACIJ), Vol.8, No.1/2, March 2017 DOI:10.5121/acij.2017.8201 1 MAINTAINING DATA INTEGRITY FOR SHARED DATA IN CLOUD Mrunal M.Ruke, Supriya Gore, Supriya Chavan and prof : Bhawana Dakhare Bharati Vidyapeeth College of Engineering, Sector-7,C.B.D,Belpada,Navi Mumbai-400614, India ABSTRACT Cloud computing is defined as a type of computing that relies on sharing computing resources rather than having local servers or personal devices to handle the applications. User can easily modify the shared and stored data in the cloud. To overcome this data modification in cloud the signature is provided to each individual user who accesses the data in cloud. Once the data is modified by the user on a block, the user must ensure that the signature is provided on that specific block. When user misbehaves or misuses the system the admin has authority to revoke that particular user from the group. After revoking that user, the existing user must re-sign the data signed by the revoked user. In addition to this, the security of the data is also enhanced with the help of public Auditor who is always able to audit the integrity of shared data without retrieving the entire data from the cloud. KEYWORDS Cloud Computing, PublicAuditor, Revoke User, Signature, Data Integrity 1. INTRODUCTION People can easily work together in a group by Sharing and storing the services in the cloud. More specifically, once a user creates shared data in the cloud, every user in the group is able to not only access and modify shared data, but also share the latest version of the shared data with the rest of the group. To protect the integrity of data in the cloud, number of mechanisms have been proposed. In these mechanisms, a signature is attached to each block in data, and the integrity of data relies on the correctness of all the signatures. One of the most significant and common features of these mechanisms is to allow a Public Auditor to efficiently check data integrity in the cloud without downloading the entire data, referred to as public auditing. This Public Auditor could be a client who would like to utilize cloud data for particular purposes (e.g., search, computation, data mining, etc.) or Third Party Auditor(TPA) who is able to provide verification services on data integrity to users. With shared data, once a user modifies a block, that user also needs to compute a new signature for the modified block. Due to the modifications from different users, different blocks are signed by different users. For security reasons, when a user leaves the group or misbehaves, this user must be revoked from the group. As a result, this revoked user should no longer be able to access and modify shared
  • 2. Advanced Computing: An International Journal (ACIJ), Vol.8, No.1/2, March 2017 2 data, and the signatures generated by this revoked user are no longer valid to the group. Therefore, although the content of shared data is not changed during user revocation, the blocks, which were previously signed by the revoked user, still need to be re-signed by an existing user in the group. As a result, the integrity of the entire data can still be verified with the public keys of existing users only. 2. PROBLEM STATEMENT Many public auditing mechanisms were introduced for efficient integrity checking. During public auditing method it fails to preserve the identity privacy on shared data and results in reviling significant confidential information to Public Auditor. In existing system once the user is revoked from the system, the blocks which were previously signed by this revoked user used to be re- signed with the help of straightforward method. In which the public auditor asked to existing user to first download the blocks previously signed by the revoked user, then it verifies the correctness of the blocks, then re-sign these blocks and finally upload the re-signature to the cloud. This method cause huge amount of communication and computation resources by downloading and verifying the blocks, but the content of the block remains same. This method is insecure because the private data of revoked user is misused by an existing user. The proposed mechanism allows a public Auditor to efficiently check the data integrity in the cloud without downloading the entire data. This mechanism preserves the confidentiality of the shared data by using the proxy re-signature mechanism. In this mechanism the blocks which were previously assign to revoked user will be re-signed by the existing user. For the security purpose secret key will be provided while login. 3. LITRATURE SURVEY Qian Wang et.al. [1] has proposed a model to solve the problem of integrity of data stored in the cloud. The TPA has allowed verifying data in cloud storage through auditing process and motivating public auditing system in the cloud. TPA check the outsourced data integrity. The advantages of auditing are to detect, prevent errors and maintain the database regularly. Auditing should not bring any new vulnerability towards privacy of data. Based on the proxy re-signature method designs a public auditing scheme for data storage with proficient user revocation in cloud. The original user can acts as a group manager and able to retract the users if necessary. For each block of data to be stored in cloud server, data owner is assigned with a signature and the integrity of data relies in the correctness of all the signatures. In a cloud if a user modifies a single block including insertion or deletion, the index of the modified block is changed and the user needs to compute a new signature for the modified block. User access the modified data with the new signature generated to perform. For security reasons, when a user leaves the group or misbehaves, user is revoked from the group. As a result, this revoked user should no longer able to access and modify shared data, and the signatures generated by this revoked user are no longer valid to the group users. Therefore the content of shared data is not changed during user revocation, the blocks which were previously signed by the revoked user, still need to be re-signed by an existing user in the group. during user revocation, an existing user need to first download the blocks previously signed by the revoked user, verify the correctness of these blocks, then re-sign these blocks, and finally upload the new signatures to the cloud.[4]
  • 3. Advanced Computing: An International Journal (ACIJ), Vol.8, No.1/2, March 2017 3 The authors Buying Wang et.al [4] has envisioned that data can be easily shared by group. Proxy re-signature technique was utilized with help of this method and the user can re-sign the revoked user block and need not to download data from server to verify the shared data integrity and also maintain the whole data integrity. 4. SYSTEM MODEL In this proposed system the sharing of data between users in a group with highly secure manner in the cloud. An authorized member in a group must access the shared data using HMAC algorithm. During user revocation the block which were previously signed by revoke user will be re-sign by an existing user in the group. Also the public verifier is able to verify the integrity of shared data without retrieving the entire data from the cloud. The Integrity of the data can be verified by using SHA-1 algorithm. Identity of the signer on each block in shared data is kept private from the public verifier. This method also supports a novel public auditing mechanism for the integrity of shared data with efficient user revocation in cloud. Figure1: Architecture Diagram 4.1 SYSTEM MODULE The System consists of the following module. 4.1.1 User Module User module can be divided into the following sub modules: 1. Registration 2. File upload 3. Download
  • 4. Advanced Computing: An International Journal (ACIJ), Vol.8, No.1/2, March 2017 4 4. Re-upload 4.1.2 Auditor Module Auditor Module can be divided into the following sub modules: 1. File Verification 2. View Verification Status 4.1.3 Owner Module Owner Module can be divided into the following sub modules: 1. View Files 2. Revoke User 5. SECURITY MODEL 5.1 For signature generation For generating signature on the blocks we have used Hmac algorithm.Hash-based message authentication code (HMAC) provides the server and the client each with a public and private key. The public key is known, but the private key is known only to that specific server and that specific client. The client creates a unique HMAC, or hash, per request to the server by combing the request data and hashing that data, along with a private key and sending it as part of a request. The server receives the request and regenerates its own unique HMAC. The server compares the two HMACs, and, if they're equal, the client is trusted and the request is executed. HMAC can then be expressed: 1. Append zeros to the left end of K to create a b-bit string K+ (for example, if K is of length 160 bits and b = 512, then K will be appended with 44 zero bytes 0x00). 2. XOR (bitwise exclusive OR) K+ with ipad to produce the b-bit block Si. 3. Append M to Si. 4. Apply H to the stream generated in Step 3. 5. XOR K+ with opad to produce the b-bit block So. 6. Append the hash result from Step 4 to So. 7. Apply H to the stream generated in Step 6 and output the result.
  • 5. Advanced Computing: An International Journal (ACIJ), Vol.8, No.1/2, March 2017 5 5.2 Integrity Verification For verifying the data integrity SHA-1 algorithm is used.SHA-1 stands for Secure Hash algorithm. Figure 2: Basic hash function SHA-1 (160 bit message) Algorithm Framework Step 1: Append Padding Bits Message is “padded” with a 1 and as many 0’s as necessary to bring the message length to 64 bits fewer than an even multiple of 512. Step 2: Append Length 64 bits are appended to the end of the padded message. These bits hold the binary format of 64 bits indicating the length of the original message. Step 3: Prepare Processing Functions SHA1 requires 80 processing functions defined as: f(t;B,C,D) = (B AND C) OR ((NOT B) AND D) ( 0 <= t <= 19) f(t;B,C,D) = B XOR C XOR D (20 <= t <= 39) f(t;B,C,D) = (B AND C) OR (B AND D) OR (C AND D) (40 <= t <=59) f (t;B,C,D) = B XOR C XOR D (60 <= t <= 79) Step 4: Prepare Processing Constants SHA1 requires 80 processing constant words defined as: K(t) = 0x5A827999 ( 0 <= t <= 19) K(t) = 0x6ED9EBA1 (20 <= t <= 39)
  • 6. Advanced Computing: An International Journal (ACIJ), Vol.8, No.1/2, March 2017 6 K(t) = 0x8F1BBCDC (40 <= t <= 59) K(t) = 0xCA62C1D6 (60 <= t <= 79) Step 5: Initialize Buffers SHA1 requires 160 bits or 5 buffers of words (32 bits): H0 = 0x67452301 H1 = 0xEFCDAB89 H2 = 0x98BADCFE H3 = 0x10325476 H4 = 0xC3D2E1F0 Step 6: Pseudo Code For loop on k = 1 to L (W(0),W(1),...,W(15)) = M[k] /* Divide M[k] into 16 words */ For t = 16 to 79 do: W(t) = (W(t-3) XOR W(t-8) XOR W(t-14) XOR W(t-16)) <<< 1 A = H0, B = H1, C = H2, D = H3, E = H4 For t = 0 to 79 do: TEMP = A<<<5 + f(t;B,C,D) + E + W(t) + K(t) E = D, D = C, C = B<<<30, B = A, A = TEMP End of for loop H0 = H0 + A, H1 = H1 + B, H2 = H2 + C, H3 = H3 + D, H4 = H4 + E End of for loop Output: H0, H1, H2, H3, H4, H5: Word buffers with final message digest
  • 7. Advanced Computing: An International Journal (ACIJ), Vol.8, No.1/2, March 2017 7 Figure 3: Message Diagram 6. CONCLUSION “Maintaining Data Integrity for Shared Data in cloud” is required where, the cloud offers data storage and sharing services to the group. By using the service user can easily modify and share the confidential data in the system. To restrict the data modification the signature is assigned on each block of the data. Due to which user will able to modify or access the data by the permission of the owner of the data. If user tries to misuses the data in system, the data owner has authority to revoke that user from the group and by using proxy re-signature mechanism the signature on the data blocks of revoked user is overridden by the new signature. This helps in preserving the security of the system. To extent the security the secret key is also provided to the user at the time of login. In addition to this, the security of the data is also enhanced with the help of public verifier, who is always able to audit the integrity of shared data without retrieving the entire data from the cloud. REFERENCES [1] Q.Wang, C.Wang,J. Li,K. Ren, W. Lou Enabling Public Verifiability and Data Dynamic for Storage Security in Cloud Computing,”4epp. 355-370 [2] Boyang Wang, Baochun Li, Hui Li, ” Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud” IEEE Trans. [3] International Research Journal of Engineering and Technology (IRJET) ,”Public Auditing For Shared Data with efficient manner in cloud”, In the preceding of irjet,- ISSN: e-ISSN: 2395 -0056 Volume: 02 Issue: 09 | Dec-2015 [4] B. Wang, B. Li, and H. Li, “Public Auditing for Shared Data with Efficient User Revocation in the Cloud,” in the Proceedings of IEEE INFOCOM 2013, 2013, pp. 2904–2912 [5] International Journal of Scientific Engineering and Applied Science (IJSEAS), “Effective Privacy- Preserving Public Auditing for Data Sharing in Cloud” , In the preceding of ijseas, - ISSN: 2395-3470 Volume-1, Issue-4| July-2015
  • 8. Advanced Computing: An International Journal (ACIJ), Vol.8, No.1/2, March 2017 8 AUTHORS Mrunal Ruke is a Final year engineering student from Bharati vidyapeeth college of Engineering Kharghar,Navi mumbai,India Supriya Gore is a Final year engineering student from Bharati vidyapeeth college of Engineering Kharghar, Navi mumbai,India Supriya Chavan is a Final year engineering student from Bharati vidyapeeth college of Engineering Kharghar, Navi mumbai,India