SlideShare a Scribd company logo
1 of 5
Download to read offline
International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-2, Feb- 2016]
Infogain Publication (Infogainpublication.com) ISSN : 2454-1311
www.ijaems.com Page | 30
Privacy Preserving Public Auditing and Data
Integrity for Secure Cloud Storage Using Third
Party Auditor
Ankush R. Nistane1
, Shubhangi Sapkal2
, Dr. R. R. Deshmukh3
1
Department of CSE, Government College of Engineering, Aurangabad, India
2
Department of MCA, Government College of Engineering, Aurangabad, India
3
Department of CSE and IT, Dr BAMU, Aurangabad, India
Abstract – Using cloud services, anyone can remotely store
their data and can have the on-demand high quality
applications and services from a shared pool of computing
resources, without the burden of local data storage and
maintenance. Cloud is a commonplace for storing data as
well as sharing of that data. However, preserving the
privacy and maintaining integrity of data during public
auditing remains to be an open challenge. In this paper, we
introducing a third party auditor (TPA), which will keep
track of all the files along with their integrity. The task of
TPA is to verify the data, so that the user will be worry-
free. Verification of data is done on the aggregate
authenticators sent by the user and Cloud Service Provider
(CSP). For this, we propose a secure cloud storage system
which supports privacy-preserving public auditing and
blockless data verification over the cloud.
Keywords – Blockless data verification, data integrity,
cloud storage, third party auditor (TPA), privacy
preserving, public auditing.
NOMENCLATURE
F - Data file is divided into blocks mi ;
i Є {1,2,…n}
Fi - Set of files
mi - ith
block of data file
hi - Hash on block
Σ Signature
I. INTRODUCTION
As we know cloud computing is booming nowadays. It is
considered as the next generation information technology
(IT) architecture for enterprises. Cloud service providers
manage the data over the cloud. From users’ perspective,
storing data remotely to the cloud is beneficial, because it
can be accessed on-demand and in a flexible way. It brings
relief of the burden high level infrastructure that provides a
scalable, secure and reliable environment for users at a
much lower cost. Most of the cloud storage likes Google
Drive and Dropbox offering space to the users which has
become a routine for users to share for storage
management, new and challenging security threats toward
users’ data. As the CSP are distributed, data outsourcing is
actually relinquishing user’s ultimate control over the fate
of their data. As the data is stored in an untrusted cloud, it
can be easily be lost or it can also get corrupted due to
disasters or failures or human errors [1]. To verify the
integrity of the data over the cloud, we introduce a third
party auditor (TPA) for public auditing. TPA offers its
auditing service with more powerful computation and
communication abilities.
Privacy preserving public auditability has following
advantages -
A. Public Auditability – It allows TPA to check integrity
of data without retrieving it. TPA or external auditor
should not have any knowledge about data i.e.
blockless data verification.
B. Storage Correctness – User’s data should correctly
store on cloud.
C. Privacy Preserving – This ensures that TPA cannot
derive any data content.
D. Lightweight – Auditing should be performed with
minimum overhead.
Specifically, the contribution can be summarized as the
following three aspects.
a. Our scheme achieves batch auditing where multiple
delegated auditing tasks from different users can be
performed simultaneously by the TPA.
b. Our scheme provides a privacy-preserving auditing
protocol.
c. Our scheme provides the better security and justifies
the performance of our proposed schemes through
concrete experiments.
International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-2, Feb- 2016]
Infogain Publication (Infogainpublication.com) ISSN : 2454-1311
www.ijaems.com Page | 31
II. LITERATURE SURVEY
There are many techniques that are used to provide security
to the user’s data over cloud. These techniques are also
used for data correctness, data integrity and its security
over the cloud. But there earlier techniques are not efficient
to work on dynamic cloud and there are some
disadvantages with these existing systems.
Following are some systems, with their pros and cons-
Ateniese et al. [2] is the one who took the public auditing
into consideration, that is, they used “provable data
possession” (PDP) model for possession of data over the
untrusted cloud storage. They used homomorphic linear
authenticator (HLA) scheme for public auditing. But there
are some problems in this system related security. This
system achieves the public auditability but exposes the data
to the external auditors. So the privacy of the data is
compromised in this system.
Juels et al. s[3] has described a model called “proof of
retrievability” (PoR). In this model, for “possession” and
“retrievability” of data error correcting codes and spot
checking is used. This model does not support public
auditability. This is the disadvantage of this model. Also,
this model does not support external auditor.
Later, to support dynamic operations of data over the cloud
servers, Wang [4] proposed a dynamic auditing protocol.
This protocol has some disadvantages; to send the data
blocks to the auditor it requires a server and which may
leak the privacy of the data to the auditor.
Waters et al [5] proposed a publicly verifiable
homomorphic authenticator based scheme which is nothing
but an improved version of "proof of retrievability”
scheme. In this scheme they used authenticators to achieve
the public auditability. But this scheme is not useful for
dynamic data.
Likewise Message Authentication Code (MAC) based
scheme is also not useful for dynamic data. It has some
disadvantages such as user has to recalculate new MAC.
In HLA based scheme [6], cloud provider reveals user’s
data to the TPA which is the disadvantage of this scheme.
This scheme is same as MAC based scheme but the only
difference between MAC and HLA is that HLA can be
aggregated.
By observing different existing system, there is need of
such a system which provides public auditing services that
will fulfill almost all the threats to the data over the cloud.
To do this, we suggested certain requirements for public
auditing services-
A. Accountability:
Auditing should be done is proper manner. That is it should
identify the problems as well as the particular entity
responsible for that problem if any unreliability occurs.
Therefore there is need of system’s accountability.
B. Performance:
The major aspect of any system is performance. In cloud
computing also security of data storage and its integrity is
important task.
C. Dynamic Support:
Cloud provides dynamic support for runtime system to
access and share the data. The challenge is the legacy users.
User has access to data and user can modify the data in the
cloud. So, dynamic support in runtime system is the major
challenge for public auditing system.
In this paper, we proposed a secure and efficient system
for public auditing which covers all the requirements
mentioned above. In this system we use external auditor
which is used for checking the integrity of the user’s data.
At the same time external auditor should be unaware of the
data so that the privacy will be preserved and the
communication overhead will be less. Also we use the
blockless data verification scheme, which verifies the
correctness of the data without having its knowledge.
Fig.1: System model of the data auditing
III. PROPOSED SYSTEM
To save the user’s computation time, storage resources and
online burden, it is very important to introduce public
auditing service for cloud data. This ensures the integrity of
the data over the cloud and helps to reduce the online burden.
Users may use the TPA to audit the data whenever they
needed. Normally users don’t have such expertise as TPA
has. TPA has the capability and expertise to check the
integrity of the data stored on the cloud on behalf of that user.
This way it makes the integrity verification of the data easier
and affordable for the user.
In the proposed scheme there are three algorithms for
integrity verification -
a. Key generation: It is a process of generating keys
(Secret and public keys).
b. Signing: Signing means generation of proof for
verification.
c. Verification: The proof generated by the cloud service
provider will be verified by the TPA.
In this paper, we use Boneh–Lynn–Shacham (BLS)
signature for the integrity verification purpose. The main
purpose of using this scheme is it creates less overhead
over the network which automatically decreases the
International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-2, Feb- 2016]
Infogain Publication (Infogainpublication.com) ISSN : 2454-1311
www.ijaems.com Page | 32
communication cost. The BLS signature is only of 160 bits.
As it is very short the size of authenticators is also reduced
that means it requires less storage space over the cloud.
Using this scheme aggregate authenticator is calculated on
every block, and later all the individual authenticators are
aggregated and calculated which is also of 160 bits. BLS
signature scheme not only reduces the communication cost
and required storage space but also this scheme is secure
and unforgeable. [7]
Cloud architecture has three modules as shown in fig.1,
User, Cloud Service Provider (CSP) and Third Party
Auditor (TPA). User is responsible for storing the data over
the cloud. CSP has the large space to store the user’s data
and has the resources to manage the user’s data, whereas
TPA which is an external auditor is responsible for
auditing.
A. User:
a. User first divides the file into blocks, i.e.
F = (m1, m2, m3… mn).
b. Once the file is divided into blocks hash value
is calculated on each block, i.e.
Hash (mi) hi
c. After that digital signature is calculated, i.e.
SignGen (mi) σi, here ‘i’ denotes the ith
block.
d. Finally the aggregate authenticator is
calculated, i.e.
Aggregate_auth (σi) σ
This aggregate authenticator is sent to the third party
auditor (TPA) for checking the correctness of the data.
B. Cloud Service Provider (CSP):
a. Calculate digital signature, i.e.
SignGen (mi) σi
’
b. Claculate aggregate authenticator, i.e.
Aggregate_auth (σi
’
) σ’
CSP sends the calculated aggregate authenticator
to the TPA for verification of data.
C. Third Party Auditor (TPA):
a. Send file to check its integrity (Fi) Where Fi is
a eset of files and
i Є {1, 2,…n}
b. Signature verification σ = σ’
Finally TPA is responsible for verifying the integrity of the
data.
As shown in fig.2, following steps are performed for
integrity verification on the user’s data (single auditing).
Fig.2: Architecture of cloud for integrity verification
1. First is the key generation process. User is
responsible for generating public and private keys
2. User divides the file into individual blocks
3. User encrypts those blocks using 64 bit DES
algorithm with the help of private key. This phase is
called as signing.
4. Calculate hash for each block using MD5 and public
key. MD5 is applied on 512 bit blocks and it
produces hash of 128 bit.
5. Calculate digital signature which encrypts hash by
using private key
6. User calculates aggregate authenticator
7. User sends calculated aggregate authenticator to the
TPA
8. User sends encrypted data blocks to the cloud server
and delete its local copy
9. TPA requests for the authenticator to the CSP
10. CSP calculates the aggregate authenticator which is
calculated on the encrypted blocks. So this system
provides more security as compared to earlier
systems.
11. CSP sends aggregate authenticator to the TPA in
response to the request.
12. TPA compares both the authenticators, the one which
is sent by the user and another which is sent by the
CSP. Based on that verification is done.
13. Depending on the result calculated by the TPA, the
security message is sent to the user. This message is
used to indicate the integrity of the file. If both the
authenticators are same then this means the integrity
of the file is maintained. If both the authenticators are
not same then this means the file is altered by the
intruder.
In this scheme, for integrity verification of the data user and
CSP do not send the original data to the TPA. So in this
case TPA has no knowledge about the data which improves
the security of the user’s data. Depending on the aggregate
authenticators sent by the user and CSP, TPA compares
International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-2, Feb- 2016]
Infogain Publication (Infogainpublication.com) ISSN : 2454-1311
www.ijaems.com Page | 33
both the authenticators and gives the result accordingly.
Hence, the proposed scheme achieves both i.e. privacy
preserving and blockless verification.
IV. MODULES
A. Public Auditing:
In this paper, we proposed a unique privacy preserving
public auditing technique which achieves the blockless
data verification. At the CSP, the aggregate authenticator
is calculated on the already encrypted data blocks. CSP
doesn’t decrypt the data blocks to calculate aggregate
authenticator. This way the security of user’s data over
the cloud is achieved. Based on the authenticators
calculated by both user and CSP on individual blocks are
aggregated and compared at the TPA for its correctness.
TPA has no knowledge of the data; it has only the
authenticators obtained from user and CSP. This way the
blockless data verification is achieved.
B. Batch Auditing:
Users may request for auditing service concurrently to the
TPA. Auditing each task for individual user can be very
inefficient and this can create the burden on the TPA.
Using the batch auditing, TPA can simultaneously
perform the multiple auditing tasks for different users. In
this phase, multiple users send the aggregate
authenticators to the TPA. Later TPA batch together all
those requests and send it as a single request to the CSP.
CSP then calculate the aggregate authenticator and sends
it to the TPA. Finally TPA verifies the data. As compared
to single auditing, batch auditing is better as multiple
auditing requests are handled at a time. This improves the
performance of the whole system.
C. Data Dynamics:
Dynamic support for public auditing is very important.
User may need to update, delete or add the data. Allowing
dynamic support over the cloud improves the efficiency
of the public auditor. External auditor has to manage the
integrity of the data file where user may wish to do some
block-level operations on data like update, delete and
modify the file in the running system. The proposed
system provides the dynamic support. [8]
V. EXPERIMENTAL RESULTS
Following are the experimental results. Fig 3 shows the
user dashboard which shows efficiency report graph of
different files uploaded by the user.
Fig. 3: User Home Page (Dashboard)
In Fig 4, user uploads the file which is divided into certain
number of blocks. Each block is encrypted with secret key
and sent to CSP. At the same time one unique aggregate
authenticator is calculated on blocks and is sent to the TPA.
Fig. 4: File Uploading and Sending encrypted file blocks
with metadata key for each block
In Fig 5, TPA requests aggregate authenticators to the CSP
for that file. Then CSP calculates aggregate authenticator
and send it back to the TPA for further processing. TPA
then audits the file and security message send to the file
owner. If the file is tampered by any other user then user
gets the File Tampered message.
In Fig 6, to download the file user needs to enter the secret
key. If secret key is valid then user need to enter valid
metadata key for each block. If entered key is invalid then
file will not be available download. More than 3 wrong
attempts will send an intruder alert to the TPA as shown in
Fig 7.
International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-2, Feb- 2016]
Infogain Publication (Infogainpublication.com) ISSN : 2454-1311
www.ijaems.com Page | 34
Fig. 5: TPA’s and CSP’s Communication for Aggregate
Authenticator
Fig. 6: Decrypt and download the file with Secret key
Fig. 7: File status and Downloading file with the help of
metadata
VI. CONCLUSION AND FUTURE SCOPE
Cloud storage is increasing day by day. Public auditing
over the cloud is of critical importance. As the user doesn’t
have such capabilities and expertise as third party auditor
has, user resorts to the TPA for the integrity verification of
the data. This work studies the importance of integrity
verification over the cloud with dynamic support. Also
proposed system achieves the privacy preserving public
auditing and blockless data verification. Batch auditing
improves the efficiency of the TPA as multiple requests are
handled at the same time, which reduces the burden of
TPA. Since this system is effective and efficient for precise
public auditing for integrity verification of user’s data.
Using different schemes the performance and security of
this system can be improved.
REFERENCES
[1] M. Armbrust, A. Fox, R. Griffith, A. D.Joseph, R.
H.Katz, A. Konwinski, G. Lee, D. A. Patterson, A.
Rabkin, I. Stoica, and M. Zaharia, “A View of Cloud
Computing,” Communications of the ACM, vol. 53,
no. 4, pp. 50–58, Apirl 2010.
[2] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L.
Kissner, Z. Peterson, and D. Song, “Provable Data
Possession at Untrusted Stores,” Proc. 14th ACM
Conf. Computer and Comm. Security (CCS ’07), pp.
598-609, 2007.
[3] Juels and J. Burton, S. Kaliski, “PORs: Proofs of
Retrievability for Large Files,” Proc. ACM Conf.
Computer and Comm. Security (CCS ’07), pp. 584-
597, Oct. 2007.
[4] Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li,
“Enabling Public Auditability and Data Dynamics for
Storage Security in Cloud Computing,” IEEE Trans.
Parallel Distributed Systems, vol. 22, no. 5, pp. 847-
859, May 2011.
[5] H. Shacham and B. Waters, “Compact proofs of
retrievability,” in Proc. of Asiacrypt 2008, vol. 5350,
Dec 2008, pp. 90–107
[6] Cong Wang, qian wang, kui ren, wenjing lou ,
“Privacy – Preserving Public Auditability for Secure
Cloud Storage”, IEEE transaction on Cloud
Computing Year 2013.
[7] Boneh, B. Lynn, and H. Shacham, “Short signatures
from the Weil pairing,” J. Cryptology, vol. 17, no. 4,
pp. 297–319, 2004.
[8] Imran Ahmad, Prof. Hitesh Gupta, “Privacy-
Preserving Public Auditing & Data Intrgrity for
Secure Cloud Storage”, International Conference on
Cloud, Big Data and Trust 2013, Nov 13-15, RGPV
100.

More Related Content

What's hot

IRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud DataIRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud DataIRJET Journal
 
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...IOSR Journals
 
Development of Effective Audit Service to Maintain Integrity of Migrated Data...
Development of Effective Audit Service to Maintain Integrity of Migrated Data...Development of Effective Audit Service to Maintain Integrity of Migrated Data...
Development of Effective Audit Service to Maintain Integrity of Migrated Data...IRJET Journal
 
Approved TPA along with Integrity Verification in Cloud
Approved TPA along with Integrity Verification in CloudApproved TPA along with Integrity Verification in Cloud
Approved TPA along with Integrity Verification in CloudEditor IJCATR
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revoc...
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revoc...Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revoc...
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revoc...1crore projects
 
A framework assuring decentralized accountability
A framework assuring decentralized accountabilityA framework assuring decentralized accountability
A framework assuring decentralized accountabilityeSAT Publishing House
 
Access Control and Revocation for Digital Assets on Cloud with Consideration ...
Access Control and Revocation for Digital Assets on Cloud with Consideration ...Access Control and Revocation for Digital Assets on Cloud with Consideration ...
Access Control and Revocation for Digital Assets on Cloud with Consideration ...IJERA Editor
 
Iaetsd secured and efficient data scheduling of intermediate data sets
Iaetsd secured and efficient data scheduling of intermediate data setsIaetsd secured and efficient data scheduling of intermediate data sets
Iaetsd secured and efficient data scheduling of intermediate data setsIaetsd Iaetsd
 
Authenticated and unrestricted auditing of big data space on cloud through v...
Authenticated and unrestricted auditing of big data space on  cloud through v...Authenticated and unrestricted auditing of big data space on  cloud through v...
Authenticated and unrestricted auditing of big data space on cloud through v...IJMER
 
Integrity Privacy to Public Auditing for Shared Data in Cloud Computing
Integrity Privacy to Public Auditing for Shared Data in Cloud ComputingIntegrity Privacy to Public Auditing for Shared Data in Cloud Computing
Integrity Privacy to Public Auditing for Shared Data in Cloud ComputingIJERA Editor
 
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud StorageIRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud StorageIRJET Journal
 
Privacy preserving public auditing for data storage security in cloud comp
Privacy preserving public auditing for data storage security in cloud compPrivacy preserving public auditing for data storage security in cloud comp
Privacy preserving public auditing for data storage security in cloud compIAEME Publication
 
Privacy preserving public auditing for
Privacy preserving public auditing forPrivacy preserving public auditing for
Privacy preserving public auditing forkarthika kathirvel
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storageMuthu Sybian
 
A survey of various scheduling algorithm in cloud computing environment
A survey of various scheduling algorithm in cloud computing environmentA survey of various scheduling algorithm in cloud computing environment
A survey of various scheduling algorithm in cloud computing environmenteSAT Publishing House
 

What's hot (20)

Cloud Storage and Security
Cloud Storage and SecurityCloud Storage and Security
Cloud Storage and Security
 
Oruta project report
Oruta project reportOruta project report
Oruta project report
 
IRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud DataIRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud Data
 
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
 
Development of Effective Audit Service to Maintain Integrity of Migrated Data...
Development of Effective Audit Service to Maintain Integrity of Migrated Data...Development of Effective Audit Service to Maintain Integrity of Migrated Data...
Development of Effective Audit Service to Maintain Integrity of Migrated Data...
 
Approved TPA along with Integrity Verification in Cloud
Approved TPA along with Integrity Verification in CloudApproved TPA along with Integrity Verification in Cloud
Approved TPA along with Integrity Verification in Cloud
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revoc...
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revoc...Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revoc...
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revoc...
 
[IJET-V1I3P3]
[IJET-V1I3P3][IJET-V1I3P3]
[IJET-V1I3P3]
 
A framework assuring decentralized accountability
A framework assuring decentralized accountabilityA framework assuring decentralized accountability
A framework assuring decentralized accountability
 
Access Control and Revocation for Digital Assets on Cloud with Consideration ...
Access Control and Revocation for Digital Assets on Cloud with Consideration ...Access Control and Revocation for Digital Assets on Cloud with Consideration ...
Access Control and Revocation for Digital Assets on Cloud with Consideration ...
 
Iaetsd secured and efficient data scheduling of intermediate data sets
Iaetsd secured and efficient data scheduling of intermediate data setsIaetsd secured and efficient data scheduling of intermediate data sets
Iaetsd secured and efficient data scheduling of intermediate data sets
 
V04405122126
V04405122126V04405122126
V04405122126
 
Authenticated and unrestricted auditing of big data space on cloud through v...
Authenticated and unrestricted auditing of big data space on  cloud through v...Authenticated and unrestricted auditing of big data space on  cloud through v...
Authenticated and unrestricted auditing of big data space on cloud through v...
 
Integrity Privacy to Public Auditing for Shared Data in Cloud Computing
Integrity Privacy to Public Auditing for Shared Data in Cloud ComputingIntegrity Privacy to Public Auditing for Shared Data in Cloud Computing
Integrity Privacy to Public Auditing for Shared Data in Cloud Computing
 
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud StorageIRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
 
Privacy preserving public auditing for data storage security in cloud comp
Privacy preserving public auditing for data storage security in cloud compPrivacy preserving public auditing for data storage security in cloud comp
Privacy preserving public auditing for data storage security in cloud comp
 
Privacy preserving public auditing for
Privacy preserving public auditing forPrivacy preserving public auditing for
Privacy preserving public auditing for
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storage
 
A survey of various scheduling algorithm in cloud computing environment
A survey of various scheduling algorithm in cloud computing environmentA survey of various scheduling algorithm in cloud computing environment
A survey of various scheduling algorithm in cloud computing environment
 

Viewers also liked

Audience Profile
Audience ProfileAudience Profile
Audience Profilesammusgrave
 
LED 2014 Autumn 1st Delegate Mailer
LED 2014 Autumn 1st Delegate MailerLED 2014 Autumn 1st Delegate Mailer
LED 2014 Autumn 1st Delegate MailerTimea Kuk
 
Guia ayudas sociales a familias 2014 - DOWN ESPAÑA
Guia ayudas sociales a familias 2014 - DOWN ESPAÑAGuia ayudas sociales a familias 2014 - DOWN ESPAÑA
Guia ayudas sociales a familias 2014 - DOWN ESPAÑADown Mérida
 
Memahami kredit perbankan
Memahami kredit perbankanMemahami kredit perbankan
Memahami kredit perbankanFridin Skidds
 
止めないためのWEBインフラ入門
止めないためのWEBインフラ入門止めないためのWEBインフラ入門
止めないためのWEBインフラ入門Sho Okada
 
Φιλ το Σαλιγκάρι (κουκλοθέατρο)
Φιλ το Σαλιγκάρι (κουκλοθέατρο)Φιλ το Σαλιγκάρι (κουκλοθέατρο)
Φιλ το Σαλιγκάρι (κουκλοθέατρο)eirmatth
 
Jon's presentation Mise-En-Sense
Jon's presentation Mise-En-SenseJon's presentation Mise-En-Sense
Jon's presentation Mise-En-SenseAffro1978
 
Incredible final project
Incredible final projectIncredible final project
Incredible final projectcclovebj
 
Basico2martes
Basico2martesBasico2martes
Basico2martesadjnt1979
 

Viewers also liked (15)

Ilovepdf merged
Ilovepdf mergedIlovepdf merged
Ilovepdf merged
 
LAS CONSERVADORAS
LAS CONSERVADORAS LAS CONSERVADORAS
LAS CONSERVADORAS
 
Joel : diari de l'estiu
Joel : diari de l'estiuJoel : diari de l'estiu
Joel : diari de l'estiu
 
Audience Profile
Audience ProfileAudience Profile
Audience Profile
 
7d1568f70f
7d1568f70f7d1568f70f
7d1568f70f
 
LED 2014 Autumn 1st Delegate Mailer
LED 2014 Autumn 1st Delegate MailerLED 2014 Autumn 1st Delegate Mailer
LED 2014 Autumn 1st Delegate Mailer
 
Guia ayudas sociales a familias 2014 - DOWN ESPAÑA
Guia ayudas sociales a familias 2014 - DOWN ESPAÑAGuia ayudas sociales a familias 2014 - DOWN ESPAÑA
Guia ayudas sociales a familias 2014 - DOWN ESPAÑA
 
Memahami kredit perbankan
Memahami kredit perbankanMemahami kredit perbankan
Memahami kredit perbankan
 
MY CV feb 2016
MY CV feb 2016MY CV feb 2016
MY CV feb 2016
 
Louisville's Best Barbecue
Louisville's Best BarbecueLouisville's Best Barbecue
Louisville's Best Barbecue
 
止めないためのWEBインフラ入門
止めないためのWEBインフラ入門止めないためのWEBインフラ入門
止めないためのWEBインフラ入門
 
Φιλ το Σαλιγκάρι (κουκλοθέατρο)
Φιλ το Σαλιγκάρι (κουκλοθέατρο)Φιλ το Σαλιγκάρι (κουκλοθέατρο)
Φιλ το Σαλιγκάρι (κουκλοθέατρο)
 
Jon's presentation Mise-En-Sense
Jon's presentation Mise-En-SenseJon's presentation Mise-En-Sense
Jon's presentation Mise-En-Sense
 
Incredible final project
Incredible final projectIncredible final project
Incredible final project
 
Basico2martes
Basico2martesBasico2martes
Basico2martes
 

Similar to Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storage Using Third Party Auditor

Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationEditor IJMTER
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...IEEEGLOBALSOFTTECHNOLOGIES
 
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing for ...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing for ...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing for ...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing for ...IEEEGLOBALSOFTTECHNOLOGIES
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storageIEEEFINALYEARPROJECTS
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storageJPINFOTECH JAYAPRAKASH
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storageJPINFOTECH JAYAPRAKASH
 
Secure cloud storage privacy preserving public auditing for data storage secu...
Secure cloud storage privacy preserving public auditing for data storage secu...Secure cloud storage privacy preserving public auditing for data storage secu...
Secure cloud storage privacy preserving public auditing for data storage secu...rajender147
 
Security Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party AuditorSecurity Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party Auditorijsrd.com
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storageShakas Technologies
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data securityeSAT Publishing House
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...Pvrtechnologies Nellore
 
Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944Editor IJARCET
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEditor IJMTER
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingAIRCC Publishing Corporation
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGAIRCC Publishing Corporation
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGijcsit
 

Similar to Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storage Using Third Party Auditor (20)

Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...
 
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing for ...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing for ...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing for ...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing for ...
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storage
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storage
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storage
 
Secure cloud storage privacy preserving public auditing for data storage secu...
Secure cloud storage privacy preserving public auditing for data storage secu...Secure cloud storage privacy preserving public auditing for data storage secu...
Secure cloud storage privacy preserving public auditing for data storage secu...
 
Security Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party AuditorSecurity Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party Auditor
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storage
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
 
50120140503020
5012014050302050120140503020
50120140503020
 
publishable paper
publishable paperpublishable paper
publishable paper
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...
 
Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 

Recently uploaded

INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 

Recently uploaded (20)

INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 

Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storage Using Third Party Auditor

  • 1. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-2, Feb- 2016] Infogain Publication (Infogainpublication.com) ISSN : 2454-1311 www.ijaems.com Page | 30 Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storage Using Third Party Auditor Ankush R. Nistane1 , Shubhangi Sapkal2 , Dr. R. R. Deshmukh3 1 Department of CSE, Government College of Engineering, Aurangabad, India 2 Department of MCA, Government College of Engineering, Aurangabad, India 3 Department of CSE and IT, Dr BAMU, Aurangabad, India Abstract – Using cloud services, anyone can remotely store their data and can have the on-demand high quality applications and services from a shared pool of computing resources, without the burden of local data storage and maintenance. Cloud is a commonplace for storing data as well as sharing of that data. However, preserving the privacy and maintaining integrity of data during public auditing remains to be an open challenge. In this paper, we introducing a third party auditor (TPA), which will keep track of all the files along with their integrity. The task of TPA is to verify the data, so that the user will be worry- free. Verification of data is done on the aggregate authenticators sent by the user and Cloud Service Provider (CSP). For this, we propose a secure cloud storage system which supports privacy-preserving public auditing and blockless data verification over the cloud. Keywords – Blockless data verification, data integrity, cloud storage, third party auditor (TPA), privacy preserving, public auditing. NOMENCLATURE F - Data file is divided into blocks mi ; i Є {1,2,…n} Fi - Set of files mi - ith block of data file hi - Hash on block Σ Signature I. INTRODUCTION As we know cloud computing is booming nowadays. It is considered as the next generation information technology (IT) architecture for enterprises. Cloud service providers manage the data over the cloud. From users’ perspective, storing data remotely to the cloud is beneficial, because it can be accessed on-demand and in a flexible way. It brings relief of the burden high level infrastructure that provides a scalable, secure and reliable environment for users at a much lower cost. Most of the cloud storage likes Google Drive and Dropbox offering space to the users which has become a routine for users to share for storage management, new and challenging security threats toward users’ data. As the CSP are distributed, data outsourcing is actually relinquishing user’s ultimate control over the fate of their data. As the data is stored in an untrusted cloud, it can be easily be lost or it can also get corrupted due to disasters or failures or human errors [1]. To verify the integrity of the data over the cloud, we introduce a third party auditor (TPA) for public auditing. TPA offers its auditing service with more powerful computation and communication abilities. Privacy preserving public auditability has following advantages - A. Public Auditability – It allows TPA to check integrity of data without retrieving it. TPA or external auditor should not have any knowledge about data i.e. blockless data verification. B. Storage Correctness – User’s data should correctly store on cloud. C. Privacy Preserving – This ensures that TPA cannot derive any data content. D. Lightweight – Auditing should be performed with minimum overhead. Specifically, the contribution can be summarized as the following three aspects. a. Our scheme achieves batch auditing where multiple delegated auditing tasks from different users can be performed simultaneously by the TPA. b. Our scheme provides a privacy-preserving auditing protocol. c. Our scheme provides the better security and justifies the performance of our proposed schemes through concrete experiments.
  • 2. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-2, Feb- 2016] Infogain Publication (Infogainpublication.com) ISSN : 2454-1311 www.ijaems.com Page | 31 II. LITERATURE SURVEY There are many techniques that are used to provide security to the user’s data over cloud. These techniques are also used for data correctness, data integrity and its security over the cloud. But there earlier techniques are not efficient to work on dynamic cloud and there are some disadvantages with these existing systems. Following are some systems, with their pros and cons- Ateniese et al. [2] is the one who took the public auditing into consideration, that is, they used “provable data possession” (PDP) model for possession of data over the untrusted cloud storage. They used homomorphic linear authenticator (HLA) scheme for public auditing. But there are some problems in this system related security. This system achieves the public auditability but exposes the data to the external auditors. So the privacy of the data is compromised in this system. Juels et al. s[3] has described a model called “proof of retrievability” (PoR). In this model, for “possession” and “retrievability” of data error correcting codes and spot checking is used. This model does not support public auditability. This is the disadvantage of this model. Also, this model does not support external auditor. Later, to support dynamic operations of data over the cloud servers, Wang [4] proposed a dynamic auditing protocol. This protocol has some disadvantages; to send the data blocks to the auditor it requires a server and which may leak the privacy of the data to the auditor. Waters et al [5] proposed a publicly verifiable homomorphic authenticator based scheme which is nothing but an improved version of "proof of retrievability” scheme. In this scheme they used authenticators to achieve the public auditability. But this scheme is not useful for dynamic data. Likewise Message Authentication Code (MAC) based scheme is also not useful for dynamic data. It has some disadvantages such as user has to recalculate new MAC. In HLA based scheme [6], cloud provider reveals user’s data to the TPA which is the disadvantage of this scheme. This scheme is same as MAC based scheme but the only difference between MAC and HLA is that HLA can be aggregated. By observing different existing system, there is need of such a system which provides public auditing services that will fulfill almost all the threats to the data over the cloud. To do this, we suggested certain requirements for public auditing services- A. Accountability: Auditing should be done is proper manner. That is it should identify the problems as well as the particular entity responsible for that problem if any unreliability occurs. Therefore there is need of system’s accountability. B. Performance: The major aspect of any system is performance. In cloud computing also security of data storage and its integrity is important task. C. Dynamic Support: Cloud provides dynamic support for runtime system to access and share the data. The challenge is the legacy users. User has access to data and user can modify the data in the cloud. So, dynamic support in runtime system is the major challenge for public auditing system. In this paper, we proposed a secure and efficient system for public auditing which covers all the requirements mentioned above. In this system we use external auditor which is used for checking the integrity of the user’s data. At the same time external auditor should be unaware of the data so that the privacy will be preserved and the communication overhead will be less. Also we use the blockless data verification scheme, which verifies the correctness of the data without having its knowledge. Fig.1: System model of the data auditing III. PROPOSED SYSTEM To save the user’s computation time, storage resources and online burden, it is very important to introduce public auditing service for cloud data. This ensures the integrity of the data over the cloud and helps to reduce the online burden. Users may use the TPA to audit the data whenever they needed. Normally users don’t have such expertise as TPA has. TPA has the capability and expertise to check the integrity of the data stored on the cloud on behalf of that user. This way it makes the integrity verification of the data easier and affordable for the user. In the proposed scheme there are three algorithms for integrity verification - a. Key generation: It is a process of generating keys (Secret and public keys). b. Signing: Signing means generation of proof for verification. c. Verification: The proof generated by the cloud service provider will be verified by the TPA. In this paper, we use Boneh–Lynn–Shacham (BLS) signature for the integrity verification purpose. The main purpose of using this scheme is it creates less overhead over the network which automatically decreases the
  • 3. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-2, Feb- 2016] Infogain Publication (Infogainpublication.com) ISSN : 2454-1311 www.ijaems.com Page | 32 communication cost. The BLS signature is only of 160 bits. As it is very short the size of authenticators is also reduced that means it requires less storage space over the cloud. Using this scheme aggregate authenticator is calculated on every block, and later all the individual authenticators are aggregated and calculated which is also of 160 bits. BLS signature scheme not only reduces the communication cost and required storage space but also this scheme is secure and unforgeable. [7] Cloud architecture has three modules as shown in fig.1, User, Cloud Service Provider (CSP) and Third Party Auditor (TPA). User is responsible for storing the data over the cloud. CSP has the large space to store the user’s data and has the resources to manage the user’s data, whereas TPA which is an external auditor is responsible for auditing. A. User: a. User first divides the file into blocks, i.e. F = (m1, m2, m3… mn). b. Once the file is divided into blocks hash value is calculated on each block, i.e. Hash (mi) hi c. After that digital signature is calculated, i.e. SignGen (mi) σi, here ‘i’ denotes the ith block. d. Finally the aggregate authenticator is calculated, i.e. Aggregate_auth (σi) σ This aggregate authenticator is sent to the third party auditor (TPA) for checking the correctness of the data. B. Cloud Service Provider (CSP): a. Calculate digital signature, i.e. SignGen (mi) σi ’ b. Claculate aggregate authenticator, i.e. Aggregate_auth (σi ’ ) σ’ CSP sends the calculated aggregate authenticator to the TPA for verification of data. C. Third Party Auditor (TPA): a. Send file to check its integrity (Fi) Where Fi is a eset of files and i Є {1, 2,…n} b. Signature verification σ = σ’ Finally TPA is responsible for verifying the integrity of the data. As shown in fig.2, following steps are performed for integrity verification on the user’s data (single auditing). Fig.2: Architecture of cloud for integrity verification 1. First is the key generation process. User is responsible for generating public and private keys 2. User divides the file into individual blocks 3. User encrypts those blocks using 64 bit DES algorithm with the help of private key. This phase is called as signing. 4. Calculate hash for each block using MD5 and public key. MD5 is applied on 512 bit blocks and it produces hash of 128 bit. 5. Calculate digital signature which encrypts hash by using private key 6. User calculates aggregate authenticator 7. User sends calculated aggregate authenticator to the TPA 8. User sends encrypted data blocks to the cloud server and delete its local copy 9. TPA requests for the authenticator to the CSP 10. CSP calculates the aggregate authenticator which is calculated on the encrypted blocks. So this system provides more security as compared to earlier systems. 11. CSP sends aggregate authenticator to the TPA in response to the request. 12. TPA compares both the authenticators, the one which is sent by the user and another which is sent by the CSP. Based on that verification is done. 13. Depending on the result calculated by the TPA, the security message is sent to the user. This message is used to indicate the integrity of the file. If both the authenticators are same then this means the integrity of the file is maintained. If both the authenticators are not same then this means the file is altered by the intruder. In this scheme, for integrity verification of the data user and CSP do not send the original data to the TPA. So in this case TPA has no knowledge about the data which improves the security of the user’s data. Depending on the aggregate authenticators sent by the user and CSP, TPA compares
  • 4. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-2, Feb- 2016] Infogain Publication (Infogainpublication.com) ISSN : 2454-1311 www.ijaems.com Page | 33 both the authenticators and gives the result accordingly. Hence, the proposed scheme achieves both i.e. privacy preserving and blockless verification. IV. MODULES A. Public Auditing: In this paper, we proposed a unique privacy preserving public auditing technique which achieves the blockless data verification. At the CSP, the aggregate authenticator is calculated on the already encrypted data blocks. CSP doesn’t decrypt the data blocks to calculate aggregate authenticator. This way the security of user’s data over the cloud is achieved. Based on the authenticators calculated by both user and CSP on individual blocks are aggregated and compared at the TPA for its correctness. TPA has no knowledge of the data; it has only the authenticators obtained from user and CSP. This way the blockless data verification is achieved. B. Batch Auditing: Users may request for auditing service concurrently to the TPA. Auditing each task for individual user can be very inefficient and this can create the burden on the TPA. Using the batch auditing, TPA can simultaneously perform the multiple auditing tasks for different users. In this phase, multiple users send the aggregate authenticators to the TPA. Later TPA batch together all those requests and send it as a single request to the CSP. CSP then calculate the aggregate authenticator and sends it to the TPA. Finally TPA verifies the data. As compared to single auditing, batch auditing is better as multiple auditing requests are handled at a time. This improves the performance of the whole system. C. Data Dynamics: Dynamic support for public auditing is very important. User may need to update, delete or add the data. Allowing dynamic support over the cloud improves the efficiency of the public auditor. External auditor has to manage the integrity of the data file where user may wish to do some block-level operations on data like update, delete and modify the file in the running system. The proposed system provides the dynamic support. [8] V. EXPERIMENTAL RESULTS Following are the experimental results. Fig 3 shows the user dashboard which shows efficiency report graph of different files uploaded by the user. Fig. 3: User Home Page (Dashboard) In Fig 4, user uploads the file which is divided into certain number of blocks. Each block is encrypted with secret key and sent to CSP. At the same time one unique aggregate authenticator is calculated on blocks and is sent to the TPA. Fig. 4: File Uploading and Sending encrypted file blocks with metadata key for each block In Fig 5, TPA requests aggregate authenticators to the CSP for that file. Then CSP calculates aggregate authenticator and send it back to the TPA for further processing. TPA then audits the file and security message send to the file owner. If the file is tampered by any other user then user gets the File Tampered message. In Fig 6, to download the file user needs to enter the secret key. If secret key is valid then user need to enter valid metadata key for each block. If entered key is invalid then file will not be available download. More than 3 wrong attempts will send an intruder alert to the TPA as shown in Fig 7.
  • 5. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-2, Feb- 2016] Infogain Publication (Infogainpublication.com) ISSN : 2454-1311 www.ijaems.com Page | 34 Fig. 5: TPA’s and CSP’s Communication for Aggregate Authenticator Fig. 6: Decrypt and download the file with Secret key Fig. 7: File status and Downloading file with the help of metadata VI. CONCLUSION AND FUTURE SCOPE Cloud storage is increasing day by day. Public auditing over the cloud is of critical importance. As the user doesn’t have such capabilities and expertise as third party auditor has, user resorts to the TPA for the integrity verification of the data. This work studies the importance of integrity verification over the cloud with dynamic support. Also proposed system achieves the privacy preserving public auditing and blockless data verification. Batch auditing improves the efficiency of the TPA as multiple requests are handled at the same time, which reduces the burden of TPA. Since this system is effective and efficient for precise public auditing for integrity verification of user’s data. Using different schemes the performance and security of this system can be improved. REFERENCES [1] M. Armbrust, A. Fox, R. Griffith, A. D.Joseph, R. H.Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “A View of Cloud Computing,” Communications of the ACM, vol. 53, no. 4, pp. 50–58, Apirl 2010. [2] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable Data Possession at Untrusted Stores,” Proc. 14th ACM Conf. Computer and Comm. Security (CCS ’07), pp. 598-609, 2007. [3] Juels and J. Burton, S. Kaliski, “PORs: Proofs of Retrievability for Large Files,” Proc. ACM Conf. Computer and Comm. Security (CCS ’07), pp. 584- 597, Oct. 2007. [4] Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, “Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing,” IEEE Trans. Parallel Distributed Systems, vol. 22, no. 5, pp. 847- 859, May 2011. [5] H. Shacham and B. Waters, “Compact proofs of retrievability,” in Proc. of Asiacrypt 2008, vol. 5350, Dec 2008, pp. 90–107 [6] Cong Wang, qian wang, kui ren, wenjing lou , “Privacy – Preserving Public Auditability for Secure Cloud Storage”, IEEE transaction on Cloud Computing Year 2013. [7] Boneh, B. Lynn, and H. Shacham, “Short signatures from the Weil pairing,” J. Cryptology, vol. 17, no. 4, pp. 297–319, 2004. [8] Imran Ahmad, Prof. Hitesh Gupta, “Privacy- Preserving Public Auditing & Data Intrgrity for Secure Cloud Storage”, International Conference on Cloud, Big Data and Trust 2013, Nov 13-15, RGPV 100.