SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 722
Development of Effective Audit Service to Maintain Integrity of
Migrated Data in Cloud
Shekhar S. Kausalye1, Prof. P.N. Kalavadekar2
1 PG Student, Dept. of Computer Engineering, SRES COE, Kopargaon, Pune University, MH, INDIA
2 Associate Professor, Dept. of Computer Engineering, SRES COE, Kopargaon, Pune University, MH, INDIA
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Cloud based service for storage of
outsource data reduces the burden of user for storage
management & maintenance, this is achieved because
cloud service provides low-cost, expandable &
geographically location independent platform. But
client has risk of missing or corrupted data as the local
copy is not available at client side. To avoid this security
risk audit service must ensure the integrity of data. PDP
technique which is used for verifying the integrity of
data can be used to understand the audit service. A PDP
protocol can be constructed using the interactive zero
knowledge system to prevent the fraud of prover as well
as leakage of verified data. This can be proved that the
protocol can persists these properties with the help of
Diffie-Hellman assumption. The mechanism can be
proposed to reduce cost of audit and to detect
misbehaviour with the help of related queries &
periodic verification.
Key Words: security, interactive proof system, cloud
storage, Audit Service, Provable Data Possession, etc…
1. INTRODUCTION
Cloud computing is growing service for current
information technology. IT provides scalable environment
for ever increasing amount of data & processes which
work on various application & services by using on-
demand self-services. The important advantage of cloud
computing paradigm is that data cam be outsourced and
centralized at different location called as clouds. This kind
of outsourced data storage service is becoming profitable
business because of flexible, low-cost, location-
independent platform to manage user data.
The burden of storage management & maintenance is
reduced by Cloud Storage Service (CSS). But if this
important service is susceptible to failure of attacks then
this will be causing the irretrievable loss of user data as
this data is not available locally with user. This risk can be
caused due to: cloud infrastructure is vulnerable to
security threats from within and outside of cloud [2]; the
Cloud Service Providers (CSP) can behave untruthfully for
cloud users [3]; also, the different opinion may be there
because of faithfulness of CSP. Accordingly, their
behaviour is unknown for different clients even though
this may result from user’s incorrect actions [4]. Because
of all these reasons its cloud service provider
responsibility to issue an efficient audit service so that the
integrity and data availability can be verified on cloud data
[5].
There are various traditional cryptographic technologies
are available for data integrity and availability which are
based on hash function and signature schemes [6][7]. But
these technology does not work on outsourced data as
they must have the local copy of data to perform the audit.
As well as this process is not feasible to perform the
validation by downloading data because of expensive
transaction if file size is large. Also to perform the audit in
cloud environment is difficult and costly for the users [8].
Therefore, it is important to understand the public
auditability for CSS, because of which users may use or
take help of Third Party Auditor (TPA). This TPA is expert
and has capabilities that user don’t have to perform the
audit on outsourced data.
For this auditability the concept of Proof of Retrievability
[9] commonly called as POR and Provable Data Possession
[10] (POP) is given by researchers. Probabilistic proof
techniques approach is used by them to show that user’s
data remain intact without downloading it, and this is
called as “Verification without Downloading.” Anyone can
use the verification protocol to prove the availability of
data using PDP or POR scheme. Hence this fulfils the
requirement of public auditability. These schemes are
developed around and untrusted storage which offer to
check the very large amount of data.
Various existing scheme does not give the security proof
against Cloud Service Provider’s fraud and counterfeits as
well as information leakage. These problems reduce the
impact of cloud audit service. Because of this new model of
framework must be proposed that enables the security of
public verification protocol in audit service.
The performance of audit service is depending on the
three aspects which are:
• How to design an efficient architecture of audit
system that reduce the storage and network
overheads and also enhance the security of audit
activities;
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 723
• How to provide an efficient audit scheduling to
help provide a more cost-effective audit service;
• How to optimize parameters of audit systems to
minimize the computation overheads of audit
services.
Quality of service can be improved by solving above
problems and it also help to detect irregularities and
requires less resources.
2. EASE OF USE
Various researchers worked on the untrusted outsourced
data. The simplest and easy way to implement the
integrity control is to use cryptographic hash function.
Yumerefendi [7] and Hsiao[6] proposed a solution for
authenticated network storage, Merkle tree also called as
hash tree as the fundamental data structure, but their
update process is costly. Fu [11] implemented & described
the method for securely accessing a read only file system
which is distributed among the various providers. This is
the solution for efficiently authenticating operation on
outsourced data or file.
The work done by Li[12], Ma[13], Xie[14], Yavuz[5]
considered the problem of how to audit the integrity of
outsourced data or database. From these Li & Xie used the
concept of Markle tree to audit the completeness of query
result, but in some cases the overhead is high that weaken
the benefits of database outsourcing. Some researchers
proposed two schemes called PDP & POR to check the
integrity of stored data without downloading it. Ateniese
proposed the Provable Data Possession model to ensure
the possession of file on untrusted storage and also
provides the RSA based scheme that achieves O(1)
communication cost. Anyone other than owner can
challenge the server for data possession using the publicly
verifiable version.
The dynamic PDP solution called scalable PDP [15] is
developed by the Ateniese. This is achieved using the
Lightweight PDP scheme which used cryptographic Hash
function & symmetric key encryption, but server can
victimize the user as lack of randomness in the challenge
in previous response. The number of updates and
challenges is fixed and limited. By studying this work
Erway has proposed two dynamic PDP [16] scheme using
Hash function tree to cognize O(log n) communication and
computation cost of data (file) which contain n blocks. The
drawback of SPDP is simple scheme called DPDP-I and in
the “block-less scheme’ which is generally called as DPDP-
II the data block can be leaked by response given to
challenge.
But Juels presented the POR [9] scheme which greatly
cognize of pre-processing steps of the client which are
followed before sending the file or data to Cloud Service
Provider. The main drawback of this scheme is that these
operation restricts the updating of data. Shacham &
Waters [17] presented and efficient version of this
protocol which is called Compact POR, this protocol uses
harmonic property to aggregate a proof into O(1)
authenticator value and O(t) computation cost where t is
challenge blocks, but the drawback of this is that its
solution is static and there is leakage of data blocks in the
verification process.
3. LITERATURE SURVEY
Audit system architecture for outsourced data in cloud is
shown in Fig. 1. This architecture work in audit service
outsourcing mode. This architecture contains four entities:
1. Data Owner (DO): The user who want to store
large amount of data to the cloud;
2. Cloud Service Provider (CSP): CSP provides data
storage service and has storage space and
computation resources;
3. Third Party Auditor (TAP): TPA has capabilities to
manage of monitor outsources data under the
deputation of data owner;
Granted Application (GA): GA has rights to access &
manipulate stored data. These application can be either
inside the cloud or outside the cloud. This depends on the
specific requirement.
Fig-1. Audit System Architecture for Cloud Computing
Audit service based on TPA works in the following way.
This also help to describe our audit service as follows:
1. Client uses the secret key sk for preprocessing of
the file, file contains collection of n blocks, then it
generates public verification information which is
stored in TPA, after this the file is transmitted
with some verification tags to Cloud Service
Provider, user can then delete the local copy of
this data;
2. Afterword, using protocol called as proof of
retrievability, TPA check the integrity and
availability of the outsourced data. It is important
to generate an alarm for suspicious activity or
events. [1].
This is also known as audit service outsourcing because
verification of data integrity can be implemented by TPA
without taking help of data owner. Here data owner and
granted clients dynamically interact with Cloud Service
Provider to access or update their own data for various
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 724
application purposes. However, we cannot trust CSP for
security of stored data, neither can we assume that data
owner is able to collect the evidences against CSP for CSPs
fault when errors occur. Because of these reasons, TPA,
which act as a Trust Third Party (TTP), is used to make
sure the security of stored data. We can say that the TPA is
reliable as well as independent, and hence it has no
motivation to conspire with the CSP or clients at the time
of auditing process:
1. TPA must regularly check the integrity and
availability of data at appropriate intervals;
2. TPA must be able to take evidences for various
disagreements about inconsistency of the data in
terms of authentic records for all the data
operations.
4. IMPLEMENTATION
In this proposed audit architecture, main idea is, to
maintain security of Third Party Auditor so that we can
guarantee the credibility of cloud storage. Because it is
easy to ensure the security of Trust Third Party Auditor
than maintaining the security of whole cloud. Hence, Third
Party Auditor is the root or basis of trust in clouds. The
protocol design must achieve following security and
performance guarantees:
 Audit without downloading: Allow Third Party
Auditor or clients with the help of Third Party
Auditor to verify correctness of data whenever
necessary without downloading the copy of data;
 Verification correctness: to ensure there is no
cheating of CSP that can clear or grant the audit
from Third Party Auditor without storing user’s
data intact;
 Privacy-preserving: to ensure that there is no
alternate way for Third Party Auditor to derive
user’s data from information collected during the
audit operation; and
 High-performance: to allow Third Party Auditor
to perform auditing but with minimum overheads
for storage, communication and computation [1]
In this proposed audit architecture, main idea is, to
maintain security.
4.1 Design
A cryptographic interactive audit scheme is used to
support the audit service. This scheme is also called as
interactive PDP (IPDP). A standard model of interactive
proof system is used to construct this scheme, because this
ensures the confidentiality of secret data also called as
zero-knowledge property & the undeceivability of invalid
tags called as soundness property.
Definition Collision Resistance Hash: A hash family H is (t,
ε) collision resistance if no t-time advantage at least ε in
breaking the collision resistance of H [1]. The system is
setup using bilinear pairing proposed by Boneh & Franklin
[18]. Let be two multiplicative groups using elliptic
curve convention with large prime order p. A function e
can be bilinear map which can be computed as: e:
.
This has following properties: for any G, H ε & all a, b ε
, we have the following –
1. Bilinearity: e([a]G; [b]H) = e(G; H) ab1:
2. Non-degeneracy: e(G; H) 6 = 1 unless G or H
= 1.
3. Computability: e(G; H) is efficiently
computable [1]
Definition Bilinear map group system: It is a tuple
composed as the object as described above
[1].
4.2 Algorithm
Interactive audit protocol is based on the interactive proof
system as explained below: A cryptographic interactive
audit scheme S is consisting of two algorithms & one proof
system generally called as interactive proof system, i.e. S =
(K, T, P).
Algorithm 1: KeyGen (1s)
Security parameter s is given as an input to this algorithm,
and the algorithm return a public keypair (pk,sk) as:
Step 1: Let be a bilinear map group
system with randomly selected generators g, h, ∈R, ,
where , T are two group of large prime order p, |p|=
O(k).
Step 2: Now we generate the collision-resistance hash
function Hk(•) and by choosing a random α, β, ∈R,, p and
compute H1 = hα and H2 = hβ ∈ .
Step 3: Thus the secret key is sk = (α, β) and the public key
is pk = (g,h,H1,H2).
Algorithm 2: TagGen (sk,F)
This algorithm takes an secret key and a file F as input.
This returns a triplet ,
where denotes the secret used to generate verification
tag, is the set of public verification parameters u and
index information i.e., denotes the set of
verification tags;
1. Owners file i.e. F is splited in to n x s sectors
F={mi,j} ∈ ,
2. Choose s and random as the secret
of the file.
3. Compute for i ∈ [1, s] and
, where and Fn is the file
name.
4. Build index table .
5. Calculate its tag as:
where and i ∈ [1,n].
Sends and outputs ,
to TPA, and to CSP.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 725
Proof (CSP,TPA): It is two-party proof protocol of
retrievability between CSP (prover) and TPA (verifier)
where CSP takes File as input, set of tags, a public key pk,
and a set of public parameter are the common input
between CSP and TP. At the end TPA return 1 or 0, where
1 shows the file is correct stored on the server. This
protocol is the three move protocol between Cloud Service
Provider and Third Party Auditor. Here the common input
is (pk, ψ). This protocol is:
 Commitment (CSP → TPA)
CSP choose random
for j ∈ [1,s], and sends its commitment to TPA,
where and
 Challenge (CSP ← TPA)
TPA choose a random challenge set I of t indexes along
with t random coefficients . Let Q be the set
of challenge index coefficient pairs. TPA sends Q
to CSP.
 Response (CSP → TPA)
CSP calculates the response Θ, μ as
Where, . P sends to V.
 Verification:
TPA can check that the response was correctly
formed by checking that
The proposed audit scheme is explained above, which
contains three algorithms namely key generation, tag
generation and verification protocol. In key generation
used is assigned a secret key sk this key is used to
generate tags for files and public key pk is used to verify
the integrity of stored files. In tag generation file F
produces the verification parameter . The hash
value can be considered as a signature of secret
and is the encryption of this secret.
Hash index table is designed according to the
Fig. -2
Framework of
interactive
audit scheme
application.
The index
table is
important for ensuring the security of the file. Using and
the hash value is generated for each block of file.
But it must be checked that values of should be
different for all processed files.
The verification process consists of three move
protocol structure which contains three steps i.e.
commitment, challenge and response. This is shown in
Figure 2.
This protocol is similar to Schnorrs ∑ protocol. The zero
knowledge property ensures that the verification process
does not expose anything other than veracity of the
statement in cloud. To avoid the leakage of data and tags
in the verification process, the secret data {m,j} is
protected by random .And the values and
are protected by simple commitment process.
4.3 Mathematical Model
It is P Class problem because: 1. Problem can be
solved in polynomial time. 2. All important operations are
hidden by KeyGen and TagGen algorithm. 3. The proof
protocol works in polynomial time. Let S be the set of
input function and output. So S = I, F, O where I is a set of
Input F is a set of functions that are used to process the
input provided and O be the set of output. I = I1, I2, I3 F =
F1, F2, F3 O = O1, O2, O3 Input is mapped to output which
is shown in following Venn diagram:
Fig-3. Venn diagram
As we have three input for the system, so we have three I
as
I1: File uploaded by user.
I2: Security parameter s which is bilinear map
group system.
I3: Secret key
I4: set of tags
Three functions are used F1, F2, and F3
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 726
F1: Key generation to generate the secret key.
F2: Tag Generation for file uploaded by user.
F3: Proof Technique to verify the files and
perform the audit.
Also the system has three outputs O1, O2, O3
O1: File Verification
O2: File is available for download (Retrieve File
after making changes by user)
O3: Perform periodic audit
5. RESULT
The implementation of system consists of implementation
of KeyGen algorithm. The input given is user id and
password. The bi-linear map group system is used with
two groups of large prime order. The key is generated
using the collision resistant hash function. While logging
to the system user has to enter the key which is sent to the
registered e-mail id of the user. This key is e-mailed to the
user when he attempt to log in using the user id and
password. The tag is generated using TagGen algorithm
which accepts two inputs secret key sk and file. The file is
uploaded with this tag to ensure the integrity while we are
performing the audit.Audit system architecture for
outsourced data in cloud.
6. CONCLUSIONS
Cloud-based outsourced storage reduces the client’s
burden for storage management and maintenance by
providing a low cost, scalable, location-independent
platform. But, the clients may not have local copy of this
data. To avoid the security risks, audit services must
ensure the integrity and availability of outsourced data.
This dissertation presents a construction of an efficient
audit service for data integrity in clouds. It also proposed
an interactive audit protocol to implement the audit
service based on a third party auditor.
In this audit service, the third party auditor, can issue a
periodic verification to monitor the change of outsourced
data by providing an optimized schedule. To realize the
audit model, there is only need to maintain the security of
the TPA. This technology can be easily adopted in a cloud
computing environment to replace the traditional Hash-
based solution.
ACKNOWLEDGEMENT
It is with the greatest pleasure and pride that I present this
paper. At this moment, I cannot neglect all those who
helped me in the successful completion of this paper. I am
very thankful to my respected project guide Prof. P. N.
Kalavadekar, Associate Professor, for his ideas and help
proved to be valuable and helpful during the creation of
this paper and guide me in the right path. I would also like
to thank all the faculties who have cleared all the major
concepts that were involved in the understanding of
techniques behind this paper. Lastly, I am thankful to my
friends who shared their knowledge in this field with me
REFERENCES
[1] Yan Zhu, Yan Zhu, Hongxin Huc, Gail-Joon Ahn,
Stephen S. Yau. Efficient audit service outsourcing for
data integrity in clouds. In: The Journal of Systems
and software 85(2012) 1083-1095 2011.
[2] Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz,
R.H., Konwinski, A., Lee, G., Patterson, D.A., Rabkin, A.,
Stoica, I., Zaharia, M. A view of cloud computing. ACM
53 (4), 50-58, 2010.
[3] Tchifilionova, V. Security and privacy implications of
cloud computing clost in the cloud. In: Camenisch, J.,
Kisimov, V., Dubovitskaya, M. (Eds.), Open Research
Problems in Network Security. Vol. 6555 of Lecture
Notesin Computer Science. Springer,
Berlin/Heidelberg, pp. 149-158, 2011.
[4] Ko, R.K.L., Lee, B.S., Pearson, S. Towards achieving
accountability, auditability and trust in cloud
computing. In: Abraham, A., Mauri, J.L., Buford, J.F.,
Suzuki, J., Thampi, S.M. (Eds.), Advances in Computing
and Communications. Vol. 193 of Communications in
Computer and Information Science. Springer,
Berlin/Heidelberg, pp. 432-444, 2011.
[5] Yavuz, A.A., Ning, P. Baf: An efficient publicly
verifiable secure audit logging scheme for distributed
systems. In: ACSAC, pp. 219228, 2009.
[6] Hsiao, H.-C., Lin, Y.-H., Studer, A., Studer, C., Wang, K.-
H., Kikuchi, Perrig, A., Sun, H.-M., Yang, B.-Y. A study
of user-friendly hash comparison schemes. In: ACSAC,
pp. 105114 2009.
[7] Yumerefendi, A.R., Chase, J.S. Strong accountability
for network storage. ACM Trans. Storage (TOS) 3 (3),
2007.
[8] Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz,
R.H., Konwinski, A., Lee, G., Patterson, D.A., Rabkin, A.,
Stoica, I., Zaharia, M., 2010. A view of cloud
computing. Commun. ACM 53 (4), 5058.
[9] Juels Jr., A., Kaliski, B.S. Pors: proofs of retrievability
for large files. In: Proceedings of the 2007 ACM
Conference on Computer and Communications
Security, CCS 2007, pp. 584597, 2007.
[10] Ateniese, G., Burns, R.C., Curtmola, R., Herring, J.,
Kissner, L., Peterson, Z.N.J., Song, D.X. Provable data
possession at untrusted stores. In: Proceedings of the
2007 ACM Conference on Computer and
Communications Security, CCS 2007, pp. 598609,
2007
[11] Fu, K., Kaashoek, M.F., Mazires, D. Fast and secure
distributed readonly file system. ACM Trans. Comput.
Syst. 20 (1), 124, 2002.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 727
[12] Li, F., Hadjieleftheriou, M., Kollios, G., Reyzin, L.
Dynamic authenticated index structures for
outsourced databases. In: Chaudhuri, S., Hristidis, V.,
Polyzotis, N. (Eds.), SIGMOD Conference. ACM, pp.
121132, 2006
[13] Ma, D., Deng, R.H., Pang, H., Zhou, J. Authenticating
query results in data publishing. In: Qing, S., Mao, W.,
Lopez, J., Wang, G. (Eds.), ICICS. Vol. 3783 of Lecture
Notes in Computer Science. Springer, pp. 376388,
2005.
[14] Xie, M., Wang, H., Yin, J., Meng, X. Integrity auditing of
outsourced data. In: Koch, C., Gehrke, J., Garofalakis,
M.N., Srivastava, D., Aberer, K., Deshpande, A.,
Florescu, D., Chan, C.Y., Ganti, V., Kanne, C.-C., Klas, W.,
Neuhold, E.J. Eds.), VLDB. ACM, pp. 782793, 2007.
[15] Ateniese, G., Pietro, R.D., Mancini, L.V., Tsudik, G.
Scalable and efficient provable data possession. In:
Proceedings of the 4th International Conference on
Security and Privacy in Communication Networks,
SecureComm, pp. 110, 2008.
[16] Erway, C.C., Kpc , A., Papamanthou, C., Tamassia, R.
Dynamic provable data possession. In: Proceedings of
the 2009 ACM Conference on Computer and
Communications Security, CCS, pp. 213222, 2009.
[17] Shacham, H., Waters, B. Compact proofs of
retrievability. In: Advances in Cryptology ASIACRY,
14th International Conference on the Theory and
Application of Cryptology and Information Security,
pp. 90107, 2008.
[18] Boneh, D., Franklin, M. Identity-based encryption
from the weil pairing. In: Advances in Cryptology
(CRYPTO2001). Vol. 2139 of LNCS, pp. 213229, 2001.

Weitere ähnliche Inhalte

Was ist angesagt?

Centralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesCentralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesEditor IJMTER
 
Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds IRJET Journal
 
Periodic Auditing of Data in Cloud Using Random Bits
Periodic Auditing of Data in Cloud Using Random BitsPeriodic Auditing of Data in Cloud Using Random Bits
Periodic Auditing of Data in Cloud Using Random BitsIJTET Journal
 
Iaetsd storage privacy protection against data
Iaetsd storage privacy protection against dataIaetsd storage privacy protection against data
Iaetsd storage privacy protection against dataIaetsd Iaetsd
 
Privacy preserving public auditing for regenerating code based cloud storage
Privacy preserving public auditing for regenerating code based cloud storagePrivacy preserving public auditing for regenerating code based cloud storage
Privacy preserving public auditing for regenerating code based cloud storagekitechsolutions
 
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentInsuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentEditor IJCATR
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storageShakas Technologies
 
A Novel privacy preserving public auditing for shared data in cloud
A Novel privacy preserving public auditing for shared data in cloudA Novel privacy preserving public auditing for shared data in cloud
A Novel privacy preserving public auditing for shared data in cloudJAVVAJI VENKATA RAO
 
A Survey on Provable Multi-copy Dynamic Data Possession in Cloud Computing Sy...
A Survey on Provable Multi-copy Dynamic Data Possession in Cloud Computing Sy...A Survey on Provable Multi-copy Dynamic Data Possession in Cloud Computing Sy...
A Survey on Provable Multi-copy Dynamic Data Possession in Cloud Computing Sy...IRJET Journal
 
Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud Girish Chandra
 
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...IOSR Journals
 
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud StoragePrivacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage1crore projects
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storageMustaq Syed
 
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
PUBLIC AUDITING 	             FOR SECURE CLOUD STORAGE                       ...PUBLIC AUDITING 	             FOR SECURE CLOUD STORAGE                       ...
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...Bharath Nair
 
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on CloudIRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on CloudIRJET Journal
 
A Survey on Batch Auditing Systems for Cloud Storage
A Survey on Batch Auditing Systems for Cloud StorageA Survey on Batch Auditing Systems for Cloud Storage
A Survey on Batch Auditing Systems for Cloud StorageIRJET Journal
 
Privacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storagePrivacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storageparry prabhu
 
Authenticated and unrestricted auditing of big data space on cloud through v...
Authenticated and unrestricted auditing of big data space on  cloud through v...Authenticated and unrestricted auditing of big data space on  cloud through v...
Authenticated and unrestricted auditing of big data space on cloud through v...IJMER
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storageIEEEFINALYEARPROJECTS
 

Was ist angesagt? (20)

Centralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesCentralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data Services
 
Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds
 
Periodic Auditing of Data in Cloud Using Random Bits
Periodic Auditing of Data in Cloud Using Random BitsPeriodic Auditing of Data in Cloud Using Random Bits
Periodic Auditing of Data in Cloud Using Random Bits
 
Iaetsd storage privacy protection against data
Iaetsd storage privacy protection against dataIaetsd storage privacy protection against data
Iaetsd storage privacy protection against data
 
Privacy preserving public auditing for regenerating code based cloud storage
Privacy preserving public auditing for regenerating code based cloud storagePrivacy preserving public auditing for regenerating code based cloud storage
Privacy preserving public auditing for regenerating code based cloud storage
 
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentInsuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud Environment
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storage
 
A Novel privacy preserving public auditing for shared data in cloud
A Novel privacy preserving public auditing for shared data in cloudA Novel privacy preserving public auditing for shared data in cloud
A Novel privacy preserving public auditing for shared data in cloud
 
A Survey on Provable Multi-copy Dynamic Data Possession in Cloud Computing Sy...
A Survey on Provable Multi-copy Dynamic Data Possession in Cloud Computing Sy...A Survey on Provable Multi-copy Dynamic Data Possession in Cloud Computing Sy...
A Survey on Provable Multi-copy Dynamic Data Possession in Cloud Computing Sy...
 
Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud
 
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
 
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud StoragePrivacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
 
L04302088092
L04302088092L04302088092
L04302088092
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storage
 
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
PUBLIC AUDITING 	             FOR SECURE CLOUD STORAGE                       ...PUBLIC AUDITING 	             FOR SECURE CLOUD STORAGE                       ...
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
 
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on CloudIRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on Cloud
 
A Survey on Batch Auditing Systems for Cloud Storage
A Survey on Batch Auditing Systems for Cloud StorageA Survey on Batch Auditing Systems for Cloud Storage
A Survey on Batch Auditing Systems for Cloud Storage
 
Privacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storagePrivacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storage
 
Authenticated and unrestricted auditing of big data space on cloud through v...
Authenticated and unrestricted auditing of big data space on  cloud through v...Authenticated and unrestricted auditing of big data space on  cloud through v...
Authenticated and unrestricted auditing of big data space on cloud through v...
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storage
 

Ähnlich wie Development of Effective Audit Service to Maintain Integrity of Migrated Data in Cloud

International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Security Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party AuditorSecurity Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party Auditorijsrd.com
 
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...IRJET Journal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storageJPINFOTECH JAYAPRAKASH
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storageJPINFOTECH JAYAPRAKASH
 
IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...
IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...
IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...IRJET Journal
 
Data Access Control Schemes in Cloud Computing: A Review
Data Access Control Schemes in Cloud Computing: A ReviewData Access Control Schemes in Cloud Computing: A Review
Data Access Control Schemes in Cloud Computing: A ReviewIRJET Journal
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...IEEEGLOBALSOFTTECHNOLOGIES
 
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing for ...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing for ...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing for ...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing for ...IEEEGLOBALSOFTTECHNOLOGIES
 
A Novel Method of Directly Auditing Integrity On Encrypted Data
A Novel Method of Directly Auditing Integrity On Encrypted DataA Novel Method of Directly Auditing Integrity On Encrypted Data
A Novel Method of Directly Auditing Integrity On Encrypted DataIRJET Journal
 
Implementing Proof of Retriavaibility for Multiple Replica of Data File using...
Implementing Proof of Retriavaibility for Multiple Replica of Data File using...Implementing Proof of Retriavaibility for Multiple Replica of Data File using...
Implementing Proof of Retriavaibility for Multiple Replica of Data File using...IRJET Journal
 
Provable multicopy dynamic data possession in cloud computing systems
Provable multicopy dynamic data possession in cloud computing systemsProvable multicopy dynamic data possession in cloud computing systems
Provable multicopy dynamic data possession in cloud computing systemsPvrtechnologies Nellore
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEditor IJMTER
 
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...IRJET Journal
 
Data Partitioning Technique In Cloud: A Survey On Limitation And Benefits
Data Partitioning Technique In Cloud: A Survey On Limitation And BenefitsData Partitioning Technique In Cloud: A Survey On Limitation And Benefits
Data Partitioning Technique In Cloud: A Survey On Limitation And BenefitsIJERA Editor
 
Enabling Cloud Storage Auditing with Key Exposure Resistance
Enabling Cloud Storage Auditing with Key Exposure ResistanceEnabling Cloud Storage Auditing with Key Exposure Resistance
Enabling Cloud Storage Auditing with Key Exposure ResistanceIRJET Journal
 
SECURE & EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA INTEGRITY IN CLOUDS
SECURE & EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA INTEGRITY IN CLOUDSSECURE & EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA INTEGRITY IN CLOUDS
SECURE & EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA INTEGRITY IN CLOUDSGyan Prakash
 
Evaluating paas scalability and improving performance using scalability impro...
Evaluating paas scalability and improving performance using scalability impro...Evaluating paas scalability and improving performance using scalability impro...
Evaluating paas scalability and improving performance using scalability impro...eSAT Journals
 

Ähnlich wie Development of Effective Audit Service to Maintain Integrity of Migrated Data in Cloud (19)

International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Security Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party AuditorSecurity Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party Auditor
 
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storage
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storage
 
IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...
IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...
IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...
 
Data Access Control Schemes in Cloud Computing: A Review
Data Access Control Schemes in Cloud Computing: A ReviewData Access Control Schemes in Cloud Computing: A Review
Data Access Control Schemes in Cloud Computing: A Review
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...
 
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing for ...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing for ...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing for ...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing for ...
 
A Novel Method of Directly Auditing Integrity On Encrypted Data
A Novel Method of Directly Auditing Integrity On Encrypted DataA Novel Method of Directly Auditing Integrity On Encrypted Data
A Novel Method of Directly Auditing Integrity On Encrypted Data
 
Implementing Proof of Retriavaibility for Multiple Replica of Data File using...
Implementing Proof of Retriavaibility for Multiple Replica of Data File using...Implementing Proof of Retriavaibility for Multiple Replica of Data File using...
Implementing Proof of Retriavaibility for Multiple Replica of Data File using...
 
Provable multicopy dynamic data possession in cloud computing systems
Provable multicopy dynamic data possession in cloud computing systemsProvable multicopy dynamic data possession in cloud computing systems
Provable multicopy dynamic data possession in cloud computing systems
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
 
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
 
Data Partitioning Technique In Cloud: A Survey On Limitation And Benefits
Data Partitioning Technique In Cloud: A Survey On Limitation And BenefitsData Partitioning Technique In Cloud: A Survey On Limitation And Benefits
Data Partitioning Technique In Cloud: A Survey On Limitation And Benefits
 
Enabling Cloud Storage Auditing with Key Exposure Resistance
Enabling Cloud Storage Auditing with Key Exposure ResistanceEnabling Cloud Storage Auditing with Key Exposure Resistance
Enabling Cloud Storage Auditing with Key Exposure Resistance
 
SECURE & EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA INTEGRITY IN CLOUDS
SECURE & EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA INTEGRITY IN CLOUDSSECURE & EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA INTEGRITY IN CLOUDS
SECURE & EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA INTEGRITY IN CLOUDS
 
Evaluating paas scalability and improving performance using scalability impro...
Evaluating paas scalability and improving performance using scalability impro...Evaluating paas scalability and improving performance using scalability impro...
Evaluating paas scalability and improving performance using scalability impro...
 

Mehr von IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

Mehr von IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Kürzlich hochgeladen

Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGSIVASHANKAR N
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 

Kürzlich hochgeladen (20)

Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 

Development of Effective Audit Service to Maintain Integrity of Migrated Data in Cloud

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 722 Development of Effective Audit Service to Maintain Integrity of Migrated Data in Cloud Shekhar S. Kausalye1, Prof. P.N. Kalavadekar2 1 PG Student, Dept. of Computer Engineering, SRES COE, Kopargaon, Pune University, MH, INDIA 2 Associate Professor, Dept. of Computer Engineering, SRES COE, Kopargaon, Pune University, MH, INDIA ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Cloud based service for storage of outsource data reduces the burden of user for storage management & maintenance, this is achieved because cloud service provides low-cost, expandable & geographically location independent platform. But client has risk of missing or corrupted data as the local copy is not available at client side. To avoid this security risk audit service must ensure the integrity of data. PDP technique which is used for verifying the integrity of data can be used to understand the audit service. A PDP protocol can be constructed using the interactive zero knowledge system to prevent the fraud of prover as well as leakage of verified data. This can be proved that the protocol can persists these properties with the help of Diffie-Hellman assumption. The mechanism can be proposed to reduce cost of audit and to detect misbehaviour with the help of related queries & periodic verification. Key Words: security, interactive proof system, cloud storage, Audit Service, Provable Data Possession, etc… 1. INTRODUCTION Cloud computing is growing service for current information technology. IT provides scalable environment for ever increasing amount of data & processes which work on various application & services by using on- demand self-services. The important advantage of cloud computing paradigm is that data cam be outsourced and centralized at different location called as clouds. This kind of outsourced data storage service is becoming profitable business because of flexible, low-cost, location- independent platform to manage user data. The burden of storage management & maintenance is reduced by Cloud Storage Service (CSS). But if this important service is susceptible to failure of attacks then this will be causing the irretrievable loss of user data as this data is not available locally with user. This risk can be caused due to: cloud infrastructure is vulnerable to security threats from within and outside of cloud [2]; the Cloud Service Providers (CSP) can behave untruthfully for cloud users [3]; also, the different opinion may be there because of faithfulness of CSP. Accordingly, their behaviour is unknown for different clients even though this may result from user’s incorrect actions [4]. Because of all these reasons its cloud service provider responsibility to issue an efficient audit service so that the integrity and data availability can be verified on cloud data [5]. There are various traditional cryptographic technologies are available for data integrity and availability which are based on hash function and signature schemes [6][7]. But these technology does not work on outsourced data as they must have the local copy of data to perform the audit. As well as this process is not feasible to perform the validation by downloading data because of expensive transaction if file size is large. Also to perform the audit in cloud environment is difficult and costly for the users [8]. Therefore, it is important to understand the public auditability for CSS, because of which users may use or take help of Third Party Auditor (TPA). This TPA is expert and has capabilities that user don’t have to perform the audit on outsourced data. For this auditability the concept of Proof of Retrievability [9] commonly called as POR and Provable Data Possession [10] (POP) is given by researchers. Probabilistic proof techniques approach is used by them to show that user’s data remain intact without downloading it, and this is called as “Verification without Downloading.” Anyone can use the verification protocol to prove the availability of data using PDP or POR scheme. Hence this fulfils the requirement of public auditability. These schemes are developed around and untrusted storage which offer to check the very large amount of data. Various existing scheme does not give the security proof against Cloud Service Provider’s fraud and counterfeits as well as information leakage. These problems reduce the impact of cloud audit service. Because of this new model of framework must be proposed that enables the security of public verification protocol in audit service. The performance of audit service is depending on the three aspects which are: • How to design an efficient architecture of audit system that reduce the storage and network overheads and also enhance the security of audit activities;
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 723 • How to provide an efficient audit scheduling to help provide a more cost-effective audit service; • How to optimize parameters of audit systems to minimize the computation overheads of audit services. Quality of service can be improved by solving above problems and it also help to detect irregularities and requires less resources. 2. EASE OF USE Various researchers worked on the untrusted outsourced data. The simplest and easy way to implement the integrity control is to use cryptographic hash function. Yumerefendi [7] and Hsiao[6] proposed a solution for authenticated network storage, Merkle tree also called as hash tree as the fundamental data structure, but their update process is costly. Fu [11] implemented & described the method for securely accessing a read only file system which is distributed among the various providers. This is the solution for efficiently authenticating operation on outsourced data or file. The work done by Li[12], Ma[13], Xie[14], Yavuz[5] considered the problem of how to audit the integrity of outsourced data or database. From these Li & Xie used the concept of Markle tree to audit the completeness of query result, but in some cases the overhead is high that weaken the benefits of database outsourcing. Some researchers proposed two schemes called PDP & POR to check the integrity of stored data without downloading it. Ateniese proposed the Provable Data Possession model to ensure the possession of file on untrusted storage and also provides the RSA based scheme that achieves O(1) communication cost. Anyone other than owner can challenge the server for data possession using the publicly verifiable version. The dynamic PDP solution called scalable PDP [15] is developed by the Ateniese. This is achieved using the Lightweight PDP scheme which used cryptographic Hash function & symmetric key encryption, but server can victimize the user as lack of randomness in the challenge in previous response. The number of updates and challenges is fixed and limited. By studying this work Erway has proposed two dynamic PDP [16] scheme using Hash function tree to cognize O(log n) communication and computation cost of data (file) which contain n blocks. The drawback of SPDP is simple scheme called DPDP-I and in the “block-less scheme’ which is generally called as DPDP- II the data block can be leaked by response given to challenge. But Juels presented the POR [9] scheme which greatly cognize of pre-processing steps of the client which are followed before sending the file or data to Cloud Service Provider. The main drawback of this scheme is that these operation restricts the updating of data. Shacham & Waters [17] presented and efficient version of this protocol which is called Compact POR, this protocol uses harmonic property to aggregate a proof into O(1) authenticator value and O(t) computation cost where t is challenge blocks, but the drawback of this is that its solution is static and there is leakage of data blocks in the verification process. 3. LITERATURE SURVEY Audit system architecture for outsourced data in cloud is shown in Fig. 1. This architecture work in audit service outsourcing mode. This architecture contains four entities: 1. Data Owner (DO): The user who want to store large amount of data to the cloud; 2. Cloud Service Provider (CSP): CSP provides data storage service and has storage space and computation resources; 3. Third Party Auditor (TAP): TPA has capabilities to manage of monitor outsources data under the deputation of data owner; Granted Application (GA): GA has rights to access & manipulate stored data. These application can be either inside the cloud or outside the cloud. This depends on the specific requirement. Fig-1. Audit System Architecture for Cloud Computing Audit service based on TPA works in the following way. This also help to describe our audit service as follows: 1. Client uses the secret key sk for preprocessing of the file, file contains collection of n blocks, then it generates public verification information which is stored in TPA, after this the file is transmitted with some verification tags to Cloud Service Provider, user can then delete the local copy of this data; 2. Afterword, using protocol called as proof of retrievability, TPA check the integrity and availability of the outsourced data. It is important to generate an alarm for suspicious activity or events. [1]. This is also known as audit service outsourcing because verification of data integrity can be implemented by TPA without taking help of data owner. Here data owner and granted clients dynamically interact with Cloud Service Provider to access or update their own data for various
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 724 application purposes. However, we cannot trust CSP for security of stored data, neither can we assume that data owner is able to collect the evidences against CSP for CSPs fault when errors occur. Because of these reasons, TPA, which act as a Trust Third Party (TTP), is used to make sure the security of stored data. We can say that the TPA is reliable as well as independent, and hence it has no motivation to conspire with the CSP or clients at the time of auditing process: 1. TPA must regularly check the integrity and availability of data at appropriate intervals; 2. TPA must be able to take evidences for various disagreements about inconsistency of the data in terms of authentic records for all the data operations. 4. IMPLEMENTATION In this proposed audit architecture, main idea is, to maintain security of Third Party Auditor so that we can guarantee the credibility of cloud storage. Because it is easy to ensure the security of Trust Third Party Auditor than maintaining the security of whole cloud. Hence, Third Party Auditor is the root or basis of trust in clouds. The protocol design must achieve following security and performance guarantees:  Audit without downloading: Allow Third Party Auditor or clients with the help of Third Party Auditor to verify correctness of data whenever necessary without downloading the copy of data;  Verification correctness: to ensure there is no cheating of CSP that can clear or grant the audit from Third Party Auditor without storing user’s data intact;  Privacy-preserving: to ensure that there is no alternate way for Third Party Auditor to derive user’s data from information collected during the audit operation; and  High-performance: to allow Third Party Auditor to perform auditing but with minimum overheads for storage, communication and computation [1] In this proposed audit architecture, main idea is, to maintain security. 4.1 Design A cryptographic interactive audit scheme is used to support the audit service. This scheme is also called as interactive PDP (IPDP). A standard model of interactive proof system is used to construct this scheme, because this ensures the confidentiality of secret data also called as zero-knowledge property & the undeceivability of invalid tags called as soundness property. Definition Collision Resistance Hash: A hash family H is (t, ε) collision resistance if no t-time advantage at least ε in breaking the collision resistance of H [1]. The system is setup using bilinear pairing proposed by Boneh & Franklin [18]. Let be two multiplicative groups using elliptic curve convention with large prime order p. A function e can be bilinear map which can be computed as: e: . This has following properties: for any G, H ε & all a, b ε , we have the following – 1. Bilinearity: e([a]G; [b]H) = e(G; H) ab1: 2. Non-degeneracy: e(G; H) 6 = 1 unless G or H = 1. 3. Computability: e(G; H) is efficiently computable [1] Definition Bilinear map group system: It is a tuple composed as the object as described above [1]. 4.2 Algorithm Interactive audit protocol is based on the interactive proof system as explained below: A cryptographic interactive audit scheme S is consisting of two algorithms & one proof system generally called as interactive proof system, i.e. S = (K, T, P). Algorithm 1: KeyGen (1s) Security parameter s is given as an input to this algorithm, and the algorithm return a public keypair (pk,sk) as: Step 1: Let be a bilinear map group system with randomly selected generators g, h, ∈R, , where , T are two group of large prime order p, |p|= O(k). Step 2: Now we generate the collision-resistance hash function Hk(•) and by choosing a random α, β, ∈R,, p and compute H1 = hα and H2 = hβ ∈ . Step 3: Thus the secret key is sk = (α, β) and the public key is pk = (g,h,H1,H2). Algorithm 2: TagGen (sk,F) This algorithm takes an secret key and a file F as input. This returns a triplet , where denotes the secret used to generate verification tag, is the set of public verification parameters u and index information i.e., denotes the set of verification tags; 1. Owners file i.e. F is splited in to n x s sectors F={mi,j} ∈ , 2. Choose s and random as the secret of the file. 3. Compute for i ∈ [1, s] and , where and Fn is the file name. 4. Build index table . 5. Calculate its tag as: where and i ∈ [1,n]. Sends and outputs , to TPA, and to CSP.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 725 Proof (CSP,TPA): It is two-party proof protocol of retrievability between CSP (prover) and TPA (verifier) where CSP takes File as input, set of tags, a public key pk, and a set of public parameter are the common input between CSP and TP. At the end TPA return 1 or 0, where 1 shows the file is correct stored on the server. This protocol is the three move protocol between Cloud Service Provider and Third Party Auditor. Here the common input is (pk, ψ). This protocol is:  Commitment (CSP → TPA) CSP choose random for j ∈ [1,s], and sends its commitment to TPA, where and  Challenge (CSP ← TPA) TPA choose a random challenge set I of t indexes along with t random coefficients . Let Q be the set of challenge index coefficient pairs. TPA sends Q to CSP.  Response (CSP → TPA) CSP calculates the response Θ, μ as Where, . P sends to V.  Verification: TPA can check that the response was correctly formed by checking that The proposed audit scheme is explained above, which contains three algorithms namely key generation, tag generation and verification protocol. In key generation used is assigned a secret key sk this key is used to generate tags for files and public key pk is used to verify the integrity of stored files. In tag generation file F produces the verification parameter . The hash value can be considered as a signature of secret and is the encryption of this secret. Hash index table is designed according to the Fig. -2 Framework of interactive audit scheme application. The index table is important for ensuring the security of the file. Using and the hash value is generated for each block of file. But it must be checked that values of should be different for all processed files. The verification process consists of three move protocol structure which contains three steps i.e. commitment, challenge and response. This is shown in Figure 2. This protocol is similar to Schnorrs ∑ protocol. The zero knowledge property ensures that the verification process does not expose anything other than veracity of the statement in cloud. To avoid the leakage of data and tags in the verification process, the secret data {m,j} is protected by random .And the values and are protected by simple commitment process. 4.3 Mathematical Model It is P Class problem because: 1. Problem can be solved in polynomial time. 2. All important operations are hidden by KeyGen and TagGen algorithm. 3. The proof protocol works in polynomial time. Let S be the set of input function and output. So S = I, F, O where I is a set of Input F is a set of functions that are used to process the input provided and O be the set of output. I = I1, I2, I3 F = F1, F2, F3 O = O1, O2, O3 Input is mapped to output which is shown in following Venn diagram: Fig-3. Venn diagram As we have three input for the system, so we have three I as I1: File uploaded by user. I2: Security parameter s which is bilinear map group system. I3: Secret key I4: set of tags Three functions are used F1, F2, and F3
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 726 F1: Key generation to generate the secret key. F2: Tag Generation for file uploaded by user. F3: Proof Technique to verify the files and perform the audit. Also the system has three outputs O1, O2, O3 O1: File Verification O2: File is available for download (Retrieve File after making changes by user) O3: Perform periodic audit 5. RESULT The implementation of system consists of implementation of KeyGen algorithm. The input given is user id and password. The bi-linear map group system is used with two groups of large prime order. The key is generated using the collision resistant hash function. While logging to the system user has to enter the key which is sent to the registered e-mail id of the user. This key is e-mailed to the user when he attempt to log in using the user id and password. The tag is generated using TagGen algorithm which accepts two inputs secret key sk and file. The file is uploaded with this tag to ensure the integrity while we are performing the audit.Audit system architecture for outsourced data in cloud. 6. CONCLUSIONS Cloud-based outsourced storage reduces the client’s burden for storage management and maintenance by providing a low cost, scalable, location-independent platform. But, the clients may not have local copy of this data. To avoid the security risks, audit services must ensure the integrity and availability of outsourced data. This dissertation presents a construction of an efficient audit service for data integrity in clouds. It also proposed an interactive audit protocol to implement the audit service based on a third party auditor. In this audit service, the third party auditor, can issue a periodic verification to monitor the change of outsourced data by providing an optimized schedule. To realize the audit model, there is only need to maintain the security of the TPA. This technology can be easily adopted in a cloud computing environment to replace the traditional Hash- based solution. ACKNOWLEDGEMENT It is with the greatest pleasure and pride that I present this paper. At this moment, I cannot neglect all those who helped me in the successful completion of this paper. I am very thankful to my respected project guide Prof. P. N. Kalavadekar, Associate Professor, for his ideas and help proved to be valuable and helpful during the creation of this paper and guide me in the right path. I would also like to thank all the faculties who have cleared all the major concepts that were involved in the understanding of techniques behind this paper. Lastly, I am thankful to my friends who shared their knowledge in this field with me REFERENCES [1] Yan Zhu, Yan Zhu, Hongxin Huc, Gail-Joon Ahn, Stephen S. Yau. Efficient audit service outsourcing for data integrity in clouds. In: The Journal of Systems and software 85(2012) 1083-1095 2011. [2] Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R.H., Konwinski, A., Lee, G., Patterson, D.A., Rabkin, A., Stoica, I., Zaharia, M. A view of cloud computing. ACM 53 (4), 50-58, 2010. [3] Tchifilionova, V. Security and privacy implications of cloud computing clost in the cloud. In: Camenisch, J., Kisimov, V., Dubovitskaya, M. (Eds.), Open Research Problems in Network Security. Vol. 6555 of Lecture Notesin Computer Science. Springer, Berlin/Heidelberg, pp. 149-158, 2011. [4] Ko, R.K.L., Lee, B.S., Pearson, S. Towards achieving accountability, auditability and trust in cloud computing. In: Abraham, A., Mauri, J.L., Buford, J.F., Suzuki, J., Thampi, S.M. (Eds.), Advances in Computing and Communications. Vol. 193 of Communications in Computer and Information Science. Springer, Berlin/Heidelberg, pp. 432-444, 2011. [5] Yavuz, A.A., Ning, P. Baf: An efficient publicly verifiable secure audit logging scheme for distributed systems. In: ACSAC, pp. 219228, 2009. [6] Hsiao, H.-C., Lin, Y.-H., Studer, A., Studer, C., Wang, K.- H., Kikuchi, Perrig, A., Sun, H.-M., Yang, B.-Y. A study of user-friendly hash comparison schemes. In: ACSAC, pp. 105114 2009. [7] Yumerefendi, A.R., Chase, J.S. Strong accountability for network storage. ACM Trans. Storage (TOS) 3 (3), 2007. [8] Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R.H., Konwinski, A., Lee, G., Patterson, D.A., Rabkin, A., Stoica, I., Zaharia, M., 2010. A view of cloud computing. Commun. ACM 53 (4), 5058. [9] Juels Jr., A., Kaliski, B.S. Pors: proofs of retrievability for large files. In: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, pp. 584597, 2007. [10] Ateniese, G., Burns, R.C., Curtmola, R., Herring, J., Kissner, L., Peterson, Z.N.J., Song, D.X. Provable data possession at untrusted stores. In: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, pp. 598609, 2007 [11] Fu, K., Kaashoek, M.F., Mazires, D. Fast and secure distributed readonly file system. ACM Trans. Comput. Syst. 20 (1), 124, 2002.
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 727 [12] Li, F., Hadjieleftheriou, M., Kollios, G., Reyzin, L. Dynamic authenticated index structures for outsourced databases. In: Chaudhuri, S., Hristidis, V., Polyzotis, N. (Eds.), SIGMOD Conference. ACM, pp. 121132, 2006 [13] Ma, D., Deng, R.H., Pang, H., Zhou, J. Authenticating query results in data publishing. In: Qing, S., Mao, W., Lopez, J., Wang, G. (Eds.), ICICS. Vol. 3783 of Lecture Notes in Computer Science. Springer, pp. 376388, 2005. [14] Xie, M., Wang, H., Yin, J., Meng, X. Integrity auditing of outsourced data. In: Koch, C., Gehrke, J., Garofalakis, M.N., Srivastava, D., Aberer, K., Deshpande, A., Florescu, D., Chan, C.Y., Ganti, V., Kanne, C.-C., Klas, W., Neuhold, E.J. Eds.), VLDB. ACM, pp. 782793, 2007. [15] Ateniese, G., Pietro, R.D., Mancini, L.V., Tsudik, G. Scalable and efficient provable data possession. In: Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, SecureComm, pp. 110, 2008. [16] Erway, C.C., Kpc , A., Papamanthou, C., Tamassia, R. Dynamic provable data possession. In: Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS, pp. 213222, 2009. [17] Shacham, H., Waters, B. Compact proofs of retrievability. In: Advances in Cryptology ASIACRY, 14th International Conference on the Theory and Application of Cryptology and Information Security, pp. 90107, 2008. [18] Boneh, D., Franklin, M. Identity-based encryption from the weil pairing. In: Advances in Cryptology (CRYPTO2001). Vol. 2139 of LNCS, pp. 213229, 2001.