SlideShare a Scribd company logo
International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 5, Sep – Oct 2019
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED:All Rights are Reserved Page 1111
Remote Data Integrity Checking with Third Party Auditor in
Public Cloud using a Proxy Server
S. SwamyAyyappa*, Prof P.S. Avadhani**
*(Student, Computer Science and Systems Engineering, AU College of Engineering, Andhra University,Visakhapatnam
Email: sas118cct@gmail.com)
** (Professor, Computer Science and Systems Engineering, AUCollege of Engineering, Andhra University, Visakhapatnam
Email :psavadhani@yahoo.com)
----------------------------------------************************----------------------------------
Abstract:
Rapid development of cloud computing enabled many users to store data to PCS (public cloud servers).
Enormous amount of data in cloud brought up the need of new security problems to be solved in allowing
more clients process their data in a public cloud. At times the owner or the administrator fails to dispose its
duty, upon the delegation that is handled by a proxy to process the data and upload them. Alongside the
remote data integrity checking with third party auditor is also possible in public cloud storage. Proxy
makes an internal communication with the client as well as end user in disposing the data with security.
We propose a method of remote data integrity checking with third party auditor using IDPP (Identity
based proxy server processing).This IDPP protocol is designed to enhance secure transactions and works
on CDH (computational Diffie-Hellman) problem. IDPP can realize the remote data integrity checking
possible upon the authorization by the administrator or owner.
Keywords —Cloud Computing, Identity based Cryptography, Proxy, Remote data, Integrity.
----------------------------------------************************----------------------------------
I. INTRODUCTION
Over-headed computation and communication
techniques generated huge amount of data.
These data require more computation resources and
greater storage space. Cloud computing realized the
data centricity with independence to data. Major
problem arises at providing security to data being
uploaded and downloaded. Cloud computing
applications provided with storage, computing, data
security, etc. By using the public cloud platform,
the clients are relieved of the burden for storage
management, universal data access with
independent geographical locations, etc. There
increased the demand for cloud services with lowest
burden of storing and accessing.
Cloud computing provides the users all the
hardware, storage space and application software to
access and process data. Cloud computing uses the
internet and remote central servers for data and
applications to organize this pattern. This is broadly
categorized into two models.
• Deployment model
• Service model
Deployment model manage the entire cloud service.
In Fact, they define the type of access to the cloud.
There are 4 major deployment models. They are
• Public cloud model
• Private cloud model
• Community cloud model
• Hybrid cloud model
Service models are user centric and define the
model of service to the consumers. This is
application driven model and design is a subset of
automating the resource.
They are 3 service models. They are
• Platform as a service (PaaS)
• Software as a service (SaaS)
• Infrastructure as a service (Iaas)
RESEARCH ARTICLE OPEN ACCESS
International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 5, Sep – Oct 2019
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 1112
Cloud Computing has client infrastructure, Internet,
application, services, Cloud runtime, Storage,
Infrastructure, and security blocks in the
architecture. Below figure shows the architecture of
Cloud Computing
Fig. 1Cloud Computing Architecture
Security of the cloud refers to the data uploaded by
the user in remote public cloud servers since the
data stored is out of user’s reach in terms of
confidentiality, integrity and availability of data and
service. Remote data integrity checking is an
essential task in convincing the users of the cloud
that their data is kept safe. Some special cases the
actual user may be restricted due to administrational
problems, and the same is realized by the Identity
based Proxy server Processing (IDPP).
II. LITERATURE REVIEW
WentingShen[1]proposed a new model for the
integrity check on the cloud computing
environment and the use of TPA (Third party
auditor) and digital signaturetechnique for
achieving the integrity over cloud computing. They
also brought up a new method of encrypting a file
with the concept of “Sanitization”. This is again
broughtby[6] where the concept of “sanitizable
signatures” was explained.
The sanitizable signatures idea led to the
development of sanitization.
B.Wang[4] discussed the “public auditing for
shared data for efficient user revocation in cloud
services”. This analysed the concepts of users in
cloud and their bound of access in a protected cloud
environment.
All the services that cloud provide, basic security
but identifying the user based on the ID and
auditing of data in cloud have the efficient method
of data handling.
BhalePradeepkumar[7] made the part of functional
algorithms used in this paper in auditing and data
integrity checking in cloud while all this is done by
a third-party auditor. They used concepts like Third
party auditor and MD5 algorithm in generating
message block of 32-bit length key.
J.Sun[3] showed the cross-domain distribution of
files especially the electronic health records and
relevant permission access to use them.
This in return showcased the concepts that are used
in WentingShen[1] that project on electronic health
records and the partly encrypted files were pushed
into the cloud using specified sanitization
techniques. These both allowed us to think over the
domain and area of research.
In this paper the proposed algorithm is using the
entire cloud service with a proxy, both uploading
and downloading alongside the auditing and data
integrity checking. These concepts were motivated
by many earlier published papers and the core
algorithm in generating the keys was designed in
showing a concreteness in development. This uses
IDPP protocol depending on the Diffie Hellman key
algorithm keeping in mind the CDH (computational
Diffie Hellman problem).
III. MOTIVATION
The earlier proposed WentingShen[1] showcased a
challenging problem of partial encryption with
“Sanitization” and advancing the cloud usage.
Further study at this process of upload and usage of
data is clear and struck with at problem of initial
uploader, which is the motivation for this paper.
International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 5, Sep – Oct 2019
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 1113
Generally, all the users of the cloud upload their
data to the public cloud and check the data integrity
by Internet and direct applications provided by the
cloud. If a particular user who is a head of any
institution, by administrational problem couldn’t
reach the network, then the manager’s transactions
will be affected. To assist this sort of problems, he
has to delegate his duty to a proxy. He even has to
appoint data integrity mechanism to ensure the
security of data. Our proposed model performs all
required aspects at one platform.
IV. PROPOSED WORK
The security in a cloud is a remote task performing
the connectivity between the cloud and its
corresponding applications which are at default by
the services of cloud computing. This paper is a
combination of Remote data integrity check by a
Third-party auditor and push and pull of data
through an additional layer called Proxy server in
disguise of actual manager to the cloud,which take
multiple inherited functions namely,
• Identity - based encryption
• Remote data Integrity check
A. Identity – based Encryption
Identity based encryption takes the user’s ID
and with the help of a master key MSK, produces a
unique Private key Kp with what the encryption
process is done where message MSG is encrypted
with Kp and the decryption process follows with the
Ciphertext C being decrypted with the unique key
Kp. Security is a great concern as the user
parameters changes for every user and they are
unique in generating the encryption and decryption
keys.
Fig. 2Identity based Encryption Architecture
B. Remote Data Integrity Check
Remote data integrity check is the non-local function,
where the check is at the Cloud site maintaining the
privacy of user files. The data in cloud has to follow the
CIA - triad (Confidentiality, integrity, availability). The
remote data integrity is realized by assigning the
function of data integrity check. This entity takes in the
user parameters including the file in encrypted format
and regenerate the signature (Sig) and tries to validate it
with the initially generated signature.
Fig. 3 Remote Data Integrity Check Using TPA
V. SYSTEM ARCHITECTURE
We propose an IDPP protocol to secure data in
public clouds. Bilinear pairings technique makes
Identity-based cryptography practically possible.
This protocol comprises of five procedures:
• Set - parameters
• Seeking
• Proxy- key generation
• Labelling
• Proof
A. Set Parameters
Let G1 and G2 be two groups and e be the
bilinear pairings which have the same order q. Let g
be a generator g of the group G1. Two
cryptographic hash functions are given below
H: {0,1}* --> Z*q, h : Z*q X {0,1}* --> G1
B. Seeking
Taking in the original client’s identity IDo, KGC
generates a random key and sends the sk(id) to the
International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 5, Sep – Oct 2019
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 1114
original client by the secure channel. Let sk(id) be
the original client’s private key.
C. Proxy-key Generation
KGC generates its master key and is kept
confidential by KGC.
D. Labelling
Taking in the file F and proxy-key, the proxy
generates the corresponding tag for each file Fi.
Then it uploads the block-tag pair to PCS.
E. Proof
Proof is an interactive system between Public
Cloud and Original client. At the end of the
interactive proof protocol, Original Client output a
bit {0|1} denoting “success” or “failure” after the
remote data integrity check is over.
Fig 4 IDPP Protocol
VI. SYSTEM MODEL
IDPP protocol in the application generated consists
of few entities each performing certain functions.
There are four entities similar to them
A. Client: This is an entity which uploads
massive data to the PCS (Public Cloud
Server), by the delegated proxy which can
perform the data integrity checking.
B. PCS (Public Cloud Server): This is
maintained by the cloud service provider
and has significant storage and computation
capacity. User’s data is securely managed in
the cloud.
C. Proxy: This is delegated and authorized by
the manager to process the Client’s data and
upload them. This verifies the signature
signed by the Client and processes it when
the same is satisfied, otherwise it cannot
perform the procedure.
D. KGC (Key Generation Centre): This is an
entity that generates the private key upon
seeking the data and all inputs from the
Client.
This procedure provides the Client to interact
directly with the PCS to check the remote data
integrity. Thus, delivering the integrity check and
securing the data in a specified design method.
VII. CONCLUSION
Motivated by the security needs, we proposed a
novel security concept of IDPP implemented on
public cloud. The concrete IDPP protocol is
designed by using the bilinear pairings
technique. This protocol is provably secure and
efficient by using the formal security proof and
efficiency analysis. This finally accomplishes the
managerial tasks with updated security
mechanisms.
REFERENCES
[1] Wenting Shen, Jing Qin, Jia Yu , Rong Hao, and Jiankun Hu,
Enabling Identity Based Integrity Auditing And Data Sharing With
Sensitive Information Hiding for Secure cloud Storages, IEEE
transactions vol 14 , February 2019
[2] G. Ateniese et al., “Provable data possession at untrusted stores,” in
Proc. 14th ACM Conf. Comput. Commun. Secur., 2007, pp. 598–
609.
[3] J. Sun and Y. Fang, “Cross-domain data sharing in distributed
electronichealth record systems,” IEEE Trans. Parallel Distrib. Syst.,
vol. 21, no. 6,pp. 754–764, Jun. 2010
[4] B. Wang, B. Li, and H. Li, “Panda: Public auditing for shared data
with efficient user revocation in the cloud,” IEEE Trans. Serv.
Comput.,vol. 8, no. 1, pp. 92–106, Jan./Feb. 2015.
[5] Y. Yu et al., “Identity-based remote data integrity checking with
perfectdata privacy preserving for cloud storage,” IEEE Trans. Inf.
ForensicsSecurity, vol. 12, no. 4, pp. 767–778, Apr. 2017.
[6] G. Ateniese, D. H. Chou, B. de Medeiros, and G. Tsudik,
“Sanitizable
signatures,” in Proc. 10th Eur. Symp. Res. Comput. Secur. Berlin,
Germany: Springer-Verlag, 2005, pp. 159–177.
[7] Bhale Pradeepkumar Gajendra, Vinay kumar singh, More Sujeeth,
“ Achieving cloud security using third party auditor, MD5 and
Identity based encryption”

More Related Content

What's hot

Improving security for data migration in cloud computing using randomized enc...
Improving security for data migration in cloud computing using randomized enc...Improving security for data migration in cloud computing using randomized enc...
Improving security for data migration in cloud computing using randomized enc...
IOSR Journals
 
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key Exposure
IRJET Journal
 
Comparison of data security in grid and cloud
Comparison of data security in grid and cloudComparison of data security in grid and cloud
Comparison of data security in grid and cloud
eSAT Publishing House
 
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesCentralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Editor IJMTER
 
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud MembersAn Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
IRJET Journal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
Comparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computingComparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computing
eSAT Journals
 
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET Journal
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Editor IJMTER
 
Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)
Jishnu Pradeep
 
An4201262267
An4201262267An4201262267
An4201262267
IJERA Editor
 
IRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud DataIRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud Data
IRJET Journal
 
Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240Editor IJARCET
 
Iaetsd storage privacy protection against data
Iaetsd storage privacy protection against dataIaetsd storage privacy protection against data
Iaetsd storage privacy protection against data
Iaetsd Iaetsd
 
Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...
Shakas Technologies
 
Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds
IRJET Journal
 
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
PUBLIC AUDITING 	             FOR SECURE CLOUD STORAGE                       ...PUBLIC AUDITING 	             FOR SECURE CLOUD STORAGE                       ...
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
Bharath Nair
 
Cloud Computing Environment using Secured Access Control Technique
Cloud Computing Environment using Secured Access Control TechniqueCloud Computing Environment using Secured Access Control Technique
Cloud Computing Environment using Secured Access Control Technique
IRJET Journal
 

What's hot (19)

Improving security for data migration in cloud computing using randomized enc...
Improving security for data migration in cloud computing using randomized enc...Improving security for data migration in cloud computing using randomized enc...
Improving security for data migration in cloud computing using randomized enc...
 
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key Exposure
 
Comparison of data security in grid and cloud
Comparison of data security in grid and cloudComparison of data security in grid and cloud
Comparison of data security in grid and cloud
 
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesCentralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data Services
 
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud MembersAn Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Comparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computingComparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computing
 
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
 
Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)
 
An4201262267
An4201262267An4201262267
An4201262267
 
IRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud DataIRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud Data
 
Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240
 
Iaetsd storage privacy protection against data
Iaetsd storage privacy protection against dataIaetsd storage privacy protection against data
Iaetsd storage privacy protection against data
 
Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...
 
Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds
 
Ijariie1196
Ijariie1196Ijariie1196
Ijariie1196
 
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
PUBLIC AUDITING 	             FOR SECURE CLOUD STORAGE                       ...PUBLIC AUDITING 	             FOR SECURE CLOUD STORAGE                       ...
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
 
Cloud Computing Environment using Secured Access Control Technique
Cloud Computing Environment using Secured Access Control TechniqueCloud Computing Environment using Secured Access Control Technique
Cloud Computing Environment using Secured Access Control Technique
 

Similar to Remote data integrity checking with a third party auditor in public cloud using a proxy server

IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET Journal
 
Firewall and vpn investigation on cloud computing performance
Firewall and vpn investigation on cloud computing performanceFirewall and vpn investigation on cloud computing performance
Firewall and vpn investigation on cloud computing performance
IJCSES Journal
 
Analysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and MethodologiesAnalysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and Methodologies
IRJET Journal
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
eSAT Journals
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
eSAT Publishing House
 
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud SystemsIRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET Journal
 
Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...
Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...
Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...
IIRindia
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET Journal
 
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
Dr. Richard Otieno
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
IRJET Journal
 
Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Editor IJARCET
 
Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Editor IJARCET
 
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTINGSECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
IJNSA Journal
 
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTINGSECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
IJNSA Journal
 
50120140503020
5012014050302050120140503020
50120140503020
IAEME Publication
 
Security Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party AuditorSecurity Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party Auditor
ijsrd.com
 
An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...
An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...
An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...
cscpconf
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
IRJET Journal
 
G033030035
G033030035G033030035
G033030035
ijceronline
 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Editor IJMTER
 

Similar to Remote data integrity checking with a third party auditor in public cloud using a proxy server (20)

IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
 
Firewall and vpn investigation on cloud computing performance
Firewall and vpn investigation on cloud computing performanceFirewall and vpn investigation on cloud computing performance
Firewall and vpn investigation on cloud computing performance
 
Analysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and MethodologiesAnalysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and Methodologies
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
 
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud SystemsIRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
 
Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...
Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...
Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
 
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
 
Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235
 
Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235
 
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTINGSECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
 
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTINGSECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
 
50120140503020
5012014050302050120140503020
50120140503020
 
Security Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party AuditorSecurity Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party Auditor
 
An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...
An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...
An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
 
G033030035
G033030035G033030035
G033030035
 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
 

More from IJSRED

IJSRED-V3I6P13
IJSRED-V3I6P13IJSRED-V3I6P13
IJSRED-V3I6P13
IJSRED
 
School Bus Tracking and Security System
School Bus Tracking and Security SystemSchool Bus Tracking and Security System
School Bus Tracking and Security System
IJSRED
 
BigBasket encashing the Demonetisation: A big opportunity
BigBasket encashing the Demonetisation: A big opportunityBigBasket encashing the Demonetisation: A big opportunity
BigBasket encashing the Demonetisation: A big opportunity
IJSRED
 
Quantitative and Qualitative Analysis of Plant Leaf Disease
Quantitative and Qualitative Analysis of Plant Leaf DiseaseQuantitative and Qualitative Analysis of Plant Leaf Disease
Quantitative and Qualitative Analysis of Plant Leaf Disease
IJSRED
 
DC Fast Charger and Battery Management System for Electric Vehicles
DC Fast Charger and Battery Management System for Electric VehiclesDC Fast Charger and Battery Management System for Electric Vehicles
DC Fast Charger and Battery Management System for Electric Vehicles
IJSRED
 
Growth Path Followed by France
Growth Path Followed by FranceGrowth Path Followed by France
Growth Path Followed by France
IJSRED
 
Acquisition System
Acquisition SystemAcquisition System
Acquisition System
IJSRED
 
Parallelization of Graceful Labeling Using Open MP
Parallelization of Graceful Labeling Using Open MPParallelization of Graceful Labeling Using Open MP
Parallelization of Graceful Labeling Using Open MP
IJSRED
 
Study of Phenotypic Plasticity of Fruits of Luffa Acutangula Var. Amara
Study of Phenotypic Plasticity of  Fruits of Luffa Acutangula Var. AmaraStudy of Phenotypic Plasticity of  Fruits of Luffa Acutangula Var. Amara
Study of Phenotypic Plasticity of Fruits of Luffa Acutangula Var. Amara
IJSRED
 
Understanding Architecture of Internet of Things
Understanding Architecture of Internet of ThingsUnderstanding Architecture of Internet of Things
Understanding Architecture of Internet of Things
IJSRED
 
Smart shopping cart
Smart shopping cartSmart shopping cart
Smart shopping cart
IJSRED
 
An Emperical Study of Learning How Soft Skills is Essential for Management St...
An Emperical Study of Learning How Soft Skills is Essential for Management St...An Emperical Study of Learning How Soft Skills is Essential for Management St...
An Emperical Study of Learning How Soft Skills is Essential for Management St...
IJSRED
 
Smart Canteen Management
Smart Canteen ManagementSmart Canteen Management
Smart Canteen Management
IJSRED
 
Gandhian trusteeship and Economic Ethics
Gandhian trusteeship and Economic EthicsGandhian trusteeship and Economic Ethics
Gandhian trusteeship and Economic Ethics
IJSRED
 
Impacts of a New Spatial Variable on a Black Hole Metric Solution
Impacts of a New Spatial Variable on a Black Hole Metric SolutionImpacts of a New Spatial Variable on a Black Hole Metric Solution
Impacts of a New Spatial Variable on a Black Hole Metric Solution
IJSRED
 
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
IJSRED
 
Inginious Trafalgar Contrivition System
Inginious Trafalgar Contrivition SystemInginious Trafalgar Contrivition System
Inginious Trafalgar Contrivition System
IJSRED
 
Farmer's Analytical assistant
Farmer's Analytical assistantFarmer's Analytical assistant
Farmer's Analytical assistant
IJSRED
 
Functions of Forensic Engineering Investigator in India
Functions of Forensic Engineering Investigator in IndiaFunctions of Forensic Engineering Investigator in India
Functions of Forensic Engineering Investigator in India
IJSRED
 
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
IJSRED
 

More from IJSRED (20)

IJSRED-V3I6P13
IJSRED-V3I6P13IJSRED-V3I6P13
IJSRED-V3I6P13
 
School Bus Tracking and Security System
School Bus Tracking and Security SystemSchool Bus Tracking and Security System
School Bus Tracking and Security System
 
BigBasket encashing the Demonetisation: A big opportunity
BigBasket encashing the Demonetisation: A big opportunityBigBasket encashing the Demonetisation: A big opportunity
BigBasket encashing the Demonetisation: A big opportunity
 
Quantitative and Qualitative Analysis of Plant Leaf Disease
Quantitative and Qualitative Analysis of Plant Leaf DiseaseQuantitative and Qualitative Analysis of Plant Leaf Disease
Quantitative and Qualitative Analysis of Plant Leaf Disease
 
DC Fast Charger and Battery Management System for Electric Vehicles
DC Fast Charger and Battery Management System for Electric VehiclesDC Fast Charger and Battery Management System for Electric Vehicles
DC Fast Charger and Battery Management System for Electric Vehicles
 
Growth Path Followed by France
Growth Path Followed by FranceGrowth Path Followed by France
Growth Path Followed by France
 
Acquisition System
Acquisition SystemAcquisition System
Acquisition System
 
Parallelization of Graceful Labeling Using Open MP
Parallelization of Graceful Labeling Using Open MPParallelization of Graceful Labeling Using Open MP
Parallelization of Graceful Labeling Using Open MP
 
Study of Phenotypic Plasticity of Fruits of Luffa Acutangula Var. Amara
Study of Phenotypic Plasticity of  Fruits of Luffa Acutangula Var. AmaraStudy of Phenotypic Plasticity of  Fruits of Luffa Acutangula Var. Amara
Study of Phenotypic Plasticity of Fruits of Luffa Acutangula Var. Amara
 
Understanding Architecture of Internet of Things
Understanding Architecture of Internet of ThingsUnderstanding Architecture of Internet of Things
Understanding Architecture of Internet of Things
 
Smart shopping cart
Smart shopping cartSmart shopping cart
Smart shopping cart
 
An Emperical Study of Learning How Soft Skills is Essential for Management St...
An Emperical Study of Learning How Soft Skills is Essential for Management St...An Emperical Study of Learning How Soft Skills is Essential for Management St...
An Emperical Study of Learning How Soft Skills is Essential for Management St...
 
Smart Canteen Management
Smart Canteen ManagementSmart Canteen Management
Smart Canteen Management
 
Gandhian trusteeship and Economic Ethics
Gandhian trusteeship and Economic EthicsGandhian trusteeship and Economic Ethics
Gandhian trusteeship and Economic Ethics
 
Impacts of a New Spatial Variable on a Black Hole Metric Solution
Impacts of a New Spatial Variable on a Black Hole Metric SolutionImpacts of a New Spatial Variable on a Black Hole Metric Solution
Impacts of a New Spatial Variable on a Black Hole Metric Solution
 
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
 
Inginious Trafalgar Contrivition System
Inginious Trafalgar Contrivition SystemInginious Trafalgar Contrivition System
Inginious Trafalgar Contrivition System
 
Farmer's Analytical assistant
Farmer's Analytical assistantFarmer's Analytical assistant
Farmer's Analytical assistant
 
Functions of Forensic Engineering Investigator in India
Functions of Forensic Engineering Investigator in IndiaFunctions of Forensic Engineering Investigator in India
Functions of Forensic Engineering Investigator in India
 
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
 

Recently uploaded

Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
ongomchris
 

Recently uploaded (20)

Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
 

Remote data integrity checking with a third party auditor in public cloud using a proxy server

  • 1. International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 5, Sep – Oct 2019 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED:All Rights are Reserved Page 1111 Remote Data Integrity Checking with Third Party Auditor in Public Cloud using a Proxy Server S. SwamyAyyappa*, Prof P.S. Avadhani** *(Student, Computer Science and Systems Engineering, AU College of Engineering, Andhra University,Visakhapatnam Email: sas118cct@gmail.com) ** (Professor, Computer Science and Systems Engineering, AUCollege of Engineering, Andhra University, Visakhapatnam Email :psavadhani@yahoo.com) ----------------------------------------************************---------------------------------- Abstract: Rapid development of cloud computing enabled many users to store data to PCS (public cloud servers). Enormous amount of data in cloud brought up the need of new security problems to be solved in allowing more clients process their data in a public cloud. At times the owner or the administrator fails to dispose its duty, upon the delegation that is handled by a proxy to process the data and upload them. Alongside the remote data integrity checking with third party auditor is also possible in public cloud storage. Proxy makes an internal communication with the client as well as end user in disposing the data with security. We propose a method of remote data integrity checking with third party auditor using IDPP (Identity based proxy server processing).This IDPP protocol is designed to enhance secure transactions and works on CDH (computational Diffie-Hellman) problem. IDPP can realize the remote data integrity checking possible upon the authorization by the administrator or owner. Keywords —Cloud Computing, Identity based Cryptography, Proxy, Remote data, Integrity. ----------------------------------------************************---------------------------------- I. INTRODUCTION Over-headed computation and communication techniques generated huge amount of data. These data require more computation resources and greater storage space. Cloud computing realized the data centricity with independence to data. Major problem arises at providing security to data being uploaded and downloaded. Cloud computing applications provided with storage, computing, data security, etc. By using the public cloud platform, the clients are relieved of the burden for storage management, universal data access with independent geographical locations, etc. There increased the demand for cloud services with lowest burden of storing and accessing. Cloud computing provides the users all the hardware, storage space and application software to access and process data. Cloud computing uses the internet and remote central servers for data and applications to organize this pattern. This is broadly categorized into two models. • Deployment model • Service model Deployment model manage the entire cloud service. In Fact, they define the type of access to the cloud. There are 4 major deployment models. They are • Public cloud model • Private cloud model • Community cloud model • Hybrid cloud model Service models are user centric and define the model of service to the consumers. This is application driven model and design is a subset of automating the resource. They are 3 service models. They are • Platform as a service (PaaS) • Software as a service (SaaS) • Infrastructure as a service (Iaas) RESEARCH ARTICLE OPEN ACCESS
  • 2. International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 5, Sep – Oct 2019 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 1112 Cloud Computing has client infrastructure, Internet, application, services, Cloud runtime, Storage, Infrastructure, and security blocks in the architecture. Below figure shows the architecture of Cloud Computing Fig. 1Cloud Computing Architecture Security of the cloud refers to the data uploaded by the user in remote public cloud servers since the data stored is out of user’s reach in terms of confidentiality, integrity and availability of data and service. Remote data integrity checking is an essential task in convincing the users of the cloud that their data is kept safe. Some special cases the actual user may be restricted due to administrational problems, and the same is realized by the Identity based Proxy server Processing (IDPP). II. LITERATURE REVIEW WentingShen[1]proposed a new model for the integrity check on the cloud computing environment and the use of TPA (Third party auditor) and digital signaturetechnique for achieving the integrity over cloud computing. They also brought up a new method of encrypting a file with the concept of “Sanitization”. This is again broughtby[6] where the concept of “sanitizable signatures” was explained. The sanitizable signatures idea led to the development of sanitization. B.Wang[4] discussed the “public auditing for shared data for efficient user revocation in cloud services”. This analysed the concepts of users in cloud and their bound of access in a protected cloud environment. All the services that cloud provide, basic security but identifying the user based on the ID and auditing of data in cloud have the efficient method of data handling. BhalePradeepkumar[7] made the part of functional algorithms used in this paper in auditing and data integrity checking in cloud while all this is done by a third-party auditor. They used concepts like Third party auditor and MD5 algorithm in generating message block of 32-bit length key. J.Sun[3] showed the cross-domain distribution of files especially the electronic health records and relevant permission access to use them. This in return showcased the concepts that are used in WentingShen[1] that project on electronic health records and the partly encrypted files were pushed into the cloud using specified sanitization techniques. These both allowed us to think over the domain and area of research. In this paper the proposed algorithm is using the entire cloud service with a proxy, both uploading and downloading alongside the auditing and data integrity checking. These concepts were motivated by many earlier published papers and the core algorithm in generating the keys was designed in showing a concreteness in development. This uses IDPP protocol depending on the Diffie Hellman key algorithm keeping in mind the CDH (computational Diffie Hellman problem). III. MOTIVATION The earlier proposed WentingShen[1] showcased a challenging problem of partial encryption with “Sanitization” and advancing the cloud usage. Further study at this process of upload and usage of data is clear and struck with at problem of initial uploader, which is the motivation for this paper.
  • 3. International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 5, Sep – Oct 2019 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 1113 Generally, all the users of the cloud upload their data to the public cloud and check the data integrity by Internet and direct applications provided by the cloud. If a particular user who is a head of any institution, by administrational problem couldn’t reach the network, then the manager’s transactions will be affected. To assist this sort of problems, he has to delegate his duty to a proxy. He even has to appoint data integrity mechanism to ensure the security of data. Our proposed model performs all required aspects at one platform. IV. PROPOSED WORK The security in a cloud is a remote task performing the connectivity between the cloud and its corresponding applications which are at default by the services of cloud computing. This paper is a combination of Remote data integrity check by a Third-party auditor and push and pull of data through an additional layer called Proxy server in disguise of actual manager to the cloud,which take multiple inherited functions namely, • Identity - based encryption • Remote data Integrity check A. Identity – based Encryption Identity based encryption takes the user’s ID and with the help of a master key MSK, produces a unique Private key Kp with what the encryption process is done where message MSG is encrypted with Kp and the decryption process follows with the Ciphertext C being decrypted with the unique key Kp. Security is a great concern as the user parameters changes for every user and they are unique in generating the encryption and decryption keys. Fig. 2Identity based Encryption Architecture B. Remote Data Integrity Check Remote data integrity check is the non-local function, where the check is at the Cloud site maintaining the privacy of user files. The data in cloud has to follow the CIA - triad (Confidentiality, integrity, availability). The remote data integrity is realized by assigning the function of data integrity check. This entity takes in the user parameters including the file in encrypted format and regenerate the signature (Sig) and tries to validate it with the initially generated signature. Fig. 3 Remote Data Integrity Check Using TPA V. SYSTEM ARCHITECTURE We propose an IDPP protocol to secure data in public clouds. Bilinear pairings technique makes Identity-based cryptography practically possible. This protocol comprises of five procedures: • Set - parameters • Seeking • Proxy- key generation • Labelling • Proof A. Set Parameters Let G1 and G2 be two groups and e be the bilinear pairings which have the same order q. Let g be a generator g of the group G1. Two cryptographic hash functions are given below H: {0,1}* --> Z*q, h : Z*q X {0,1}* --> G1 B. Seeking Taking in the original client’s identity IDo, KGC generates a random key and sends the sk(id) to the
  • 4. International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 5, Sep – Oct 2019 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 1114 original client by the secure channel. Let sk(id) be the original client’s private key. C. Proxy-key Generation KGC generates its master key and is kept confidential by KGC. D. Labelling Taking in the file F and proxy-key, the proxy generates the corresponding tag for each file Fi. Then it uploads the block-tag pair to PCS. E. Proof Proof is an interactive system between Public Cloud and Original client. At the end of the interactive proof protocol, Original Client output a bit {0|1} denoting “success” or “failure” after the remote data integrity check is over. Fig 4 IDPP Protocol VI. SYSTEM MODEL IDPP protocol in the application generated consists of few entities each performing certain functions. There are four entities similar to them A. Client: This is an entity which uploads massive data to the PCS (Public Cloud Server), by the delegated proxy which can perform the data integrity checking. B. PCS (Public Cloud Server): This is maintained by the cloud service provider and has significant storage and computation capacity. User’s data is securely managed in the cloud. C. Proxy: This is delegated and authorized by the manager to process the Client’s data and upload them. This verifies the signature signed by the Client and processes it when the same is satisfied, otherwise it cannot perform the procedure. D. KGC (Key Generation Centre): This is an entity that generates the private key upon seeking the data and all inputs from the Client. This procedure provides the Client to interact directly with the PCS to check the remote data integrity. Thus, delivering the integrity check and securing the data in a specified design method. VII. CONCLUSION Motivated by the security needs, we proposed a novel security concept of IDPP implemented on public cloud. The concrete IDPP protocol is designed by using the bilinear pairings technique. This protocol is provably secure and efficient by using the formal security proof and efficiency analysis. This finally accomplishes the managerial tasks with updated security mechanisms. REFERENCES [1] Wenting Shen, Jing Qin, Jia Yu , Rong Hao, and Jiankun Hu, Enabling Identity Based Integrity Auditing And Data Sharing With Sensitive Information Hiding for Secure cloud Storages, IEEE transactions vol 14 , February 2019 [2] G. Ateniese et al., “Provable data possession at untrusted stores,” in Proc. 14th ACM Conf. Comput. Commun. Secur., 2007, pp. 598– 609. [3] J. Sun and Y. Fang, “Cross-domain data sharing in distributed electronichealth record systems,” IEEE Trans. Parallel Distrib. Syst., vol. 21, no. 6,pp. 754–764, Jun. 2010 [4] B. Wang, B. Li, and H. Li, “Panda: Public auditing for shared data with efficient user revocation in the cloud,” IEEE Trans. Serv. Comput.,vol. 8, no. 1, pp. 92–106, Jan./Feb. 2015. [5] Y. Yu et al., “Identity-based remote data integrity checking with perfectdata privacy preserving for cloud storage,” IEEE Trans. Inf. ForensicsSecurity, vol. 12, no. 4, pp. 767–778, Apr. 2017. [6] G. Ateniese, D. H. Chou, B. de Medeiros, and G. Tsudik, “Sanitizable signatures,” in Proc. 10th Eur. Symp. Res. Comput. Secur. Berlin, Germany: Springer-Verlag, 2005, pp. 159–177. [7] Bhale Pradeepkumar Gajendra, Vinay kumar singh, More Sujeeth, “ Achieving cloud security using third party auditor, MD5 and Identity based encryption”