SlideShare a Scribd company logo
1 of 5
Download to read offline
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, Issue 7, July 2013
www.ijarcet.org
2236

Abstract— Cloud Computing is the arising technology that
delivers software, platform and infrastructure as a service
over a network. Cloud minimizes the burden of users by
allowing them to remotely store their data and eliminates the
need of local storage and maintenance. Even though benefits
are higher but while storing data in cloud, correctness of data
and security are major concerns as there are many chances for
CSP to behave unfaithfully towards users regarding the status
of their outsourced data. In order to overcome the threat of
integrity, user can entrust third party auditor to assess the risk
of outsourced data when needed .For this, in our proposed
scheme we are using SHA-2 which is cryptographic hash
function to verify integrity of data along with XOR
mechanism, Station-to-Station key protocol for key generation
and mutual authentication with TPA.
Index Terms— Audit, Cloud, Integrity, Station to Station
Protocol, SHA-2, Third Party Auditor, XOR
I. INTRODUCTION
Cloud computing is a forthcoming revolution in IT industry
due to its advantages-on demand service, location
independent resource pooling, rapid resource elasticity and
usage based pricing. Cloud Computing is collection of
scalable and virtualized resources and provide service based
on pay-as-you-use strategy.
Cloud services are broadly divided into three categories as
shown in figure 1:
1. SaaS (Software as a Service) – SaaS is a model of
software deployment that enables software to be delivered
from host source over the network as opposed to installations
or implementations.
2. PaaS (Platform as a Service)-This is a model in which
operating system and middleware services are provided to
the consumer by the cloud.
3. IaaS (Infrastructure as a Service)- This is a model in
which service provider delivers the entire infrastructure as a
service including storage, hardware, servers and networking
Manuscript received July, 2013.
Jaspreet Kaur, Student, M..Tech (Computer Science and Engineering
Department)RIMT-IET(Punjab Technical University), Mandi Gobindgarh ,
India, 9646851670.
Jasmeet Singh, Assistant Professor, Computer Science and Engineering
Department, RIMT-IET(Punjab Technical University), Mandi Gobindgarh ,
India, 9888265592,
components.[7]
Figure 1. Cloud Service Models
From user’s perspective, including both individuals and
enterprises, outsourcing data in the cloud in a flexible
on-demand manner as shown in figure 2 brings appealing
benefits-
 Relief of the burden of the storage management.
 Universal data access with independent geographical
locations.
 Avoidance of capital expenditure on hardware, software
and personnel maintenance.
Figure 2. Data Outsourcing in Cloud
However, outsourcing data brings new challenging security
issues.
Monitoring Data Integrity while using TPA
in Cloud Environment
Jaspreet Kaur, Jasmeet Singh
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, Issue 7, July 2013
2237
www.ijarcet.org
 Data integrity
 Unfaithful cloud service provider
The first issue is data integrity. In computer security, data
integrity can be defined as “the state that exists when
computerized data is the same as that in the source document
and has not been exposed to accidental or malicious
alterations or destruction”. Integrity of data stored at the
entrusted cloud server is not guaranteed.
The second issue is unfaithful cloud server providers
(CSP). There are many reasons why CSPs are not always
trustworthy like, for saving money and storage space, CSPs
maydiscard the data that has not been accessed for long time
(which belongs to ordinary client) or sometimes even hide
data losses or corruptions to maintain a reputation.[1]
To ensure integrity of outsourced data, data owner delegate
the auditing task to trusted third party auditor. The persona
of TPA is listed as follows-
 Reduces the owner burden in managing the data.
 Ensure the client that the data stored in the cloud is intact
and data integrity is maintained.
 Aid in achieving high economies of scale through
customer satisfaction.[5]
The TPA is an independent authority that has expertise and
capabilities to monitor the integrity of cloud data outsourced
by the following two fundamental requirements have to be
met:
1. TPA should be able to audit the cloud data storage
efficiently without asking for the local copy of data thereby
reducing the on-line burden of cloud users.
2. The third party auditor informs user about data
corruption or loss, if any. To securely introduce an effective
third party auditor (TPA), the auditing process should not
affect user data privacy.[1]
Figure 3 represents the cloud data storage service which
consists of three different entities: Users, Cloud Storage
Server, Third Party Auditor (TPA).
1. User: Users are the data owners who have the large
amount of data to be stored in the cloud and relies on cloud
storage server for data computation and maintenance, can be
either individual consumers or organizations.
2. Cloud Storage Server: A cloud storage server (CSS) is
an entity that is managed by cloud service provider (CSP). It
provides space to the user for data storage and computation.
3. Third Party Auditor (TPA): An TPA is an entity who
has expertise and capabilities that user don’t have, is trusted
to access or expose the risk of cloud storage services on
behalf of client upon request.[8]
Figure3. Architecture of cloud data storage service
II. PROBLEM FORMULATION
When we talk about Cloud Security, maintaining data
integrity is one of the most important and difficult task. In
this case, user cannot trust cloud service provider to handle
the data byhimself as he himself can modifythe original data
and integrity may be lost. If any intruder attacks and steals
the data and modifies it then in some cases the modification
is not even noticed by the cloud server. So in this case, user
can rely on a trusted (authenticated) third party auditor to
check for the integrity of his data. For this, strong
cryptographic hash function is required by the auditor to
check for integrity of cloud data.
III. PROPOSED WORK PLAN
For ensuring the integrity of the data we will be using
combination of three approaches-
 Station-to-Station protocol (based on Diffie-Hellman
key exchange algorithm) generates mutual key which is
known to both user and auditor. It also provides entity
authentication to both.
 Exclusive-OR (XOR) to perform a xor operation
between the message and the key generated using
Station-to-Station protocol.
 Secure Hashing Algorithm (SHA-2) to generate a digest
by passing the original message to the hash function. This is
done by both the user and the auditor and the value obtained
from the hash function by both of them is compared and
hence the data integrity is verified.
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, Issue 7, July 2013
www.ijarcet.org
2238
Figure 4. Methodology
According to figure 4, the steps are as follows-
1. A secret key generated using STS protocol(that is known
to both user and auditor).Also, mutual authentication is
done using this protocol.
2. XOR operation is done between the data and the key
generated to create cipher text which is stored in cloud.
3. Separately the data is passed in a hash function (using
SHA-2) and the hash value is obtained by the user.
4. Auditor gets the cipher text from the cloud and performs
an XOR operation with the secret key generated by the
station to station protocol and gets a plain text.
5. Auditor passes this plain text to the same hash function
(using SHA2) and obtains a hash value.
6. He then compares this hash value with the hash value
received from the user .If both the values are identical
then the data integrity is maintained else data is
tampered.
1. ALGORITHMS
1. STS protocol
Key exchange should be linked to authentication so that a
party has assurances that an exchanged key (which might be
used to facilitate privacy or integrity and thus keep
authenticity alive) is in fact shared with the authenticated
party, and not an impostor .Station-to-Station (STS)
Protocol is efficient authenticated key exchange protocol.
The STS protocol consists of Diffie-Hellman key
establishment followed by an exchange of authentication
signatures.
SET UP-
 In the basic version of the protocol, we assume that the
parameters used for the key establishment (i.e., the
specification of a particular cyclic group and the
corresponding primitive element α) are fixed and known to
all users.
 Also, the public portion of this key pair may be shared
prior to session establishment.
STEPS-
1) The protocol begins with one party, Alice, creating a
random number x and sending the exponential αx to the
other party, Bob .
2) Bob creates a random number y and uses Alice’s
exponential to compute the exchanged key K = (αx)y. Bob
responds with the exponential αy and a token consisting of
his signature on the exponentials, encrypted with K using a
suitable symmetric encryption algorithm E (i.e., EK(sB{ αy,
αx })).
3) Alice computes K, decrypts the token using K, and verifies
Bob’s signature using Bob’s public key. Alice sends to Bob
her corresponding encrypted signature on the exponentials,
EK(sA{ αx, αy }).
4) Finally, Bob similarly verifies Alice’s encrypted signature
using K and Alice’s public key.
Alice and Bob are now mutually authenticated and have a
shared secret. This secret, K, can then be used to encrypt
further communication.[6] The basic form of the protocol is
formalized in the following three steps:
(1) Alice → Bob: αx
(2) Alice ← Bob: αy, EK (sB{ αy, αx })
(3) Alice → Bob: EK (sA{ αx, αy })
1. Exclusive OR Operation
XOR is an operation in which same bits produce a resultant
bit as 0 whereas different bits produce a resultant 1. In this, a
XOR operation is done at original text along with secret
value which gives cipher text. The original text can be
obtained byperforming an XOR operation between the secret
key and resultant cipher text.[4]
2. SHA-2
This family of hashing algorithms known as SHA-2, use
larger digest messages than SHA-1, making them more
resistant to possible attacks and allowing them to be used
with larger blocks of data, up to 2
128
bits, e.g. in the case of
SHA512. The SHA-2 hashing algorithms are same for
SHA256, SHA224, SHA384, and SHA512 hashing
functions, differing only in the size of the operands, the
initialization vectors, and the size of the final digest
message.
The figure 5 describes the SHA-2 algorithm applied to the
SHA256 hash function.
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, Issue 7, July 2013
2239
www.ijarcet.org
Figure 5. SHA-2 Round Calculation
The SHA256 Hash function produces a final digest message
of 256 bits, that is dependent of the input message, composed
by multiple blocks of 512 bits each. [3]
1) Message Padding and Parsing
The binary message to be processed is appended with a ‘1’
and padded with zeros until its length ≡ 448 mod 512. The
original message length is then appended as a 64-bit binary
number. The resultant padded message is parsed into N
512-bit blocks, denoted M (1)
, M (2)
, ……. M (N)
. These M (i)
message blocks are passed individually to the message
expander.
2) Message Expander
The message expander (also called the message scheduler)
takes each M (i)
and expands it into 64 32-bit Wt blocks.[2]
3) Message Compression
The Wt words from the message expansion stage are then
passed to the SHA compression function, or the ‘SHA core’.
The input block is expanded and fed to the 64 cycles of the
SHA256 function in words of 32 bits each ( denoted by Wt).
In each cycle or round of the SHA-2 algorithm the
introduced data is mixed with the current state. This data
scrambling is performed by additions and logical operations,
such as bitwise logical operations and bitwise rotations. The
computational structure of each round of this algorithm is
depicted in Figure. The value W is the 32-bit data word, for
the t round, and the Kt value represents the 32-bit constant
that also depends on the round.
The 32-bit values of the A to H variables are updated
in each round and the new values are used in the following
round. The initial values of these variables is given by the
256-bit constant value, this value is only set for the first data
block. The consecutive data blocks use the intermediate hash
value, computed for the previous data block. Each 512 data
block is processed for 64 rounds, after which the values of
the variables A to H are added to the previous digest
message, in order to obtain partial digest message. To better
illustrate this algorithm a pseudo code representation is
depicted in table 1.
for each data block i do
W = expand(data block)
A = DM0; B = DM1; C = DM2; D = DM3
E = DM4; F = DM5; G = DM6; H = DM7
for t= 0, t≤ 63 {79}, t=t+1 do
T1= H + 1(E) + Ch(E, F, G) + Kt+ Wt
T2= 0 (A) + Maj(A, B, C)
H = G ; G = F ; F = E ;
E = D + T1
D = C ; C = B ; B = A
A = T1+ T2
end for
DM0= A + DM0; DM1= B + DM1
DM2= C + DM2; DM3= D + DM3
DM4= E + DM4; DM5= C + DM5
DM6= D + DM6; DM7= E + DM7
end for
Table 1.Pseudocode for SHA-2
The final Digest Message (DM) for a given data stream, is
given by the result of the last data block.[3]
IV. CONCLUSION
Cloud Computing is an emerging commercial paradigm that
promises to eliminate the need for maintaining expensive
hardware. As market grows threat on data also grows. In this
paper to ensure that our data are intact we addressed the
construction of an efficient audit service where user can
delegate the integritychecking task to third party auditor and
be worry-free to use cloud storage services. We believe that
advantages of proposed scheme will shed light on economies
of scale of cloud computing.
REFERENCES
[1] Jaspreet Kaur, Jasmeet Singh, “Survey on Efficient Audit Service to ensure
Data Integrity in Cloud Environment”, Global Journal of Computer Science
and Technology (GJCST), Vol. 13, Issue 4, 2013
[2] Robert P. McEvoy, Francis M. Crowe, Colin C. Murphy and William P.
Marnane, “Optimisation of the SHA-2 Family of Hash Functions on FPGAs”,
IEEE Emerging VLSI Technologies and Architectures, Vol. 00, 2-3 March
2006.
[3] Ricardo Chaves, Leonel Sousa, “Improving SHA-2 Hardware
Implementation”, International Association for Cryptographic Research, 2008.
[4] K.Govinda, E.Sathiyamoorthy, “Data Auditing in Cloud Environment
using Message Authentication Code”, International Conference on Emerging
Trends on Advanced Engineering Research(ICETT),2012.
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, Issue 7, July 2013
www.ijarcet.org
2240
[5] Miss. M.Sowparnika, Prof.R. Dheenadayalu, “Improving Data Integrity on
Cloud Storage Services”, International Journal of Engineering Science
Invention (IJESI), Vol. 2, Issue 2,February 2013.
[6] Whitfield Diffie, Michael J. Wiener, “Authentication and Authenticated
Key Exchanges”, Appeared in Designs, Codes and Cryptography, 2, 107-125
(1992), Kluwer Academic Publishers
[7] Shobha Rajak, Ashok Verma, “Secure Data Storage in the Cloud using
Digital Signature Mechanism”, International Journal of Advanced Research in
Computer Engineering and Technology, Vol. 1, Issue 4, June 2012.
[8] B.Dhiyanesh, A.Thiyagarajan, “A Novel Third Party Auditability and
Dynamic Based Security in Cloud Compuitng”, International Journal of
Advanced Research in Technology(IJART), Vol. 1, Issue 1, 2011.
[9] Reenu Sara Georeg, Sabitha S,” Survey on Data Integrity in Cloud
Computing”, International Journal of Advanced Research in Computer
Engineering & Technology (IJARCET) Vol. 2, Issue 1, January 2013.
[10] http://en.wikipedia.org/wiki/Station-to-Station_protocol

More Related Content

What's hot

IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET-  	  A Survey on Searching of Keyword on Encrypted Data in Cloud using ...IRJET-  	  A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...IRJET Journal
 
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET Journal
 
Perceiving and recovering degraded data on secure cloud
Perceiving and recovering degraded data on secure cloudPerceiving and recovering degraded data on secure cloud
Perceiving and recovering degraded data on secure cloudIAEME Publication
 
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC AlgorithmIRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC AlgorithmIRJET Journal
 
Achieving Secure And Scalable Cloud computing
Achieving Secure And Scalable Cloud computingAchieving Secure And Scalable Cloud computing
Achieving Secure And Scalable Cloud computingKiran Girase
 
Secure Access to Outsourced Databases
Secure Access to Outsourced DatabasesSecure Access to Outsourced Databases
Secure Access to Outsourced DatabasesIOSR Journals
 
Building confidential and efficient query services in the cloud with rasp dat...
Building confidential and efficient query services in the cloud with rasp dat...Building confidential and efficient query services in the cloud with rasp dat...
Building confidential and efficient query services in the cloud with rasp dat...eSAT Journals
 
Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...eSAT Journals
 
Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...eSAT Publishing House
 
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHMDATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHMijsrd.com
 
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET -  	  A Secure AMR Stganography Scheme based on Pulse Distribution Mode...IRJET -  	  A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...IRJET Journal
 
Remote data integrity checking with a third party auditor in public cloud usi...
Remote data integrity checking with a third party auditor in public cloud usi...Remote data integrity checking with a third party auditor in public cloud usi...
Remote data integrity checking with a third party auditor in public cloud usi...IJSRED
 
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
 IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET - Efficient and Verifiable Queries over Encrypted Data in CloudIRJET Journal
 
IRJET-Efficient Revocation and Secure Attribute-Based Proxy Re-Encryption Scheme
IRJET-Efficient Revocation and Secure Attribute-Based Proxy Re-Encryption SchemeIRJET-Efficient Revocation and Secure Attribute-Based Proxy Re-Encryption Scheme
IRJET-Efficient Revocation and Secure Attribute-Based Proxy Re-Encryption SchemeIRJET Journal
 
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentInsuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentEditor IJCATR
 
IRJET- Anchoring of Cloud Information under Key Presentation
IRJET- Anchoring of Cloud Information under Key PresentationIRJET- Anchoring of Cloud Information under Key Presentation
IRJET- Anchoring of Cloud Information under Key PresentationIRJET Journal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Ensuring Distributed Accountability for Data Sharing Using Reversible Data Hi...
Ensuring Distributed Accountability for Data Sharing Using Reversible Data Hi...Ensuring Distributed Accountability for Data Sharing Using Reversible Data Hi...
Ensuring Distributed Accountability for Data Sharing Using Reversible Data Hi...IOSR Journals
 
Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
Oruta: Privacy-Preserving Public Auditing for Shared Data in the CloudOruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
Oruta: Privacy-Preserving Public Auditing for Shared Data in the CloudMigrant Systems
 

What's hot (20)

IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET-  	  A Survey on Searching of Keyword on Encrypted Data in Cloud using ...IRJET-  	  A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
 
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
 
Perceiving and recovering degraded data on secure cloud
Perceiving and recovering degraded data on secure cloudPerceiving and recovering degraded data on secure cloud
Perceiving and recovering degraded data on secure cloud
 
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC AlgorithmIRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
 
Achieving Secure And Scalable Cloud computing
Achieving Secure And Scalable Cloud computingAchieving Secure And Scalable Cloud computing
Achieving Secure And Scalable Cloud computing
 
Secure Access to Outsourced Databases
Secure Access to Outsourced DatabasesSecure Access to Outsourced Databases
Secure Access to Outsourced Databases
 
Building confidential and efficient query services in the cloud with rasp dat...
Building confidential and efficient query services in the cloud with rasp dat...Building confidential and efficient query services in the cloud with rasp dat...
Building confidential and efficient query services in the cloud with rasp dat...
 
Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...
 
Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...
 
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHMDATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
 
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET -  	  A Secure AMR Stganography Scheme based on Pulse Distribution Mode...IRJET -  	  A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
 
Remote data integrity checking with a third party auditor in public cloud usi...
Remote data integrity checking with a third party auditor in public cloud usi...Remote data integrity checking with a third party auditor in public cloud usi...
Remote data integrity checking with a third party auditor in public cloud usi...
 
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
 IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
 
IRJET-Efficient Revocation and Secure Attribute-Based Proxy Re-Encryption Scheme
IRJET-Efficient Revocation and Secure Attribute-Based Proxy Re-Encryption SchemeIRJET-Efficient Revocation and Secure Attribute-Based Proxy Re-Encryption Scheme
IRJET-Efficient Revocation and Secure Attribute-Based Proxy Re-Encryption Scheme
 
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentInsuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud Environment
 
J0423066069
J0423066069J0423066069
J0423066069
 
IRJET- Anchoring of Cloud Information under Key Presentation
IRJET- Anchoring of Cloud Information under Key PresentationIRJET- Anchoring of Cloud Information under Key Presentation
IRJET- Anchoring of Cloud Information under Key Presentation
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Ensuring Distributed Accountability for Data Sharing Using Reversible Data Hi...
Ensuring Distributed Accountability for Data Sharing Using Reversible Data Hi...Ensuring Distributed Accountability for Data Sharing Using Reversible Data Hi...
Ensuring Distributed Accountability for Data Sharing Using Reversible Data Hi...
 
Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
Oruta: Privacy-Preserving Public Auditing for Shared Data in the CloudOruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
 

Similar to Ijarcet vol-2-issue-7-2236-2240

IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET Journal
 
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud DataA Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud DataIRJET Journal
 
Security Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party AuditorSecurity Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party Auditorijsrd.com
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Towards Secure and Dependable Storage Services in Cloud Computing
Towards Secure and Dependable Storage Services in Cloud  Computing Towards Secure and Dependable Storage Services in Cloud  Computing
Towards Secure and Dependable Storage Services in Cloud Computing IJMER
 
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingIRJET Journal
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...Editor IJCATR
 
Detecting Password brute force attack and Protecting the cloud data with AES ...
Detecting Password brute force attack and Protecting the cloud data with AES ...Detecting Password brute force attack and Protecting the cloud data with AES ...
Detecting Password brute force attack and Protecting the cloud data with AES ...IRJET Journal
 
IRJET - Virtual Data Auditing at Overcast Environment
IRJET - Virtual Data Auditing at Overcast EnvironmentIRJET - Virtual Data Auditing at Overcast Environment
IRJET - Virtual Data Auditing at Overcast EnvironmentIRJET Journal
 
IRJET - Providing High Securtiy for Encrypted Data in Cloud
IRJET -  	  Providing High Securtiy for Encrypted Data in CloudIRJET -  	  Providing High Securtiy for Encrypted Data in Cloud
IRJET - Providing High Securtiy for Encrypted Data in CloudIRJET Journal
 
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudIJTET Journal
 
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...IJSRD
 
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET Journal
 
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET-  	  Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET-  	  Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET Journal
 
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudeSAT Publishing House
 
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudeSAT Journals
 
Enhanced Security Through Token
Enhanced Security Through TokenEnhanced Security Through Token
Enhanced Security Through TokenIRJET Journal
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET Journal
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
 

Similar to Ijarcet vol-2-issue-7-2236-2240 (20)

IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
 
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud DataA Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
 
Security Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party AuditorSecurity Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party Auditor
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Towards Secure and Dependable Storage Services in Cloud Computing
Towards Secure and Dependable Storage Services in Cloud  Computing Towards Secure and Dependable Storage Services in Cloud  Computing
Towards Secure and Dependable Storage Services in Cloud Computing
 
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
 
Detecting Password brute force attack and Protecting the cloud data with AES ...
Detecting Password brute force attack and Protecting the cloud data with AES ...Detecting Password brute force attack and Protecting the cloud data with AES ...
Detecting Password brute force attack and Protecting the cloud data with AES ...
 
IRJET - Virtual Data Auditing at Overcast Environment
IRJET - Virtual Data Auditing at Overcast EnvironmentIRJET - Virtual Data Auditing at Overcast Environment
IRJET - Virtual Data Auditing at Overcast Environment
 
IRJET - Providing High Securtiy for Encrypted Data in Cloud
IRJET -  	  Providing High Securtiy for Encrypted Data in CloudIRJET -  	  Providing High Securtiy for Encrypted Data in Cloud
IRJET - Providing High Securtiy for Encrypted Data in Cloud
 
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-Cloud
 
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
 
R180203114117
R180203114117R180203114117
R180203114117
 
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
 
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET-  	  Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET-  	  Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
 
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloud
 
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloud
 
Enhanced Security Through Token
Enhanced Security Through TokenEnhanced Security Through Token
Enhanced Security Through Token
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 

More from Editor IJARCET

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationEditor IJARCET
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Editor IJARCET
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Editor IJARCET
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Editor IJARCET
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Editor IJARCET
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Editor IJARCET
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Editor IJARCET
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Editor IJARCET
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Editor IJARCET
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Editor IJARCET
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Editor IJARCET
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Editor IJARCET
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Editor IJARCET
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Editor IJARCET
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Editor IJARCET
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Editor IJARCET
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Editor IJARCET
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Editor IJARCET
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Editor IJARCET
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Editor IJARCET
 

More from Editor IJARCET (20)

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 

Recently uploaded

What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 

Recently uploaded (20)

What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 

Ijarcet vol-2-issue-7-2236-2240

  • 1. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 7, July 2013 www.ijarcet.org 2236  Abstract— Cloud Computing is the arising technology that delivers software, platform and infrastructure as a service over a network. Cloud minimizes the burden of users by allowing them to remotely store their data and eliminates the need of local storage and maintenance. Even though benefits are higher but while storing data in cloud, correctness of data and security are major concerns as there are many chances for CSP to behave unfaithfully towards users regarding the status of their outsourced data. In order to overcome the threat of integrity, user can entrust third party auditor to assess the risk of outsourced data when needed .For this, in our proposed scheme we are using SHA-2 which is cryptographic hash function to verify integrity of data along with XOR mechanism, Station-to-Station key protocol for key generation and mutual authentication with TPA. Index Terms— Audit, Cloud, Integrity, Station to Station Protocol, SHA-2, Third Party Auditor, XOR I. INTRODUCTION Cloud computing is a forthcoming revolution in IT industry due to its advantages-on demand service, location independent resource pooling, rapid resource elasticity and usage based pricing. Cloud Computing is collection of scalable and virtualized resources and provide service based on pay-as-you-use strategy. Cloud services are broadly divided into three categories as shown in figure 1: 1. SaaS (Software as a Service) – SaaS is a model of software deployment that enables software to be delivered from host source over the network as opposed to installations or implementations. 2. PaaS (Platform as a Service)-This is a model in which operating system and middleware services are provided to the consumer by the cloud. 3. IaaS (Infrastructure as a Service)- This is a model in which service provider delivers the entire infrastructure as a service including storage, hardware, servers and networking Manuscript received July, 2013. Jaspreet Kaur, Student, M..Tech (Computer Science and Engineering Department)RIMT-IET(Punjab Technical University), Mandi Gobindgarh , India, 9646851670. Jasmeet Singh, Assistant Professor, Computer Science and Engineering Department, RIMT-IET(Punjab Technical University), Mandi Gobindgarh , India, 9888265592, components.[7] Figure 1. Cloud Service Models From user’s perspective, including both individuals and enterprises, outsourcing data in the cloud in a flexible on-demand manner as shown in figure 2 brings appealing benefits-  Relief of the burden of the storage management.  Universal data access with independent geographical locations.  Avoidance of capital expenditure on hardware, software and personnel maintenance. Figure 2. Data Outsourcing in Cloud However, outsourcing data brings new challenging security issues. Monitoring Data Integrity while using TPA in Cloud Environment Jaspreet Kaur, Jasmeet Singh
  • 2. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 7, July 2013 2237 www.ijarcet.org  Data integrity  Unfaithful cloud service provider The first issue is data integrity. In computer security, data integrity can be defined as “the state that exists when computerized data is the same as that in the source document and has not been exposed to accidental or malicious alterations or destruction”. Integrity of data stored at the entrusted cloud server is not guaranteed. The second issue is unfaithful cloud server providers (CSP). There are many reasons why CSPs are not always trustworthy like, for saving money and storage space, CSPs maydiscard the data that has not been accessed for long time (which belongs to ordinary client) or sometimes even hide data losses or corruptions to maintain a reputation.[1] To ensure integrity of outsourced data, data owner delegate the auditing task to trusted third party auditor. The persona of TPA is listed as follows-  Reduces the owner burden in managing the data.  Ensure the client that the data stored in the cloud is intact and data integrity is maintained.  Aid in achieving high economies of scale through customer satisfaction.[5] The TPA is an independent authority that has expertise and capabilities to monitor the integrity of cloud data outsourced by the following two fundamental requirements have to be met: 1. TPA should be able to audit the cloud data storage efficiently without asking for the local copy of data thereby reducing the on-line burden of cloud users. 2. The third party auditor informs user about data corruption or loss, if any. To securely introduce an effective third party auditor (TPA), the auditing process should not affect user data privacy.[1] Figure 3 represents the cloud data storage service which consists of three different entities: Users, Cloud Storage Server, Third Party Auditor (TPA). 1. User: Users are the data owners who have the large amount of data to be stored in the cloud and relies on cloud storage server for data computation and maintenance, can be either individual consumers or organizations. 2. Cloud Storage Server: A cloud storage server (CSS) is an entity that is managed by cloud service provider (CSP). It provides space to the user for data storage and computation. 3. Third Party Auditor (TPA): An TPA is an entity who has expertise and capabilities that user don’t have, is trusted to access or expose the risk of cloud storage services on behalf of client upon request.[8] Figure3. Architecture of cloud data storage service II. PROBLEM FORMULATION When we talk about Cloud Security, maintaining data integrity is one of the most important and difficult task. In this case, user cannot trust cloud service provider to handle the data byhimself as he himself can modifythe original data and integrity may be lost. If any intruder attacks and steals the data and modifies it then in some cases the modification is not even noticed by the cloud server. So in this case, user can rely on a trusted (authenticated) third party auditor to check for the integrity of his data. For this, strong cryptographic hash function is required by the auditor to check for integrity of cloud data. III. PROPOSED WORK PLAN For ensuring the integrity of the data we will be using combination of three approaches-  Station-to-Station protocol (based on Diffie-Hellman key exchange algorithm) generates mutual key which is known to both user and auditor. It also provides entity authentication to both.  Exclusive-OR (XOR) to perform a xor operation between the message and the key generated using Station-to-Station protocol.  Secure Hashing Algorithm (SHA-2) to generate a digest by passing the original message to the hash function. This is done by both the user and the auditor and the value obtained from the hash function by both of them is compared and hence the data integrity is verified.
  • 3. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 7, July 2013 www.ijarcet.org 2238 Figure 4. Methodology According to figure 4, the steps are as follows- 1. A secret key generated using STS protocol(that is known to both user and auditor).Also, mutual authentication is done using this protocol. 2. XOR operation is done between the data and the key generated to create cipher text which is stored in cloud. 3. Separately the data is passed in a hash function (using SHA-2) and the hash value is obtained by the user. 4. Auditor gets the cipher text from the cloud and performs an XOR operation with the secret key generated by the station to station protocol and gets a plain text. 5. Auditor passes this plain text to the same hash function (using SHA2) and obtains a hash value. 6. He then compares this hash value with the hash value received from the user .If both the values are identical then the data integrity is maintained else data is tampered. 1. ALGORITHMS 1. STS protocol Key exchange should be linked to authentication so that a party has assurances that an exchanged key (which might be used to facilitate privacy or integrity and thus keep authenticity alive) is in fact shared with the authenticated party, and not an impostor .Station-to-Station (STS) Protocol is efficient authenticated key exchange protocol. The STS protocol consists of Diffie-Hellman key establishment followed by an exchange of authentication signatures. SET UP-  In the basic version of the protocol, we assume that the parameters used for the key establishment (i.e., the specification of a particular cyclic group and the corresponding primitive element α) are fixed and known to all users.  Also, the public portion of this key pair may be shared prior to session establishment. STEPS- 1) The protocol begins with one party, Alice, creating a random number x and sending the exponential αx to the other party, Bob . 2) Bob creates a random number y and uses Alice’s exponential to compute the exchanged key K = (αx)y. Bob responds with the exponential αy and a token consisting of his signature on the exponentials, encrypted with K using a suitable symmetric encryption algorithm E (i.e., EK(sB{ αy, αx })). 3) Alice computes K, decrypts the token using K, and verifies Bob’s signature using Bob’s public key. Alice sends to Bob her corresponding encrypted signature on the exponentials, EK(sA{ αx, αy }). 4) Finally, Bob similarly verifies Alice’s encrypted signature using K and Alice’s public key. Alice and Bob are now mutually authenticated and have a shared secret. This secret, K, can then be used to encrypt further communication.[6] The basic form of the protocol is formalized in the following three steps: (1) Alice → Bob: αx (2) Alice ← Bob: αy, EK (sB{ αy, αx }) (3) Alice → Bob: EK (sA{ αx, αy }) 1. Exclusive OR Operation XOR is an operation in which same bits produce a resultant bit as 0 whereas different bits produce a resultant 1. In this, a XOR operation is done at original text along with secret value which gives cipher text. The original text can be obtained byperforming an XOR operation between the secret key and resultant cipher text.[4] 2. SHA-2 This family of hashing algorithms known as SHA-2, use larger digest messages than SHA-1, making them more resistant to possible attacks and allowing them to be used with larger blocks of data, up to 2 128 bits, e.g. in the case of SHA512. The SHA-2 hashing algorithms are same for SHA256, SHA224, SHA384, and SHA512 hashing functions, differing only in the size of the operands, the initialization vectors, and the size of the final digest message. The figure 5 describes the SHA-2 algorithm applied to the SHA256 hash function.
  • 4. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 7, July 2013 2239 www.ijarcet.org Figure 5. SHA-2 Round Calculation The SHA256 Hash function produces a final digest message of 256 bits, that is dependent of the input message, composed by multiple blocks of 512 bits each. [3] 1) Message Padding and Parsing The binary message to be processed is appended with a ‘1’ and padded with zeros until its length ≡ 448 mod 512. The original message length is then appended as a 64-bit binary number. The resultant padded message is parsed into N 512-bit blocks, denoted M (1) , M (2) , ……. M (N) . These M (i) message blocks are passed individually to the message expander. 2) Message Expander The message expander (also called the message scheduler) takes each M (i) and expands it into 64 32-bit Wt blocks.[2] 3) Message Compression The Wt words from the message expansion stage are then passed to the SHA compression function, or the ‘SHA core’. The input block is expanded and fed to the 64 cycles of the SHA256 function in words of 32 bits each ( denoted by Wt). In each cycle or round of the SHA-2 algorithm the introduced data is mixed with the current state. This data scrambling is performed by additions and logical operations, such as bitwise logical operations and bitwise rotations. The computational structure of each round of this algorithm is depicted in Figure. The value W is the 32-bit data word, for the t round, and the Kt value represents the 32-bit constant that also depends on the round. The 32-bit values of the A to H variables are updated in each round and the new values are used in the following round. The initial values of these variables is given by the 256-bit constant value, this value is only set for the first data block. The consecutive data blocks use the intermediate hash value, computed for the previous data block. Each 512 data block is processed for 64 rounds, after which the values of the variables A to H are added to the previous digest message, in order to obtain partial digest message. To better illustrate this algorithm a pseudo code representation is depicted in table 1. for each data block i do W = expand(data block) A = DM0; B = DM1; C = DM2; D = DM3 E = DM4; F = DM5; G = DM6; H = DM7 for t= 0, t≤ 63 {79}, t=t+1 do T1= H + 1(E) + Ch(E, F, G) + Kt+ Wt T2= 0 (A) + Maj(A, B, C) H = G ; G = F ; F = E ; E = D + T1 D = C ; C = B ; B = A A = T1+ T2 end for DM0= A + DM0; DM1= B + DM1 DM2= C + DM2; DM3= D + DM3 DM4= E + DM4; DM5= C + DM5 DM6= D + DM6; DM7= E + DM7 end for Table 1.Pseudocode for SHA-2 The final Digest Message (DM) for a given data stream, is given by the result of the last data block.[3] IV. CONCLUSION Cloud Computing is an emerging commercial paradigm that promises to eliminate the need for maintaining expensive hardware. As market grows threat on data also grows. In this paper to ensure that our data are intact we addressed the construction of an efficient audit service where user can delegate the integritychecking task to third party auditor and be worry-free to use cloud storage services. We believe that advantages of proposed scheme will shed light on economies of scale of cloud computing. REFERENCES [1] Jaspreet Kaur, Jasmeet Singh, “Survey on Efficient Audit Service to ensure Data Integrity in Cloud Environment”, Global Journal of Computer Science and Technology (GJCST), Vol. 13, Issue 4, 2013 [2] Robert P. McEvoy, Francis M. Crowe, Colin C. Murphy and William P. Marnane, “Optimisation of the SHA-2 Family of Hash Functions on FPGAs”, IEEE Emerging VLSI Technologies and Architectures, Vol. 00, 2-3 March 2006. [3] Ricardo Chaves, Leonel Sousa, “Improving SHA-2 Hardware Implementation”, International Association for Cryptographic Research, 2008. [4] K.Govinda, E.Sathiyamoorthy, “Data Auditing in Cloud Environment using Message Authentication Code”, International Conference on Emerging Trends on Advanced Engineering Research(ICETT),2012.
  • 5. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 7, July 2013 www.ijarcet.org 2240 [5] Miss. M.Sowparnika, Prof.R. Dheenadayalu, “Improving Data Integrity on Cloud Storage Services”, International Journal of Engineering Science Invention (IJESI), Vol. 2, Issue 2,February 2013. [6] Whitfield Diffie, Michael J. Wiener, “Authentication and Authenticated Key Exchanges”, Appeared in Designs, Codes and Cryptography, 2, 107-125 (1992), Kluwer Academic Publishers [7] Shobha Rajak, Ashok Verma, “Secure Data Storage in the Cloud using Digital Signature Mechanism”, International Journal of Advanced Research in Computer Engineering and Technology, Vol. 1, Issue 4, June 2012. [8] B.Dhiyanesh, A.Thiyagarajan, “A Novel Third Party Auditability and Dynamic Based Security in Cloud Compuitng”, International Journal of Advanced Research in Technology(IJART), Vol. 1, Issue 1, 2011. [9] Reenu Sara Georeg, Sabitha S,” Survey on Data Integrity in Cloud Computing”, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Vol. 2, Issue 1, January 2013. [10] http://en.wikipedia.org/wiki/Station-to-Station_protocol