SlideShare a Scribd company logo
1 of 3
Download to read offline
Novateur Publication’s
International Journal of Innovation in Engineering, Research and Technology [IJIERT]
ICITDCEME’15 Conference Proceedings
ISSN No - 2394-3696
Page | 1
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING
MULTI-AUTHORITY SYSTEM
Priyanka Phasale .
Department of Computer Engineering,
Vishwabharati Academy’s College of Engineering, Ahmednagar, India
Priyanka Kokate
. Department of Computer Engineering,
Vishwabharati Academy’s College of Engineering, Ahmednagar, India
Prof M.C. Kshirsagar
Department of Computer Engineering,
Vishwabharati Academy’s College of Engineering, Ahmednagar, India
ABSTRACT
The continuous development of cloud computing, several trends are opening up to new forms of outsourcing. Public
data integrity auditing is not secure and efficient for shared dynamic data. In existing scheme figure out the collusion
attack and provide an efficient public integrity auditing scheme, with the help of secure group user revocation based
on vector commitment and verifier–local revocation group signature. It provides secure and efficient scheme which
support public checking and efficient user revocation. Problem of existing work they used TPA (Third party auditor)
for key generation and key agreement. Use of TPA as central system if it fails then whole system gets failed. If we
are working with cloud, user identity is major concern because user doesn’t want to reveal his personal information
to public. This concept not included in it. In this paper, based these con’s we proposed a dynamic data sharing in
public cloud using multi-authority system. The proposed scheme is able to protect user’s privacy against each single
authority.
KEYWORDS: Public integrity auditing, CSP, TPA, dynamic data, VC, ASGA.
INTRODUCTION
Cloud computing refers application and services that run on distributed networks. Cloud storage is important service
of cloud computing which allow data owners to move data from their local computing system to the cloud.
Therefore in any infrastructure data loss or discard not been accessed. Sometime CSP (cloud service provider) might
be dishonest that’s why owners need to ensure that data are stored in cloud or not [1][2]. Recently some research
considers several remote integrity checking protocols which allow the auditor to check the data integrity on remote
server [2]. In [1], X-Chen proposed secure and efficient public data integrity auditing for shared dynamic data.
Overcome collusion attack of cloud storage server against security. To protect security and privacy of cloud user’s
data [1]
LITERATURE REVIEW:
In the literature review topical method over the cloud data approaches as discuss, below in literature some of them
are discussed:
1) Tao Jiang, Xiao Feng Chen, and Jian Feng Ma: Public Integrity Auditing for Shared Dynamic Cloud Data
with Group User Revocation, IEEE TRANSACTIONS ON COMPUTERS VOL: PP NO: 99 YEAR 2015
This paper represent secure and efficient public data integrity auditing for sharing dynamic data against the collusion
attack, Provide secure group user revocation base on VC(Vector Commitment) and VLR(Verifier-local
revocation)group signature. Organizations outsource own data to third party CSP(Cloud Service
providers).contribution of these scheme: Propose efficient data auditing scheme by using VC and AGKA
(Asymmetric group key agreement),GS(Group signature)to support ciphertext group user revocation and
encrypt/decrypt share database. CSM (Cloud storage model) indicate three entities:
Novateur Publication’s
International Journal of Innovation in Engineering, Research and Technology [IJIERT]
ICITDCEME’15 Conference Proceedings
ISSN No - 2394-3696
Page | 2
1. CSS (Cloud storage server): share privilege to access and modify number of group users.
2. GU (Group user) who are authorized to access and modify the data by the data owner.
3. TPA: any entity which able to conduct data integrity of share data storage in cloud server.
2) Madhuri R. Rokade et al, “Providing Data Utility on Cloud using Slicing approach and Dynamic Auditing
Protocol using Third Party Auditor to maintain Integrity of Data” (IJCSIT) International Journal of
Computer Science and Information Technologies, Vol. 5 (1) , 2014, 852-855.
A method presents a new approach called slicing to privacy-preserving data. Slicing overcomes the limitations of
generalization and bucketization and preserves better utility while protecting against privacy threats in cloud. That
proposed an efficient and inherently secure dynamic auditing protocol which audits the data present in the cloud
periodically and also whenever auditor wants to check it. Also dynamic data changes are also audited. Furthermore,
auditing scheme incurs less communication cost and less computation cost of the auditor by moving the computing
loads of auditing from the auditor to the server, which greatly improves the auditing performance and can be applied
to large-scale cloud storage systems.
3) C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-preserving public auditing for data storage security in
cloud computing,” in Proc. of IEEE INFOCOM 2010, CA, USA, Mar. 2010, pp no. 525533.
Motivate the public auditing system of data storage security in Cloud Computing and provide a privacy-preserving
auditing protocol. Our scheme enables an external auditor to audit user’s cloud data without learning the data
content. This scheme is the first to support scalable and efficient privacy preserving public storage auditing in cloud.
Scheme achieves batch auditing where multiple delegated auditing tasks from different users can be performed
simultaneously by the TPA in a privacy-preserving manner. TPA would not knowledge about the data content stored
on the cloud server during the efficient auditing process, which not only eliminates the burden of cloud user from
the tedious and possibly expensive auditing task, but also reduce the user’s fear of their outsourced data leakage.
TPA may concurrently handle multiple audit sessions from different users for their outsourced data files; we further
extend our privacy preserving public auditing protocol into a multiuser setting, where the TPA can perform multiple
auditing tasks in a batch manner for better efficiency.
4) J. Yuan and S. Yu, “Efficient public integrity checking for cloud data sharing with multi-user
modification,” in Proc. of IEEE INFOCOM 2014, Toronto, Canada, Apr. 2014, pp. 2121–2129.
The author designed dynamic public integrity auditing scheme with group user revocation. Yuan and yu not consider
data secrecy of group users in their scheme that means scheme efficiently support plaintext data update and integrity
auditing not cipher text data. Design polynomial authentication tag and adopt proxy tag update technique. If data
owner share group key with group users and defection or revocation occur any group user will force to other group
user to update their shared key. Sometime data owner not take part in user revocation phase, where many time cloud
server update the data and provide data legally last.
5) B. Wang, B. Li, and H. Li, “Oruta: Privacy-preserving public auditing for shared data in the cloud,” in
Proc. of IEEE CLOUD 2012, Hawaii, USA, Jun. 2012, pp. 295–302.
Oruta consider how to audit the integrity of shared data in cloud with static group. Group is predefined before shared
data created in cloud. Membership of users is constant in the group. Original user decides who is able to share data
to the cloud before outsourcing. Problem in these schemes is how to audit the integrity of shared data in cloud with
dynamic group. New user added onto group but existing user can be revoked during data sharing.
6) D. Catalano and D. Fiore, “Vector commitments and their applications,” in Public-Key Cryptography -
PKC 2013, Nara, Japan, Mar. 2013, pp. 55–72.
This paper introduce new simple and powerful commitment mechanism should not allow a sender to change mind
about committed message. VC Scheme is collection of six-polynomial time algorithm (Vc.KeyGen, Vc.Com,
Vc.Open, Vc.Ver, Vc.Update, and Vc.ProofUpdate). Vc allows to commit ordered sequence of q value
(m1……..mg) to single message Vc require position binding to satisfaction means two different value at the same
position. Vc require hiding updatable property, Use two algorithm to update the commitment and opening message.
First algorithm allows committer who created commitment and want to update changing message. Second algorithm
allows holders of an opening of message to update their proof.
PROPOSED WORK:
Problems of Existing Work:
1. As in base paper [1], Used TPA (Third party auditor) for key generation and for key agreement.
2. TPA (Third party auditor) is central system, if it fails then whole system get failed.
Novateur Publication’s
International Journal of Innovation in Engineering, Research and Technology [IJIERT]
ICITDCEME’15 Conference Proceedings
ISSN No - 2394-3696
Page | 3
3. If we are working with cloud, user identity is major concern user doesn’t want to reveal his personal
information to public. This concept not included in it.
So based on these cons, we proposed a Dynamic Data Sharing in Public Cloud using Multi-Authority System
.
Fig 1: Proposed system
The proposed schemes are able to protect user’s privacy against each single authority. Authorities are assumed to
have powerful computation abilities, and they are supervised by government offices because some attributes
partially contain users’ personally identifiable information. The whole attribute set is divided into N disjoint sets and
controlled by each authority, therefore each authority is aware of only part of attributes.
We have assumed semi-honest authorities and we assumed that they will not collude with each other. This is a
necessary assumption because each authority is in charge of a subset of the whole attributes set, and for the
attributes that it is in charge of; it knows the exact information of the key requester. If the information from all
authorities is gathered altogether, the complete attribute set of the key requester is recovered and thus his identity is
disclosed to the authorities. In this sense, system is semi-anonymous since partial identity information (represented
as some attributes) is disclosed to each authority, but we can achieve a full-anonymity and also allow the collusion
of the authorities.
CONCLUSION
We provide security analysis of our scheme, and it shows that our scheme provide data confidentiality for group
users, and it is also secure against the collusion attack from the cloud storage server and revoked group users. We
provide security analysis of our scheme with a semi-anonymous attribute-based privilege control scheme to address
the user privacy problem in a cloud storage server. The scheme vector commitment, Asymmetric Group Key
Agreement (AGKA) and group signatures with user revocation are adopt to achieve the data integrity auditing of
remote data using multiple authorities in the cloud computing system, our proposed schemes achieve not only fine-
grained privilege control but also identity anonymity while conducting privilege control based on users’ identity
information.
REFERENCES
[1] Tao Jiang, Xiao Feng Chen, and Jian Feng Ma: “Public Integrity Auditing for Shared Dynamic Cloud Data with
Group User Revocation”, IEEE TRANSACTIONS ON COMPUTERS VOL: PP NO: 99 YEAR 2015.
[2] Madhuri R. Rokade et al, “Providing Data Utility on Cloud using Slicing approach and Dynamic Auditing
Protocol using Third Party Auditor to maintain Integrity of Data”,(IJCSIT) International Journal of Computer
Science and Information Technologies, Vol. 5 (1) , 2014, 852-855.
[3] C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-preserving public auditing for data storage security in cloud
computing,”, in Proc. of IEEE INFOCOM 2010, CA, USA, Mar. 2010, pp no. 525533.
[4] J. Yuan and S. Yu, “Efficient public integrity checking for cloud data sharing with multi- user modification,” in
Proc. of IEEE INFOCOM 2014, Toronto, Canada, Apr. 2014, pp. 2121–2129.
[5] B. Wang, B. Li, and H. Li, “Oruta: Privacy-preserving public auditing for shared data in the cloud,” in Proc. of
IEEE CLOUD 2012, Hawaii, USA, Jun. 2012, pp. 295–302.
[6] D. Catalano and D. Fiore, “Vector commitments and their applications,” in Public-Key Cryptography - PKC
2013, Nara, Japan, Mar. 2013, pp. 55–72.

More Related Content

What's hot

Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revoc...
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revoc...Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revoc...
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revoc...1crore projects
 
147bc3d2e2ffdb1c4f10d673600dd786.Maintaining Integrity and Security for the D...
147bc3d2e2ffdb1c4f10d673600dd786.Maintaining Integrity and Security for the D...147bc3d2e2ffdb1c4f10d673600dd786.Maintaining Integrity and Security for the D...
147bc3d2e2ffdb1c4f10d673600dd786.Maintaining Integrity and Security for the D...Gayathri Dili
 
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...INFOGAIN PUBLICATION
 
Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC)
Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC)Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC)
Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC)ElavarasaN GanesaN
 
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...IOSR Journals
 
Maintaining Data Integrity for Shared Data in Cloud
Maintaining Data Integrity for Shared Data in Cloud Maintaining Data Integrity for Shared Data in Cloud
Maintaining Data Integrity for Shared Data in Cloud IJERA Editor
 
Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
Oruta: Privacy-Preserving Public Auditing for Shared Data in the CloudOruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
Oruta: Privacy-Preserving Public Auditing for Shared Data in the CloudMigrant Systems
 
Security Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party AuditorSecurity Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party Auditorijsrd.com
 
Cloud Computing Environment using Secured Access Control Technique
Cloud Computing Environment using Secured Access Control TechniqueCloud Computing Environment using Secured Access Control Technique
Cloud Computing Environment using Secured Access Control TechniqueIRJET Journal
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data securityeSAT Publishing House
 
Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944Editor IJARCET
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...IJNSA Journal
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniqueseSAT Publishing House
 
IRJET- Blockchain based Data Sharing Framework
IRJET- Blockchain based Data Sharing FrameworkIRJET- Blockchain based Data Sharing Framework
IRJET- Blockchain based Data Sharing FrameworkIRJET Journal
 
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS)
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS) AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS)
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS) ijccsa
 
Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...IGEEKS TECHNOLOGIES
 

What's hot (18)

Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revoc...
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revoc...Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revoc...
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revoc...
 
147bc3d2e2ffdb1c4f10d673600dd786.Maintaining Integrity and Security for the D...
147bc3d2e2ffdb1c4f10d673600dd786.Maintaining Integrity and Security for the D...147bc3d2e2ffdb1c4f10d673600dd786.Maintaining Integrity and Security for the D...
147bc3d2e2ffdb1c4f10d673600dd786.Maintaining Integrity and Security for the D...
 
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
 
Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC)
Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC)Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC)
Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC)
 
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
 
Maintaining Data Integrity for Shared Data in Cloud
Maintaining Data Integrity for Shared Data in Cloud Maintaining Data Integrity for Shared Data in Cloud
Maintaining Data Integrity for Shared Data in Cloud
 
I42024349
I42024349I42024349
I42024349
 
Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
Oruta: Privacy-Preserving Public Auditing for Shared Data in the CloudOruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
 
Security Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party AuditorSecurity Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party Auditor
 
Cloud Computing Environment using Secured Access Control Technique
Cloud Computing Environment using Secured Access Control TechniqueCloud Computing Environment using Secured Access Control Technique
Cloud Computing Environment using Secured Access Control Technique
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
 
Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniques
 
IRJET- Blockchain based Data Sharing Framework
IRJET- Blockchain based Data Sharing FrameworkIRJET- Blockchain based Data Sharing Framework
IRJET- Blockchain based Data Sharing Framework
 
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS)
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS) AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS)
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS)
 
Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...
 

Similar to SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM

Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...Pvrtechnologies Nellore
 
public truthfulness assessment for shared active cloud data storage with grou...
public truthfulness assessment for shared active cloud data storage with grou...public truthfulness assessment for shared active cloud data storage with grou...
public truthfulness assessment for shared active cloud data storage with grou...Ijripublishers Ijri
 
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud StorageIRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud StorageIRJET Journal
 
A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...eSAT Journals
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...IJNSA Journal
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationEditor IJMTER
 
Preserving Privacy Policy- Preserving public auditing for data in the cloud
	Preserving Privacy Policy- Preserving public auditing for data in the cloud	Preserving Privacy Policy- Preserving public auditing for data in the cloud
Preserving Privacy Policy- Preserving public auditing for data in the cloudinventionjournals
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocolIaetsd Iaetsd
 
IRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud DataIRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud DataIRJET Journal
 
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on CloudReview on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on CloudIRJET Journal
 
Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944Editor IJARCET
 
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET Journal
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudIJERA Editor
 
A provenance policy based access
A provenance policy based accessA provenance policy based access
A provenance policy based accessijsptm
 
Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...
Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...
Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...IIRindia
 
HOMOMORPHIC AUTHENTICABLE RING SIGNATURE MECHANISM FOR PUBLIC AUDITING ON SHA...
HOMOMORPHIC AUTHENTICABLE RING SIGNATURE MECHANISM FOR PUBLIC AUDITING ON SHA...HOMOMORPHIC AUTHENTICABLE RING SIGNATURE MECHANISM FOR PUBLIC AUDITING ON SHA...
HOMOMORPHIC AUTHENTICABLE RING SIGNATURE MECHANISM FOR PUBLIC AUDITING ON SHA...Journal For Research
 
Iaetsd storage privacy protection against data
Iaetsd storage privacy protection against dataIaetsd storage privacy protection against data
Iaetsd storage privacy protection against dataIaetsd Iaetsd
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
 

Similar to SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM (20)

Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...
 
CSE-05-27-34
CSE-05-27-34CSE-05-27-34
CSE-05-27-34
 
public truthfulness assessment for shared active cloud data storage with grou...
public truthfulness assessment for shared active cloud data storage with grou...public truthfulness assessment for shared active cloud data storage with grou...
public truthfulness assessment for shared active cloud data storage with grou...
 
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud StorageIRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
 
A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
 
[IJET-V1I3P3]
[IJET-V1I3P3][IJET-V1I3P3]
[IJET-V1I3P3]
 
Preserving Privacy Policy- Preserving public auditing for data in the cloud
	Preserving Privacy Policy- Preserving public auditing for data in the cloud	Preserving Privacy Policy- Preserving public auditing for data in the cloud
Preserving Privacy Policy- Preserving public auditing for data in the cloud
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocol
 
IRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud DataIRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud Data
 
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on CloudReview on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
 
Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944
 
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
 
A provenance policy based access
A provenance policy based accessA provenance policy based access
A provenance policy based access
 
Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...
Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...
Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...
 
HOMOMORPHIC AUTHENTICABLE RING SIGNATURE MECHANISM FOR PUBLIC AUDITING ON SHA...
HOMOMORPHIC AUTHENTICABLE RING SIGNATURE MECHANISM FOR PUBLIC AUDITING ON SHA...HOMOMORPHIC AUTHENTICABLE RING SIGNATURE MECHANISM FOR PUBLIC AUDITING ON SHA...
HOMOMORPHIC AUTHENTICABLE RING SIGNATURE MECHANISM FOR PUBLIC AUDITING ON SHA...
 
Iaetsd storage privacy protection against data
Iaetsd storage privacy protection against dataIaetsd storage privacy protection against data
Iaetsd storage privacy protection against data
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 

More from ijiert bestjournal

CRACKS IN STEEL CASTING FOR VOLUTE CASING OF A PUMP
 CRACKS IN STEEL CASTING FOR VOLUTE CASING OF A PUMP CRACKS IN STEEL CASTING FOR VOLUTE CASING OF A PUMP
CRACKS IN STEEL CASTING FOR VOLUTE CASING OF A PUMPijiert bestjournal
 
A COMPARATIVE STUDY OF DESIGN OF SIMPLE SPUR GEAR TRAIN AND HELICAL GEAR TRAI...
A COMPARATIVE STUDY OF DESIGN OF SIMPLE SPUR GEAR TRAIN AND HELICAL GEAR TRAI...A COMPARATIVE STUDY OF DESIGN OF SIMPLE SPUR GEAR TRAIN AND HELICAL GEAR TRAI...
A COMPARATIVE STUDY OF DESIGN OF SIMPLE SPUR GEAR TRAIN AND HELICAL GEAR TRAI...ijiert bestjournal
 
COMPARATIVE ANALYSIS OF CONVENTIONAL LEAF SPRING AND COMPOSITE LEAF
COMPARATIVE ANALYSIS OF CONVENTIONAL LEAF SPRING AND COMPOSITE LEAFCOMPARATIVE ANALYSIS OF CONVENTIONAL LEAF SPRING AND COMPOSITE LEAF
COMPARATIVE ANALYSIS OF CONVENTIONAL LEAF SPRING AND COMPOSITE LEAFijiert bestjournal
 
POWER GENERATION BY DIFFUSER AUGMENTED WIND TURBINE
 POWER GENERATION BY DIFFUSER AUGMENTED WIND TURBINE POWER GENERATION BY DIFFUSER AUGMENTED WIND TURBINE
POWER GENERATION BY DIFFUSER AUGMENTED WIND TURBINEijiert bestjournal
 
FINITE ELEMENT ANALYSIS OF CONNECTING ROD OF MG-ALLOY
FINITE ELEMENT ANALYSIS OF CONNECTING ROD OF MG-ALLOY FINITE ELEMENT ANALYSIS OF CONNECTING ROD OF MG-ALLOY
FINITE ELEMENT ANALYSIS OF CONNECTING ROD OF MG-ALLOY ijiert bestjournal
 
REVIEW ON CRITICAL SPEED IMPROVEMENT IN SINGLE CYLINDER ENGINE VALVE TRAIN
REVIEW ON CRITICAL SPEED IMPROVEMENT IN SINGLE CYLINDER ENGINE VALVE TRAINREVIEW ON CRITICAL SPEED IMPROVEMENT IN SINGLE CYLINDER ENGINE VALVE TRAIN
REVIEW ON CRITICAL SPEED IMPROVEMENT IN SINGLE CYLINDER ENGINE VALVE TRAINijiert bestjournal
 
ENERGY CONVERSION PHENOMENON IN IMPLEMENTATION OF WATER LIFTING BY USING PEND...
ENERGY CONVERSION PHENOMENON IN IMPLEMENTATION OF WATER LIFTING BY USING PEND...ENERGY CONVERSION PHENOMENON IN IMPLEMENTATION OF WATER LIFTING BY USING PEND...
ENERGY CONVERSION PHENOMENON IN IMPLEMENTATION OF WATER LIFTING BY USING PEND...ijiert bestjournal
 
SCUDERI SPLIT CYCLE ENGINE: REVOLUTIONARY TECHNOLOGY & EVOLUTIONARY DESIGN RE...
SCUDERI SPLIT CYCLE ENGINE: REVOLUTIONARY TECHNOLOGY & EVOLUTIONARY DESIGN RE...SCUDERI SPLIT CYCLE ENGINE: REVOLUTIONARY TECHNOLOGY & EVOLUTIONARY DESIGN RE...
SCUDERI SPLIT CYCLE ENGINE: REVOLUTIONARY TECHNOLOGY & EVOLUTIONARY DESIGN RE...ijiert bestjournal
 
EXPERIMENTAL EVALUATION OF TEMPERATURE DISTRIBUTION IN JOURNAL BEARING OPERAT...
EXPERIMENTAL EVALUATION OF TEMPERATURE DISTRIBUTION IN JOURNAL BEARING OPERAT...EXPERIMENTAL EVALUATION OF TEMPERATURE DISTRIBUTION IN JOURNAL BEARING OPERAT...
EXPERIMENTAL EVALUATION OF TEMPERATURE DISTRIBUTION IN JOURNAL BEARING OPERAT...ijiert bestjournal
 
STUDY OF SOLAR THERMAL CAVITY RECEIVER FOR PARABOLIC CONCENTRATING COLLECTOR
STUDY OF SOLAR THERMAL CAVITY RECEIVER FOR PARABOLIC CONCENTRATING COLLECTOR STUDY OF SOLAR THERMAL CAVITY RECEIVER FOR PARABOLIC CONCENTRATING COLLECTOR
STUDY OF SOLAR THERMAL CAVITY RECEIVER FOR PARABOLIC CONCENTRATING COLLECTOR ijiert bestjournal
 
DESIGN, OPTIMIZATION AND FINITE ELEMENT ANALYSIS OF CRANKSHAFT
DESIGN, OPTIMIZATION AND FINITE ELEMENT ANALYSIS OF CRANKSHAFTDESIGN, OPTIMIZATION AND FINITE ELEMENT ANALYSIS OF CRANKSHAFT
DESIGN, OPTIMIZATION AND FINITE ELEMENT ANALYSIS OF CRANKSHAFTijiert bestjournal
 
ELECTRO CHEMICAL MACHINING AND ELECTRICAL DISCHARGE MACHINING PROCESSES MICRO...
ELECTRO CHEMICAL MACHINING AND ELECTRICAL DISCHARGE MACHINING PROCESSES MICRO...ELECTRO CHEMICAL MACHINING AND ELECTRICAL DISCHARGE MACHINING PROCESSES MICRO...
ELECTRO CHEMICAL MACHINING AND ELECTRICAL DISCHARGE MACHINING PROCESSES MICRO...ijiert bestjournal
 
HEAT TRANSFER ENHANCEMENT BY USING NANOFLUID JET IMPINGEMENT
HEAT TRANSFER ENHANCEMENT BY USING NANOFLUID JET IMPINGEMENTHEAT TRANSFER ENHANCEMENT BY USING NANOFLUID JET IMPINGEMENT
HEAT TRANSFER ENHANCEMENT BY USING NANOFLUID JET IMPINGEMENTijiert bestjournal
 
MODIFICATION AND OPTIMIZATION IN STEEL SANDWICH PANELS USING ANSYS WORKBENCH
MODIFICATION AND OPTIMIZATION IN STEEL SANDWICH PANELS USING ANSYS WORKBENCH MODIFICATION AND OPTIMIZATION IN STEEL SANDWICH PANELS USING ANSYS WORKBENCH
MODIFICATION AND OPTIMIZATION IN STEEL SANDWICH PANELS USING ANSYS WORKBENCH ijiert bestjournal
 
IMPACT ANALYSIS OF ALUMINUM HONEYCOMB SANDWICH PANEL BUMPER BEAM: A REVIEW
IMPACT ANALYSIS OF ALUMINUM HONEYCOMB SANDWICH PANEL BUMPER BEAM: A REVIEW IMPACT ANALYSIS OF ALUMINUM HONEYCOMB SANDWICH PANEL BUMPER BEAM: A REVIEW
IMPACT ANALYSIS OF ALUMINUM HONEYCOMB SANDWICH PANEL BUMPER BEAM: A REVIEW ijiert bestjournal
 
DESIGN OF WELDING FIXTURES AND POSITIONERS
DESIGN OF WELDING FIXTURES AND POSITIONERSDESIGN OF WELDING FIXTURES AND POSITIONERS
DESIGN OF WELDING FIXTURES AND POSITIONERSijiert bestjournal
 
ADVANCED TRANSIENT THERMAL AND STRUCTURAL ANALYSIS OF DISC BRAKE BY USING ANS...
ADVANCED TRANSIENT THERMAL AND STRUCTURAL ANALYSIS OF DISC BRAKE BY USING ANS...ADVANCED TRANSIENT THERMAL AND STRUCTURAL ANALYSIS OF DISC BRAKE BY USING ANS...
ADVANCED TRANSIENT THERMAL AND STRUCTURAL ANALYSIS OF DISC BRAKE BY USING ANS...ijiert bestjournal
 
REVIEW ON MECHANICAL PROPERTIES OF NON-ASBESTOS COMPOSITE MATERIAL USED IN BR...
REVIEW ON MECHANICAL PROPERTIES OF NON-ASBESTOS COMPOSITE MATERIAL USED IN BR...REVIEW ON MECHANICAL PROPERTIES OF NON-ASBESTOS COMPOSITE MATERIAL USED IN BR...
REVIEW ON MECHANICAL PROPERTIES OF NON-ASBESTOS COMPOSITE MATERIAL USED IN BR...ijiert bestjournal
 
PERFORMANCE EVALUATION OF TRIBOLOGICAL PROPERTIES OF COTTON SEED OIL FOR MULT...
PERFORMANCE EVALUATION OF TRIBOLOGICAL PROPERTIES OF COTTON SEED OIL FOR MULT...PERFORMANCE EVALUATION OF TRIBOLOGICAL PROPERTIES OF COTTON SEED OIL FOR MULT...
PERFORMANCE EVALUATION OF TRIBOLOGICAL PROPERTIES OF COTTON SEED OIL FOR MULT...ijiert bestjournal
 

More from ijiert bestjournal (20)

CRACKS IN STEEL CASTING FOR VOLUTE CASING OF A PUMP
 CRACKS IN STEEL CASTING FOR VOLUTE CASING OF A PUMP CRACKS IN STEEL CASTING FOR VOLUTE CASING OF A PUMP
CRACKS IN STEEL CASTING FOR VOLUTE CASING OF A PUMP
 
A COMPARATIVE STUDY OF DESIGN OF SIMPLE SPUR GEAR TRAIN AND HELICAL GEAR TRAI...
A COMPARATIVE STUDY OF DESIGN OF SIMPLE SPUR GEAR TRAIN AND HELICAL GEAR TRAI...A COMPARATIVE STUDY OF DESIGN OF SIMPLE SPUR GEAR TRAIN AND HELICAL GEAR TRAI...
A COMPARATIVE STUDY OF DESIGN OF SIMPLE SPUR GEAR TRAIN AND HELICAL GEAR TRAI...
 
COMPARATIVE ANALYSIS OF CONVENTIONAL LEAF SPRING AND COMPOSITE LEAF
COMPARATIVE ANALYSIS OF CONVENTIONAL LEAF SPRING AND COMPOSITE LEAFCOMPARATIVE ANALYSIS OF CONVENTIONAL LEAF SPRING AND COMPOSITE LEAF
COMPARATIVE ANALYSIS OF CONVENTIONAL LEAF SPRING AND COMPOSITE LEAF
 
POWER GENERATION BY DIFFUSER AUGMENTED WIND TURBINE
 POWER GENERATION BY DIFFUSER AUGMENTED WIND TURBINE POWER GENERATION BY DIFFUSER AUGMENTED WIND TURBINE
POWER GENERATION BY DIFFUSER AUGMENTED WIND TURBINE
 
FINITE ELEMENT ANALYSIS OF CONNECTING ROD OF MG-ALLOY
FINITE ELEMENT ANALYSIS OF CONNECTING ROD OF MG-ALLOY FINITE ELEMENT ANALYSIS OF CONNECTING ROD OF MG-ALLOY
FINITE ELEMENT ANALYSIS OF CONNECTING ROD OF MG-ALLOY
 
REVIEW ON CRITICAL SPEED IMPROVEMENT IN SINGLE CYLINDER ENGINE VALVE TRAIN
REVIEW ON CRITICAL SPEED IMPROVEMENT IN SINGLE CYLINDER ENGINE VALVE TRAINREVIEW ON CRITICAL SPEED IMPROVEMENT IN SINGLE CYLINDER ENGINE VALVE TRAIN
REVIEW ON CRITICAL SPEED IMPROVEMENT IN SINGLE CYLINDER ENGINE VALVE TRAIN
 
ENERGY CONVERSION PHENOMENON IN IMPLEMENTATION OF WATER LIFTING BY USING PEND...
ENERGY CONVERSION PHENOMENON IN IMPLEMENTATION OF WATER LIFTING BY USING PEND...ENERGY CONVERSION PHENOMENON IN IMPLEMENTATION OF WATER LIFTING BY USING PEND...
ENERGY CONVERSION PHENOMENON IN IMPLEMENTATION OF WATER LIFTING BY USING PEND...
 
SCUDERI SPLIT CYCLE ENGINE: REVOLUTIONARY TECHNOLOGY & EVOLUTIONARY DESIGN RE...
SCUDERI SPLIT CYCLE ENGINE: REVOLUTIONARY TECHNOLOGY & EVOLUTIONARY DESIGN RE...SCUDERI SPLIT CYCLE ENGINE: REVOLUTIONARY TECHNOLOGY & EVOLUTIONARY DESIGN RE...
SCUDERI SPLIT CYCLE ENGINE: REVOLUTIONARY TECHNOLOGY & EVOLUTIONARY DESIGN RE...
 
EXPERIMENTAL EVALUATION OF TEMPERATURE DISTRIBUTION IN JOURNAL BEARING OPERAT...
EXPERIMENTAL EVALUATION OF TEMPERATURE DISTRIBUTION IN JOURNAL BEARING OPERAT...EXPERIMENTAL EVALUATION OF TEMPERATURE DISTRIBUTION IN JOURNAL BEARING OPERAT...
EXPERIMENTAL EVALUATION OF TEMPERATURE DISTRIBUTION IN JOURNAL BEARING OPERAT...
 
STUDY OF SOLAR THERMAL CAVITY RECEIVER FOR PARABOLIC CONCENTRATING COLLECTOR
STUDY OF SOLAR THERMAL CAVITY RECEIVER FOR PARABOLIC CONCENTRATING COLLECTOR STUDY OF SOLAR THERMAL CAVITY RECEIVER FOR PARABOLIC CONCENTRATING COLLECTOR
STUDY OF SOLAR THERMAL CAVITY RECEIVER FOR PARABOLIC CONCENTRATING COLLECTOR
 
DESIGN, OPTIMIZATION AND FINITE ELEMENT ANALYSIS OF CRANKSHAFT
DESIGN, OPTIMIZATION AND FINITE ELEMENT ANALYSIS OF CRANKSHAFTDESIGN, OPTIMIZATION AND FINITE ELEMENT ANALYSIS OF CRANKSHAFT
DESIGN, OPTIMIZATION AND FINITE ELEMENT ANALYSIS OF CRANKSHAFT
 
ELECTRO CHEMICAL MACHINING AND ELECTRICAL DISCHARGE MACHINING PROCESSES MICRO...
ELECTRO CHEMICAL MACHINING AND ELECTRICAL DISCHARGE MACHINING PROCESSES MICRO...ELECTRO CHEMICAL MACHINING AND ELECTRICAL DISCHARGE MACHINING PROCESSES MICRO...
ELECTRO CHEMICAL MACHINING AND ELECTRICAL DISCHARGE MACHINING PROCESSES MICRO...
 
HEAT TRANSFER ENHANCEMENT BY USING NANOFLUID JET IMPINGEMENT
HEAT TRANSFER ENHANCEMENT BY USING NANOFLUID JET IMPINGEMENTHEAT TRANSFER ENHANCEMENT BY USING NANOFLUID JET IMPINGEMENT
HEAT TRANSFER ENHANCEMENT BY USING NANOFLUID JET IMPINGEMENT
 
MODIFICATION AND OPTIMIZATION IN STEEL SANDWICH PANELS USING ANSYS WORKBENCH
MODIFICATION AND OPTIMIZATION IN STEEL SANDWICH PANELS USING ANSYS WORKBENCH MODIFICATION AND OPTIMIZATION IN STEEL SANDWICH PANELS USING ANSYS WORKBENCH
MODIFICATION AND OPTIMIZATION IN STEEL SANDWICH PANELS USING ANSYS WORKBENCH
 
IMPACT ANALYSIS OF ALUMINUM HONEYCOMB SANDWICH PANEL BUMPER BEAM: A REVIEW
IMPACT ANALYSIS OF ALUMINUM HONEYCOMB SANDWICH PANEL BUMPER BEAM: A REVIEW IMPACT ANALYSIS OF ALUMINUM HONEYCOMB SANDWICH PANEL BUMPER BEAM: A REVIEW
IMPACT ANALYSIS OF ALUMINUM HONEYCOMB SANDWICH PANEL BUMPER BEAM: A REVIEW
 
DESIGN OF WELDING FIXTURES AND POSITIONERS
DESIGN OF WELDING FIXTURES AND POSITIONERSDESIGN OF WELDING FIXTURES AND POSITIONERS
DESIGN OF WELDING FIXTURES AND POSITIONERS
 
ADVANCED TRANSIENT THERMAL AND STRUCTURAL ANALYSIS OF DISC BRAKE BY USING ANS...
ADVANCED TRANSIENT THERMAL AND STRUCTURAL ANALYSIS OF DISC BRAKE BY USING ANS...ADVANCED TRANSIENT THERMAL AND STRUCTURAL ANALYSIS OF DISC BRAKE BY USING ANS...
ADVANCED TRANSIENT THERMAL AND STRUCTURAL ANALYSIS OF DISC BRAKE BY USING ANS...
 
REVIEW ON MECHANICAL PROPERTIES OF NON-ASBESTOS COMPOSITE MATERIAL USED IN BR...
REVIEW ON MECHANICAL PROPERTIES OF NON-ASBESTOS COMPOSITE MATERIAL USED IN BR...REVIEW ON MECHANICAL PROPERTIES OF NON-ASBESTOS COMPOSITE MATERIAL USED IN BR...
REVIEW ON MECHANICAL PROPERTIES OF NON-ASBESTOS COMPOSITE MATERIAL USED IN BR...
 
PERFORMANCE EVALUATION OF TRIBOLOGICAL PROPERTIES OF COTTON SEED OIL FOR MULT...
PERFORMANCE EVALUATION OF TRIBOLOGICAL PROPERTIES OF COTTON SEED OIL FOR MULT...PERFORMANCE EVALUATION OF TRIBOLOGICAL PROPERTIES OF COTTON SEED OIL FOR MULT...
PERFORMANCE EVALUATION OF TRIBOLOGICAL PROPERTIES OF COTTON SEED OIL FOR MULT...
 
MAGNETIC ABRASIVE FINISHING
MAGNETIC ABRASIVE FINISHINGMAGNETIC ABRASIVE FINISHING
MAGNETIC ABRASIVE FINISHING
 

Recently uploaded

Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 

Recently uploaded (20)

Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 

SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM

  • 1. Novateur Publication’s International Journal of Innovation in Engineering, Research and Technology [IJIERT] ICITDCEME’15 Conference Proceedings ISSN No - 2394-3696 Page | 1 SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM Priyanka Phasale . Department of Computer Engineering, Vishwabharati Academy’s College of Engineering, Ahmednagar, India Priyanka Kokate . Department of Computer Engineering, Vishwabharati Academy’s College of Engineering, Ahmednagar, India Prof M.C. Kshirsagar Department of Computer Engineering, Vishwabharati Academy’s College of Engineering, Ahmednagar, India ABSTRACT The continuous development of cloud computing, several trends are opening up to new forms of outsourcing. Public data integrity auditing is not secure and efficient for shared dynamic data. In existing scheme figure out the collusion attack and provide an efficient public integrity auditing scheme, with the help of secure group user revocation based on vector commitment and verifier–local revocation group signature. It provides secure and efficient scheme which support public checking and efficient user revocation. Problem of existing work they used TPA (Third party auditor) for key generation and key agreement. Use of TPA as central system if it fails then whole system gets failed. If we are working with cloud, user identity is major concern because user doesn’t want to reveal his personal information to public. This concept not included in it. In this paper, based these con’s we proposed a dynamic data sharing in public cloud using multi-authority system. The proposed scheme is able to protect user’s privacy against each single authority. KEYWORDS: Public integrity auditing, CSP, TPA, dynamic data, VC, ASGA. INTRODUCTION Cloud computing refers application and services that run on distributed networks. Cloud storage is important service of cloud computing which allow data owners to move data from their local computing system to the cloud. Therefore in any infrastructure data loss or discard not been accessed. Sometime CSP (cloud service provider) might be dishonest that’s why owners need to ensure that data are stored in cloud or not [1][2]. Recently some research considers several remote integrity checking protocols which allow the auditor to check the data integrity on remote server [2]. In [1], X-Chen proposed secure and efficient public data integrity auditing for shared dynamic data. Overcome collusion attack of cloud storage server against security. To protect security and privacy of cloud user’s data [1] LITERATURE REVIEW: In the literature review topical method over the cloud data approaches as discuss, below in literature some of them are discussed: 1) Tao Jiang, Xiao Feng Chen, and Jian Feng Ma: Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation, IEEE TRANSACTIONS ON COMPUTERS VOL: PP NO: 99 YEAR 2015 This paper represent secure and efficient public data integrity auditing for sharing dynamic data against the collusion attack, Provide secure group user revocation base on VC(Vector Commitment) and VLR(Verifier-local revocation)group signature. Organizations outsource own data to third party CSP(Cloud Service providers).contribution of these scheme: Propose efficient data auditing scheme by using VC and AGKA (Asymmetric group key agreement),GS(Group signature)to support ciphertext group user revocation and encrypt/decrypt share database. CSM (Cloud storage model) indicate three entities:
  • 2. Novateur Publication’s International Journal of Innovation in Engineering, Research and Technology [IJIERT] ICITDCEME’15 Conference Proceedings ISSN No - 2394-3696 Page | 2 1. CSS (Cloud storage server): share privilege to access and modify number of group users. 2. GU (Group user) who are authorized to access and modify the data by the data owner. 3. TPA: any entity which able to conduct data integrity of share data storage in cloud server. 2) Madhuri R. Rokade et al, “Providing Data Utility on Cloud using Slicing approach and Dynamic Auditing Protocol using Third Party Auditor to maintain Integrity of Data” (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (1) , 2014, 852-855. A method presents a new approach called slicing to privacy-preserving data. Slicing overcomes the limitations of generalization and bucketization and preserves better utility while protecting against privacy threats in cloud. That proposed an efficient and inherently secure dynamic auditing protocol which audits the data present in the cloud periodically and also whenever auditor wants to check it. Also dynamic data changes are also audited. Furthermore, auditing scheme incurs less communication cost and less computation cost of the auditor by moving the computing loads of auditing from the auditor to the server, which greatly improves the auditing performance and can be applied to large-scale cloud storage systems. 3) C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-preserving public auditing for data storage security in cloud computing,” in Proc. of IEEE INFOCOM 2010, CA, USA, Mar. 2010, pp no. 525533. Motivate the public auditing system of data storage security in Cloud Computing and provide a privacy-preserving auditing protocol. Our scheme enables an external auditor to audit user’s cloud data without learning the data content. This scheme is the first to support scalable and efficient privacy preserving public storage auditing in cloud. Scheme achieves batch auditing where multiple delegated auditing tasks from different users can be performed simultaneously by the TPA in a privacy-preserving manner. TPA would not knowledge about the data content stored on the cloud server during the efficient auditing process, which not only eliminates the burden of cloud user from the tedious and possibly expensive auditing task, but also reduce the user’s fear of their outsourced data leakage. TPA may concurrently handle multiple audit sessions from different users for their outsourced data files; we further extend our privacy preserving public auditing protocol into a multiuser setting, where the TPA can perform multiple auditing tasks in a batch manner for better efficiency. 4) J. Yuan and S. Yu, “Efficient public integrity checking for cloud data sharing with multi-user modification,” in Proc. of IEEE INFOCOM 2014, Toronto, Canada, Apr. 2014, pp. 2121–2129. The author designed dynamic public integrity auditing scheme with group user revocation. Yuan and yu not consider data secrecy of group users in their scheme that means scheme efficiently support plaintext data update and integrity auditing not cipher text data. Design polynomial authentication tag and adopt proxy tag update technique. If data owner share group key with group users and defection or revocation occur any group user will force to other group user to update their shared key. Sometime data owner not take part in user revocation phase, where many time cloud server update the data and provide data legally last. 5) B. Wang, B. Li, and H. Li, “Oruta: Privacy-preserving public auditing for shared data in the cloud,” in Proc. of IEEE CLOUD 2012, Hawaii, USA, Jun. 2012, pp. 295–302. Oruta consider how to audit the integrity of shared data in cloud with static group. Group is predefined before shared data created in cloud. Membership of users is constant in the group. Original user decides who is able to share data to the cloud before outsourcing. Problem in these schemes is how to audit the integrity of shared data in cloud with dynamic group. New user added onto group but existing user can be revoked during data sharing. 6) D. Catalano and D. Fiore, “Vector commitments and their applications,” in Public-Key Cryptography - PKC 2013, Nara, Japan, Mar. 2013, pp. 55–72. This paper introduce new simple and powerful commitment mechanism should not allow a sender to change mind about committed message. VC Scheme is collection of six-polynomial time algorithm (Vc.KeyGen, Vc.Com, Vc.Open, Vc.Ver, Vc.Update, and Vc.ProofUpdate). Vc allows to commit ordered sequence of q value (m1……..mg) to single message Vc require position binding to satisfaction means two different value at the same position. Vc require hiding updatable property, Use two algorithm to update the commitment and opening message. First algorithm allows committer who created commitment and want to update changing message. Second algorithm allows holders of an opening of message to update their proof. PROPOSED WORK: Problems of Existing Work: 1. As in base paper [1], Used TPA (Third party auditor) for key generation and for key agreement. 2. TPA (Third party auditor) is central system, if it fails then whole system get failed.
  • 3. Novateur Publication’s International Journal of Innovation in Engineering, Research and Technology [IJIERT] ICITDCEME’15 Conference Proceedings ISSN No - 2394-3696 Page | 3 3. If we are working with cloud, user identity is major concern user doesn’t want to reveal his personal information to public. This concept not included in it. So based on these cons, we proposed a Dynamic Data Sharing in Public Cloud using Multi-Authority System . Fig 1: Proposed system The proposed schemes are able to protect user’s privacy against each single authority. Authorities are assumed to have powerful computation abilities, and they are supervised by government offices because some attributes partially contain users’ personally identifiable information. The whole attribute set is divided into N disjoint sets and controlled by each authority, therefore each authority is aware of only part of attributes. We have assumed semi-honest authorities and we assumed that they will not collude with each other. This is a necessary assumption because each authority is in charge of a subset of the whole attributes set, and for the attributes that it is in charge of; it knows the exact information of the key requester. If the information from all authorities is gathered altogether, the complete attribute set of the key requester is recovered and thus his identity is disclosed to the authorities. In this sense, system is semi-anonymous since partial identity information (represented as some attributes) is disclosed to each authority, but we can achieve a full-anonymity and also allow the collusion of the authorities. CONCLUSION We provide security analysis of our scheme, and it shows that our scheme provide data confidentiality for group users, and it is also secure against the collusion attack from the cloud storage server and revoked group users. We provide security analysis of our scheme with a semi-anonymous attribute-based privilege control scheme to address the user privacy problem in a cloud storage server. The scheme vector commitment, Asymmetric Group Key Agreement (AGKA) and group signatures with user revocation are adopt to achieve the data integrity auditing of remote data using multiple authorities in the cloud computing system, our proposed schemes achieve not only fine- grained privilege control but also identity anonymity while conducting privilege control based on users’ identity information. REFERENCES [1] Tao Jiang, Xiao Feng Chen, and Jian Feng Ma: “Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation”, IEEE TRANSACTIONS ON COMPUTERS VOL: PP NO: 99 YEAR 2015. [2] Madhuri R. Rokade et al, “Providing Data Utility on Cloud using Slicing approach and Dynamic Auditing Protocol using Third Party Auditor to maintain Integrity of Data”,(IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (1) , 2014, 852-855. [3] C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-preserving public auditing for data storage security in cloud computing,”, in Proc. of IEEE INFOCOM 2010, CA, USA, Mar. 2010, pp no. 525533. [4] J. Yuan and S. Yu, “Efficient public integrity checking for cloud data sharing with multi- user modification,” in Proc. of IEEE INFOCOM 2014, Toronto, Canada, Apr. 2014, pp. 2121–2129. [5] B. Wang, B. Li, and H. Li, “Oruta: Privacy-preserving public auditing for shared data in the cloud,” in Proc. of IEEE CLOUD 2012, Hawaii, USA, Jun. 2012, pp. 295–302. [6] D. Catalano and D. Fiore, “Vector commitments and their applications,” in Public-Key Cryptography - PKC 2013, Nara, Japan, Mar. 2013, pp. 55–72.