SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
ISSN: 2278 – 1323
                                       International Journal of Advanced Research in Computer Engineering & Technology
                                                                                           Volume 1, Issue 4, June 2012


 ICCC: Information Correctness to the Customers in
               Cloud Data Storage
                  Gangolu Sreedevi                                                      Prof. C. Rajendra,
                    M. Tech (CS),                                                    H.O.D, CSE Department,
                    ASCET, India                                                             ASCET, India
              gangolusreedevi@gmail.com

    Abstract- Cloud storage is the only solution to the IT           correctness proof that the data that is stored by a user at
organizations to optimize the escalating storage costs and           remote data storage in the cloud archives is not modified by
maintenance. Data outsourcing in to the cloud has become             the archive and thereby the correctness of the data is
today trending environment for the thin organizations. The
entire user’s data is store in large data centers, those which are
                                                                     assured. Such kinds of correctness proofs are much
located remotely and the users don’t have any control on it. on      helpful in P to P (peer-to-peer) storage systems, long term
the other hand, this unique feature of the cloud poses many          archives, database systems, file storage systems. The
new security challenges which need to be clearly understood          authentication systems avert the archives of cloud from mis-
and resolved. Even the information is not accessible by the          representing or modifying the data stored at it without the
user the data centers should grant a way for the customer to         approval of the data holder by using frequent checks on the
check the correctness of his data is maintained or is
                                                                     storage archives. Such checks must allow the data holder
compromise.
    As a solution this we are proposing providing information        to efficiently, frequently, quickly and securely validate that
correctness to the customers in Cloud Storage. The proposing         the cloud archive is not cheating the data holder. Cheating,
system gives a information correctness proof, the customer           in this situation, means that the cloud storage archive might
c a n employ to check the correctness o f his data i n the           delete some of the data or may tamper or modify some of
cloud. The correctness of the data can be approved upon by           the data. It must be noted that the cloud storage server
both the cloud and the customer a n d can be included in             might not be spiteful; instead, it might be simply
the Service level agreement ( SLA). This scheme ensures
that the storage at the client side is minimal which will be
                                                                     undependable and lose or unconsciously corrupt the
beneficial for thin clients.                                         hosted data. But the information correctness schemes that
                                                                     are to be developed need to be often applicable for spiteful
Keywords: Cloud computing, Data correctness, Cloud Storage           as well as unreliable cloud storage servers. Any such
                                                                     correctness proofs possession schemes will not protect the
                                                                     information from dishonesty by the archive. To guarantee
                     I.   INTRODUCTION
                                                                     file toughness other kind of techniques like i n f o r m a t i o n
   Many organization and users outstanding their economic            redundancy across multiple systems can be maintained. It
advantages through the information outsourcing to cloud              just allows invention of modification of a remotely located
storage servers. Because cloud outsourcing is the raising            file at an unreliable cloud storage server.
trend today’s computing. The cloud storage means that the               While implementing the information correctness proofs
holder of the data store his data in a third party cloud server      for data possession at un-trusted cloud storage servers we
which is supposed to apparently for a fee and provide back           are habitually partial by the property at the cloud server
the data to the client whenever required. The data storage           as well as at the client (customer). Given that the data
becomes costly for small Organizations to regularly update           sizes are large and are stored at remote servers, accessing
their hardware whenever additional data is made and                  the entire file can be expensive in hardware costs to the
maintenance of the stored data can be hard task. Cloud data          storage server.
outsourcing helps such organizations by reducing the
                                                                        Transmitting the information across the network to
maintenance costs, personnel costs and storage costs. The
                                                                     the user (client) can devour heavy bandwidths. Because
cloud storage also offers a reliability of important data by
                                                                     development in cloud storage capacity has fat outpaced the
maintaining multiple copies of the data thereby reducing the
                                                                     development in cloud data access as well as network speed or
chance of data lose by hardware failures.
                                                                     bandwidth, transmitting and accessing the entire network
   The cloud in spite of many protection concerns for the
                                                                     resources.
users data storing which need to be expansively investigated
for making it a reliable solution to the problem of avoiding            Furthermore, the hardware to establish the information
local storage of data.                                               correctness proof obstruct with the on-demand bandwidth
                                                                     of the cloud server used for normal storage and retrieving
   Many problems like data verification and truthfulness [1]
                                                                     purpose. The problem is more intricate by the fact that the
outsourcing encrypted data and associated difficult
                                                                     holder of the data may be a small device, like a Personal
problems dealing with querying over encrypted domain [2]
                                                                     Digital Assist (PDA) or a mobile phone, which have limited
were discussed in research review.
                                                                     battery power, CPU power and communication bandwidth.
   In this paper our proposal ICCC deal with the crisis of
                                                                     Therefore a information correctness proof that has to be
implementing a protocol for obtaining the correctness of
                                                                     urbanized needs to take the above limitations into
data possession in the cloud sometimes referred to as Proof
                                                                     consideration. The ICCC should be able to produce a
of retrievability. The ICCC tries to achieve and validate a

                                                                                                                                  234
                                          All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                                       International Journal of Advanced Research in Computer Engineering & Technology
                                                                                           Volume 1, Issue 4, June 2012

evidence without the need for the cloud server to access             key can be used irrespective of the size of the file or the
the entire data file or the client (user) retrieving the entire      number of files whose retrievability it wants to verify. Also
file from the server. Also the ICCC should diminish the              the archive needs to access only a small portion of the file
local computation at the client as well as the bandwidth             F unlike in the key-has scheme which required the archive
consumed at the client (user).                                       to process the entire file F for protocol verification. This
                                                                     small portion of the file F is in fact independent of the
                                                                     length of F. The Figure 1 shows the pictorial view of the
                    II.   RELATED WORK                               proposing ICCC.
    Cloud computing refers to the delivery of computing and
storage capacity as a service to a heterogeneous community
of end-recipients. The name comes from the use of clouds as
an abstraction for the complex infrastructure it contains in
system diagrams. Cloud computing entrusts services with a
user's data, software and computation over a network. It has
considerable overlap with software as a service (SaaS).
    End users access cloud based applications through a web
browser or a light weight desktop or mobile app while the
business software and data are stored on servers at a remote
location. Proponents claim that cloud computing allows                Figure 1 pictorial view of information correctness proof of retrievability
                                                                              based on inserting random sentinels in the data file F
enterprises to get their applications up and running faster,
with improved manageability and less maintenance, and
enables IT to more rapidly adjust resources to meet                      In this approach special blocks (called sentinels) are
fluctuating and unpredictable business demand.                       hidden among other blocks in the data file F. In the
    Cloud computing relies on sharing of resources to                setup phase, the verifier randomly embeds these sentinels
achieve coherence and economies of scale similar to a utility        among the data blocks. I n the verification phase, to
(like the electricity grid) over a network (typically the            check the correctness of the data file F, the verifier
Internet). At the foundation of cloud computing is the               challenges the prover (cloud archive) by specifying the
broader concept of converged infrastructure and shared               positions of a collection of sentinels and asking the prover
services.                                                            to return the associated sentinel values. If the prover has
   The ICCC system can be prepared using a encryption                modified or deleted a substantial portion of F, then with
function         hk (F), ICCC the correctness verifier, before       high probability it will also have suppressed a number of
archiving the data file F in the cloud data storage, pre-            sentinels.
computes the cryptographic encrypted hash value of F                    When the encrypted information is large, this approach
u s in g hk (F) and stores this hash v a lu e as well as the         involves the encryption of the F utilizing the key it becomes
e n c r y p t e d key K. To check if the correctness of the file F   computationally awkward. There will also be storage
is lost, the correctness verifier releases the encrypted key K       transparency at the server, partly due to the newly inserted
to the cloud storage archive and asks it to compute and              sentinels and partly due to the error correcting codes that
return the value of hk (F). By storing multiple hash values          are inserted. The client wants to store all the sentinels with
for different keys the verifier can check for the                    it, which may be storage overhead to thin clients (PDAs,
correctness of the file F for multiple times, each one               low power devices etc.).
being independent evidence.
   Though this ICCC approach is very simple and easily
implemental, the main disadvantage of this approach is the                                 III.    ICCC APPROACH
high supply costs it requires for the implementation. The                Our ICCC information correctness proof approach does
verifier in this approach requires storing as many keys and          not encrypt the whole information. The ICCC encrypts only
the number of checks to perform and the hash value of the            few bits of the data per data block thus reducing the
information file F with each hash key. Computing hash                computational transparency on the clients. Our approach is
value for even a fairly large information files can be               suitable for thin organizations because the client storage
computationally arduous for some clients (PDAs, mobile               transparency is also minimized as it does not store any data
phones, etc).                                                        with it.
   The archive side requires each incantation of the                     The verifier has to store only a single encrypted key in
protocol; the archive requires processing the entire                 our information correctness protocol. Because of the
information file F. This can be computationally difficult            irrespective of the size of the i n f o r m a t i o n file F - and
for the archive even for a lightweight operation like                t h e two functions which produce a random sequence. The
hashing. Furthermore, it requires that each information              verifier does not store any data with it. The verifier
correctness proof requires the proverb to read the entire            appends meta data to the file F before storing the file at the
file F - a significant overhead for an archive whose intended        archive and stores at the archive side. In the verification
load is only an occasional read per file, were every file to         phase the verifier uses this meta data to verify the
be tested frequently [3].                                            correctness of the data. It is important to note that our
   Juels and Burton proposed a approach called Proof of              proof of data integrity protocol just checks the integrity of
retrievability for large files using” sentinels” [3]. In this        data i.e. if the data has been illegally modified or deleted.
approach, unlike in the key-hash approach, only a single

                                                                                                                                           235
                                          All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                                         International Journal of Advanced Research in Computer Engineering & Technology
                                                                                             Volume 1, Issue 4, June 2012

                                                                  encryption method can be improvised to provide still
                                                                  stronger protection for verifiers data.
                                                                     3) Appending of meta data: All the meta data bit
                                                                  blocks that are generated using the above procedure are to
                                                                  be concatenated together. This concatenated Meta data
                                                                  should be appended to the file F before storing it at the
                                                                  cloud server. The file F along with the appended meta data
                                                                  e
                                                                  F is archived with the cloud. Figure 4 shows the encrypted
                                                                       e
                                                                  file F after appending the meta data to the data file F .
             Figure 2 A data file F with 6 data blocks
                                                                  B. Verification phase
   IV.   A INFORMAION CORRECTNESS PROOF IN                           Let the verifier V w a n t to verify the integrity of the file
                    CLOUD                                         F . It throws a challenge to the archive and asks it to
                                                                  respond. The challenge and the response are compared and
   In this ICCC approach the user should route and create         the verifier accepts or rejects the integrity proof.
suitable Meta data which is used in the later verification         Suppose the verifier wishes to check the integrity of nth
stage before storing the information file at the cloud storage    block. The verifier challenges the cloud storage server by
the user queries the cloud data storage for proper replies for
checking the correctness of the information which it
concludes the correctness of its information stored in the
client.
A. Setup phase
   Let the verifier V wishes to the store the file F with
the archive. Let this file F consist of n file blocks. We
initially preprocess the file and create metadata to be
appended to the file. Let each of the n data blocks have m              Figure 3 A data block with random bits selected in the file F
bits in them. A typical data file F w h i c h the client
wishes to store in the cloud is shown in Figure 2. The
initial setup phase can be described in the following steps
 1) Generation of meta-data: Let g be a function defined as
                            fllows
            g(i, j) → {1..m}, i ∈ {1..n}, j ∈ {1..k}       (1)
Where k is the number of bits per data block which we
wish to read as meta data. The function g generates for                Figure 4 The encrypted file F which will be stored in the cloud.
each block a set of k bit positions within the m bits that
are in the data block. Hence g(i, j) gives the j th bit in the    Specifying the block number i and a bit number j
                                                                  generated by using the function g which only the verifier
ith data block. The value of k is in the choice of the
                                                                  knows. The verifier also specifies the position at which
verifier and is a secret known only to him. Therefore for         the meta data corresponding the block i is appended.
each data block we get a set of k bits and in total for all       This meta data will be a k-bit number. Hence the cloud
the n blocks we get                                               storage server is required to send k+1 bits for verification
n ∗ k bits. Let mi represent the k bits of Meta data for the      by the client.
                                                                     The Meta data sent by the cloud is decrypted by using
ith
                                                                  the number αi and the corresponding bit in this decrypted
block. Figure 3 shows a data block of the file F with
random                                                            Meta data is compared with the bit that is sent by the cloud.
bits selected using the function g.                               Any mismatch between the two would mean a loss of the
   2) Encrypting the meta data: Each of the meta data             integrity of the client’s at the cloud storage.
from the data blocks mi is encrypted by using a suitable                                  V.     CONCLUSION
algorithm to give a new modified meta data Mi .
   Without loss of generality we show this process by using          In this paper we have proposed ICCC approach to
a simple XOR operation. Let h be a function which                 facilitate the client (user) in getting information correctness
generates k bit integer αi for each i. This function is a         which he wishes to store in the cloud servers with bare
secret and is known only to the verifier V.                       minimum costs and efforts. Our approach was developed to
                                                                  reduce the computational and storage overhead of the
                     h : i → αi , αi ∈ {0..2n }          (2)      customer as well as to minimize the computational overhead
                                                                  of the cloud storage server. We also minimized the size
 For the meta data (mi ) of each data block the number αi
                                                                  of the proof of data integrity so as to reduce the network
is added to get a new k bit number Mi .
                                                                  bandwidth consumption. At the client we only store two
                          Mi = mi + αi                    (3)     functions, the bit generator function g, and the function h
                                                                  which is used for encrypting the data. Hence the storage at
In this way we get a set of n new meta data bit blocks. The       the client is very much minimal compared to all other

                                                                                                                                          236
                                            All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                                               International Journal of Advanced Research in Computer Engineering & Technology
                                                                                                   Volume 1, Issue 4, June 2012

schemes [4] that were developed. Hence this scheme proves
advantageous to thin clients like PDAs and mobile phones
    It should be noted that our approach applies to static
storage of information and also dynamic storage
information. Also the number of queries that can be asked
by the client is fixed apriori. But this number is quite large
and can be sufficient if the period of data storage is short. It
will be a challenge to increase the number of queries using
this scheme.
                           REFERENCES
[1] E . Mykletun, M. Narasimha, and G. Tsudik, “Authentication and
   integrity in outsourced databases,” Trans. Storage, vol. 2, no. 2, pp. 107–
   138, 2006.
[2] D . X. Song, D. Wagner, and A. Perrig, “Practical techniques for
   searches on encrypted data,” in SP ’00: Proceedings of the 2000 IEEE
   Symposium on Security and Privacy.              Washington, DC, USA:
   IEEE Computer Society, 2000, p. 44.
[3] A. Juels and B. S. Kaliski, Jr., “Pors: proofs of retrievability for large
   files,” in CCS ’07: Proceedings of the 14th ACM conference on
   Computer and communications security.            New York, NY, USA:
   ACM, 2007, pp. 584–597.
[4] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z.
     Peterson, and D. Song, “Provable data possession at untrusted stores,”
     in CCS ’07: Proceedings of the 14th ACM conference on Computer
     and communica- tions security. New York,




                                                                                                                          237
                                                  All Rights Reserved © 2012 IJARCET

Weitere ähnliche Inhalte

Was ist angesagt?

A Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud ComputingA Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud Computingvivatechijri
 
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing SystemsProposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing SystemsHossam Al-Ansary
 
Unit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computingUnit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computingMonishaNehkal
 
an enhanced multi layered cryptosystem based secure
an enhanced multi layered cryptosystem based securean enhanced multi layered cryptosystem based secure
an enhanced multi layered cryptosystem based secureIJAEMSJORNAL
 
Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Editor IJARCET
 
Excellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingExcellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingEditor IJMTER
 
Data Partitioning Technique In Cloud: A Survey On Limitation And Benefits
Data Partitioning Technique In Cloud: A Survey On Limitation And BenefitsData Partitioning Technique In Cloud: A Survey On Limitation And Benefits
Data Partitioning Technique In Cloud: A Survey On Limitation And BenefitsIJERA Editor
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Editor IJMTER
 
Survey on Division and Replication of Data in Cloud for Optimal Performance a...
Survey on Division and Replication of Data in Cloud for Optimal Performance a...Survey on Division and Replication of Data in Cloud for Optimal Performance a...
Survey on Division and Replication of Data in Cloud for Optimal Performance a...IJSRD
 
The Data Distribution Service Tutorial
The Data Distribution Service TutorialThe Data Distribution Service Tutorial
The Data Distribution Service TutorialAngelo Corsaro
 
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...pharmaindexing
 
Cloude computing notes for Rgpv 7th sem student
Cloude computing notes for Rgpv 7th sem studentCloude computing notes for Rgpv 7th sem student
Cloude computing notes for Rgpv 7th sem studentgdyadav
 
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...IJERA Editor
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationEditor IJMTER
 
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...IRJET Journal
 
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud StorageEnhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud StorageIRJET Journal
 
DDS on the Web: Quick Recipes for Real-Time Web Applications
DDS on the Web: Quick Recipes for Real-Time Web ApplicationsDDS on the Web: Quick Recipes for Real-Time Web Applications
DDS on the Web: Quick Recipes for Real-Time Web ApplicationsAngelo Corsaro
 
Secure Data Storage in Cloud Using Encryption and Steganography
Secure Data Storage in Cloud Using Encryption and SteganographySecure Data Storage in Cloud Using Encryption and Steganography
Secure Data Storage in Cloud Using Encryption and Steganographyiosrjce
 

Was ist angesagt? (19)

A Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud ComputingA Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud Computing
 
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing SystemsProposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
 
Unit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computingUnit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computing
 
an enhanced multi layered cryptosystem based secure
an enhanced multi layered cryptosystem based securean enhanced multi layered cryptosystem based secure
an enhanced multi layered cryptosystem based secure
 
Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409
 
Excellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingExcellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computing
 
Data Partitioning Technique In Cloud: A Survey On Limitation And Benefits
Data Partitioning Technique In Cloud: A Survey On Limitation And BenefitsData Partitioning Technique In Cloud: A Survey On Limitation And Benefits
Data Partitioning Technique In Cloud: A Survey On Limitation And Benefits
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
 
Survey on Division and Replication of Data in Cloud for Optimal Performance a...
Survey on Division and Replication of Data in Cloud for Optimal Performance a...Survey on Division and Replication of Data in Cloud for Optimal Performance a...
Survey on Division and Replication of Data in Cloud for Optimal Performance a...
 
The Data Distribution Service Tutorial
The Data Distribution Service TutorialThe Data Distribution Service Tutorial
The Data Distribution Service Tutorial
 
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
 
V04405122126
V04405122126V04405122126
V04405122126
 
Cloude computing notes for Rgpv 7th sem student
Cloude computing notes for Rgpv 7th sem studentCloude computing notes for Rgpv 7th sem student
Cloude computing notes for Rgpv 7th sem student
 
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
 
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
 
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud StorageEnhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
 
DDS on the Web: Quick Recipes for Real-Time Web Applications
DDS on the Web: Quick Recipes for Real-Time Web ApplicationsDDS on the Web: Quick Recipes for Real-Time Web Applications
DDS on the Web: Quick Recipes for Real-Time Web Applications
 
Secure Data Storage in Cloud Using Encryption and Steganography
Secure Data Storage in Cloud Using Encryption and SteganographySecure Data Storage in Cloud Using Encryption and Steganography
Secure Data Storage in Cloud Using Encryption and Steganography
 

Andere mochten auch

Andere mochten auch (20)

Israel Vietnam Humanitarian Mission2 (Nx Power Lite)
Israel  Vietnam Humanitarian Mission2 (Nx Power Lite)Israel  Vietnam Humanitarian Mission2 (Nx Power Lite)
Israel Vietnam Humanitarian Mission2 (Nx Power Lite)
 
Prueba
PruebaPrueba
Prueba
 
Volume 2-issue-6-2095-2097
Volume 2-issue-6-2095-2097Volume 2-issue-6-2095-2097
Volume 2-issue-6-2095-2097
 
92 97
92 9792 97
92 97
 
289 292
289 292289 292
289 292
 
244 251
244 251244 251
244 251
 
Wsn1
Wsn1Wsn1
Wsn1
 
Houses in Kamalaya, Minglanilla
Houses in Kamalaya, MinglanillaHouses in Kamalaya, Minglanilla
Houses in Kamalaya, Minglanilla
 
306 310
306 310306 310
306 310
 
Where are the Internet Opportunities in Ukraine?
Where are the Internet Opportunities in Ukraine?Where are the Internet Opportunities in Ukraine?
Where are the Internet Opportunities in Ukraine?
 
Because 1
Because 1Because 1
Because 1
 
557 562
557 562557 562
557 562
 
Ijarcet vol-2-issue-7-2319-2322
Ijarcet vol-2-issue-7-2319-2322Ijarcet vol-2-issue-7-2319-2322
Ijarcet vol-2-issue-7-2319-2322
 
Tipos De Mercado(Pedro Manuel Y Ana)
Tipos De Mercado(Pedro Manuel Y Ana)Tipos De Mercado(Pedro Manuel Y Ana)
Tipos De Mercado(Pedro Manuel Y Ana)
 
111 118
111 118111 118
111 118
 
Ijarcet vol-2-issue-7-2333-2336
Ijarcet vol-2-issue-7-2333-2336Ijarcet vol-2-issue-7-2333-2336
Ijarcet vol-2-issue-7-2333-2336
 
471 475
471 475471 475
471 475
 
Ijarcet vol-2-issue-7-2277-2280
Ijarcet vol-2-issue-7-2277-2280Ijarcet vol-2-issue-7-2277-2280
Ijarcet vol-2-issue-7-2277-2280
 
Analytics Site Search
Analytics Site SearchAnalytics Site Search
Analytics Site Search
 
1850 1854
1850 18541850 1854
1850 1854
 

Ähnlich wie 234 237

Enabling Integrity for the Compressed Files in Cloud Server
Enabling Integrity for the Compressed Files in Cloud ServerEnabling Integrity for the Compressed Files in Cloud Server
Enabling Integrity for the Compressed Files in Cloud ServerIOSR Journals
 
A Novel Method of Directly Auditing Integrity On Encrypted Data
A Novel Method of Directly Auditing Integrity On Encrypted DataA Novel Method of Directly Auditing Integrity On Encrypted Data
A Novel Method of Directly Auditing Integrity On Encrypted DataIRJET Journal
 
Periodic Auditing of Data in Cloud Using Random Bits
Periodic Auditing of Data in Cloud Using Random BitsPeriodic Auditing of Data in Cloud Using Random Bits
Periodic Auditing of Data in Cloud Using Random BitsIJTET Journal
 
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and Deduplication
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and DeduplicationSecCloudPro: A Novel Secure Cloud Storage System for Auditing and Deduplication
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and DeduplicationIJCERT
 
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudeSAT Journals
 
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudeSAT Publishing House
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingAIRCC Publishing Corporation
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGAIRCC Publishing Corporation
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGijcsit
 
Crypto multi tenant an environment of secure computing using cloud sql
Crypto multi tenant an environment of secure computing using cloud sqlCrypto multi tenant an environment of secure computing using cloud sql
Crypto multi tenant an environment of secure computing using cloud sqlijdpsjournal
 
Ensuring data integrity on cloud data storage
 Ensuring data integrity on cloud data storage Ensuring data integrity on cloud data storage
Ensuring data integrity on cloud data storageRatheesh Kumar R
 
Dynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudDynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudAM Publications
 
Privacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage DevicesPrivacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage DevicesIOSR Journals
 
PROVABLE DATA PROCESSING (PDP) A MODEL FOR CLIENT'S SECURED DATA ON CLOUD
PROVABLE DATA PROCESSING (PDP) A MODEL FOR CLIENT'S SECURED DATA ON CLOUDPROVABLE DATA PROCESSING (PDP) A MODEL FOR CLIENT'S SECURED DATA ON CLOUD
PROVABLE DATA PROCESSING (PDP) A MODEL FOR CLIENT'S SECURED DATA ON CLOUDJournal For Research
 
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...IRJET Journal
 
Secure Auditing and Deduplicating Data in Cloud
Secure Auditing and Deduplicating Data in CloudSecure Auditing and Deduplicating Data in Cloud
Secure Auditing and Deduplicating Data in Cloud1crore projects
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 

Ähnlich wie 234 237 (20)

Enabling Integrity for the Compressed Files in Cloud Server
Enabling Integrity for the Compressed Files in Cloud ServerEnabling Integrity for the Compressed Files in Cloud Server
Enabling Integrity for the Compressed Files in Cloud Server
 
Abstract
AbstractAbstract
Abstract
 
A Novel Method of Directly Auditing Integrity On Encrypted Data
A Novel Method of Directly Auditing Integrity On Encrypted DataA Novel Method of Directly Auditing Integrity On Encrypted Data
A Novel Method of Directly Auditing Integrity On Encrypted Data
 
Periodic Auditing of Data in Cloud Using Random Bits
Periodic Auditing of Data in Cloud Using Random BitsPeriodic Auditing of Data in Cloud Using Random Bits
Periodic Auditing of Data in Cloud Using Random Bits
 
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and Deduplication
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and DeduplicationSecCloudPro: A Novel Secure Cloud Storage System for Auditing and Deduplication
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and Deduplication
 
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloud
 
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloud
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
H1803035056
H1803035056H1803035056
H1803035056
 
Crypto multi tenant an environment of secure computing using cloud sql
Crypto multi tenant an environment of secure computing using cloud sqlCrypto multi tenant an environment of secure computing using cloud sql
Crypto multi tenant an environment of secure computing using cloud sql
 
Ensuring data integrity on cloud data storage
 Ensuring data integrity on cloud data storage Ensuring data integrity on cloud data storage
Ensuring data integrity on cloud data storage
 
Dynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudDynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for Cloud
 
Privacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage DevicesPrivacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage Devices
 
An4201262267
An4201262267An4201262267
An4201262267
 
PROVABLE DATA PROCESSING (PDP) A MODEL FOR CLIENT'S SECURED DATA ON CLOUD
PROVABLE DATA PROCESSING (PDP) A MODEL FOR CLIENT'S SECURED DATA ON CLOUDPROVABLE DATA PROCESSING (PDP) A MODEL FOR CLIENT'S SECURED DATA ON CLOUD
PROVABLE DATA PROCESSING (PDP) A MODEL FOR CLIENT'S SECURED DATA ON CLOUD
 
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
 
Secure Auditing and Deduplicating Data in Cloud
Secure Auditing and Deduplicating Data in CloudSecure Auditing and Deduplicating Data in Cloud
Secure Auditing and Deduplicating Data in Cloud
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 

Mehr von Editor IJARCET

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationEditor IJARCET
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Editor IJARCET
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Editor IJARCET
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Editor IJARCET
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Editor IJARCET
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Editor IJARCET
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Editor IJARCET
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Editor IJARCET
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Editor IJARCET
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Editor IJARCET
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Editor IJARCET
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Editor IJARCET
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Editor IJARCET
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Editor IJARCET
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Editor IJARCET
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Editor IJARCET
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Editor IJARCET
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Editor IJARCET
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Editor IJARCET
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Editor IJARCET
 

Mehr von Editor IJARCET (20)

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 

Kürzlich hochgeladen

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 

Kürzlich hochgeladen (20)

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

234 237

  • 1. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 ICCC: Information Correctness to the Customers in Cloud Data Storage Gangolu Sreedevi Prof. C. Rajendra, M. Tech (CS), H.O.D, CSE Department, ASCET, India ASCET, India gangolusreedevi@gmail.com Abstract- Cloud storage is the only solution to the IT correctness proof that the data that is stored by a user at organizations to optimize the escalating storage costs and remote data storage in the cloud archives is not modified by maintenance. Data outsourcing in to the cloud has become the archive and thereby the correctness of the data is today trending environment for the thin organizations. The entire user’s data is store in large data centers, those which are assured. Such kinds of correctness proofs are much located remotely and the users don’t have any control on it. on helpful in P to P (peer-to-peer) storage systems, long term the other hand, this unique feature of the cloud poses many archives, database systems, file storage systems. The new security challenges which need to be clearly understood authentication systems avert the archives of cloud from mis- and resolved. Even the information is not accessible by the representing or modifying the data stored at it without the user the data centers should grant a way for the customer to approval of the data holder by using frequent checks on the check the correctness of his data is maintained or is storage archives. Such checks must allow the data holder compromise. As a solution this we are proposing providing information to efficiently, frequently, quickly and securely validate that correctness to the customers in Cloud Storage. The proposing the cloud archive is not cheating the data holder. Cheating, system gives a information correctness proof, the customer in this situation, means that the cloud storage archive might c a n employ to check the correctness o f his data i n the delete some of the data or may tamper or modify some of cloud. The correctness of the data can be approved upon by the data. It must be noted that the cloud storage server both the cloud and the customer a n d can be included in might not be spiteful; instead, it might be simply the Service level agreement ( SLA). This scheme ensures that the storage at the client side is minimal which will be undependable and lose or unconsciously corrupt the beneficial for thin clients. hosted data. But the information correctness schemes that are to be developed need to be often applicable for spiteful Keywords: Cloud computing, Data correctness, Cloud Storage as well as unreliable cloud storage servers. Any such correctness proofs possession schemes will not protect the information from dishonesty by the archive. To guarantee I. INTRODUCTION file toughness other kind of techniques like i n f o r m a t i o n Many organization and users outstanding their economic redundancy across multiple systems can be maintained. It advantages through the information outsourcing to cloud just allows invention of modification of a remotely located storage servers. Because cloud outsourcing is the raising file at an unreliable cloud storage server. trend today’s computing. The cloud storage means that the While implementing the information correctness proofs holder of the data store his data in a third party cloud server for data possession at un-trusted cloud storage servers we which is supposed to apparently for a fee and provide back are habitually partial by the property at the cloud server the data to the client whenever required. The data storage as well as at the client (customer). Given that the data becomes costly for small Organizations to regularly update sizes are large and are stored at remote servers, accessing their hardware whenever additional data is made and the entire file can be expensive in hardware costs to the maintenance of the stored data can be hard task. Cloud data storage server. outsourcing helps such organizations by reducing the Transmitting the information across the network to maintenance costs, personnel costs and storage costs. The the user (client) can devour heavy bandwidths. Because cloud storage also offers a reliability of important data by development in cloud storage capacity has fat outpaced the maintaining multiple copies of the data thereby reducing the development in cloud data access as well as network speed or chance of data lose by hardware failures. bandwidth, transmitting and accessing the entire network The cloud in spite of many protection concerns for the resources. users data storing which need to be expansively investigated for making it a reliable solution to the problem of avoiding Furthermore, the hardware to establish the information local storage of data. correctness proof obstruct with the on-demand bandwidth of the cloud server used for normal storage and retrieving Many problems like data verification and truthfulness [1] purpose. The problem is more intricate by the fact that the outsourcing encrypted data and associated difficult holder of the data may be a small device, like a Personal problems dealing with querying over encrypted domain [2] Digital Assist (PDA) or a mobile phone, which have limited were discussed in research review. battery power, CPU power and communication bandwidth. In this paper our proposal ICCC deal with the crisis of Therefore a information correctness proof that has to be implementing a protocol for obtaining the correctness of urbanized needs to take the above limitations into data possession in the cloud sometimes referred to as Proof consideration. The ICCC should be able to produce a of retrievability. The ICCC tries to achieve and validate a 234 All Rights Reserved © 2012 IJARCET
  • 2. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 evidence without the need for the cloud server to access key can be used irrespective of the size of the file or the the entire data file or the client (user) retrieving the entire number of files whose retrievability it wants to verify. Also file from the server. Also the ICCC should diminish the the archive needs to access only a small portion of the file local computation at the client as well as the bandwidth F unlike in the key-has scheme which required the archive consumed at the client (user). to process the entire file F for protocol verification. This small portion of the file F is in fact independent of the length of F. The Figure 1 shows the pictorial view of the II. RELATED WORK proposing ICCC. Cloud computing refers to the delivery of computing and storage capacity as a service to a heterogeneous community of end-recipients. The name comes from the use of clouds as an abstraction for the complex infrastructure it contains in system diagrams. Cloud computing entrusts services with a user's data, software and computation over a network. It has considerable overlap with software as a service (SaaS). End users access cloud based applications through a web browser or a light weight desktop or mobile app while the business software and data are stored on servers at a remote location. Proponents claim that cloud computing allows Figure 1 pictorial view of information correctness proof of retrievability based on inserting random sentinels in the data file F enterprises to get their applications up and running faster, with improved manageability and less maintenance, and enables IT to more rapidly adjust resources to meet In this approach special blocks (called sentinels) are fluctuating and unpredictable business demand. hidden among other blocks in the data file F. In the Cloud computing relies on sharing of resources to setup phase, the verifier randomly embeds these sentinels achieve coherence and economies of scale similar to a utility among the data blocks. I n the verification phase, to (like the electricity grid) over a network (typically the check the correctness of the data file F, the verifier Internet). At the foundation of cloud computing is the challenges the prover (cloud archive) by specifying the broader concept of converged infrastructure and shared positions of a collection of sentinels and asking the prover services. to return the associated sentinel values. If the prover has The ICCC system can be prepared using a encryption modified or deleted a substantial portion of F, then with function hk (F), ICCC the correctness verifier, before high probability it will also have suppressed a number of archiving the data file F in the cloud data storage, pre- sentinels. computes the cryptographic encrypted hash value of F When the encrypted information is large, this approach u s in g hk (F) and stores this hash v a lu e as well as the involves the encryption of the F utilizing the key it becomes e n c r y p t e d key K. To check if the correctness of the file F computationally awkward. There will also be storage is lost, the correctness verifier releases the encrypted key K transparency at the server, partly due to the newly inserted to the cloud storage archive and asks it to compute and sentinels and partly due to the error correcting codes that return the value of hk (F). By storing multiple hash values are inserted. The client wants to store all the sentinels with for different keys the verifier can check for the it, which may be storage overhead to thin clients (PDAs, correctness of the file F for multiple times, each one low power devices etc.). being independent evidence. Though this ICCC approach is very simple and easily implemental, the main disadvantage of this approach is the III. ICCC APPROACH high supply costs it requires for the implementation. The Our ICCC information correctness proof approach does verifier in this approach requires storing as many keys and not encrypt the whole information. The ICCC encrypts only the number of checks to perform and the hash value of the few bits of the data per data block thus reducing the information file F with each hash key. Computing hash computational transparency on the clients. Our approach is value for even a fairly large information files can be suitable for thin organizations because the client storage computationally arduous for some clients (PDAs, mobile transparency is also minimized as it does not store any data phones, etc). with it. The archive side requires each incantation of the The verifier has to store only a single encrypted key in protocol; the archive requires processing the entire our information correctness protocol. Because of the information file F. This can be computationally difficult irrespective of the size of the i n f o r m a t i o n file F - and for the archive even for a lightweight operation like t h e two functions which produce a random sequence. The hashing. Furthermore, it requires that each information verifier does not store any data with it. The verifier correctness proof requires the proverb to read the entire appends meta data to the file F before storing the file at the file F - a significant overhead for an archive whose intended archive and stores at the archive side. In the verification load is only an occasional read per file, were every file to phase the verifier uses this meta data to verify the be tested frequently [3]. correctness of the data. It is important to note that our Juels and Burton proposed a approach called Proof of proof of data integrity protocol just checks the integrity of retrievability for large files using” sentinels” [3]. In this data i.e. if the data has been illegally modified or deleted. approach, unlike in the key-hash approach, only a single 235 All Rights Reserved © 2012 IJARCET
  • 3. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 encryption method can be improvised to provide still stronger protection for verifiers data. 3) Appending of meta data: All the meta data bit blocks that are generated using the above procedure are to be concatenated together. This concatenated Meta data should be appended to the file F before storing it at the cloud server. The file F along with the appended meta data e F is archived with the cloud. Figure 4 shows the encrypted e file F after appending the meta data to the data file F . Figure 2 A data file F with 6 data blocks B. Verification phase IV. A INFORMAION CORRECTNESS PROOF IN Let the verifier V w a n t to verify the integrity of the file CLOUD F . It throws a challenge to the archive and asks it to respond. The challenge and the response are compared and In this ICCC approach the user should route and create the verifier accepts or rejects the integrity proof. suitable Meta data which is used in the later verification Suppose the verifier wishes to check the integrity of nth stage before storing the information file at the cloud storage block. The verifier challenges the cloud storage server by the user queries the cloud data storage for proper replies for checking the correctness of the information which it concludes the correctness of its information stored in the client. A. Setup phase Let the verifier V wishes to the store the file F with the archive. Let this file F consist of n file blocks. We initially preprocess the file and create metadata to be appended to the file. Let each of the n data blocks have m Figure 3 A data block with random bits selected in the file F bits in them. A typical data file F w h i c h the client wishes to store in the cloud is shown in Figure 2. The initial setup phase can be described in the following steps 1) Generation of meta-data: Let g be a function defined as fllows g(i, j) → {1..m}, i ∈ {1..n}, j ∈ {1..k} (1) Where k is the number of bits per data block which we wish to read as meta data. The function g generates for Figure 4 The encrypted file F which will be stored in the cloud. each block a set of k bit positions within the m bits that are in the data block. Hence g(i, j) gives the j th bit in the Specifying the block number i and a bit number j generated by using the function g which only the verifier ith data block. The value of k is in the choice of the knows. The verifier also specifies the position at which verifier and is a secret known only to him. Therefore for the meta data corresponding the block i is appended. each data block we get a set of k bits and in total for all This meta data will be a k-bit number. Hence the cloud the n blocks we get storage server is required to send k+1 bits for verification n ∗ k bits. Let mi represent the k bits of Meta data for the by the client. The Meta data sent by the cloud is decrypted by using ith the number αi and the corresponding bit in this decrypted block. Figure 3 shows a data block of the file F with random Meta data is compared with the bit that is sent by the cloud. bits selected using the function g. Any mismatch between the two would mean a loss of the 2) Encrypting the meta data: Each of the meta data integrity of the client’s at the cloud storage. from the data blocks mi is encrypted by using a suitable V. CONCLUSION algorithm to give a new modified meta data Mi . Without loss of generality we show this process by using In this paper we have proposed ICCC approach to a simple XOR operation. Let h be a function which facilitate the client (user) in getting information correctness generates k bit integer αi for each i. This function is a which he wishes to store in the cloud servers with bare secret and is known only to the verifier V. minimum costs and efforts. Our approach was developed to reduce the computational and storage overhead of the h : i → αi , αi ∈ {0..2n } (2) customer as well as to minimize the computational overhead of the cloud storage server. We also minimized the size For the meta data (mi ) of each data block the number αi of the proof of data integrity so as to reduce the network is added to get a new k bit number Mi . bandwidth consumption. At the client we only store two Mi = mi + αi (3) functions, the bit generator function g, and the function h which is used for encrypting the data. Hence the storage at In this way we get a set of n new meta data bit blocks. The the client is very much minimal compared to all other 236 All Rights Reserved © 2012 IJARCET
  • 4. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 schemes [4] that were developed. Hence this scheme proves advantageous to thin clients like PDAs and mobile phones It should be noted that our approach applies to static storage of information and also dynamic storage information. Also the number of queries that can be asked by the client is fixed apriori. But this number is quite large and can be sufficient if the period of data storage is short. It will be a challenge to increase the number of queries using this scheme. REFERENCES [1] E . Mykletun, M. Narasimha, and G. Tsudik, “Authentication and integrity in outsourced databases,” Trans. Storage, vol. 2, no. 2, pp. 107– 138, 2006. [2] D . X. Song, D. Wagner, and A. Perrig, “Practical techniques for searches on encrypted data,” in SP ’00: Proceedings of the 2000 IEEE Symposium on Security and Privacy. Washington, DC, USA: IEEE Computer Society, 2000, p. 44. [3] A. Juels and B. S. Kaliski, Jr., “Pors: proofs of retrievability for large files,” in CCS ’07: Proceedings of the 14th ACM conference on Computer and communications security. New York, NY, USA: ACM, 2007, pp. 584–597. [4] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable data possession at untrusted stores,” in CCS ’07: Proceedings of the 14th ACM conference on Computer and communica- tions security. New York, 237 All Rights Reserved © 2012 IJARCET