SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 5244
MULTI AUTHORITY BASED INTEGRITY AUDITING AND PROOF OF
STORAGE WITH DATA DEDUPLICATION IN CLOUD
Arokia Mary Pooja S1, Anantha Narayanan R2, K Meenakshi3
1,2Student, Dept. of Computer Science and Engineering, SRM Institute of Science and Technology, Tamil Nadu
3Assisstant Professor, Dept. of Computer Science and Engineering, SRM Institute of Science and Technology,
Tamil Nadu
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - Cloud helps in providing services to an
organization over a network with the ability for users to
upload, update and share information. Givingsecuritytocloud
is the most important characteristic to consider in the cloud
computing environment as clients frequently store sensitive
data with cloud storage providers. The problem is that, these
providers may be untrusted. Sharing data in a multi-user
environment, in a secure manner while preserving data from
an unauthorized user is still a challenging issue. Integrity of
the outsourced files can be checked using a cryptographic
technique called Proof of Storage (PoS). In this paper, we have
introduced a method that uses hybrid symmetric and
asymmetric encryption for users to safely store sensitive
information by encryptingandre-encryptingthefile uploaded.
This approach helps store data in the cloud in a secure
manner, thereby protecting it from any attacks that may be
imposed by an intruder. File level data de-duplication
technique is used to identify duplicate data, eliminate
redundancy thus saving the storage space in the cloud server.
The concept of Re-Encryption using AES, DES and RSA
algorithm is introduced to create an efficient system to
establish secure file deduplication and PoS, simultaneously.
Key Words: Cryptography, Hybrid Encryption, Cloud
Security, Proof of Storage, Deduplication.
1. INTRODUCTION
Cloud computing is used for storing and accessing personal,
confidential and sensitive data. The prime benefit of using
cloud storage from the user’s perspective is that customers
can decrease their expenditure in purchasing and
maintaining storage infrastructure whilst only paying for
requested storage, which can be scaled-up and down upon
demand [1]. But it is also very true that cloud Storage is not
in unlimited. Data deduplication is the best way to handle
these data [3]. Here file level technique is used. Elimination
of repetitive or duplicate data is referredtoasdeduplication.
It is very crucial in cloud storages to help save storage space
because redundant information can slow down the system
and occupy unnecessary space. The text file uploaded onthe
cloud is first checked for deduplication using file level
deduplication technique. It is done so bycomparingthehash
index values generated using SHA-1 algorithm and a
comparison check for different users having the same file is
performed. If the current file has the same hash as the
existing file, then a message is promptedtosaythatthesame
file is being uploaded.
Cloud Service Provider manages the information stored.
Data security at various levels is crucial. The problems in a
cloud network may includeintrusionbyhacker,data stealing
and tampering of information etc. To overcome theseissues,
Cryptography is used to ensure safe transmission of
information over the network [5]. It is a process by which an
original text is converted into another form. This transition
from original message to cipher text istermedasencryption.
The mechanism from which a cipher text istransformedinto
the original text is called decryption. This is done with the
help of a key generated from encrypting. Hybrid encryption
provides thrice the time protection for the data stored over
the cloud network. Hybrid encryption is a process by which
two or more algorithms are combined and to provide more
security rather than using a single algorithm. Cloud
computing is used for complex applications in large scale
systems with multiple users. Therefore, it is very important
to ensure the security of data and authenticity ofusersinthe
cloud network. A series of encryption and re-encryption
process in a cloud platform aids in improving the security
aspect from the client’s side. It also helps in guarantyingthat
the Proof of Storage (PoS) is maintained. This mechanism
includes confidentiality, integrity, authenticationofidentity,
and non-repudiation.
1.1 Existing System
An integrity auditing schemefor data stored in the cloudwas
proposed. A novel model wasbuilt to assisthighconcurrency
and hold huge data in the real scenario [1]. Computing tasks
were centralized (e.g., concealing a company’s important
information), which are redundant for the manager, are
shared among users. The users, rather than requesting
information from the concerned person, obtain the required
data directly from the cloudserver [2]. The existingsolutions
for the security of data stored in the cloud is provided by
single level encryption algorithmsat the server side, without
taking into account the confidentiality level of data. A secure
cloud computing model based on data splitting was also
introduced. There are hybrid cryptographic techniques, but
the data stored are generally split and each split information
is encrypted using different algorithms and stored [7]. The
objective of this technique was to establish therequiredlevel
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 5245
of security for data. It reduces processing time and provides
reliability and confidentiality.
Disadvantage:
The main disadvantage is data integrity issues. Hiding
sensitiveinformationusingtraditionalsinglelevelencryption
is not appropriateforfiles stored in thecloudduetoitsmulti-
tenancy and susceptibility to attacks [7].Themechanismand
the system model built for sensitive informationhidingatthe
server side makes the existing scheme advantageous but not
efficient because it does provide adequate proof to the user
that the file uploaded is held safely and that only authorized
person is given permission to request or access.
1.2 Proposed system
We have proposed a cloud system that provides more
reliability using multilevel encryption and decryption. First,
we will be checking for duplicate file by using file level
deduplication which checks the files by comparing the hash
indices using SHA-1 algorithm, after decryption before the
multilevel encryption. If any duplicate data is found in the
file, then the system does not allow the user to upload it in
the cloud consequently saving storage space. To eradicate
the lack of security, we have introduced a simple yet secure
mechanism where after each encryption, the keys obtained
are encrypted again and are stored in a server.Inorderto do
this, a combination of cryptographic algorithmssuchasAES,
DES and RSA are taken. A time-based key is generated to
check that only authorized users are accessing any data
shared between multiple users.
Advantage:
In the proposed framework, we encrypt the data thrice and
store it in a server. All these algorithms use the plaintext in
original form to convert into cipher texts thus generating
keys and storing the encryptedkeysindifferentservers. This
is in turn helps prevent intruders from hacking into the
database and stealing sensitive information. We are adding
extra security level in it. In this, unauthorized user can’t use
the data easily because of a time-based key. Confidential
information is held in the cloud storage safely because of
three level hybrid cryptographic process. We also reduce
the storage space by avoiding duplicate data.
2. Methodology
The text file uploaded on the cloud is first checked for
deduplication using file level deduplication technique.
Redundant data uploaded in the cloud can be easily
identified by the user. It is done so by comparing the hash
index values generated using SHA-1 algorithm and a
comparison check is performed. If the current file has the
same hash as the existing file, then a message is prompted to
say that the same file is being uploaded. If not, the file is
stored in the cloud by first encrypting it using AESalgorithm
for which a key is generated. The cipher text isconsidered as
the plain text in the next encryption process using DES for
which another key is generated. The same is done using RSA
for which two keys are generated. The final cipher text is
stored in the first server. The keys generated for each
algorithm is encrypted using AES and is stored again in a
different server. The keys generated from this is stored in
the third server. Thus, informationisencryptedstronglyand
is distributed among different servers thereby hiding
sensitive information securely in the cloud server while
saving storage space.
Fig -1: Encryption and Re-encryption process
2.1 Algorithms used
Symmetric Encryption:
Advanced Encryption Standard (AES) is a standard
adopted by the US government. AES has three blocks 128,
192, 256 respectively.Thisalgorithmgoesthrough10rounds
for 128 bits. For a 192 bit key, 12 rounds and 14 rounds for
256 bit sized keys. A common public key is generated.
Utilization of memory space is the least in AES. It is the most
widely used forof encryptionandissuperiorwhencompared
to other algorithms.
Data Encryption Standard (DES) is adopted by American
government in 1976, a traditional encryption algorithm. The
DES algorithm uses various cryptographic technologies. An
original text is split into several blocks. Key lengthgivenis64
bits with each block containing 64 bits. Where only 56 bits
are accepted, or valid bits and the remaining block are of 8
bits which is used forparitychecking.Acommonpublickeyis
generated here. Using DES, we can encrypt a data in the least
time when compared to other cryptographic algorithms.
Asymmetric key Encryption:
Rivest–Shamir–Adleman(RSA)Algorithm:InRSA,thereare
two keys, public and private key and is an asymmetric key
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 5246
encryption. In network systems, the most usually used
operations is RSA verification of signature. It has the least
output bits though it is slow and consumes a lot of memory.
3. Technical modules
3.1. Deduplication
Elimination of repetitive or duplicate data is referred to as
deduplication. It is very crucial in cloud storages to help save
storage space because redundantinformationcanslowdown
the system and occupy unnecessary space. The text file
uploaded on the cloud is first checked for deduplication
using file level deduplication technique. Repetitive
information stored in the cloud can be identified easily by
the user. It is done so by comparing the hash index values
generated using SHA-1 algorithm and a comparison check
for different users having the same file is performed. If the
current file has the same hash as the existing file, then a
message is prompted to say that the same file is being
uploaded. If the uploaded file is not a duplicate copy, then it
enters the encryption phase.
Fig -2: Uploading existing file
Fig -3: Deduplicate file exists message
3.2 Encryption
If the file does not contain redundant data, the file is stored
in the cloud by first encrypting it using AES algorithm for
which a key is generated. The cipher textisconsideredasthe
plain text in the next encryption processusingDESforwhich
another key is generated. The same is done using RSA for
which two keys are generated. The final cipher text is stored
in the first server.
Fig -4: Encrypted data stored
3.3 Re-Encryption
The keys generated for each algorithm is encrypted again
using AES and is stored in a different server. This is mapped
to the next block using the file Id in the database. The final
keys generated from this is stored similarly in the third
server. Thus, information is encrypted strongly and is
distributed among different servers therebyhidingsensitive
information securelyinthecloudserverwhilesavingstorage
space.
Fig -5: Re-encrypted keys stored in a different server
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 5247
Fig -6: Final keys from re-encryption stored in the third
server
3.4 Time based Key generation
Authentication is given basedonrandomnumbergeneration
which is used to check that only the authorized or registered
user is requesting and accessing the file. This is done within
a time limit to add to the protection of data. When the user
wants to view the file content that was allowed by another
user, his integrity is first checked by sending this auto-
generated time-based key to their associated email ID. By
entering the correct key, we can verify that only an
authorized person is accessing the content. It also ensures
integrity in a cloud environment where multipleclientsstore
important information.
Fig -7: Verification of authorization of the user
3. CONCLUSIONS
The data is stored successfully using multilevel encryption
by using AES, DES, RSA in a multiuser environment. The
stored data is protected making it difficult for hackers to
steal sensitive information as it ishardtotrack thepatternof
algorithms used to encrypt the data and re-encryptionof the
obtained keys further makes it hard to retrieve keys from
different servers. Integrity auditing and proof of storage is
maintained using this technique while reducing the storage
space occupied by a file in cloud with data deduplication.
REFERENCES
[1] W. Shen, J. Qin, J. Yu, R. Hao, and J. Hu, “Enabling
identity-based integrity auditing and data sharing with
sensitive information hiding for secure cloud storage,”
IEEE Transactions on Information Forensics and
Security, vol. 14, no. 2, pp. 331–346, 2019.
[2] C.Wang “Privacy preserving public auditing for secure
cloud storage,” IEEE Transactions on Computer, vol. 62,
no. 2, pp. 362-375, 2013.
[3] Identity-based remote data integrity checking with
perfect data privacy preserving for cloud storage, IEEE
Transactions on Information Forensics and Security,
G.Ateniese April 2017.
[4] Y. Wang, Q. Wu, B. Qin, W. Shi, R. H. Deng, and J. Hu,
“Identity based data outsourcing with comprehensive
auditing in clouds,” IEEE transactions on information
forensics and security. 12, no.4, pp. 940– 952, 2017.
[5] H. Wang, “Identity-based distributed provable data
possession in multi cloudstorage,”IEEETransactionson
Services Computing, vol. 8, no. 2, pp. 328–340, 2015.
[6] Z. Yan, W. Ding, X. Yu, H. Zhu, and R. H. Deng,
“Deduplication on encrypted big data in cloud,” IEEE
Transactions on Big Data, vol. 2, no. 2, pp. 138–150,
2016.
[7] Vishwanath S Mahalle, Aniket K Shahade, Enhancingthe
Data Security in Cloud by Implementing Hybrid (RSA &
AES) Encryption Algorithm, 2014
[8] Soufiane Oukili, Seddik Bri, "High speed efficient
advanced encryption standard implementation",
Networks Computers and Communications (ISNCC)
2017 International Symposium on, pp. 1-4, 2017.
[9] Punam V. Maitri, Aruna Verma, "secure file storage in
cloud computing using hybrid cryptographyalgorithm",
ieee wispnet 2016 conference (c), 2016.
[10] Mauro Storch, César A. F. de Rose, "Cloud Storage Cost
Modeling for Cryptographic File Systems", Parallel
Distributed and Network-based Processing (PDP) 2017
25th Euromicro International Conference on, pp. 9-14,
2017.
[11] Shivani Saxena, Amit Shrivastava, Aumreesh Saxena,
Manish Manoria, "Protecting Data Storage on Cloud to
Enhance Security Level and Processing of the Data by
using Hadoop", Advanced Computation and
Telecommunication (ICACAT) 2018 International
Conference on, pp. 1-6, 2018.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 5248
[12] Lijuan Li, Shuguo Li, "High throughput AES
encryption/decryption with efficient reordering and
merging techniques", Field Programmable Logic and
Applications (FPL) 2017 27th International Conference
on, pp. 1-4, 2017.
[13] Y. Wang, A. Kumar, Y. Ha, "FPGA-based high throughput
XTS-AES encryption/decryption for storage area
network", IEEE Int. Conf Field- Programmable
Technology (FPT), pp. 268-271, 2014.
[14] Dongyoung Koo, Youngjoo Shin, Joobeom Yun, Junbeom
Hur, "a hybrid deduplication for secure and efficient
data outsourcing in fog computing", 2016, IEEE 8th
international conferenceon cloudcomputingtechnology
and science.
[15] Yingbing Zhou, Yongzhen LI, "The Design and
Implementation of a Symmetric Encryption Algorithm
Based on DES", IEEE ICSESS, pp. 517-520, June 2014.
[16] Jun Ren, Zhiqiang Yao, Jinbo Xiong, Yuanyuan Zhang,
Ayong Ye, "a secure data deduplication scheme
based on differential privacy", 2016 ieee 22nd
international conference on parallel and distributed
system.
[17] Amarja Hanumant Bhosale, A.A. Manjrekar, "Attribute-
Based Storage Control with Smart De-Duplication
Filter Using Hybrid Cloud", Computing Communication
Control and Automation (ICCUBEA) 2018 Fourth
International Conference on, pp. 1-6, 2018.
[18] K. He, J. Chen, R. Du, Q. Wu, G. Xue and X. Zhang,
"DeyPoS: Deduplicatable Dynamic ProofofStoragefor
Multi-User Environments," in IEEE Transactions on
Computers, vol. 65, no. 12, pp. 3631-3645, 1 Dec. 2016.
[19] Q. Zheng and S. Xu, “Secure and efficient proofofstorage
with deduplication,” in Proc. 2nd ACM Conf. Data Appl.
Security Privacy, 2012, pp. 1–12 .
[20] Wang, B. Li, and H. Li, “Public auditing for shared data
with efficient user revocation in the cloud,” in Proc.
INFOCOM, 2015, pp. 2904–2912.
[21] R. Du , L. Deng, J. Chen, K. He, and M. Zheng, “Proofs of
ownership and retrievability in cloud storage,” in Proc.
IEEE 13th Int. Conf. Trust, Security Privacy Comput.
Commun., 2014 , pp. 328–335.
[22] Minxin Du, Qian Wang, Meiqi He, Jian Weng, "Privacy-
Preserving Indexing and Query Processing for Secure
Dynamic Cloud Storage", Information Forensics and
Security IEEE Transactions on, vol. 13, no. 9, pp. 2320-
2332, 2018.
[23] Jasleen K., S.Garg[,“Security in Cloud Computing using
Hybrid of Algorithms”,IJERJS, Volume 3, Issue 5, ISSN
2091-2730,pages 300-305, September-October, 2017.
[24] Kiruthika.R,Jeena.R , “ Enhancing Cloud Computing
Security using AES Algorithm”, IJARCSSE, Volume 5,
Issue 3, ISSN 2277 128X,pp 630-635, March 2016.
[25] S. Munjal1, S. Garg, “Enhancing Data Security and
Storage in Cloud Computing Environment”, IJCSIT, Vol.
6, ISSN 0975- 9646, pages 2623-2626,2015.

Weitere ähnliche Inhalte

Was ist angesagt?

IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET Journal
 
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in CloudAn Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in CloudIRJET Journal
 
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud StorageSecure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud StorageIRJET Journal
 
Big data security_issues_research_paper
Big data security_issues_research_paperBig data security_issues_research_paper
Big data security_issues_research_paperLuisa Francisco
 
Implementation of De-Duplication Algorithm
Implementation of De-Duplication AlgorithmImplementation of De-Duplication Algorithm
Implementation of De-Duplication AlgorithmIRJET Journal
 
IRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using CryptographyIRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using CryptographyIRJET Journal
 
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGEHYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGEAM Publications,India
 
A Secure MSSS Scheme and AES Encryption over Cloud Data
A Secure MSSS Scheme and AES Encryption over Cloud DataA Secure MSSS Scheme and AES Encryption over Cloud Data
A Secure MSSS Scheme and AES Encryption over Cloud DataEditor IJCATR
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET Journal
 
IRJET- Protection of Personal Data on Distributed Cloud using Biometrics
IRJET- Protection of Personal Data on Distributed Cloud using BiometricsIRJET- Protection of Personal Data on Distributed Cloud using Biometrics
IRJET- Protection of Personal Data on Distributed Cloud using BiometricsIRJET Journal
 
Multi-part Dynamic Key Generation For Secure Data Encryption
Multi-part Dynamic Key Generation For Secure Data EncryptionMulti-part Dynamic Key Generation For Secure Data Encryption
Multi-part Dynamic Key Generation For Secure Data EncryptionCSCJournals
 
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEMSECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEMJournal For Research
 
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageBio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageIJERA Editor
 
Cloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve CryptographyCloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve CryptographyIRJET Journal
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET Journal
 
IRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET- A Survey: Data Security in Cloud using Cryptography and SteganographyIRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET- A Survey: Data Security in Cloud using Cryptography and SteganographyIRJET Journal
 
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmHybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmIJECEIAES
 
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud ComputingSecurely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud ComputingIJERA Editor
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 

Was ist angesagt? (20)

IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud Computing
 
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in CloudAn Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
 
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud StorageSecure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
 
Big data security_issues_research_paper
Big data security_issues_research_paperBig data security_issues_research_paper
Big data security_issues_research_paper
 
Implementation of De-Duplication Algorithm
Implementation of De-Duplication AlgorithmImplementation of De-Duplication Algorithm
Implementation of De-Duplication Algorithm
 
IRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using CryptographyIRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using Cryptography
 
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGEHYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
 
A Secure MSSS Scheme and AES Encryption over Cloud Data
A Secure MSSS Scheme and AES Encryption over Cloud DataA Secure MSSS Scheme and AES Encryption over Cloud Data
A Secure MSSS Scheme and AES Encryption over Cloud Data
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
 
IRJET- Protection of Personal Data on Distributed Cloud using Biometrics
IRJET- Protection of Personal Data on Distributed Cloud using BiometricsIRJET- Protection of Personal Data on Distributed Cloud using Biometrics
IRJET- Protection of Personal Data on Distributed Cloud using Biometrics
 
Multi-part Dynamic Key Generation For Secure Data Encryption
Multi-part Dynamic Key Generation For Secure Data EncryptionMulti-part Dynamic Key Generation For Secure Data Encryption
Multi-part Dynamic Key Generation For Secure Data Encryption
 
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEMSECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
 
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageBio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
 
Cloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve CryptographyCloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve Cryptography
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
 
IRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET- A Survey: Data Security in Cloud using Cryptography and SteganographyIRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
 
126689454 jv6
126689454 jv6126689454 jv6
126689454 jv6
 
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmHybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
 
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud ComputingSecurely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 

Ähnlich wie IRJET - Multi Authority based Integrity Auditing and Proof of Storage with Data Deduplication in Cloud

Secure_Data_Distribution_Algorithm_for_Fog_Computing.pdf
Secure_Data_Distribution_Algorithm_for_Fog_Computing.pdfSecure_Data_Distribution_Algorithm_for_Fog_Computing.pdf
Secure_Data_Distribution_Algorithm_for_Fog_Computing.pdfHimaBinduKrovvidi
 
Improving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using HadoopImproving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using HadoopIJERA Editor
 
Revocation based De-duplication Systems for Improving Reliability in Cloud St...
Revocation based De-duplication Systems for Improving Reliability in Cloud St...Revocation based De-duplication Systems for Improving Reliability in Cloud St...
Revocation based De-duplication Systems for Improving Reliability in Cloud St...IRJET Journal
 
Cloud security: literature survey
Cloud security: literature surveyCloud security: literature survey
Cloud security: literature surveyIJECEIAES
 
Block-Level Message-Locked Encryption for Secure Large File De-duplication
Block-Level Message-Locked Encryption for Secure Large File De-duplicationBlock-Level Message-Locked Encryption for Secure Large File De-duplication
Block-Level Message-Locked Encryption for Secure Large File De-duplicationIRJET Journal
 
IRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET- Data Security in Cloud Computing through AES under DrivehqIRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET- Data Security in Cloud Computing through AES under DrivehqIRJET Journal
 
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...IJSRD
 
IRJET- Key Exchange Privacy Preserving Technique in Cloud Computing
IRJET-  	  Key Exchange Privacy Preserving Technique in Cloud ComputingIRJET-  	  Key Exchange Privacy Preserving Technique in Cloud Computing
IRJET- Key Exchange Privacy Preserving Technique in Cloud ComputingIRJET Journal
 
Improved deduplication with keys and chunks in HDFS storage providers
Improved deduplication with keys and chunks in HDFS storage providersImproved deduplication with keys and chunks in HDFS storage providers
Improved deduplication with keys and chunks in HDFS storage providersIRJET Journal
 
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET-  	  Ensuring Security in Cloud Computing Cryptography using CryptographyIRJET-  	  Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET- Ensuring Security in Cloud Computing Cryptography using CryptographyIRJET Journal
 
IRJET- Cloud Computing with Encryption
IRJET-  	  Cloud Computing with EncryptionIRJET-  	  Cloud Computing with Encryption
IRJET- Cloud Computing with EncryptionIRJET Journal
 
Psdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storagePsdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storageZTech Proje
 
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingIRJET Journal
 
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET- Data Security in Cloud Computing using Cryptographic AlgorithmsIRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET- Data Security in Cloud Computing using Cryptographic AlgorithmsIRJET Journal
 
Iaetsd secured and efficient data scheduling of intermediate data sets
Iaetsd secured and efficient data scheduling of intermediate data setsIaetsd secured and efficient data scheduling of intermediate data sets
Iaetsd secured and efficient data scheduling of intermediate data setsIaetsd Iaetsd
 
IJSRED-V2I2P10
IJSRED-V2I2P10IJSRED-V2I2P10
IJSRED-V2I2P10IJSRED
 
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...dbpublications
 
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATAEXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATAIRJET Journal
 

Ähnlich wie IRJET - Multi Authority based Integrity Auditing and Proof of Storage with Data Deduplication in Cloud (20)

Secure_Data_Distribution_Algorithm_for_Fog_Computing.pdf
Secure_Data_Distribution_Algorithm_for_Fog_Computing.pdfSecure_Data_Distribution_Algorithm_for_Fog_Computing.pdf
Secure_Data_Distribution_Algorithm_for_Fog_Computing.pdf
 
Improving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using HadoopImproving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using Hadoop
 
Revocation based De-duplication Systems for Improving Reliability in Cloud St...
Revocation based De-duplication Systems for Improving Reliability in Cloud St...Revocation based De-duplication Systems for Improving Reliability in Cloud St...
Revocation based De-duplication Systems for Improving Reliability in Cloud St...
 
Cloud security: literature survey
Cloud security: literature surveyCloud security: literature survey
Cloud security: literature survey
 
Block-Level Message-Locked Encryption for Secure Large File De-duplication
Block-Level Message-Locked Encryption for Secure Large File De-duplicationBlock-Level Message-Locked Encryption for Secure Large File De-duplication
Block-Level Message-Locked Encryption for Secure Large File De-duplication
 
IRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET- Data Security in Cloud Computing through AES under DrivehqIRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET- Data Security in Cloud Computing through AES under Drivehq
 
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
 
IRJET- Key Exchange Privacy Preserving Technique in Cloud Computing
IRJET-  	  Key Exchange Privacy Preserving Technique in Cloud ComputingIRJET-  	  Key Exchange Privacy Preserving Technique in Cloud Computing
IRJET- Key Exchange Privacy Preserving Technique in Cloud Computing
 
Improved deduplication with keys and chunks in HDFS storage providers
Improved deduplication with keys and chunks in HDFS storage providersImproved deduplication with keys and chunks in HDFS storage providers
Improved deduplication with keys and chunks in HDFS storage providers
 
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET-  	  Ensuring Security in Cloud Computing Cryptography using CryptographyIRJET-  	  Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
 
IRJET- Cloud Computing with Encryption
IRJET-  	  Cloud Computing with EncryptionIRJET-  	  Cloud Computing with Encryption
IRJET- Cloud Computing with Encryption
 
E0952731
E0952731E0952731
E0952731
 
Psdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storagePsdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storage
 
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
 
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET- Data Security in Cloud Computing using Cryptographic AlgorithmsIRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
 
Iaetsd secured and efficient data scheduling of intermediate data sets
Iaetsd secured and efficient data scheduling of intermediate data setsIaetsd secured and efficient data scheduling of intermediate data sets
Iaetsd secured and efficient data scheduling of intermediate data sets
 
IJSRED-V2I2P10
IJSRED-V2I2P10IJSRED-V2I2P10
IJSRED-V2I2P10
 
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
 
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATAEXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
 
Kp3419221926
Kp3419221926Kp3419221926
Kp3419221926
 

Mehr von IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

Mehr von IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Kürzlich hochgeladen

Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01KreezheaRecto
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...SUHANI PANDEY
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdfSuman Jyoti
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 

Kürzlich hochgeladen (20)

Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 

IRJET - Multi Authority based Integrity Auditing and Proof of Storage with Data Deduplication in Cloud

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 5244 MULTI AUTHORITY BASED INTEGRITY AUDITING AND PROOF OF STORAGE WITH DATA DEDUPLICATION IN CLOUD Arokia Mary Pooja S1, Anantha Narayanan R2, K Meenakshi3 1,2Student, Dept. of Computer Science and Engineering, SRM Institute of Science and Technology, Tamil Nadu 3Assisstant Professor, Dept. of Computer Science and Engineering, SRM Institute of Science and Technology, Tamil Nadu ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - Cloud helps in providing services to an organization over a network with the ability for users to upload, update and share information. Givingsecuritytocloud is the most important characteristic to consider in the cloud computing environment as clients frequently store sensitive data with cloud storage providers. The problem is that, these providers may be untrusted. Sharing data in a multi-user environment, in a secure manner while preserving data from an unauthorized user is still a challenging issue. Integrity of the outsourced files can be checked using a cryptographic technique called Proof of Storage (PoS). In this paper, we have introduced a method that uses hybrid symmetric and asymmetric encryption for users to safely store sensitive information by encryptingandre-encryptingthefile uploaded. This approach helps store data in the cloud in a secure manner, thereby protecting it from any attacks that may be imposed by an intruder. File level data de-duplication technique is used to identify duplicate data, eliminate redundancy thus saving the storage space in the cloud server. The concept of Re-Encryption using AES, DES and RSA algorithm is introduced to create an efficient system to establish secure file deduplication and PoS, simultaneously. Key Words: Cryptography, Hybrid Encryption, Cloud Security, Proof of Storage, Deduplication. 1. INTRODUCTION Cloud computing is used for storing and accessing personal, confidential and sensitive data. The prime benefit of using cloud storage from the user’s perspective is that customers can decrease their expenditure in purchasing and maintaining storage infrastructure whilst only paying for requested storage, which can be scaled-up and down upon demand [1]. But it is also very true that cloud Storage is not in unlimited. Data deduplication is the best way to handle these data [3]. Here file level technique is used. Elimination of repetitive or duplicate data is referredtoasdeduplication. It is very crucial in cloud storages to help save storage space because redundant information can slow down the system and occupy unnecessary space. The text file uploaded onthe cloud is first checked for deduplication using file level deduplication technique. It is done so bycomparingthehash index values generated using SHA-1 algorithm and a comparison check for different users having the same file is performed. If the current file has the same hash as the existing file, then a message is promptedtosaythatthesame file is being uploaded. Cloud Service Provider manages the information stored. Data security at various levels is crucial. The problems in a cloud network may includeintrusionbyhacker,data stealing and tampering of information etc. To overcome theseissues, Cryptography is used to ensure safe transmission of information over the network [5]. It is a process by which an original text is converted into another form. This transition from original message to cipher text istermedasencryption. The mechanism from which a cipher text istransformedinto the original text is called decryption. This is done with the help of a key generated from encrypting. Hybrid encryption provides thrice the time protection for the data stored over the cloud network. Hybrid encryption is a process by which two or more algorithms are combined and to provide more security rather than using a single algorithm. Cloud computing is used for complex applications in large scale systems with multiple users. Therefore, it is very important to ensure the security of data and authenticity ofusersinthe cloud network. A series of encryption and re-encryption process in a cloud platform aids in improving the security aspect from the client’s side. It also helps in guarantyingthat the Proof of Storage (PoS) is maintained. This mechanism includes confidentiality, integrity, authenticationofidentity, and non-repudiation. 1.1 Existing System An integrity auditing schemefor data stored in the cloudwas proposed. A novel model wasbuilt to assisthighconcurrency and hold huge data in the real scenario [1]. Computing tasks were centralized (e.g., concealing a company’s important information), which are redundant for the manager, are shared among users. The users, rather than requesting information from the concerned person, obtain the required data directly from the cloudserver [2]. The existingsolutions for the security of data stored in the cloud is provided by single level encryption algorithmsat the server side, without taking into account the confidentiality level of data. A secure cloud computing model based on data splitting was also introduced. There are hybrid cryptographic techniques, but the data stored are generally split and each split information is encrypted using different algorithms and stored [7]. The objective of this technique was to establish therequiredlevel
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 5245 of security for data. It reduces processing time and provides reliability and confidentiality. Disadvantage: The main disadvantage is data integrity issues. Hiding sensitiveinformationusingtraditionalsinglelevelencryption is not appropriateforfiles stored in thecloudduetoitsmulti- tenancy and susceptibility to attacks [7].Themechanismand the system model built for sensitive informationhidingatthe server side makes the existing scheme advantageous but not efficient because it does provide adequate proof to the user that the file uploaded is held safely and that only authorized person is given permission to request or access. 1.2 Proposed system We have proposed a cloud system that provides more reliability using multilevel encryption and decryption. First, we will be checking for duplicate file by using file level deduplication which checks the files by comparing the hash indices using SHA-1 algorithm, after decryption before the multilevel encryption. If any duplicate data is found in the file, then the system does not allow the user to upload it in the cloud consequently saving storage space. To eradicate the lack of security, we have introduced a simple yet secure mechanism where after each encryption, the keys obtained are encrypted again and are stored in a server.Inorderto do this, a combination of cryptographic algorithmssuchasAES, DES and RSA are taken. A time-based key is generated to check that only authorized users are accessing any data shared between multiple users. Advantage: In the proposed framework, we encrypt the data thrice and store it in a server. All these algorithms use the plaintext in original form to convert into cipher texts thus generating keys and storing the encryptedkeysindifferentservers. This is in turn helps prevent intruders from hacking into the database and stealing sensitive information. We are adding extra security level in it. In this, unauthorized user can’t use the data easily because of a time-based key. Confidential information is held in the cloud storage safely because of three level hybrid cryptographic process. We also reduce the storage space by avoiding duplicate data. 2. Methodology The text file uploaded on the cloud is first checked for deduplication using file level deduplication technique. Redundant data uploaded in the cloud can be easily identified by the user. It is done so by comparing the hash index values generated using SHA-1 algorithm and a comparison check is performed. If the current file has the same hash as the existing file, then a message is prompted to say that the same file is being uploaded. If not, the file is stored in the cloud by first encrypting it using AESalgorithm for which a key is generated. The cipher text isconsidered as the plain text in the next encryption process using DES for which another key is generated. The same is done using RSA for which two keys are generated. The final cipher text is stored in the first server. The keys generated for each algorithm is encrypted using AES and is stored again in a different server. The keys generated from this is stored in the third server. Thus, informationisencryptedstronglyand is distributed among different servers thereby hiding sensitive information securely in the cloud server while saving storage space. Fig -1: Encryption and Re-encryption process 2.1 Algorithms used Symmetric Encryption: Advanced Encryption Standard (AES) is a standard adopted by the US government. AES has three blocks 128, 192, 256 respectively.Thisalgorithmgoesthrough10rounds for 128 bits. For a 192 bit key, 12 rounds and 14 rounds for 256 bit sized keys. A common public key is generated. Utilization of memory space is the least in AES. It is the most widely used forof encryptionandissuperiorwhencompared to other algorithms. Data Encryption Standard (DES) is adopted by American government in 1976, a traditional encryption algorithm. The DES algorithm uses various cryptographic technologies. An original text is split into several blocks. Key lengthgivenis64 bits with each block containing 64 bits. Where only 56 bits are accepted, or valid bits and the remaining block are of 8 bits which is used forparitychecking.Acommonpublickeyis generated here. Using DES, we can encrypt a data in the least time when compared to other cryptographic algorithms. Asymmetric key Encryption: Rivest–Shamir–Adleman(RSA)Algorithm:InRSA,thereare two keys, public and private key and is an asymmetric key
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 5246 encryption. In network systems, the most usually used operations is RSA verification of signature. It has the least output bits though it is slow and consumes a lot of memory. 3. Technical modules 3.1. Deduplication Elimination of repetitive or duplicate data is referred to as deduplication. It is very crucial in cloud storages to help save storage space because redundantinformationcanslowdown the system and occupy unnecessary space. The text file uploaded on the cloud is first checked for deduplication using file level deduplication technique. Repetitive information stored in the cloud can be identified easily by the user. It is done so by comparing the hash index values generated using SHA-1 algorithm and a comparison check for different users having the same file is performed. If the current file has the same hash as the existing file, then a message is prompted to say that the same file is being uploaded. If the uploaded file is not a duplicate copy, then it enters the encryption phase. Fig -2: Uploading existing file Fig -3: Deduplicate file exists message 3.2 Encryption If the file does not contain redundant data, the file is stored in the cloud by first encrypting it using AES algorithm for which a key is generated. The cipher textisconsideredasthe plain text in the next encryption processusingDESforwhich another key is generated. The same is done using RSA for which two keys are generated. The final cipher text is stored in the first server. Fig -4: Encrypted data stored 3.3 Re-Encryption The keys generated for each algorithm is encrypted again using AES and is stored in a different server. This is mapped to the next block using the file Id in the database. The final keys generated from this is stored similarly in the third server. Thus, information is encrypted strongly and is distributed among different servers therebyhidingsensitive information securelyinthecloudserverwhilesavingstorage space. Fig -5: Re-encrypted keys stored in a different server
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 5247 Fig -6: Final keys from re-encryption stored in the third server 3.4 Time based Key generation Authentication is given basedonrandomnumbergeneration which is used to check that only the authorized or registered user is requesting and accessing the file. This is done within a time limit to add to the protection of data. When the user wants to view the file content that was allowed by another user, his integrity is first checked by sending this auto- generated time-based key to their associated email ID. By entering the correct key, we can verify that only an authorized person is accessing the content. It also ensures integrity in a cloud environment where multipleclientsstore important information. Fig -7: Verification of authorization of the user 3. CONCLUSIONS The data is stored successfully using multilevel encryption by using AES, DES, RSA in a multiuser environment. The stored data is protected making it difficult for hackers to steal sensitive information as it ishardtotrack thepatternof algorithms used to encrypt the data and re-encryptionof the obtained keys further makes it hard to retrieve keys from different servers. Integrity auditing and proof of storage is maintained using this technique while reducing the storage space occupied by a file in cloud with data deduplication. REFERENCES [1] W. Shen, J. Qin, J. Yu, R. Hao, and J. Hu, “Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage,” IEEE Transactions on Information Forensics and Security, vol. 14, no. 2, pp. 331–346, 2019. [2] C.Wang “Privacy preserving public auditing for secure cloud storage,” IEEE Transactions on Computer, vol. 62, no. 2, pp. 362-375, 2013. [3] Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage, IEEE Transactions on Information Forensics and Security, G.Ateniese April 2017. [4] Y. Wang, Q. Wu, B. Qin, W. Shi, R. H. Deng, and J. Hu, “Identity based data outsourcing with comprehensive auditing in clouds,” IEEE transactions on information forensics and security. 12, no.4, pp. 940– 952, 2017. [5] H. Wang, “Identity-based distributed provable data possession in multi cloudstorage,”IEEETransactionson Services Computing, vol. 8, no. 2, pp. 328–340, 2015. [6] Z. Yan, W. Ding, X. Yu, H. Zhu, and R. H. Deng, “Deduplication on encrypted big data in cloud,” IEEE Transactions on Big Data, vol. 2, no. 2, pp. 138–150, 2016. [7] Vishwanath S Mahalle, Aniket K Shahade, Enhancingthe Data Security in Cloud by Implementing Hybrid (RSA & AES) Encryption Algorithm, 2014 [8] Soufiane Oukili, Seddik Bri, "High speed efficient advanced encryption standard implementation", Networks Computers and Communications (ISNCC) 2017 International Symposium on, pp. 1-4, 2017. [9] Punam V. Maitri, Aruna Verma, "secure file storage in cloud computing using hybrid cryptographyalgorithm", ieee wispnet 2016 conference (c), 2016. [10] Mauro Storch, César A. F. de Rose, "Cloud Storage Cost Modeling for Cryptographic File Systems", Parallel Distributed and Network-based Processing (PDP) 2017 25th Euromicro International Conference on, pp. 9-14, 2017. [11] Shivani Saxena, Amit Shrivastava, Aumreesh Saxena, Manish Manoria, "Protecting Data Storage on Cloud to Enhance Security Level and Processing of the Data by using Hadoop", Advanced Computation and Telecommunication (ICACAT) 2018 International Conference on, pp. 1-6, 2018.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 5248 [12] Lijuan Li, Shuguo Li, "High throughput AES encryption/decryption with efficient reordering and merging techniques", Field Programmable Logic and Applications (FPL) 2017 27th International Conference on, pp. 1-4, 2017. [13] Y. Wang, A. Kumar, Y. Ha, "FPGA-based high throughput XTS-AES encryption/decryption for storage area network", IEEE Int. Conf Field- Programmable Technology (FPT), pp. 268-271, 2014. [14] Dongyoung Koo, Youngjoo Shin, Joobeom Yun, Junbeom Hur, "a hybrid deduplication for secure and efficient data outsourcing in fog computing", 2016, IEEE 8th international conferenceon cloudcomputingtechnology and science. [15] Yingbing Zhou, Yongzhen LI, "The Design and Implementation of a Symmetric Encryption Algorithm Based on DES", IEEE ICSESS, pp. 517-520, June 2014. [16] Jun Ren, Zhiqiang Yao, Jinbo Xiong, Yuanyuan Zhang, Ayong Ye, "a secure data deduplication scheme based on differential privacy", 2016 ieee 22nd international conference on parallel and distributed system. [17] Amarja Hanumant Bhosale, A.A. Manjrekar, "Attribute- Based Storage Control with Smart De-Duplication Filter Using Hybrid Cloud", Computing Communication Control and Automation (ICCUBEA) 2018 Fourth International Conference on, pp. 1-6, 2018. [18] K. He, J. Chen, R. Du, Q. Wu, G. Xue and X. Zhang, "DeyPoS: Deduplicatable Dynamic ProofofStoragefor Multi-User Environments," in IEEE Transactions on Computers, vol. 65, no. 12, pp. 3631-3645, 1 Dec. 2016. [19] Q. Zheng and S. Xu, “Secure and efficient proofofstorage with deduplication,” in Proc. 2nd ACM Conf. Data Appl. Security Privacy, 2012, pp. 1–12 . [20] Wang, B. Li, and H. Li, “Public auditing for shared data with efficient user revocation in the cloud,” in Proc. INFOCOM, 2015, pp. 2904–2912. [21] R. Du , L. Deng, J. Chen, K. He, and M. Zheng, “Proofs of ownership and retrievability in cloud storage,” in Proc. IEEE 13th Int. Conf. Trust, Security Privacy Comput. Commun., 2014 , pp. 328–335. [22] Minxin Du, Qian Wang, Meiqi He, Jian Weng, "Privacy- Preserving Indexing and Query Processing for Secure Dynamic Cloud Storage", Information Forensics and Security IEEE Transactions on, vol. 13, no. 9, pp. 2320- 2332, 2018. [23] Jasleen K., S.Garg[,“Security in Cloud Computing using Hybrid of Algorithms”,IJERJS, Volume 3, Issue 5, ISSN 2091-2730,pages 300-305, September-October, 2017. [24] Kiruthika.R,Jeena.R , “ Enhancing Cloud Computing Security using AES Algorithm”, IJARCSSE, Volume 5, Issue 3, ISSN 2277 128X,pp 630-635, March 2016. [25] S. Munjal1, S. Garg, “Enhancing Data Security and Storage in Cloud Computing Environment”, IJCSIT, Vol. 6, ISSN 0975- 9646, pages 2623-2626,2015.