SlideShare a Scribd company logo
1 of 3
Download to read offline
IJSRD - International Journal for Scientific Research & Development| Vol. 2, Issue 09, 2014 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 173
Security Check in Cloud Computing through Third Party Auditor
Govinda.K1
J.Keerthana2
U.Pavithra3
1,2,3
SCSE, VIT University, Vellore, India
Abstract— In cloud computing, data owners crowd their
data on cloud servers and users (data consumers) can access
the data from cloud servers. Due to the data outsourcing,
however, it requires an independent auditing service to
check the data integrity in the cloud. Some existing remote
integrity checking method scan only serve for static records
data. Thus, cannot be used in the auditing service since the
data in the cloud can be animatedly updated. Thus, an
efficient and secure dynamic auditing protocol is required to
convince data owners that the data are correctly stored in the
cloud. In this paper, we first design an auditing framework
for cloud storage systems for privacy-preserving auditing
protocol. Then, we extend our auditing protocol to support
the data dynamic operations, which is efficient to secure
the random model.
Key words: Resources, Rack, Region, Data, Cloud
I. INTRODUCTION
Cloud Computing has been envisioned as the next
generation architecture of IT enterprise, due to its
extraordinary advantages in the history of IT: on-demand
self-service, everywhere network access, location
independent resource pooling, rapid resource elasticity,
usage-based pricing and transference of risk [1]. As a
troublemaking technology with profound implications,
Cloud Computing is transformed how business peoples use
IT. One fundamental aspect of this concept shifting is that
data is being centralized to the Cloud. From us viewpoint ,
including both individuals and IT enterprises, storing data
remotely into the cloud in a flexible on-demand manner
brings appealing benefits: relief of the burden for storage
management, universal data access with independent
geographical locations, and avoidance of capital expenditure
on hardware, software, and personnel maintenances, etc
[2].While Cloud makes these advantages more Applicant
than ever, it also brings new and challenging security to
users outsourced data. Since cloud service providers (CSP)
are separate administrative entities, data outsourcing is
actually surrender user’s ultimate control over the outcome
of their data. The correctness of the data in the cloud is
being put at risk due to the following reasons. First of all,
although the infrastructures under the cloud are much more
powerful than personal computing Devices. Examples:
outages and security breach of important cloud services
appear from time to time [3]–[5].
Secondly, they exist various motivations for cloud
service provider behaves disloyally towards the cloud users
regarding the status of their outsourced data. Examples:
cloud service providers, for monetary reasons, reclaiming
storage by discarding data that has not been loss incidents
so as to maintain a reputation [6]–[8]. Although outsourcing
data into the cloud is economically attractive and
complexity of long-termdata storage, it does not suggest any
security on data honesty and availability. This problem, if
not properly addressed, may lead to the successful
exploitation of the cloud architecture. As users no longer
physically own the storage of their data, cryptographic
primitives for the purpose of data security protection can’t
be directly adopted. Thus, how to efficiently verify the
correctness of outsourced cloud data without the local copy
of data files becomes a big challenge for data storage
security in Cloud Computing.
Note that simply downloading the data for its
integrity verification and not a practical solution due to the
expensiveness in I/O cost and transmitting the file across the
network. Besides, it is often insufficient to detect the data
corruption when accessing the data. Considering the large
amount of the outsourced data and the user’s controlled
resource capacity, the ability to audit the correctness of the
data in a cloud environment can be terrible and expensive
for the cloud users [8], [9].Hence, to fully ensure the data
security and save the cloud users computation resources, it
is of critical importance to enable public auditability for
cloud data storage. so that the users may resort to a third
party auditor (TPA), who has expertise that the users do not,
to audit the outsourced data when needed. Based on the
audit result, TPA could release an audit report, which would
not only help users to evaluate the risk of their subscribed
cloud data services, but also be useful for the cloud service
provider to improve their cloud based service platform [7].
By enabling public risk auditing protocols will play an
important role on cloud economy to become fully
established, where users can assess risk and gain trust in
Cloud.
Recently, the notion of public auditability has been
proposed in the context of ensuring remotely stored data
integrity under different systems and security models [6],
[8], [10], [11].Public auditability allows an external party, in
addition to the user himself, to verify the correctness of
remotely stored data. However, most of these schemes [6],
[8], [10] do not support the privacy protection of users’ data
against external auditors, i.e., they may potentially reveal
user data information to the auditors, as will be discussed in
Section III-C. This severe drawback greatly affects the
security of these protocols in Cloud Computing. From the
perspective of protecting data privacy the users, who own
the data and rely on TPA just for test orage security of their
data, do not want this auditing process introducing new
vulnerabilities of unauthorized information leakage towards
their data security [12]. Moreover, there are legal
regulations, such as the US Health Insurance Portability and
Accountability Act (HIPAA) [13], further demanding the
outsourced data not to be leaked to external parties
[7].Exploiting data encryption before outsourcing [11] is
one way to mitigate this privacy concern, but it is only
complementary to the privacy-preserving public auditing
scheme to be proposed in this paper. Without a properly
designed auditing protocol, encryption itself cannot prevent
data from “flowing away” towards external parties during
the auditing process. Thus, it does not completely solve the
problem of protecting data privacy but just reduces it to the
one of managing the encryption keys. Unauthorized data
leakage still remains a problem due to the potential exposure
of encryption keys.
Security Check in Cloud Computing through Third Party Auditor
(IJSRD/Vol. 2/Issue 09/2014/039)
All rights reserved by www.ijsrd.com 174
II. LITERATURE REVIEW
ABE was proposed by Sahai and Waters . In ABE, a user
has a set of attributes in addition to its unique ID. There are
two classes of ABEs. In Key-policy ABE or KP-ABE
(Goyalet al. the sender has an access policy to encrypt data.
A writer whose attributes and keys have been revoked
cannot write back the old informations. The receiver
receives attributes and secret keys from the attribute
authority and is able to decrypt information if it has
matching attributes. In Cipher text-policy, CP-ABE the
receiver has the access policy in the form of a tree, with
attributes as leaves and monotonic access structure with
AND, OR and other threshold gates.
All the approaches take a centralized concept and
allows only one KDC, which is a single point of failure.
Trail proposed a multi-authority ABE, in which there are
several KDC authorities (coordinated by a trusted authority)
which distribute attributes and secret keys to users. Multi-
authority ABE protocol was studied in which required no
reliable authority which requires every user to have
attributes from at KDCs. Recently, Lewko and Waters
proposed a fully decentralized ABE where users could have
zero or more attributes from each authority and did not
require a trusted server. In all these cases, decryption at
user’s end is computation demanding. So, this technique
might be useless when users access their mobile devices. To
clear this problem, Green et al. planned to outsource the
decryption task to a replacement server, so that the user can
compete with minimum resources. Example: hand held
devices. However, the occurrence of one replacement and
one key distribution centre makes it less forceful than
decentralized approaches. Both these approaches had no
way to authenticate users, anaemically. Yang et al.
presented a modification of authenticate users, who want to
remain secrete while accessing the cloud. To ensure
anonymous user authentication Attribute Based Signatures
were introduced by Majiet al. [23]. This was also a
centralized approach. A recent scheme by the same authors
[24] takes a decentralized approach and provides
authentication without disclosing.
III. PROPOSED METHOD
The third party auditor will use MD5 algorithm to do
security check.
This message can be a string of any variable length
containing alphabets, digits and special symbols. In general
formula:
Message = ((a-z) + (A-Z) + (0-9) + (!-;))*
The message digest should be a string of fixed
length containing of all the alphabets and special symbols.
Message Digest= ((a-z) + (A-Z) + (0-9) + (! -;))n,
Where n=a ( a:fixed natural number)
While working on MySQL databases and PHP for web
applications we came across MD5. We also marked an
application called “Cain n Able” which can crack messages
from their MD5 hash value.
 When analytic work indicated that MD5's
predecessor MD4 was likely to be insecure. MD5
was designed in 1991 to be a secure replacement.
 In 1993 Den Boer gave a result of finding a
"pseudo-collision" of the MD5 compression
function. That is, two different initialization
vectors which produce an identical digest.
 In 1996Dobbertin announced a collision of the
compression function of MD5 While this was not
an full MD5 hash function, it was close enough for
cryptographers to recommend switching to a
replacement, such asSHA-1 or RIPEMD-160.
 Recently, a number of projects have created under
MD5 rainbow tables which are easily available in
online, and can be used to reverse many MD5
hashes into strings that bump with the original
input, usually for the purposes of password
cracking. If passwords are combined with a salt
before the MD5 digest is generated, rainbow tables
become much less useful.
So we thought of designing a new algorithm for
calculating message digest.
IV. ALGORITHM
Input: A message in plaintext of any length.
Output: A message digest of 128 bit for the input message.
The algorithm works in the following steps:
Step1: Enter the input string.
Step2: Find the equivalent binary string.(Use ASCII
conversion ) .
Step 3:
i.) Append a bit sequence ( “01”) to the binary string
so that the length of the resulting string is 64
shorter than a multiple of 512.
ii.) Append 64 more bits by scanning the binary string
of step3 starting from an arbitrary location.
Step 4:
i.) Divide the output binary string of Step3 in 128 bit
blocks.
ii.) Generate a 128 bit binary key using a random
number generator.
iii.) Perform a bitwise operation (like OR , AND, XOR,
followed by Left Shift, Right Shift, zero fill
shifting etc.) among the 128 bit block and 128 bit
random key.
iv.) Store the output of Step4(iii) as stepwise message
digest.
Step 5:
i.) Perform a bitwise operation among the current
stepwise message digest and the previous stepwise
message digest.
ii.) Go to Step4 until all the blocks of input message
are exhausted.
Step 6: Convert the output of Step5 into corresponding
character value and store it as the final message digest.
V. DISCUSSION
The input message can be of any type. It may contain
character, digit, special symbols etc.
Message = ((a-z) + (A-Z) + (0-9) + (! - ;))*
Binary equivalent of input message is calculated.
This is done by using ASCII code for corresponding
character.
For example: A = 01000001
B = 01000010 …….. etc.
Security Check in Cloud Computing through Third Party Auditor
(IJSRD/Vol. 2/Issue 09/2014/039)
All rights reserved by www.ijsrd.com 175
The resulting binary string may contain any No. of
digits. Then a bit sequence is appended (say “01”) to the
input binary string so that the length of the resulting string is
64 shorter than a multiple of 512. Mathematically length of
binary string is %512=448. The bit sequences can also be
11, 10, 00 etc. Again 64 more bit sequence is appended to it
from the input binary string itself starting from a arbitrary
position. Here it starts from ([length of string]/3)th position.
Now the binary string is of length which is a integer
multiple of 512.this message string is then divided into
blocks of 128 bits. A key is generated which is also of 128
bit. The key can be generated by using any of the random
number.
Here we have used the method as
Key = (key*39) % 967
Keyf = (key)!
Binary equivalent of keyf is calculated and any 128
bit is taken as the key for a step. In each step one block of
message string and a key is processed to give a message
process. The process may involve operations like OR, AND,
XOR, left shift, right shift etc. The stepwise message digests
performs a bitwise operation with previous step message
digest to form the final message. The resulting binary string
is then converted into character string to get the final
message digest. In this any input string the output message
digest is of constant length. The message digest may contain
any characters, digits, special characters etc.
i.e.: Message Digest= ((a-z) + (A-Z) + (0-9) + (! - ;)) n
Where n= a fixed natural number.
Fig.1: Layout of our proposed algorithm
VI. CONCLUSION
In this paper we explained different existing paper
techniques and their merits and demerits. We discussed their
methods of data security and privacy etc. In all those papers
some have not described proper data security mechanisms,
some were lack in supporting dynamic data operations,
some were lack in ensuring data integrity, while some were
lacking by high resource and computation cost. Hence this
paper gives overall idea of all existing techniques for cloud
data security and methods proposed for ensuring data
authentication using TPA.
REFERENCES
[1] Elsenpeter Robert, Anthony T.Velte and Toby
J.Velte, Cloud Computing a Practical Approach
2010.
[2] Qian Wang and Cong Wang and Kui Ren, Wenjing
Lou, Jin Li “Enabling Public Auditability And Data
Dynamics For Storage Security in Cloud
Computing” in IEEE transactions on parallel and
distributed systems, 2011, vol. 22, no. 5.
[3] Cong Wang and Kui Ren and Wenjing Lou and
JinLi,”Toward Publicly Auditable Secure Cloud
Data Storage Services” in IEEE, 2010.
[4] M.Ashah and R. swaminathan and
m.baker”Privacy-Preserving Audit And Extraction
of Digital Contents”, 2011.
[5] H. Shacham and B. Waters “Compact Proofs of
Retrivability“ in proc. of asiascrypt, 2008.
[6] Xiang Tan and Bo Ai “The Issue of Cloud
Computing Security in High-Speed Railway”
international confer. on electronic and mechanical
engi. And information technology, 2011. Beijing
p.r china,.
[7] FarzadSabahi, “Cloud Computing Security Threats
and Responses” ,IEEE confer. 2011, 978-1-61284-
486-2/111
[8] Ravi Kant Sahu and Abhishek Mohta, L.K.
Awasthi ”Robust Data Integration While Using
Third Party Auditor For Cloud Data Storage
Services”, conf. IJARCSSE, 2012, Volume 2, Issue
2,ISSN: 2277 128X.
[9] Govinda V, and Gurunathaprasad, H
Sathshkumar,”Third Party Auditing For Security
Data Storage in cloud through digital signature
using RSA” IJASATR, 2012, issue 2,vol-4, Issn
2249-9954.
[10]P. Mell and t. Grance “Draft Nist Working
Definition of Cloud Computing”, 2009.
[11] Elinor Mills, "Cloud Computing Security Forecast: Clear
Skies", 2009.
[12]H. Shacham and B. Waters, “Compact Proofs of
Retrievability,” Proc. 14th Int’l Conf. Theory and
Application of Cryptology and Information
Security: Advances in Cryptology, J. Pieprzyk,
ed.,pp. 90-107, 2008.
[13]C.C. Erway, A. Ku¨ pc¸u¨ , C. Papamanthou, and
R. Tamassia, “Dynamic Provable Data
Possession,” Proc. ACM Conf. Computer and
Comm. Security, E. Al-Shaer, S. Jha, and A.D.
Keromytis, eds.,pp. 213-222, 2009.
[14]Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li,
“Enabling Public Auditability and Data Dynamics
for Storage Security in Cloud Computing,” IEEE
Trans. Parallel Distributed Systems, vol. 22, no. 5,
pp. 847-859, May 2011.
[15]C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-
Preserving Public Auditing for Data Storage
Security in Cloud Computing,” Proc. IEEE
INFOCOM, pp. 525-533, 2010.
[16]Y. Zhu, H. Hu, G. Ahn, and M. Yu, “Cooperative
Provable Data Possession for Integrity Verification
in Multi-Cloud Storage,” IEEE Trans. Parallel and
Distributed Systems, vol. 23, no. 12, pp. 2231-
2244, Dec. 2012.

More Related Content

What's hot

A Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud ComputingA Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud ComputingEditor IJCATR
 
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesCentralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesEditor IJMTER
 
A Novel privacy preserving public auditing for shared data in cloud
A Novel privacy preserving public auditing for shared data in cloudA Novel privacy preserving public auditing for shared data in cloud
A Novel privacy preserving public auditing for shared data in cloudJAVVAJI VENKATA RAO
 
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC AlgorithmIRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC AlgorithmIRJET Journal
 
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...Migrant Systems
 
Iaetsd storage privacy protection against data
Iaetsd storage privacy protection against dataIaetsd storage privacy protection against data
Iaetsd storage privacy protection against dataIaetsd Iaetsd
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudIJERA Editor
 
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS)
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS) AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS)
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS) ijccsa
 
Privacy preserving public auditing for
Privacy preserving public auditing forPrivacy preserving public auditing for
Privacy preserving public auditing forkarthika kathirvel
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storageMuthu Sybian
 
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentInsuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentEditor IJCATR
 
Preserving Privacy Policy- Preserving public auditing for data in the cloud
	Preserving Privacy Policy- Preserving public auditing for data in the cloud	Preserving Privacy Policy- Preserving public auditing for data in the cloud
Preserving Privacy Policy- Preserving public auditing for data in the cloudinventionjournals
 
Ieeepro techno solutions 2014 ieee java project - decentralized access cont...
Ieeepro techno solutions   2014 ieee java project - decentralized access cont...Ieeepro techno solutions   2014 ieee java project - decentralized access cont...
Ieeepro techno solutions 2014 ieee java project - decentralized access cont...hemanthbbc
 

What's hot (17)

A Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud ComputingA Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud Computing
 
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesCentralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data Services
 
A Novel privacy preserving public auditing for shared data in cloud
A Novel privacy preserving public auditing for shared data in cloudA Novel privacy preserving public auditing for shared data in cloud
A Novel privacy preserving public auditing for shared data in cloud
 
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC AlgorithmIRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
 
Oruta project report
Oruta project reportOruta project report
Oruta project report
 
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...
 
Iaetsd storage privacy protection against data
Iaetsd storage privacy protection against dataIaetsd storage privacy protection against data
Iaetsd storage privacy protection against data
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
 
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS)
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS) AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS)
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS)
 
Privacy preserving public auditing for
Privacy preserving public auditing forPrivacy preserving public auditing for
Privacy preserving public auditing for
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storage
 
50120140503020
5012014050302050120140503020
50120140503020
 
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentInsuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud Environment
 
Preserving Privacy Policy- Preserving public auditing for data in the cloud
	Preserving Privacy Policy- Preserving public auditing for data in the cloud	Preserving Privacy Policy- Preserving public auditing for data in the cloud
Preserving Privacy Policy- Preserving public auditing for data in the cloud
 
H1803035056
H1803035056H1803035056
H1803035056
 
Ieeepro techno solutions 2014 ieee java project - decentralized access cont...
Ieeepro techno solutions   2014 ieee java project - decentralized access cont...Ieeepro techno solutions   2014 ieee java project - decentralized access cont...
Ieeepro techno solutions 2014 ieee java project - decentralized access cont...
 
I42024349
I42024349I42024349
I42024349
 

Similar to Security Check in Cloud Computing through Third Party Auditor

Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEditor IJMTER
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationEditor IJMTER
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data securityeSAT Publishing House
 
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...IRJET Journal
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocolIaetsd Iaetsd
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...IJNSA Journal
 
Paper id 212014106
Paper id 212014106Paper id 212014106
Paper id 212014106IJRAT
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...IJNSA Journal
 
Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944Editor IJARCET
 
Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944Editor IJARCET
 
Data Partitioning Technique In Cloud: A Survey On Limitation And Benefits
Data Partitioning Technique In Cloud: A Survey On Limitation And BenefitsData Partitioning Technique In Cloud: A Survey On Limitation And Benefits
Data Partitioning Technique In Cloud: A Survey On Limitation And BenefitsIJERA Editor
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
IRJET- Continuous Auditing Approach to the Cloud Service Addressing Attri...
IRJET-  	  Continuous Auditing Approach to the Cloud Service Addressing Attri...IRJET-  	  Continuous Auditing Approach to the Cloud Service Addressing Attri...
IRJET- Continuous Auditing Approach to the Cloud Service Addressing Attri...IRJET Journal
 
Privacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage DevicesPrivacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage DevicesIOSR Journals
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
 
Excellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingExcellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingEditor IJMTER
 
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...INFOGAIN PUBLICATION
 
Ieeepro techno solutions 2011 ieee dotnet project -secure role based data
Ieeepro techno solutions   2011 ieee dotnet project -secure role based dataIeeepro techno solutions   2011 ieee dotnet project -secure role based data
Ieeepro techno solutions 2011 ieee dotnet project -secure role based dataASAITHAMBIRAJAA
 

Similar to Security Check in Cloud Computing through Third Party Auditor (20)

V04405122126
V04405122126V04405122126
V04405122126
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
 
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocol
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
 
Paper id 212014106
Paper id 212014106Paper id 212014106
Paper id 212014106
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
 
Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944
 
Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944
 
Data Partitioning Technique In Cloud: A Survey On Limitation And Benefits
Data Partitioning Technique In Cloud: A Survey On Limitation And BenefitsData Partitioning Technique In Cloud: A Survey On Limitation And Benefits
Data Partitioning Technique In Cloud: A Survey On Limitation And Benefits
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
IRJET- Continuous Auditing Approach to the Cloud Service Addressing Attri...
IRJET-  	  Continuous Auditing Approach to the Cloud Service Addressing Attri...IRJET-  	  Continuous Auditing Approach to the Cloud Service Addressing Attri...
IRJET- Continuous Auditing Approach to the Cloud Service Addressing Attri...
 
Privacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage DevicesPrivacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage Devices
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Excellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingExcellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computing
 
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
 
Ieeepro techno solutions 2011 ieee dotnet project -secure role based data
Ieeepro techno solutions   2011 ieee dotnet project -secure role based dataIeeepro techno solutions   2011 ieee dotnet project -secure role based data
Ieeepro techno solutions 2011 ieee dotnet project -secure role based data
 

More from ijsrd.com

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Gridijsrd.com
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Thingsijsrd.com
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Lifeijsrd.com
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTijsrd.com
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...ijsrd.com
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...ijsrd.com
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Lifeijsrd.com
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learningijsrd.com
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation Systemijsrd.com
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...ijsrd.com
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigeratorijsrd.com
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...ijsrd.com
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingijsrd.com
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logsijsrd.com
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMijsrd.com
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Trackingijsrd.com
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...ijsrd.com
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparatorsijsrd.com
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...ijsrd.com
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.ijsrd.com
 

More from ijsrd.com (20)

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Grid
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Life
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOT
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Life
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learning
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation System
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigerator
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processing
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Tracking
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparators
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.
 

Recently uploaded

Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........LeaCamillePacle
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 

Recently uploaded (20)

Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 

Security Check in Cloud Computing through Third Party Auditor

  • 1. IJSRD - International Journal for Scientific Research & Development| Vol. 2, Issue 09, 2014 | ISSN (online): 2321-0613 All rights reserved by www.ijsrd.com 173 Security Check in Cloud Computing through Third Party Auditor Govinda.K1 J.Keerthana2 U.Pavithra3 1,2,3 SCSE, VIT University, Vellore, India Abstract— In cloud computing, data owners crowd their data on cloud servers and users (data consumers) can access the data from cloud servers. Due to the data outsourcing, however, it requires an independent auditing service to check the data integrity in the cloud. Some existing remote integrity checking method scan only serve for static records data. Thus, cannot be used in the auditing service since the data in the cloud can be animatedly updated. Thus, an efficient and secure dynamic auditing protocol is required to convince data owners that the data are correctly stored in the cloud. In this paper, we first design an auditing framework for cloud storage systems for privacy-preserving auditing protocol. Then, we extend our auditing protocol to support the data dynamic operations, which is efficient to secure the random model. Key words: Resources, Rack, Region, Data, Cloud I. INTRODUCTION Cloud Computing has been envisioned as the next generation architecture of IT enterprise, due to its extraordinary advantages in the history of IT: on-demand self-service, everywhere network access, location independent resource pooling, rapid resource elasticity, usage-based pricing and transference of risk [1]. As a troublemaking technology with profound implications, Cloud Computing is transformed how business peoples use IT. One fundamental aspect of this concept shifting is that data is being centralized to the Cloud. From us viewpoint , including both individuals and IT enterprises, storing data remotely into the cloud in a flexible on-demand manner brings appealing benefits: relief of the burden for storage management, universal data access with independent geographical locations, and avoidance of capital expenditure on hardware, software, and personnel maintenances, etc [2].While Cloud makes these advantages more Applicant than ever, it also brings new and challenging security to users outsourced data. Since cloud service providers (CSP) are separate administrative entities, data outsourcing is actually surrender user’s ultimate control over the outcome of their data. The correctness of the data in the cloud is being put at risk due to the following reasons. First of all, although the infrastructures under the cloud are much more powerful than personal computing Devices. Examples: outages and security breach of important cloud services appear from time to time [3]–[5]. Secondly, they exist various motivations for cloud service provider behaves disloyally towards the cloud users regarding the status of their outsourced data. Examples: cloud service providers, for monetary reasons, reclaiming storage by discarding data that has not been loss incidents so as to maintain a reputation [6]–[8]. Although outsourcing data into the cloud is economically attractive and complexity of long-termdata storage, it does not suggest any security on data honesty and availability. This problem, if not properly addressed, may lead to the successful exploitation of the cloud architecture. As users no longer physically own the storage of their data, cryptographic primitives for the purpose of data security protection can’t be directly adopted. Thus, how to efficiently verify the correctness of outsourced cloud data without the local copy of data files becomes a big challenge for data storage security in Cloud Computing. Note that simply downloading the data for its integrity verification and not a practical solution due to the expensiveness in I/O cost and transmitting the file across the network. Besides, it is often insufficient to detect the data corruption when accessing the data. Considering the large amount of the outsourced data and the user’s controlled resource capacity, the ability to audit the correctness of the data in a cloud environment can be terrible and expensive for the cloud users [8], [9].Hence, to fully ensure the data security and save the cloud users computation resources, it is of critical importance to enable public auditability for cloud data storage. so that the users may resort to a third party auditor (TPA), who has expertise that the users do not, to audit the outsourced data when needed. Based on the audit result, TPA could release an audit report, which would not only help users to evaluate the risk of their subscribed cloud data services, but also be useful for the cloud service provider to improve their cloud based service platform [7]. By enabling public risk auditing protocols will play an important role on cloud economy to become fully established, where users can assess risk and gain trust in Cloud. Recently, the notion of public auditability has been proposed in the context of ensuring remotely stored data integrity under different systems and security models [6], [8], [10], [11].Public auditability allows an external party, in addition to the user himself, to verify the correctness of remotely stored data. However, most of these schemes [6], [8], [10] do not support the privacy protection of users’ data against external auditors, i.e., they may potentially reveal user data information to the auditors, as will be discussed in Section III-C. This severe drawback greatly affects the security of these protocols in Cloud Computing. From the perspective of protecting data privacy the users, who own the data and rely on TPA just for test orage security of their data, do not want this auditing process introducing new vulnerabilities of unauthorized information leakage towards their data security [12]. Moreover, there are legal regulations, such as the US Health Insurance Portability and Accountability Act (HIPAA) [13], further demanding the outsourced data not to be leaked to external parties [7].Exploiting data encryption before outsourcing [11] is one way to mitigate this privacy concern, but it is only complementary to the privacy-preserving public auditing scheme to be proposed in this paper. Without a properly designed auditing protocol, encryption itself cannot prevent data from “flowing away” towards external parties during the auditing process. Thus, it does not completely solve the problem of protecting data privacy but just reduces it to the one of managing the encryption keys. Unauthorized data leakage still remains a problem due to the potential exposure of encryption keys.
  • 2. Security Check in Cloud Computing through Third Party Auditor (IJSRD/Vol. 2/Issue 09/2014/039) All rights reserved by www.ijsrd.com 174 II. LITERATURE REVIEW ABE was proposed by Sahai and Waters . In ABE, a user has a set of attributes in addition to its unique ID. There are two classes of ABEs. In Key-policy ABE or KP-ABE (Goyalet al. the sender has an access policy to encrypt data. A writer whose attributes and keys have been revoked cannot write back the old informations. The receiver receives attributes and secret keys from the attribute authority and is able to decrypt information if it has matching attributes. In Cipher text-policy, CP-ABE the receiver has the access policy in the form of a tree, with attributes as leaves and monotonic access structure with AND, OR and other threshold gates. All the approaches take a centralized concept and allows only one KDC, which is a single point of failure. Trail proposed a multi-authority ABE, in which there are several KDC authorities (coordinated by a trusted authority) which distribute attributes and secret keys to users. Multi- authority ABE protocol was studied in which required no reliable authority which requires every user to have attributes from at KDCs. Recently, Lewko and Waters proposed a fully decentralized ABE where users could have zero or more attributes from each authority and did not require a trusted server. In all these cases, decryption at user’s end is computation demanding. So, this technique might be useless when users access their mobile devices. To clear this problem, Green et al. planned to outsource the decryption task to a replacement server, so that the user can compete with minimum resources. Example: hand held devices. However, the occurrence of one replacement and one key distribution centre makes it less forceful than decentralized approaches. Both these approaches had no way to authenticate users, anaemically. Yang et al. presented a modification of authenticate users, who want to remain secrete while accessing the cloud. To ensure anonymous user authentication Attribute Based Signatures were introduced by Majiet al. [23]. This was also a centralized approach. A recent scheme by the same authors [24] takes a decentralized approach and provides authentication without disclosing. III. PROPOSED METHOD The third party auditor will use MD5 algorithm to do security check. This message can be a string of any variable length containing alphabets, digits and special symbols. In general formula: Message = ((a-z) + (A-Z) + (0-9) + (!-;))* The message digest should be a string of fixed length containing of all the alphabets and special symbols. Message Digest= ((a-z) + (A-Z) + (0-9) + (! -;))n, Where n=a ( a:fixed natural number) While working on MySQL databases and PHP for web applications we came across MD5. We also marked an application called “Cain n Able” which can crack messages from their MD5 hash value.  When analytic work indicated that MD5's predecessor MD4 was likely to be insecure. MD5 was designed in 1991 to be a secure replacement.  In 1993 Den Boer gave a result of finding a "pseudo-collision" of the MD5 compression function. That is, two different initialization vectors which produce an identical digest.  In 1996Dobbertin announced a collision of the compression function of MD5 While this was not an full MD5 hash function, it was close enough for cryptographers to recommend switching to a replacement, such asSHA-1 or RIPEMD-160.  Recently, a number of projects have created under MD5 rainbow tables which are easily available in online, and can be used to reverse many MD5 hashes into strings that bump with the original input, usually for the purposes of password cracking. If passwords are combined with a salt before the MD5 digest is generated, rainbow tables become much less useful. So we thought of designing a new algorithm for calculating message digest. IV. ALGORITHM Input: A message in plaintext of any length. Output: A message digest of 128 bit for the input message. The algorithm works in the following steps: Step1: Enter the input string. Step2: Find the equivalent binary string.(Use ASCII conversion ) . Step 3: i.) Append a bit sequence ( “01”) to the binary string so that the length of the resulting string is 64 shorter than a multiple of 512. ii.) Append 64 more bits by scanning the binary string of step3 starting from an arbitrary location. Step 4: i.) Divide the output binary string of Step3 in 128 bit blocks. ii.) Generate a 128 bit binary key using a random number generator. iii.) Perform a bitwise operation (like OR , AND, XOR, followed by Left Shift, Right Shift, zero fill shifting etc.) among the 128 bit block and 128 bit random key. iv.) Store the output of Step4(iii) as stepwise message digest. Step 5: i.) Perform a bitwise operation among the current stepwise message digest and the previous stepwise message digest. ii.) Go to Step4 until all the blocks of input message are exhausted. Step 6: Convert the output of Step5 into corresponding character value and store it as the final message digest. V. DISCUSSION The input message can be of any type. It may contain character, digit, special symbols etc. Message = ((a-z) + (A-Z) + (0-9) + (! - ;))* Binary equivalent of input message is calculated. This is done by using ASCII code for corresponding character. For example: A = 01000001 B = 01000010 …….. etc.
  • 3. Security Check in Cloud Computing through Third Party Auditor (IJSRD/Vol. 2/Issue 09/2014/039) All rights reserved by www.ijsrd.com 175 The resulting binary string may contain any No. of digits. Then a bit sequence is appended (say “01”) to the input binary string so that the length of the resulting string is 64 shorter than a multiple of 512. Mathematically length of binary string is %512=448. The bit sequences can also be 11, 10, 00 etc. Again 64 more bit sequence is appended to it from the input binary string itself starting from a arbitrary position. Here it starts from ([length of string]/3)th position. Now the binary string is of length which is a integer multiple of 512.this message string is then divided into blocks of 128 bits. A key is generated which is also of 128 bit. The key can be generated by using any of the random number. Here we have used the method as Key = (key*39) % 967 Keyf = (key)! Binary equivalent of keyf is calculated and any 128 bit is taken as the key for a step. In each step one block of message string and a key is processed to give a message process. The process may involve operations like OR, AND, XOR, left shift, right shift etc. The stepwise message digests performs a bitwise operation with previous step message digest to form the final message. The resulting binary string is then converted into character string to get the final message digest. In this any input string the output message digest is of constant length. The message digest may contain any characters, digits, special characters etc. i.e.: Message Digest= ((a-z) + (A-Z) + (0-9) + (! - ;)) n Where n= a fixed natural number. Fig.1: Layout of our proposed algorithm VI. CONCLUSION In this paper we explained different existing paper techniques and their merits and demerits. We discussed their methods of data security and privacy etc. In all those papers some have not described proper data security mechanisms, some were lack in supporting dynamic data operations, some were lack in ensuring data integrity, while some were lacking by high resource and computation cost. Hence this paper gives overall idea of all existing techniques for cloud data security and methods proposed for ensuring data authentication using TPA. REFERENCES [1] Elsenpeter Robert, Anthony T.Velte and Toby J.Velte, Cloud Computing a Practical Approach 2010. [2] Qian Wang and Cong Wang and Kui Ren, Wenjing Lou, Jin Li “Enabling Public Auditability And Data Dynamics For Storage Security in Cloud Computing” in IEEE transactions on parallel and distributed systems, 2011, vol. 22, no. 5. [3] Cong Wang and Kui Ren and Wenjing Lou and JinLi,”Toward Publicly Auditable Secure Cloud Data Storage Services” in IEEE, 2010. [4] M.Ashah and R. swaminathan and m.baker”Privacy-Preserving Audit And Extraction of Digital Contents”, 2011. [5] H. Shacham and B. Waters “Compact Proofs of Retrivability“ in proc. of asiascrypt, 2008. [6] Xiang Tan and Bo Ai “The Issue of Cloud Computing Security in High-Speed Railway” international confer. on electronic and mechanical engi. And information technology, 2011. Beijing p.r china,. [7] FarzadSabahi, “Cloud Computing Security Threats and Responses” ,IEEE confer. 2011, 978-1-61284- 486-2/111 [8] Ravi Kant Sahu and Abhishek Mohta, L.K. Awasthi ”Robust Data Integration While Using Third Party Auditor For Cloud Data Storage Services”, conf. IJARCSSE, 2012, Volume 2, Issue 2,ISSN: 2277 128X. [9] Govinda V, and Gurunathaprasad, H Sathshkumar,”Third Party Auditing For Security Data Storage in cloud through digital signature using RSA” IJASATR, 2012, issue 2,vol-4, Issn 2249-9954. [10]P. Mell and t. Grance “Draft Nist Working Definition of Cloud Computing”, 2009. [11] Elinor Mills, "Cloud Computing Security Forecast: Clear Skies", 2009. [12]H. Shacham and B. Waters, “Compact Proofs of Retrievability,” Proc. 14th Int’l Conf. Theory and Application of Cryptology and Information Security: Advances in Cryptology, J. Pieprzyk, ed.,pp. 90-107, 2008. [13]C.C. Erway, A. Ku¨ pc¸u¨ , C. Papamanthou, and R. Tamassia, “Dynamic Provable Data Possession,” Proc. ACM Conf. Computer and Comm. Security, E. Al-Shaer, S. Jha, and A.D. Keromytis, eds.,pp. 213-222, 2009. [14]Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, “Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing,” IEEE Trans. Parallel Distributed Systems, vol. 22, no. 5, pp. 847-859, May 2011. [15]C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy- Preserving Public Auditing for Data Storage Security in Cloud Computing,” Proc. IEEE INFOCOM, pp. 525-533, 2010. [16]Y. Zhu, H. Hu, G. Ahn, and M. Yu, “Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage,” IEEE Trans. Parallel and Distributed Systems, vol. 23, no. 12, pp. 2231- 2244, Dec. 2012.