SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1501
Implementing Proof of Retriavaibility for Multiple Replica of Data File
Using No-SQL Database
M. E. Pore, S. B. Takmare, Amol Mahadik
1Computer Science and Engineering Dept., Bharati Vidyapeeth’s College of Engineering,
Kolhapur (District), Maharashtra-416012, INDIA maheshpore17@gmail.com
2Head of Department, Computer Science and Engineering Dept., Bharati Vidyapeeth’s College of Engineering,
Kolhapur (District), Maharashtra-416012, INDIA sachintakmare@gmail.com
3 Lecturer, Computer Engineering Dept., Bharati Vidyapeeth’s Institute of Technology,
Palus, Sangli (District), Maharashtra-416310, INDIA mahadik.amol@gmail.com
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Cloud computing comprises high demand as an
outsourcing entity to share storagecapacity, differentvendors
databases, a pool of software’sanddifferentplatforms. Instead
of wasting money, many organizations outsource their
services from different Cloud service providers. One of the key
services of Cloud service provider is providing storage
capacity, which is in high demand now a day. But, Cloud
computing is in threat when number of users increased. The
Cloud service provider may behave unfaithfully towards user
in case of CSP with limited resources and many users. This
paper designs a protocol to check integrity of data stored at
Cloud server. Many schemes introduce a new network entity
‘Third Party Auditor’. It reduces the integrity verification
burden of a user. The TPA performs integrity verification of
data stored at cloud server on behalf of user. However, itisnot
enough to trust on TPA in case of sensitive data. The TPA may
also behave unfaithfully towards user. So, this paper proposes
a new protocol that generates a proof of data integrity in case
of untrusted cloud storage as well as untrusted TPA.
Furthermore, to work with and process user’s time series data
this paper replaces relational database system with No-SQL
databases. This will increase the data operation performance
in case of huge data management.
Keywords: Cloud computing, No-SQL database,
Untrusted Third Party Auditor, Integrity of data.
1. INTRODUCTION
Cloud computing is a model to compute mobile, suitableand
as per need access to resources shared at centralized place.
Cloud computing effectively utilizes the IT resources. Cloud
computing provides different services like Iaas, Paas and
Saas. One of the major role in Iaas is to provide storage as a
service. This reduces the burden of the user to store data
locally. It is safe to utilize this service only if when numbers
of users are limited. In case of Cloud service provider with
resource constrained devices, if the number of users
increased the CSP may behave unfaithfully towards user.
Some user’s store their sensitive data at CSP’s, so checking
the correctness of user data and providing safeguards from
unauthorized access is most essential one. The data may be
corrupted or losses due to certain server breakdowns or
hacked by intruders or may be intentionally deleted by CSP
[1].
In case of CSP with resource constrained devices, to
increase resource utilization CSP itself intentionally deletes
user’s rarely accessed data. So now a day in such cases
maintaining verification of user data through various
protocols is in focus. The many schemes implements
integrity proofsthroughdifferentintegrityproofstechniques
[2], [3], [4], [5], [6], [7], [8], [9], [10] and [11].
To generates integrity proofs large number of
computations are required. It creates a huge overhead of
creation of authenticators, tagging of data, and creation of
secret keys at user side. The public verifiability reduces this
computational overhead of user by appointing Third Party
Auditor. The TPA executes different data structure and
algorithms to generate data integrity proofs.
As a safeguard to user data, the data is encrypted by using
set of secret keys at different time periods. The TPA is
always has the possession with this secret key. It may be
possible that TPA also modifies or deletes some data
accidentally or intentionally. In this case generatedintegrity
proof is not correct, so ensuring TPA integrity proofs is
essential. This paper proposes a protocol that verifies TPA’s
generated integrity proofs.
Now a day due to real time data large data warehousesare
require to store it. The CSP’s may maintain this data in
distributed manner. This also requires greater data
operation performance as well as scaling of data at run time.
All this is not possible with traditional relational database
management system.
This paper replaces traditional relational database
management system by No-SQL database. It provides
Decentralized access to data, maintains replicas of dataset
which produces availability, data scalability andstoreslarge
volume of data. All this are very helpful for cloud
applications [14], [15], [16], [17], [18] and [19].
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1502
By taking all these in consideration this paper proposes a
protocol that checks integrity of user data in case of
untrusted CSP as well as untrusted TPA and in No-SQL
environment.
2. LITERATURE REVIEW
Jin Li, Xiao Tan, Xiaofeng Chen, Duncan S. Wong, and
Fatos Xhafa propose the notion of public verifiability to
reduce the computational cost at user side during the
integrity verification of their data. They introduce one more
network element which is acting as an auditor on the behalf
of the client. The auditor preprocesses client's data and
uploads it to the storage server and later verifies the
integrity of data. They were formerly proposed integrity of
only a single copy of a data file by using public verifiability.
They also assumed that a cloud audit server is trusted
network element which will fail atsomeincidents.Theyused
a relational database system which has some database
scalability issues [1].
Ateniese et al. [2] defined the model for ensuring
possession of files on untrusted storages. They also
proposed the first proof-of-storage scheme that supports
public verifiability. The scheme utilizes RSA-based
homomorphic tags for auditing outsourced data, However,
the data owner has to compute a large number of tags for
those data to be outsourced, which usually involves
exponentiation and multiplication operations.Furthermore,
the case of dynamic data storage has not been considered by
Ateniese et al.
Juels and Kaliski Jr. [3] introduced spot-checking and
error correcting codes are adopted to ensure both
“possession” and “retrievability” of data files in archive
service systems. However, public verifiability is not
supported in their scheme and the data owner also has to
make many computational efforts to generate tags for those
data to be outsourced.
Much research devoted their work in data integrity and
security in cloud computing for stored data [4], [5], [6], [7],
[8], [9], [10] and [11].
Jia Yu, Kui Ren, Cong Wang and Vijay Varadharajan
discuss a new aspect of cloud auditing. They investigatehow
to reduce the damage of the client's key exposure in cloud
storage auditing. They formalize the definition and the
security model of the auditing protocol with key-exposure
resilience and propose such protocol. However, they are not
applying this technique in the case of third party auditor
used for cloud storage auditing. Again, public verifiability is
not supported in their scheme and the data owner also has
to make many computational efforts [12].
Zhuo Haoand Nenghai Yu enlightens a multiple-replica
remote data possession checking protocol which has public
verifiability. Homomorphic authenticationtagsbasedon BLS
signature are used in the proposed protocol. Again, they
used a relational database system to maintain the database
of multiple replicas, which required a large number of
complex operations with large data sets [13].
Ruxandra Burtica, Eleonora Maria Mocanu, Mugurel
developed an application which follows a keyword over
multiple social media platforms (e.g. Twitter, Facebook),
maintaining the aggregated data in a No-SQL database [14].
Jing Han, Haihong E, Guan Le and Jian Du define basic
characteristics, the data model of No-SQL. In addition, they
classify No-SQL databases according to the CAP theorem.
Finally, the mainstream No-SQL database is separately
described in detail, and defines some properties to help
enterprises to choose No-SQL [15].
R.Hecht and S.Jablonski, defines use of No-SQL in Cloud
Computing [18].
3. DESIGN ASPECTS
3.1 Proposed System
This paper designs and develops a verification scheme with
public verifiability so that the client can verifycorrectnessof
the remote data using No-SQL database. In addition,
exploring the auditing protocol withkey-exposureresilience
to prevent dishonest behavior of Third Party Auditor (Cloud
Audit Server) and reduce computation and communication
overhead.
Fig - 1: Architecture of Proposed System
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1503
3.2 Methodology
Step 1: Data collection and Setup module: In Data
Collection the traditional data warehouse
solution replaced into emerging big data
technologies such as No-SQL databases. So the
client’s data are stored into No-SQL type
databases, which is a document/text/XML like
structure. By using Searching technique user can
collect a data file from database and divide it into
the M blocks and send these blockstoCloudAudit
Server. In addition to this, user generates set of
secret keys used at different time period to
encrypt the data timely to provide safeguard.
Step 2: Upload module: - In the second module the user
uploads Dataset blocks to the Cloud Audit server.
The Cloud Audit Server generates a signature for
each dataset blocks and re-uploads the data
blocks to the Cloud Storage Server.
Step 3: Signature generation Module: - For each data
block signature is generated by TPA. All these
signature set is then also sent to the client.
Integrity proofs are calculated from these
signatures.
Step 4: Integrity verification module: - The TPA
challenges the CSS for integrity verification of
data file. In response to this CSS provides proofs,
if both matches then data are correct otherwise
data is corrupted/modified or lost by CSS. The
same is done by user to check proofs given by
TPA. All these challenge and proof are done for
multiple replicas of data file.
4. SNAPSHOTS
Fig -2: Starting MongoDB
Fig. 2 shows starting MongoDB, run mongod.exe. This
starts the main MongoDB database process. The waiting
for connections message in the console output indicates
that the mongod.exe process is running successfully.
Fig -3: Key Generation and Updation
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1504
Fig. 3 shows: The client generates the set of secret key and
public key by using key generation and key updation
algorithms. The application accepts the time span from the
client and creates the entered number of secret keys which
will be assigns automatically to TPA periodically to
strengthen the security.
Fig - 4: Challenge-Proof-Verify Process
Fig. 4 shows Integrity verification by user to check proof
generated by TPA to check trustworthiness of TPA.
5. RESULT AND DISSCUTION ON MODULES
Table-1: Tag generation time:
DATASET (MB) TIME(MS)
1 305
2 415
3 503
4 610
5 708
0
100
200
300
400
500
600
700
800
1 2 3 4 5
Time(ms)
Tag Generation
Series1
Chart -1: Tag generation time on Server
In the first experiment, Authenticator generation
time is calculated. Five different number of dataset sizes are
chosen in the experiment to show the authenticator
generation. From chart 1, we can see that the time needed to
generates authenticator’s increaseswhenthesizeofdataset
increases. Compared with thepreviousrelated work [1]time
needed to this is less.
Table -2: Challenge-Proof-Verify time on server 1
Dataset(MB) Time (ms)
1 45
2 60
3 62
4 72
5 75
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1505
Chart - 2: Time required for Challenge-Proof-Verify
process at Server 1(For first Replica of data file)
Table -3: Challenge-Proof-Verify time on server 2
DATASET (MB) TIME(MS)
1 61
2 72
3 95
4 105
5 120
Chart - 3: Time required for Challenge-Proof-Verify
process at Server 2(For second Replica of data file)
In the second experiment, we have
calculated the time required to for Challenge-Proof-Verify
process at different servers for multiple replicas of data
file using No-SQL database.
From the charts 2 and 3, we can say that time needed
for Challenge-Proof-Verify process at different servers for
multiple replicas of data file using No-SQL database is quite
less than traditional RDBMS.
6. CONCLUSIONS
This paper proposes a new proof of retrievability for
cloud storage, this proposes a protocol that verifies CSS’s as
well as TPA’s generated integrity proofs for multiple replica
of a data file. This paper replaces traditional relational
database management system by No-SQL database. It
provides Decentralized access to data, maintains replicas of
dataset which produces availability, data scalability and
stores large volume of data.
REFERENCES
[1] Jin Li, Xiao Tan, Xiaofeng Chen, Duncan S. Wong, and
Fatos Xhafa, “OPoR: Enabling Proof of RetrievabilityinCloud
Computing with Resource-Constrained Devices” IEEE
Transactions on cloud computing vol.3, No.2, April/June
2015.
[2] G. Ateniese, R. Burns, R. Curtmola, J. Herring,L.Kissner,Z.
Peterson,and D. Song, “Provable data possession at
untrusted stores,”in Proc. 14th ACMConf.Comput.Commun.
Security, 2007, pp. 598–609.
[3] A. Juels and B. S. Kaliski Jr, “Pors: Proofs of retrievability
for large files,” in Proc. 14th ACM Conf. Comput. Commun.
Security, 2007, pp. 584–597.
[4] H. Shacham and B. Waters, “Compact proofs of
retrievability,” in Proc. 14th Int. Conf. Theory Appl. Cryptol.
Inf. Security, 2008, pp. 90–107.
[5] K. D. Bowers, A. Juels, and A. Oprea, “Proofs of
retrievability:Theory and implementation,” in Proc. ACM
Workshop Cloud Comput.Security, 2009, pp. 43–54.
[6] M. Naor and G. N. Rothblum, “The complexity of online
memory checking,” J. ACM, vol. 56, no. 1, pp. 2:1–2:46, Feb.
2009.
[7] E.-C. Chang and J. Xu, “Remote integrity check with
dishonest storage server,” in Proc. 13th Eur. Symp. Res.
Comput. Security,2008, pp. 223–237.
[8] M. A. Shah, R. Swaminathan, and M. Baker. (2008).
Privacy-preserving audit and extraction of digital contents,
Cryptology ePrint Archive, Report 2008/186 [Online].
Available: http://eprint.iacr.org/
[9] A. Opera, M. K. Reiter, and K. Yang, “Space-efficient block
storage integrity,” in Proc. 12th Annu. Netw. Distrib. Syst.
Security Symp. 2005, pp. 17–28.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1506
[10] T. S. J. Schwarz and E. L. Miller, “Store, forget,andcheck:
Using algebraic signatures to check remotely administered
storage,” in Proc. 26th IEEE Int. Conf. Distrib. Comput. Syst.,
2006, p. 12.
[11] Q. Wang, K. Ren, S. Yu, and W. Lou, “Dependable and
secure sensor data storage with dynamic integrity
assurance,” ACM Trans.Sens.Netw.,vol.8,no.1,pp.9:1–9:24,
Aug. 2011.
[12] Jia Yu, Kui Ren, Cong Wang and Vijay Varadharajan,
“Enabling Cloud Storage Auditing with Key-Exposure
Resistance” IEEE Transactions on Information forensicsand
security vol.10, No.6, June 2015.
[13] Zhuo Haoand Nenghai Yu, “A Multiple-Replica
Remote Data Possession Checking Protocol with Public
Verifiability” IEEE Transactions on Data, Privacy and E-
commerce April 2010.
[14] Ruxandra Burtica, Eleonora Maria Mocanu, Mugurel
Ionuƣ Andreica, Nicolae ƱapuƟ “Practical application and
evaluation of No-Sql databases inCloud Computing” IEEE
transactions on No-Sql 2012.
[15] Jing Han, Haihong E, Guan Le and Jian Du ” Survey on
No-Sql Database” IEEE 2011.
[16] MongoDB tutorials
https://docs.mongodb.org/getting-started/shell/import-
data/
[17] MongoDB predefined datasets
https://raw.githubusercontent.com/mongodb/docs-
assets/primer-dataset/dataset.json
[18] R.Hecht and S.Jablonski, “NoSQL evaluation: A use case
oriented survey. In Cloud and Service Computing
(CSC) ”, 2011 International Conference, IEEE, (2011)
December, pp. 336-341.
[19] Use relational DBMS, N. saying good bye to DBMSs,
designing effective interfaces, Communications of the ACM
vol.52 no. 9, (2009)
Mr. Mahesh Pore received the B.E.
degree in Computer Science in
2007 from Shivaji University. He is
currently working as Lecturer in
Institute of Civil and Rural
Engineering polytechnic, Gargoti
(Maharashtra, India). His research
interest includes Cloud Computing
and Security.
Mr. Sachin Takmare received the
M.Tech. Degree in Computer
Science and Engineering in year
2013 from Rajiv Gandhi Technical
university, Madhya Pradesh. He is
currently working as Head of the
Engineering, Bharati Vidyapeeth’s College of Engineering,
Kolhapur, and Maharashtra, India. His research interest
includes Data Mining, Networking and Image Processing.
Mr. Amol Mahadik received the
M.E. degree in Computer
Engineering in year 2015 from
Savitribai Phule UniversityPune,
Maharashtra. He is currently
working as Lecturer, Computer
Engineering,BharatiVidyapeeth’s
Institute of Technology, Palus,
and Maharashtra, India. His
research interest includes Data Mining, Cloud Computing
and Big Data.
Department ,Computer

Weitere Àhnliche Inhalte

Was ist angesagt?

Ieee transactions on 2018 network and service management
Ieee transactions on 2018 network and service managementIeee transactions on 2018 network and service management
Ieee transactions on 2018 network and service managementtsysglobalsolutions
 
Performing initiative data prefetching
Performing initiative data prefetchingPerforming initiative data prefetching
Performing initiative data prefetchingKamal Spring
 
IRJET- A Workflow Management System for Scalable Data Mining on Clouds
IRJET- A Workflow Management System for Scalable Data Mining on CloudsIRJET- A Workflow Management System for Scalable Data Mining on Clouds
IRJET- A Workflow Management System for Scalable Data Mining on CloudsIRJET Journal
 
Prediction Based Efficient Resource Provisioning and Its Impact on QoS Parame...
Prediction Based Efficient Resource Provisioning and Its Impact on QoS Parame...Prediction Based Efficient Resource Provisioning and Its Impact on QoS Parame...
Prediction Based Efficient Resource Provisioning and Its Impact on QoS Parame...IJECEIAES
 
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud StorageIRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud StorageIRJET Journal
 
To Improve Data Storage Security Levels in the Cloud
To Improve Data Storage Security Levels in the CloudTo Improve Data Storage Security Levels in the Cloud
To Improve Data Storage Security Levels in the Cloudrahulmonikasharma
 
Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds IRJET Journal
 
IRJET- Secure Data Access on Distributed Database using Skyline Queries
IRJET- Secure Data Access on Distributed Database using Skyline QueriesIRJET- Secure Data Access on Distributed Database using Skyline Queries
IRJET- Secure Data Access on Distributed Database using Skyline QueriesIRJET Journal
 
A real-time big data sentiment analysis for iraqi tweets using spark streaming
A real-time big data sentiment analysis for iraqi tweets using spark streamingA real-time big data sentiment analysis for iraqi tweets using spark streaming
A real-time big data sentiment analysis for iraqi tweets using spark streamingjournalBEEI
 
An Improved Differential Evolution Algorithm for Data Stream Clustering
An Improved Differential Evolution Algorithm for Data Stream ClusteringAn Improved Differential Evolution Algorithm for Data Stream Clustering
An Improved Differential Evolution Algorithm for Data Stream ClusteringIJECEIAES
 
Toward a real time framework in cloudlet-based architecture
Toward a real time framework in cloudlet-based architectureToward a real time framework in cloudlet-based architecture
Toward a real time framework in cloudlet-based architectureredpel dot com
 
Svm Classifier Algorithm for Data Stream Mining Using Hive and R
Svm Classifier Algorithm for Data Stream Mining Using Hive and RSvm Classifier Algorithm for Data Stream Mining Using Hive and R
Svm Classifier Algorithm for Data Stream Mining Using Hive and RIRJET Journal
 
Evidence Data Preprocessing for Forensic and Legal Analytics
Evidence Data Preprocessing for Forensic and Legal AnalyticsEvidence Data Preprocessing for Forensic and Legal Analytics
Evidence Data Preprocessing for Forensic and Legal AnalyticsCSCJournals
 
Biometric Identification and Authentication Providence using Fingerprint for ...
Biometric Identification and Authentication Providence using Fingerprint for ...Biometric Identification and Authentication Providence using Fingerprint for ...
Biometric Identification and Authentication Providence using Fingerprint for ...IJECEIAES
 
Database techniques for resilient network monitoring and inspection
Database techniques for resilient network monitoring and inspectionDatabase techniques for resilient network monitoring and inspection
Database techniques for resilient network monitoring and inspectionTELKOMNIKA JOURNAL
 
Web usage Mining Based on Request Dependency Graph
Web usage Mining Based on Request Dependency GraphWeb usage Mining Based on Request Dependency Graph
Web usage Mining Based on Request Dependency GraphIRJET Journal
 
Privacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storagePrivacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storageparry prabhu
 
Entity resolution for hierarchical data using attributes value comparison ove...
Entity resolution for hierarchical data using attributes value comparison ove...Entity resolution for hierarchical data using attributes value comparison ove...
Entity resolution for hierarchical data using attributes value comparison ove...IAEME Publication
 
IRJET - Coarse Grain Load Balance Algorithm for Detecting
IRJET - Coarse Grain Load Balance Algorithm for DetectingIRJET - Coarse Grain Load Balance Algorithm for Detecting
IRJET - Coarse Grain Load Balance Algorithm for DetectingIRJET Journal
 

Was ist angesagt? (20)

Ieee transactions on 2018 network and service management
Ieee transactions on 2018 network and service managementIeee transactions on 2018 network and service management
Ieee transactions on 2018 network and service management
 
Performing initiative data prefetching
Performing initiative data prefetchingPerforming initiative data prefetching
Performing initiative data prefetching
 
IRJET- A Workflow Management System for Scalable Data Mining on Clouds
IRJET- A Workflow Management System for Scalable Data Mining on CloudsIRJET- A Workflow Management System for Scalable Data Mining on Clouds
IRJET- A Workflow Management System for Scalable Data Mining on Clouds
 
Prediction Based Efficient Resource Provisioning and Its Impact on QoS Parame...
Prediction Based Efficient Resource Provisioning and Its Impact on QoS Parame...Prediction Based Efficient Resource Provisioning and Its Impact on QoS Parame...
Prediction Based Efficient Resource Provisioning and Its Impact on QoS Parame...
 
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud StorageIRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
 
To Improve Data Storage Security Levels in the Cloud
To Improve Data Storage Security Levels in the CloudTo Improve Data Storage Security Levels in the Cloud
To Improve Data Storage Security Levels in the Cloud
 
Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds
 
Sub1582
Sub1582Sub1582
Sub1582
 
IRJET- Secure Data Access on Distributed Database using Skyline Queries
IRJET- Secure Data Access on Distributed Database using Skyline QueriesIRJET- Secure Data Access on Distributed Database using Skyline Queries
IRJET- Secure Data Access on Distributed Database using Skyline Queries
 
A real-time big data sentiment analysis for iraqi tweets using spark streaming
A real-time big data sentiment analysis for iraqi tweets using spark streamingA real-time big data sentiment analysis for iraqi tweets using spark streaming
A real-time big data sentiment analysis for iraqi tweets using spark streaming
 
An Improved Differential Evolution Algorithm for Data Stream Clustering
An Improved Differential Evolution Algorithm for Data Stream ClusteringAn Improved Differential Evolution Algorithm for Data Stream Clustering
An Improved Differential Evolution Algorithm for Data Stream Clustering
 
Toward a real time framework in cloudlet-based architecture
Toward a real time framework in cloudlet-based architectureToward a real time framework in cloudlet-based architecture
Toward a real time framework in cloudlet-based architecture
 
Svm Classifier Algorithm for Data Stream Mining Using Hive and R
Svm Classifier Algorithm for Data Stream Mining Using Hive and RSvm Classifier Algorithm for Data Stream Mining Using Hive and R
Svm Classifier Algorithm for Data Stream Mining Using Hive and R
 
Evidence Data Preprocessing for Forensic and Legal Analytics
Evidence Data Preprocessing for Forensic and Legal AnalyticsEvidence Data Preprocessing for Forensic and Legal Analytics
Evidence Data Preprocessing for Forensic and Legal Analytics
 
Biometric Identification and Authentication Providence using Fingerprint for ...
Biometric Identification and Authentication Providence using Fingerprint for ...Biometric Identification and Authentication Providence using Fingerprint for ...
Biometric Identification and Authentication Providence using Fingerprint for ...
 
Database techniques for resilient network monitoring and inspection
Database techniques for resilient network monitoring and inspectionDatabase techniques for resilient network monitoring and inspection
Database techniques for resilient network monitoring and inspection
 
Web usage Mining Based on Request Dependency Graph
Web usage Mining Based on Request Dependency GraphWeb usage Mining Based on Request Dependency Graph
Web usage Mining Based on Request Dependency Graph
 
Privacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storagePrivacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storage
 
Entity resolution for hierarchical data using attributes value comparison ove...
Entity resolution for hierarchical data using attributes value comparison ove...Entity resolution for hierarchical data using attributes value comparison ove...
Entity resolution for hierarchical data using attributes value comparison ove...
 
IRJET - Coarse Grain Load Balance Algorithm for Detecting
IRJET - Coarse Grain Load Balance Algorithm for DetectingIRJET - Coarse Grain Load Balance Algorithm for Detecting
IRJET - Coarse Grain Load Balance Algorithm for Detecting
 

Ähnlich wie Implementing Proof of Retriavaibility for Multiple Replica of Data File using No-SQL Database

Effective Information Flow Control as a Service: EIFCaaS
Effective Information Flow Control as a Service: EIFCaaSEffective Information Flow Control as a Service: EIFCaaS
Effective Information Flow Control as a Service: EIFCaaSIRJET Journal
 
IRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud DataIRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud DataIRJET Journal
 
Development of Effective Audit Service to Maintain Integrity of Migrated Data...
Development of Effective Audit Service to Maintain Integrity of Migrated Data...Development of Effective Audit Service to Maintain Integrity of Migrated Data...
Development of Effective Audit Service to Maintain Integrity of Migrated Data...IRJET Journal
 
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on CloudIRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on CloudIRJET Journal
 
Authenticated and unrestricted auditing of big data space on cloud through v...
Authenticated and unrestricted auditing of big data space on  cloud through v...Authenticated and unrestricted auditing of big data space on  cloud through v...
Authenticated and unrestricted auditing of big data space on cloud through v...IJMER
 
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...INFOGAIN PUBLICATION
 
IRJET- A Survey on Remote Data Possession Verification Protocol in Cloud Storage
IRJET- A Survey on Remote Data Possession Verification Protocol in Cloud StorageIRJET- A Survey on Remote Data Possession Verification Protocol in Cloud Storage
IRJET- A Survey on Remote Data Possession Verification Protocol in Cloud StorageIRJET Journal
 
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
 IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET - Efficient and Verifiable Queries over Encrypted Data in CloudIRJET Journal
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationEditor IJMTER
 
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...IRJET Journal
 
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET Journal
 
Data Access Control Schemes in Cloud Computing: A Review
Data Access Control Schemes in Cloud Computing: A ReviewData Access Control Schemes in Cloud Computing: A Review
Data Access Control Schemes in Cloud Computing: A ReviewIRJET Journal
 
A Novel Method of Directly Auditing Integrity On Encrypted Data
A Novel Method of Directly Auditing Integrity On Encrypted DataA Novel Method of Directly Auditing Integrity On Encrypted Data
A Novel Method of Directly Auditing Integrity On Encrypted DataIRJET Journal
 
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVMIRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVMIRJET Journal
 
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentInsuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentEditor IJCATR
 
M.E Computer Science Cloud Computing Projects
M.E Computer Science Cloud Computing ProjectsM.E Computer Science Cloud Computing Projects
M.E Computer Science Cloud Computing ProjectsVijay Karan
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingAIRCC Publishing Corporation
 

Ähnlich wie Implementing Proof of Retriavaibility for Multiple Replica of Data File using No-SQL Database (20)

Effective Information Flow Control as a Service: EIFCaaS
Effective Information Flow Control as a Service: EIFCaaSEffective Information Flow Control as a Service: EIFCaaS
Effective Information Flow Control as a Service: EIFCaaS
 
IRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud DataIRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud Data
 
Development of Effective Audit Service to Maintain Integrity of Migrated Data...
Development of Effective Audit Service to Maintain Integrity of Migrated Data...Development of Effective Audit Service to Maintain Integrity of Migrated Data...
Development of Effective Audit Service to Maintain Integrity of Migrated Data...
 
50120140507005 2
50120140507005 250120140507005 2
50120140507005 2
 
50120140507005
5012014050700550120140507005
50120140507005
 
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on CloudIRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on Cloud
 
50120140503020
5012014050302050120140503020
50120140503020
 
Authenticated and unrestricted auditing of big data space on cloud through v...
Authenticated and unrestricted auditing of big data space on  cloud through v...Authenticated and unrestricted auditing of big data space on  cloud through v...
Authenticated and unrestricted auditing of big data space on cloud through v...
 
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
 
IRJET- A Survey on Remote Data Possession Verification Protocol in Cloud Storage
IRJET- A Survey on Remote Data Possession Verification Protocol in Cloud StorageIRJET- A Survey on Remote Data Possession Verification Protocol in Cloud Storage
IRJET- A Survey on Remote Data Possession Verification Protocol in Cloud Storage
 
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
 IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
 
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
 
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
 
Data Access Control Schemes in Cloud Computing: A Review
Data Access Control Schemes in Cloud Computing: A ReviewData Access Control Schemes in Cloud Computing: A Review
Data Access Control Schemes in Cloud Computing: A Review
 
A Novel Method of Directly Auditing Integrity On Encrypted Data
A Novel Method of Directly Auditing Integrity On Encrypted DataA Novel Method of Directly Auditing Integrity On Encrypted Data
A Novel Method of Directly Auditing Integrity On Encrypted Data
 
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVMIRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
 
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentInsuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud Environment
 
M.E Computer Science Cloud Computing Projects
M.E Computer Science Cloud Computing ProjectsM.E Computer Science Cloud Computing Projects
M.E Computer Science Cloud Computing Projects
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
 

Mehr von IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

Mehr von IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

KĂŒrzlich hochgeladen

Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
TechTACÂź CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTACÂź CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTACÂź CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTACÂź CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
An introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxAn introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxPurva Nikam
 
Call Us ≜ 8377877756 ≌ Call Girls In Shastri Nagar (Delhi)
Call Us ≜ 8377877756 ≌ Call Girls In Shastri Nagar (Delhi)Call Us ≜ 8377877756 ≌ Call Girls In Shastri Nagar (Delhi)
Call Us ≜ 8377877756 ≌ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitterShivangiSharma879191
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 

KĂŒrzlich hochgeladen (20)

Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
TechTACÂź CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTACÂź CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTACÂź CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTACÂź CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
An introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxAn introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptx
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Call Us ≜ 8377877756 ≌ Call Girls In Shastri Nagar (Delhi)
Call Us ≜ 8377877756 ≌ Call Girls In Shastri Nagar (Delhi)Call Us ≜ 8377877756 ≌ Call Girls In Shastri Nagar (Delhi)
Call Us ≜ 8377877756 ≌ Call Girls In Shastri Nagar (Delhi)
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 

Implementing Proof of Retriavaibility for Multiple Replica of Data File using No-SQL Database

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1501 Implementing Proof of Retriavaibility for Multiple Replica of Data File Using No-SQL Database M. E. Pore, S. B. Takmare, Amol Mahadik 1Computer Science and Engineering Dept., Bharati Vidyapeeth’s College of Engineering, Kolhapur (District), Maharashtra-416012, INDIA maheshpore17@gmail.com 2Head of Department, Computer Science and Engineering Dept., Bharati Vidyapeeth’s College of Engineering, Kolhapur (District), Maharashtra-416012, INDIA sachintakmare@gmail.com 3 Lecturer, Computer Engineering Dept., Bharati Vidyapeeth’s Institute of Technology, Palus, Sangli (District), Maharashtra-416310, INDIA mahadik.amol@gmail.com ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Cloud computing comprises high demand as an outsourcing entity to share storagecapacity, differentvendors databases, a pool of software’sanddifferentplatforms. Instead of wasting money, many organizations outsource their services from different Cloud service providers. One of the key services of Cloud service provider is providing storage capacity, which is in high demand now a day. But, Cloud computing is in threat when number of users increased. The Cloud service provider may behave unfaithfully towards user in case of CSP with limited resources and many users. This paper designs a protocol to check integrity of data stored at Cloud server. Many schemes introduce a new network entity ‘Third Party Auditor’. It reduces the integrity verification burden of a user. The TPA performs integrity verification of data stored at cloud server on behalf of user. However, itisnot enough to trust on TPA in case of sensitive data. The TPA may also behave unfaithfully towards user. So, this paper proposes a new protocol that generates a proof of data integrity in case of untrusted cloud storage as well as untrusted TPA. Furthermore, to work with and process user’s time series data this paper replaces relational database system with No-SQL databases. This will increase the data operation performance in case of huge data management. Keywords: Cloud computing, No-SQL database, Untrusted Third Party Auditor, Integrity of data. 1. INTRODUCTION Cloud computing is a model to compute mobile, suitableand as per need access to resources shared at centralized place. Cloud computing effectively utilizes the IT resources. Cloud computing provides different services like Iaas, Paas and Saas. One of the major role in Iaas is to provide storage as a service. This reduces the burden of the user to store data locally. It is safe to utilize this service only if when numbers of users are limited. In case of Cloud service provider with resource constrained devices, if the number of users increased the CSP may behave unfaithfully towards user. Some user’s store their sensitive data at CSP’s, so checking the correctness of user data and providing safeguards from unauthorized access is most essential one. The data may be corrupted or losses due to certain server breakdowns or hacked by intruders or may be intentionally deleted by CSP [1]. In case of CSP with resource constrained devices, to increase resource utilization CSP itself intentionally deletes user’s rarely accessed data. So now a day in such cases maintaining verification of user data through various protocols is in focus. The many schemes implements integrity proofsthroughdifferentintegrityproofstechniques [2], [3], [4], [5], [6], [7], [8], [9], [10] and [11]. To generates integrity proofs large number of computations are required. It creates a huge overhead of creation of authenticators, tagging of data, and creation of secret keys at user side. The public verifiability reduces this computational overhead of user by appointing Third Party Auditor. The TPA executes different data structure and algorithms to generate data integrity proofs. As a safeguard to user data, the data is encrypted by using set of secret keys at different time periods. The TPA is always has the possession with this secret key. It may be possible that TPA also modifies or deletes some data accidentally or intentionally. In this case generatedintegrity proof is not correct, so ensuring TPA integrity proofs is essential. This paper proposes a protocol that verifies TPA’s generated integrity proofs. Now a day due to real time data large data warehousesare require to store it. The CSP’s may maintain this data in distributed manner. This also requires greater data operation performance as well as scaling of data at run time. All this is not possible with traditional relational database management system. This paper replaces traditional relational database management system by No-SQL database. It provides Decentralized access to data, maintains replicas of dataset which produces availability, data scalability andstoreslarge volume of data. All this are very helpful for cloud applications [14], [15], [16], [17], [18] and [19].
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1502 By taking all these in consideration this paper proposes a protocol that checks integrity of user data in case of untrusted CSP as well as untrusted TPA and in No-SQL environment. 2. LITERATURE REVIEW Jin Li, Xiao Tan, Xiaofeng Chen, Duncan S. Wong, and Fatos Xhafa propose the notion of public verifiability to reduce the computational cost at user side during the integrity verification of their data. They introduce one more network element which is acting as an auditor on the behalf of the client. The auditor preprocesses client's data and uploads it to the storage server and later verifies the integrity of data. They were formerly proposed integrity of only a single copy of a data file by using public verifiability. They also assumed that a cloud audit server is trusted network element which will fail atsomeincidents.Theyused a relational database system which has some database scalability issues [1]. Ateniese et al. [2] defined the model for ensuring possession of files on untrusted storages. They also proposed the first proof-of-storage scheme that supports public verifiability. The scheme utilizes RSA-based homomorphic tags for auditing outsourced data, However, the data owner has to compute a large number of tags for those data to be outsourced, which usually involves exponentiation and multiplication operations.Furthermore, the case of dynamic data storage has not been considered by Ateniese et al. Juels and Kaliski Jr. [3] introduced spot-checking and error correcting codes are adopted to ensure both “possession” and “retrievability” of data files in archive service systems. However, public verifiability is not supported in their scheme and the data owner also has to make many computational efforts to generate tags for those data to be outsourced. Much research devoted their work in data integrity and security in cloud computing for stored data [4], [5], [6], [7], [8], [9], [10] and [11]. Jia Yu, Kui Ren, Cong Wang and Vijay Varadharajan discuss a new aspect of cloud auditing. They investigatehow to reduce the damage of the client's key exposure in cloud storage auditing. They formalize the definition and the security model of the auditing protocol with key-exposure resilience and propose such protocol. However, they are not applying this technique in the case of third party auditor used for cloud storage auditing. Again, public verifiability is not supported in their scheme and the data owner also has to make many computational efforts [12]. Zhuo Haoand Nenghai Yu enlightens a multiple-replica remote data possession checking protocol which has public verifiability. Homomorphic authenticationtagsbasedon BLS signature are used in the proposed protocol. Again, they used a relational database system to maintain the database of multiple replicas, which required a large number of complex operations with large data sets [13]. Ruxandra Burtica, Eleonora Maria Mocanu, Mugurel developed an application which follows a keyword over multiple social media platforms (e.g. Twitter, Facebook), maintaining the aggregated data in a No-SQL database [14]. Jing Han, Haihong E, Guan Le and Jian Du define basic characteristics, the data model of No-SQL. In addition, they classify No-SQL databases according to the CAP theorem. Finally, the mainstream No-SQL database is separately described in detail, and defines some properties to help enterprises to choose No-SQL [15]. R.Hecht and S.Jablonski, defines use of No-SQL in Cloud Computing [18]. 3. DESIGN ASPECTS 3.1 Proposed System This paper designs and develops a verification scheme with public verifiability so that the client can verifycorrectnessof the remote data using No-SQL database. In addition, exploring the auditing protocol withkey-exposureresilience to prevent dishonest behavior of Third Party Auditor (Cloud Audit Server) and reduce computation and communication overhead. Fig - 1: Architecture of Proposed System
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1503 3.2 Methodology Step 1: Data collection and Setup module: In Data Collection the traditional data warehouse solution replaced into emerging big data technologies such as No-SQL databases. So the client’s data are stored into No-SQL type databases, which is a document/text/XML like structure. By using Searching technique user can collect a data file from database and divide it into the M blocks and send these blockstoCloudAudit Server. In addition to this, user generates set of secret keys used at different time period to encrypt the data timely to provide safeguard. Step 2: Upload module: - In the second module the user uploads Dataset blocks to the Cloud Audit server. The Cloud Audit Server generates a signature for each dataset blocks and re-uploads the data blocks to the Cloud Storage Server. Step 3: Signature generation Module: - For each data block signature is generated by TPA. All these signature set is then also sent to the client. Integrity proofs are calculated from these signatures. Step 4: Integrity verification module: - The TPA challenges the CSS for integrity verification of data file. In response to this CSS provides proofs, if both matches then data are correct otherwise data is corrupted/modified or lost by CSS. The same is done by user to check proofs given by TPA. All these challenge and proof are done for multiple replicas of data file. 4. SNAPSHOTS Fig -2: Starting MongoDB Fig. 2 shows starting MongoDB, run mongod.exe. This starts the main MongoDB database process. The waiting for connections message in the console output indicates that the mongod.exe process is running successfully. Fig -3: Key Generation and Updation
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1504 Fig. 3 shows: The client generates the set of secret key and public key by using key generation and key updation algorithms. The application accepts the time span from the client and creates the entered number of secret keys which will be assigns automatically to TPA periodically to strengthen the security. Fig - 4: Challenge-Proof-Verify Process Fig. 4 shows Integrity verification by user to check proof generated by TPA to check trustworthiness of TPA. 5. RESULT AND DISSCUTION ON MODULES Table-1: Tag generation time: DATASET (MB) TIME(MS) 1 305 2 415 3 503 4 610 5 708 0 100 200 300 400 500 600 700 800 1 2 3 4 5 Time(ms) Tag Generation Series1 Chart -1: Tag generation time on Server In the first experiment, Authenticator generation time is calculated. Five different number of dataset sizes are chosen in the experiment to show the authenticator generation. From chart 1, we can see that the time needed to generates authenticator’s increaseswhenthesizeofdataset increases. Compared with thepreviousrelated work [1]time needed to this is less. Table -2: Challenge-Proof-Verify time on server 1 Dataset(MB) Time (ms) 1 45 2 60 3 62 4 72 5 75
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1505 Chart - 2: Time required for Challenge-Proof-Verify process at Server 1(For first Replica of data file) Table -3: Challenge-Proof-Verify time on server 2 DATASET (MB) TIME(MS) 1 61 2 72 3 95 4 105 5 120 Chart - 3: Time required for Challenge-Proof-Verify process at Server 2(For second Replica of data file) In the second experiment, we have calculated the time required to for Challenge-Proof-Verify process at different servers for multiple replicas of data file using No-SQL database. From the charts 2 and 3, we can say that time needed for Challenge-Proof-Verify process at different servers for multiple replicas of data file using No-SQL database is quite less than traditional RDBMS. 6. CONCLUSIONS This paper proposes a new proof of retrievability for cloud storage, this proposes a protocol that verifies CSS’s as well as TPA’s generated integrity proofs for multiple replica of a data file. This paper replaces traditional relational database management system by No-SQL database. It provides Decentralized access to data, maintains replicas of dataset which produces availability, data scalability and stores large volume of data. REFERENCES [1] Jin Li, Xiao Tan, Xiaofeng Chen, Duncan S. Wong, and Fatos Xhafa, “OPoR: Enabling Proof of RetrievabilityinCloud Computing with Resource-Constrained Devices” IEEE Transactions on cloud computing vol.3, No.2, April/June 2015. [2] G. Ateniese, R. Burns, R. Curtmola, J. Herring,L.Kissner,Z. Peterson,and D. Song, “Provable data possession at untrusted stores,”in Proc. 14th ACMConf.Comput.Commun. Security, 2007, pp. 598–609. [3] A. Juels and B. S. Kaliski Jr, “Pors: Proofs of retrievability for large files,” in Proc. 14th ACM Conf. Comput. Commun. Security, 2007, pp. 584–597. [4] H. Shacham and B. Waters, “Compact proofs of retrievability,” in Proc. 14th Int. Conf. Theory Appl. Cryptol. Inf. Security, 2008, pp. 90–107. [5] K. D. Bowers, A. Juels, and A. Oprea, “Proofs of retrievability:Theory and implementation,” in Proc. ACM Workshop Cloud Comput.Security, 2009, pp. 43–54. [6] M. Naor and G. N. Rothblum, “The complexity of online memory checking,” J. ACM, vol. 56, no. 1, pp. 2:1–2:46, Feb. 2009. [7] E.-C. Chang and J. Xu, “Remote integrity check with dishonest storage server,” in Proc. 13th Eur. Symp. Res. Comput. Security,2008, pp. 223–237. [8] M. A. Shah, R. Swaminathan, and M. Baker. (2008). Privacy-preserving audit and extraction of digital contents, Cryptology ePrint Archive, Report 2008/186 [Online]. Available: http://eprint.iacr.org/ [9] A. Opera, M. K. Reiter, and K. Yang, “Space-efficient block storage integrity,” in Proc. 12th Annu. Netw. Distrib. Syst. Security Symp. 2005, pp. 17–28.
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1506 [10] T. S. J. Schwarz and E. L. Miller, “Store, forget,andcheck: Using algebraic signatures to check remotely administered storage,” in Proc. 26th IEEE Int. Conf. Distrib. Comput. Syst., 2006, p. 12. [11] Q. Wang, K. Ren, S. Yu, and W. Lou, “Dependable and secure sensor data storage with dynamic integrity assurance,” ACM Trans.Sens.Netw.,vol.8,no.1,pp.9:1–9:24, Aug. 2011. [12] Jia Yu, Kui Ren, Cong Wang and Vijay Varadharajan, “Enabling Cloud Storage Auditing with Key-Exposure Resistance” IEEE Transactions on Information forensicsand security vol.10, No.6, June 2015. [13] Zhuo Haoand Nenghai Yu, “A Multiple-Replica Remote Data Possession Checking Protocol with Public Verifiability” IEEE Transactions on Data, Privacy and E- commerce April 2010. [14] Ruxandra Burtica, Eleonora Maria Mocanu, Mugurel IonuĆŁ Andreica, Nicolae ĆąapuƟ “Practical application and evaluation of No-Sql databases inCloud Computing” IEEE transactions on No-Sql 2012. [15] Jing Han, Haihong E, Guan Le and Jian Du ” Survey on No-Sql Database” IEEE 2011. [16] MongoDB tutorials https://docs.mongodb.org/getting-started/shell/import- data/ [17] MongoDB predefined datasets https://raw.githubusercontent.com/mongodb/docs- assets/primer-dataset/dataset.json [18] R.Hecht and S.Jablonski, “NoSQL evaluation: A use case oriented survey. In Cloud and Service Computing (CSC) ”, 2011 International Conference, IEEE, (2011) December, pp. 336-341. [19] Use relational DBMS, N. saying good bye to DBMSs, designing effective interfaces, Communications of the ACM vol.52 no. 9, (2009) Mr. Mahesh Pore received the B.E. degree in Computer Science in 2007 from Shivaji University. He is currently working as Lecturer in Institute of Civil and Rural Engineering polytechnic, Gargoti (Maharashtra, India). His research interest includes Cloud Computing and Security. Mr. Sachin Takmare received the M.Tech. Degree in Computer Science and Engineering in year 2013 from Rajiv Gandhi Technical university, Madhya Pradesh. He is currently working as Head of the Engineering, Bharati Vidyapeeth’s College of Engineering, Kolhapur, and Maharashtra, India. His research interest includes Data Mining, Networking and Image Processing. Mr. Amol Mahadik received the M.E. degree in Computer Engineering in year 2015 from Savitribai Phule UniversityPune, Maharashtra. He is currently working as Lecturer, Computer Engineering,BharatiVidyapeeth’s Institute of Technology, Palus, and Maharashtra, India. His research interest includes Data Mining, Cloud Computing and Big Data. Department ,Computer