SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 08 | August-2015, Available @ http://www.ijret.org 52
A CLOUD STORAGE SYSTEM FOR SHARING DATA SECURELY
WITH PRIVACY PRESERVATION AND FRAUD DETECTION
Manoj Shantaram Tore1
, S.K.Sonkar2
1
PG Student, Computer Engineering, AVCOE Sangamner, Maharashtra, India
2
Assistant Professor, Computer Engineering, AVCOE Sangamner, Maharashtra, India
Abstract
Cloud computing provides much-known services for storing user data over cloud server and it provides attention towards a broad
set of technologies, rules and controls deployed to provide security for applications and data. As the more and more firm uses the
cloud, security in cloud environment is becoming very important issue. It is much needed that companies should work with
partners doing best practices of cloud security and which facilitate transparency for their solutions. Number of security solutions
today depends on the authentication for security but it did not provide solution for the privacy problems while sharing data in the
cloud environment. Data access request from the user itself may expose users’ private data no matter his request approved or not.
So this becomes very important in sharing data in the cloud environment. In this paper we proposed a system which provides
attention towards the above mentioned problem. In proposed system we used the concept of data anonymity for sending data
access request to data owner and also provide the data auditing facility to detect fraud in the integrity of users shared data.
Keywords: Cloud computing, privacy preservation, data integrity, data sharing, authentication
--------------------------------------------------------------------***----------------------------------------------------------------------
1. INTRODUCTION
Cloud computing offers mixing of data servers and web
services in distributed computing fashion. Important firms
like Amazon, Google, Microsoft, Yahoo, Salseforce and
others provides cloud services to users. At the primary stage
the architecture of cloud based services provided by amazon
and after this different new models and variations has been
proposed for cloud architecture. Many techniques available
today for data storage over a cloud server so that client can
be assured in terms of CIA triad, i.e confidentiality, integrity
and availability of data on cloud servers. Confidentiality
means that data is protected from the unauthorized entities.
It can be ensure by different cryptographic techniques.
Availability means the user can use his own data stored over
cloud storage everywhere and anytime. Integrity means that
actual data cannot be change by any unauthorized entities.
Cloud computing technology can increase availability with
the use of internet enabled access, but in this case user is
restricted to timely and strong and healthy provision of
resources. Availability is affected by the architecture of a
cloud and capacity of cloud to store data of cloud provider.
Fig-1 [1] shows the cloud computing environment which
consists of three elements. First one is the cloud user who
has the vast amount of data to be stored over cloud storage,
second one is the cloud storage which is maintain by the
cloud service provider which is able to facilitate storage
services and has large storage space and computation
resources and the last one is the Trusted Third Party (TPP)
who has expertise and has the abilities that cloud user
doesn‟t has. It is trusted to calculate cloud storage service
reliability on behalf of user over user‟s request.
Fig -1: Cloud Storage Environment
Users store their data remotely over cloud and take
advantages of pull based high quality applications and
services from a shared pool of configured computing
resources using cloud storage, without any load of local data
maintenance and storage. The other advantage of using a
cloud services is that user can easily share their data with
other cloud users for getting more and more profits. So data
sharing in the cloud computing environment is an important
functionality. Though data sharing is important in cloud
computing environment, it also creates some security and
privacy problems in cloud computing for sharing data.
User‟s access request for data can itself reveal users privacy
without considering whether he get the permission for
accessing data. Also user storing data over cloud storage has
no longer possession of data physically; it makes data
integrity protection a hard task. So there is a necessity to
develop a system which should protect user privacy and data
integrity. Also it should be able to detect the fraud made to
the shared data over a cloud server. So by considering the
need of sharing data in cloud computing environment we
have designed a system which address the above discussed
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 08 | August-2015, Available @ http://www.ijret.org 53
security problems related to user‟s privacy and data
integrity, our system protect user privacy by sending
anonymous request when user requests other user‟s data for
sharing over cloud storage. To share data with users proxy
re-encryption is applied by cloud server. Attribute based
encryption is provided so that user can only controls its own
data fields. System also checks user data for its correctness
by acting as a third party auditor (TPA). So our system
provides a secure solution for sharing data over cloud
storage.
2. RELATED WORK
A shared authority based privacy preserving protocol [1]
which enables shared access authority to cloud users by
using anonymous access request matching mechanism.
Attribute based access control is used which enables user to
access only its own data fields. Proxy re-encryption scheme
is used by cloud server to facilitate data sharing between
multiple users.
A secure cloud storage system which supports a public
auditing with privacy preservation is proposed in [2]. Third
Party Auditor (TPA) is available to verify user‟s private data
for its integrity. TPA also be able to do audits for more than
one users at same time and efficiently. Homomorphic linear
authentication scheme (HLA) and Message authentication
scheme (MAC) are used to verify data integrity.
An anonymous ID assignment based data sharing algorithm
(AIDA) scheme for multiparty oriented cloud and
distributed computing systems is proposed in [3]. In this
scheme secure sum data mining methods are used to develop
an integer data sharing algorithm. It also uses a variable and
unbounded number of iterations for anonymous assignment.
It works on Sturm‟s theorem and Newton‟s identities for
data mining methods. Algorithm scalability is improved by
using distributed solutions of some polynomials over finite
fields. To detect statistics of the necessary number of
iterations Markov chain representations are used.
A MONA (Multi-owner Data Sharing Secure Scheme) for
dynamic groups in the cloud applications is proposed in [4].
With the use of MONA, user can share his data securely
with other users via untrusted cloud and also supports to
dynamic group interactions. In this data sharing scheme, a
new user who granted access is able to decrypt data files
without pre-contacting with data owner. A user revocation is
performed with the use of revocation list. Secret keys of the
other remaining users are not updated in revocation list in
the process of revocation of one user. Any user in the group
can uses cloud resources anonymously. This is decided by
applying access control. Only group manager is able to
reveal true identity of user for dispute arbitration. In this
scheme encryption computation cost and overhead of
storage is not related to the amount of users.
A distributed storage integrity auditing mechanism scheme
to improve secure and dependable storage services in cloud
computing [5]. To accomplish this, the Homomorphic token
and distributed erasure coded data is introduced. The
scheme allows users to make audit of the cloud storage. For
this the communication and computation cost is kept low.
The auditing results ensures the correctness of cloud storage.
It also supports to dynamic outsourced data operations. It is
shown that the scheme can recover quickly against
malicious data modification attacks, server colliding attacks
and Byzantine failure, to enhance the weakness of
symmetric key cryptosystem in public clouds.
A broadcast group key management (BGKM) is proposed in
[6] and it shows that, user do not need realize public key
cryptography, and can dynamically generate the symmetric
key in the process of decryption. According to this, attribute
based access control scheme is developed so it can achieve
that user is able to decrypt the data iff its attribute of identity
match the content provider‟s policies. Fine grained
algorithm applies Access Control Vector (ACV) to assign
secrets to users depend on the identity attributes and allow
users to derive symmetric keys based on their secrets and
other public information. An advantage of BKGS is that
when there is need for adding or revoking users and
updating access control policy.
In above mentioned works, different security related
problems are addressed that can affect data sharing in cloud.
However users access request related privacy and data
integrity issues are not given simultaneously. So here we
have integrated these issues together and designed a system
which can preserve user‟s privacy at the time of sharing data
over cloud and also considering problems related to user‟s
data integrity.
3. PROBLEM STATEMENT
The aim is to design a system which gets shared access
authority by anonymous access request by considering the
user security and privacy issues and realizes that user is able
to only access its own data fields, share its data among
multiple users by using proxy re-encryption. To verify data
integrity auditing functionality technique is applied.
4. PROPOSED SYSTEM
4.1 System Model
The architecture of proposed system for storing data over
cloud as shown in Fig-2. It consists of „n‟ number of users, a
cloud server or cloud storage (CS) and cloud storage system
which acts as middleware between cloud server and cloud
user. Users are able to perform operations such as login to
system, upload data to cloud server by using Cloud Storage
System, Send request for accessing other user‟s data by
using cloud storage system etc. Cloud server (CS) stores
user data in to a cloud storage it has. Main part of the
architecture is cloud storage system. It performs the
functions for user such as maintain the users database,
authenticate the user, uploading user data to cloud server,
anonymous access request matching for sharing the data,
check the user data for its integrity etc.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 08 | August-2015, Available @ http://www.ijret.org 54
Fig -1: System Architecture
4.2 Threat Model
There is no any trust relationship between cloud server and
users. Cloud server is semi-honest and curious and is
considered as entity that follows strict protocol procedure.
Cloud server may attempt to access users private data. It
shows that cloud server is under the supervision of its cloud
provider, and may have interest in users‟ private data. Other
users also have interest in each other‟s data fields so they
can also try to learn their data.
4.3 Design Goals
For effective utilization our system should achieve
following security measures as follows,
 Anonymity: It guarantees that user get shared access
authority of other users data without revealing the
identity.
 Attribute based access control: It ensures that each
user can only get access to its own data fields.
 Proxy re-encryption: It ensures that multiple user can
share data among themselves.
 Data auditing: it ensures that system checks user data
for its correctness without retrieving the whole copy
of the data and without the additional burden on the
cloud server.
4.4 Algorithms
We have used traditional cryptographic algorithm for
encryption and decryption of user data before
uploading/downloading to a cloud server. In addition to this
we have used following algorithms
 K-Anonymity: K-Anonymity algorithm is the
algorithms used for partially hide the user data. In
our system we are using this algorithm for hiding
user‟s personal information when he sends the data
access request to other users so the user privacy is
protected in getting shares access authority.
In addition to this we have used MD5 algorithm for
generating signatures for files which are stored over cloud
server. We also used Pseudo Random Number Generation
algorithm for generating random keys for encryption. SOAP
protocol is used to make connection to cloud.
5. PERFORMANCE ANALYSIS
We implemented our system by using C#.net technique and
visual studio 2010 on windows system with intel core i3
processor. We have evaluated following results for the
developed system.
0.7
0.8
0.9
1
1.1
0.2 0.4 0.6 0.8 1 1.2 1.4 1.6
Precission
Recall
Fraud
Fraud
Chart -1: Number of frauds detected and number of frauds
expected
Above chart-1 shows that the number of frauds detected and
number of frauds expected in the system. System check for
the fraud when user downloads the file from cloud server.
System then performs the integrity check and detects fraud.
6. CONCLUSION
In this paper, we have described a cloud storage system
which encourages users to share their data securely over
cloud server without revealing their privacy. A system also
checks the user data store on to the cloud serer and preserve
user‟s data integrity. Overall our system preserves user
privacy and data integrity of user data while sharing data in
a cloud environment and facilitate a secure way for sharing
data on the cloud server. So our system ensures that user‟s
privacy and data integrity will be preserve. Our system will
be applicable where there is use of cloud computing.
REFERENCES
[1]. H. Liu, H. Ning, Q. Xiong and L.T. Yang, “Shared
Authority Based Privacy Preserving Authentication Protocol
in Cloud Computing,” IEEE Transactions on PARALLEL
AND DISTRIBUTED SYSTEMS VOL:PP NO:99 YEAR
2014.
[2]. C. Wang, S.S.M Chow, Q. wang , K Ren and W.
Lou,”Privacy-Preserving Public Auditing for Secure Cloud
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 08 | August-2015, Available @ http://www.ijret.org 55
Storage,” IEEE Transactions on COMPUTERS, VOL.62,
NO.2, FEBRUARY 2013.
[3]. L. A. Dunning and R. Kresman, Privacy Preserving
Data Sharing With Anonymous ID Assignment,” IEEE
Transactions on Information forensics and Security, vol. 8,
no. 2, pp. 402-413, 2013.
[4]. X. Liu, Y. Zhang, B. Wang, and J. Yan, ”Mona: Secure
Multi-Owner Data Sharing for Dynamic Groups in the
Cloud,” IEEE Transactions on Parallel and Distributed
systems.[online]ieeexplore.ieee.org/stamp/stamp.jsp?tp=arn
u mber=6374615, 2012.
[5]. C. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou,
Toward Secure and Dependable Storage Services in Cloud
Computing,” IEEE Transactions on Services
Computing,Vol.5, no. 2, pp. 220-232, 2012.
[6]. M. Nabeel, N. Shang and E. Bertino, “Privacy reserving
Policy Based Content Sharing in Public Clouds,” IEEE
Transactions on Knowledge and Data Engineering, [online]
ieexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=629889
1, 2012.
BIOGRAPHIES
Mr. Manoj Shantaram Tore received the
B.E. degree in In Computer Engineering
from University of Pune, in 2012.
Currently he is pursuing Master‟s degree
in Computer Engineering from
Amrutvahini college of Engineering,
Sangamner under University of Pune. His areas of interest
are network Security and cloud computing. He is currently
working in the field of Network security and Cloud
computing.
Prof. S. K. Sonkar received the Master
degree in Computer science and
Engineering from SRTMU Nanded. He is
currently pursuing the Ph.D. degree in
computer science from University of Pune.
He is presently working as Assistant
Professor in Dept. of Computer Engineering in Amrutvahini
college of Engineering, Sangamner, India. His current
research interests include network security and Cloud
Computing.

Más contenido relacionado

La actualidad más candente

secure multi-owner data sharing for dynamic groups
secure multi-owner data sharing for dynamic groupssecure multi-owner data sharing for dynamic groups
secure multi-owner data sharing for dynamic groupsSuchithra Balan
 
SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD CO...
SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD CO...SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD CO...
SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD CO...I3E Technologies
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...IJNSA Journal
 
Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...Adz91 Digital Ads Pvt Ltd
 
Mona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudMona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudAvinash K S
 
Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloud
Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using CloudSecure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloud
Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloudpaperpublications3
 
Secure data sharing for dynamic groups in multi-owner using cloud
Secure data sharing for dynamic groups in multi-owner using cloudSecure data sharing for dynamic groups in multi-owner using cloud
Secure data sharing for dynamic groups in multi-owner using cloudSagar Dhanake
 
Towards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the DataTowards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the DataIRJET Journal
 
Mona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudMona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudKrushna Panda
 
Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...ieeepondy
 
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the CloudSMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloudijsrd.com
 
Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...Pvrtechnologies Nellore
 
Iaetsd secure data sharing of multi-owner groups in cloud
Iaetsd secure data sharing of multi-owner groups in cloudIaetsd secure data sharing of multi-owner groups in cloud
Iaetsd secure data sharing of multi-owner groups in cloudIaetsd Iaetsd
 
Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...Papitha Velumani
 
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...Migrant Systems
 
Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)Jishnu Pradeep
 
A provenance policy based access
A provenance policy based accessA provenance policy based access
A provenance policy based accessijsptm
 

La actualidad más candente (20)

secure multi-owner data sharing for dynamic groups
secure multi-owner data sharing for dynamic groupssecure multi-owner data sharing for dynamic groups
secure multi-owner data sharing for dynamic groups
 
SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD CO...
SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD CO...SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD CO...
SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD CO...
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
 
Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...
 
Mona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudMona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloud
 
Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloud
Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using CloudSecure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloud
Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloud
 
Secure data sharing for dynamic groups in multi-owner using cloud
Secure data sharing for dynamic groups in multi-owner using cloudSecure data sharing for dynamic groups in multi-owner using cloud
Secure data sharing for dynamic groups in multi-owner using cloud
 
Towards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the DataTowards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the Data
 
Mona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudMona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloud
 
Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...
 
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the CloudSMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
 
Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...
 
J018145862
J018145862J018145862
J018145862
 
Iaetsd secure data sharing of multi-owner groups in cloud
Iaetsd secure data sharing of multi-owner groups in cloudIaetsd secure data sharing of multi-owner groups in cloud
Iaetsd secure data sharing of multi-owner groups in cloud
 
Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...
 
Paper2
Paper2Paper2
Paper2
 
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...
 
Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)
 
A provenance policy based access
A provenance policy based accessA provenance policy based access
A provenance policy based access
 
Mona final review
Mona final reviewMona final review
Mona final review
 

Destacado

การติดตั้ง Windows8
การติดตั้ง Windows8การติดตั้ง Windows8
การติดตั้ง Windows8atommove
 
Animais selvagens
Animais selvagensAnimais selvagens
Animais selvagensmarecos5h
 
UM ESTUDO EMPÍRICO DO USO DA COMUNICAÇÃO PARA CARACTERIZAR A OCORRÊNCIA DE DE...
UM ESTUDO EMPÍRICO DO USO DA COMUNICAÇÃO PARA CARACTERIZAR A OCORRÊNCIA DE DE...UM ESTUDO EMPÍRICO DO USO DA COMUNICAÇÃO PARA CARACTERIZAR A OCORRÊNCIA DE DE...
UM ESTUDO EMPÍRICO DO USO DA COMUNICAÇÃO PARA CARACTERIZAR A OCORRÊNCIA DE DE...Igor Wiese
 
Dados científicos, Serviços nacionais de dados e Research Data Alliance
Dados científicos, Serviços nacionais de dados e Research Data AllianceDados científicos, Serviços nacionais de dados e Research Data Alliance
Dados científicos, Serviços nacionais de dados e Research Data AllianceDaniela Brauner
 
LIGHTING CONFERENCE 2015
LIGHTING CONFERENCE 2015LIGHTING CONFERENCE 2015
LIGHTING CONFERENCE 2015LEONIDAS VERGOS
 
Titas Lapinskas - Technical Team Leader in Agile
Titas Lapinskas - Technical Team Leader in AgileTitas Lapinskas - Technical Team Leader in Agile
Titas Lapinskas - Technical Team Leader in AgileAgile Lietuva
 
Kennisnet Webinar: kansen en uitdagingen bij datagedreven onderwijs
Kennisnet Webinar: kansen en uitdagingen bij datagedreven onderwijsKennisnet Webinar: kansen en uitdagingen bij datagedreven onderwijs
Kennisnet Webinar: kansen en uitdagingen bij datagedreven onderwijserikwoning
 
Indicadores de Inovação
Indicadores de InovaçãoIndicadores de Inovação
Indicadores de InovaçãoEthel Capuano
 
Tom_Osborne_Resume
Tom_Osborne_ResumeTom_Osborne_Resume
Tom_Osborne_ResumeTom Osborne
 
Single Stage Differential Folded Cascode Amplifier
Single Stage Differential Folded Cascode AmplifierSingle Stage Differential Folded Cascode Amplifier
Single Stage Differential Folded Cascode AmplifierAalay Kapadia
 
Gestão de Projetos e Programas - Aula # 15
Gestão de Projetos e Programas - Aula # 15Gestão de Projetos e Programas - Aula # 15
Gestão de Projetos e Programas - Aula # 15Ethel Capuano
 
Aula03 - Termo de Abertura de Projeto
Aula03 - Termo de Abertura de ProjetoAula03 - Termo de Abertura de Projeto
Aula03 - Termo de Abertura de ProjetoDaniela Brauner
 
Cover pembahagi fail panitia 2014
Cover pembahagi fail panitia 2014Cover pembahagi fail panitia 2014
Cover pembahagi fail panitia 2014Siti Norijah Muda
 
Perancangan strategik bm 2016
Perancangan strategik bm 2016Perancangan strategik bm 2016
Perancangan strategik bm 2016Ahmad Yusoff
 

Destacado (20)

Cake ops black
Cake ops   blackCake ops   black
Cake ops black
 
การติดตั้ง Windows8
การติดตั้ง Windows8การติดตั้ง Windows8
การติดตั้ง Windows8
 
Web quest lie
Web quest lieWeb quest lie
Web quest lie
 
Animais selvagens
Animais selvagensAnimais selvagens
Animais selvagens
 
UM ESTUDO EMPÍRICO DO USO DA COMUNICAÇÃO PARA CARACTERIZAR A OCORRÊNCIA DE DE...
UM ESTUDO EMPÍRICO DO USO DA COMUNICAÇÃO PARA CARACTERIZAR A OCORRÊNCIA DE DE...UM ESTUDO EMPÍRICO DO USO DA COMUNICAÇÃO PARA CARACTERIZAR A OCORRÊNCIA DE DE...
UM ESTUDO EMPÍRICO DO USO DA COMUNICAÇÃO PARA CARACTERIZAR A OCORRÊNCIA DE DE...
 
Sm 10 6 09
Sm 10 6 09Sm 10 6 09
Sm 10 6 09
 
Dados científicos, Serviços nacionais de dados e Research Data Alliance
Dados científicos, Serviços nacionais de dados e Research Data AllianceDados científicos, Serviços nacionais de dados e Research Data Alliance
Dados científicos, Serviços nacionais de dados e Research Data Alliance
 
LIGHTING CONFERENCE 2015
LIGHTING CONFERENCE 2015LIGHTING CONFERENCE 2015
LIGHTING CONFERENCE 2015
 
RG
RGRG
RG
 
Titas Lapinskas - Technical Team Leader in Agile
Titas Lapinskas - Technical Team Leader in AgileTitas Lapinskas - Technical Team Leader in Agile
Titas Lapinskas - Technical Team Leader in Agile
 
Kennisnet Webinar: kansen en uitdagingen bij datagedreven onderwijs
Kennisnet Webinar: kansen en uitdagingen bij datagedreven onderwijsKennisnet Webinar: kansen en uitdagingen bij datagedreven onderwijs
Kennisnet Webinar: kansen en uitdagingen bij datagedreven onderwijs
 
Indicadores de Inovação
Indicadores de InovaçãoIndicadores de Inovação
Indicadores de Inovação
 
Tom_Osborne_Resume
Tom_Osborne_ResumeTom_Osborne_Resume
Tom_Osborne_Resume
 
Ece523 folded cascode design
Ece523 folded cascode designEce523 folded cascode design
Ece523 folded cascode design
 
Single Stage Differential Folded Cascode Amplifier
Single Stage Differential Folded Cascode AmplifierSingle Stage Differential Folded Cascode Amplifier
Single Stage Differential Folded Cascode Amplifier
 
Gestão de Projetos e Programas - Aula # 15
Gestão de Projetos e Programas - Aula # 15Gestão de Projetos e Programas - Aula # 15
Gestão de Projetos e Programas - Aula # 15
 
Aula03 - Termo de Abertura de Projeto
Aula03 - Termo de Abertura de ProjetoAula03 - Termo de Abertura de Projeto
Aula03 - Termo de Abertura de Projeto
 
Cover pembahagi fail panitia 2014
Cover pembahagi fail panitia 2014Cover pembahagi fail panitia 2014
Cover pembahagi fail panitia 2014
 
Perancangan strategik bm 2016
Perancangan strategik bm 2016Perancangan strategik bm 2016
Perancangan strategik bm 2016
 
Magazyn THEY.PL - nr 10 (2015)
Magazyn THEY.PL - nr 10 (2015)Magazyn THEY.PL - nr 10 (2015)
Magazyn THEY.PL - nr 10 (2015)
 

Similar a A cloud storage system for sharing data securely with privacy preservation and fraud detection

Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data securityeSAT Publishing House
 
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET Journal
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocolIaetsd Iaetsd
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudIJERA Editor
 
Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944Editor IJARCET
 
Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944Editor IJARCET
 
Anonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in CloudAnonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in CloudIRJET Journal
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...IJNSA Journal
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET Journal
 
Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds IRJET Journal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...IRJET Journal
 
Paper id 212014106
Paper id 212014106Paper id 212014106
Paper id 212014106IJRAT
 
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture. Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture. IJCERT JOURNAL
 
Security Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party AuditorSecurity Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party Auditorijsrd.com
 
Ensuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storageEnsuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storageeSAT Publishing House
 
Ensuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storageEnsuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storageeSAT Journals
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEditor IJMTER
 
Iaetsd storage privacy protection against data
Iaetsd storage privacy protection against dataIaetsd storage privacy protection against data
Iaetsd storage privacy protection against dataIaetsd Iaetsd
 

Similar a A cloud storage system for sharing data securely with privacy preservation and fraud detection (20)

Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
 
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocol
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
 
Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944
 
Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944
 
Anonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in CloudAnonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in Cloud
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
 
Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
 
Paper id 212014106
Paper id 212014106Paper id 212014106
Paper id 212014106
 
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture. Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
 
Security Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party AuditorSecurity Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party Auditor
 
Ensuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storageEnsuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storage
 
Ensuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storageEnsuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storage
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
 
Iaetsd storage privacy protection against data
Iaetsd storage privacy protection against dataIaetsd storage privacy protection against data
Iaetsd storage privacy protection against data
 

Más de eSAT Journals

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementseSAT Journals
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case studyeSAT Journals
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case studyeSAT Journals
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreeSAT Journals
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialseSAT Journals
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...eSAT Journals
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...eSAT Journals
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizereSAT Journals
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementeSAT Journals
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...eSAT Journals
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteeSAT Journals
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...eSAT Journals
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...eSAT Journals
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabseSAT Journals
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaeSAT Journals
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...eSAT Journals
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodeSAT Journals
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniqueseSAT Journals
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...eSAT Journals
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...eSAT Journals
 

Más de eSAT Journals (20)

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniques
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
 

Último

notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptMsecMca
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
Intro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdfIntro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdfrs7054576148
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...SUHANI PANDEY
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfRagavanV2
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...tanu pandey
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 

Último (20)

notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Intro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdfIntro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdf
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdf
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 

A cloud storage system for sharing data securely with privacy preservation and fraud detection

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 08 | August-2015, Available @ http://www.ijret.org 52 A CLOUD STORAGE SYSTEM FOR SHARING DATA SECURELY WITH PRIVACY PRESERVATION AND FRAUD DETECTION Manoj Shantaram Tore1 , S.K.Sonkar2 1 PG Student, Computer Engineering, AVCOE Sangamner, Maharashtra, India 2 Assistant Professor, Computer Engineering, AVCOE Sangamner, Maharashtra, India Abstract Cloud computing provides much-known services for storing user data over cloud server and it provides attention towards a broad set of technologies, rules and controls deployed to provide security for applications and data. As the more and more firm uses the cloud, security in cloud environment is becoming very important issue. It is much needed that companies should work with partners doing best practices of cloud security and which facilitate transparency for their solutions. Number of security solutions today depends on the authentication for security but it did not provide solution for the privacy problems while sharing data in the cloud environment. Data access request from the user itself may expose users’ private data no matter his request approved or not. So this becomes very important in sharing data in the cloud environment. In this paper we proposed a system which provides attention towards the above mentioned problem. In proposed system we used the concept of data anonymity for sending data access request to data owner and also provide the data auditing facility to detect fraud in the integrity of users shared data. Keywords: Cloud computing, privacy preservation, data integrity, data sharing, authentication --------------------------------------------------------------------***---------------------------------------------------------------------- 1. INTRODUCTION Cloud computing offers mixing of data servers and web services in distributed computing fashion. Important firms like Amazon, Google, Microsoft, Yahoo, Salseforce and others provides cloud services to users. At the primary stage the architecture of cloud based services provided by amazon and after this different new models and variations has been proposed for cloud architecture. Many techniques available today for data storage over a cloud server so that client can be assured in terms of CIA triad, i.e confidentiality, integrity and availability of data on cloud servers. Confidentiality means that data is protected from the unauthorized entities. It can be ensure by different cryptographic techniques. Availability means the user can use his own data stored over cloud storage everywhere and anytime. Integrity means that actual data cannot be change by any unauthorized entities. Cloud computing technology can increase availability with the use of internet enabled access, but in this case user is restricted to timely and strong and healthy provision of resources. Availability is affected by the architecture of a cloud and capacity of cloud to store data of cloud provider. Fig-1 [1] shows the cloud computing environment which consists of three elements. First one is the cloud user who has the vast amount of data to be stored over cloud storage, second one is the cloud storage which is maintain by the cloud service provider which is able to facilitate storage services and has large storage space and computation resources and the last one is the Trusted Third Party (TPP) who has expertise and has the abilities that cloud user doesn‟t has. It is trusted to calculate cloud storage service reliability on behalf of user over user‟s request. Fig -1: Cloud Storage Environment Users store their data remotely over cloud and take advantages of pull based high quality applications and services from a shared pool of configured computing resources using cloud storage, without any load of local data maintenance and storage. The other advantage of using a cloud services is that user can easily share their data with other cloud users for getting more and more profits. So data sharing in the cloud computing environment is an important functionality. Though data sharing is important in cloud computing environment, it also creates some security and privacy problems in cloud computing for sharing data. User‟s access request for data can itself reveal users privacy without considering whether he get the permission for accessing data. Also user storing data over cloud storage has no longer possession of data physically; it makes data integrity protection a hard task. So there is a necessity to develop a system which should protect user privacy and data integrity. Also it should be able to detect the fraud made to the shared data over a cloud server. So by considering the need of sharing data in cloud computing environment we have designed a system which address the above discussed
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 08 | August-2015, Available @ http://www.ijret.org 53 security problems related to user‟s privacy and data integrity, our system protect user privacy by sending anonymous request when user requests other user‟s data for sharing over cloud storage. To share data with users proxy re-encryption is applied by cloud server. Attribute based encryption is provided so that user can only controls its own data fields. System also checks user data for its correctness by acting as a third party auditor (TPA). So our system provides a secure solution for sharing data over cloud storage. 2. RELATED WORK A shared authority based privacy preserving protocol [1] which enables shared access authority to cloud users by using anonymous access request matching mechanism. Attribute based access control is used which enables user to access only its own data fields. Proxy re-encryption scheme is used by cloud server to facilitate data sharing between multiple users. A secure cloud storage system which supports a public auditing with privacy preservation is proposed in [2]. Third Party Auditor (TPA) is available to verify user‟s private data for its integrity. TPA also be able to do audits for more than one users at same time and efficiently. Homomorphic linear authentication scheme (HLA) and Message authentication scheme (MAC) are used to verify data integrity. An anonymous ID assignment based data sharing algorithm (AIDA) scheme for multiparty oriented cloud and distributed computing systems is proposed in [3]. In this scheme secure sum data mining methods are used to develop an integer data sharing algorithm. It also uses a variable and unbounded number of iterations for anonymous assignment. It works on Sturm‟s theorem and Newton‟s identities for data mining methods. Algorithm scalability is improved by using distributed solutions of some polynomials over finite fields. To detect statistics of the necessary number of iterations Markov chain representations are used. A MONA (Multi-owner Data Sharing Secure Scheme) for dynamic groups in the cloud applications is proposed in [4]. With the use of MONA, user can share his data securely with other users via untrusted cloud and also supports to dynamic group interactions. In this data sharing scheme, a new user who granted access is able to decrypt data files without pre-contacting with data owner. A user revocation is performed with the use of revocation list. Secret keys of the other remaining users are not updated in revocation list in the process of revocation of one user. Any user in the group can uses cloud resources anonymously. This is decided by applying access control. Only group manager is able to reveal true identity of user for dispute arbitration. In this scheme encryption computation cost and overhead of storage is not related to the amount of users. A distributed storage integrity auditing mechanism scheme to improve secure and dependable storage services in cloud computing [5]. To accomplish this, the Homomorphic token and distributed erasure coded data is introduced. The scheme allows users to make audit of the cloud storage. For this the communication and computation cost is kept low. The auditing results ensures the correctness of cloud storage. It also supports to dynamic outsourced data operations. It is shown that the scheme can recover quickly against malicious data modification attacks, server colliding attacks and Byzantine failure, to enhance the weakness of symmetric key cryptosystem in public clouds. A broadcast group key management (BGKM) is proposed in [6] and it shows that, user do not need realize public key cryptography, and can dynamically generate the symmetric key in the process of decryption. According to this, attribute based access control scheme is developed so it can achieve that user is able to decrypt the data iff its attribute of identity match the content provider‟s policies. Fine grained algorithm applies Access Control Vector (ACV) to assign secrets to users depend on the identity attributes and allow users to derive symmetric keys based on their secrets and other public information. An advantage of BKGS is that when there is need for adding or revoking users and updating access control policy. In above mentioned works, different security related problems are addressed that can affect data sharing in cloud. However users access request related privacy and data integrity issues are not given simultaneously. So here we have integrated these issues together and designed a system which can preserve user‟s privacy at the time of sharing data over cloud and also considering problems related to user‟s data integrity. 3. PROBLEM STATEMENT The aim is to design a system which gets shared access authority by anonymous access request by considering the user security and privacy issues and realizes that user is able to only access its own data fields, share its data among multiple users by using proxy re-encryption. To verify data integrity auditing functionality technique is applied. 4. PROPOSED SYSTEM 4.1 System Model The architecture of proposed system for storing data over cloud as shown in Fig-2. It consists of „n‟ number of users, a cloud server or cloud storage (CS) and cloud storage system which acts as middleware between cloud server and cloud user. Users are able to perform operations such as login to system, upload data to cloud server by using Cloud Storage System, Send request for accessing other user‟s data by using cloud storage system etc. Cloud server (CS) stores user data in to a cloud storage it has. Main part of the architecture is cloud storage system. It performs the functions for user such as maintain the users database, authenticate the user, uploading user data to cloud server, anonymous access request matching for sharing the data, check the user data for its integrity etc.
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 08 | August-2015, Available @ http://www.ijret.org 54 Fig -1: System Architecture 4.2 Threat Model There is no any trust relationship between cloud server and users. Cloud server is semi-honest and curious and is considered as entity that follows strict protocol procedure. Cloud server may attempt to access users private data. It shows that cloud server is under the supervision of its cloud provider, and may have interest in users‟ private data. Other users also have interest in each other‟s data fields so they can also try to learn their data. 4.3 Design Goals For effective utilization our system should achieve following security measures as follows,  Anonymity: It guarantees that user get shared access authority of other users data without revealing the identity.  Attribute based access control: It ensures that each user can only get access to its own data fields.  Proxy re-encryption: It ensures that multiple user can share data among themselves.  Data auditing: it ensures that system checks user data for its correctness without retrieving the whole copy of the data and without the additional burden on the cloud server. 4.4 Algorithms We have used traditional cryptographic algorithm for encryption and decryption of user data before uploading/downloading to a cloud server. In addition to this we have used following algorithms  K-Anonymity: K-Anonymity algorithm is the algorithms used for partially hide the user data. In our system we are using this algorithm for hiding user‟s personal information when he sends the data access request to other users so the user privacy is protected in getting shares access authority. In addition to this we have used MD5 algorithm for generating signatures for files which are stored over cloud server. We also used Pseudo Random Number Generation algorithm for generating random keys for encryption. SOAP protocol is used to make connection to cloud. 5. PERFORMANCE ANALYSIS We implemented our system by using C#.net technique and visual studio 2010 on windows system with intel core i3 processor. We have evaluated following results for the developed system. 0.7 0.8 0.9 1 1.1 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 Precission Recall Fraud Fraud Chart -1: Number of frauds detected and number of frauds expected Above chart-1 shows that the number of frauds detected and number of frauds expected in the system. System check for the fraud when user downloads the file from cloud server. System then performs the integrity check and detects fraud. 6. CONCLUSION In this paper, we have described a cloud storage system which encourages users to share their data securely over cloud server without revealing their privacy. A system also checks the user data store on to the cloud serer and preserve user‟s data integrity. Overall our system preserves user privacy and data integrity of user data while sharing data in a cloud environment and facilitate a secure way for sharing data on the cloud server. So our system ensures that user‟s privacy and data integrity will be preserve. Our system will be applicable where there is use of cloud computing. REFERENCES [1]. H. Liu, H. Ning, Q. Xiong and L.T. Yang, “Shared Authority Based Privacy Preserving Authentication Protocol in Cloud Computing,” IEEE Transactions on PARALLEL AND DISTRIBUTED SYSTEMS VOL:PP NO:99 YEAR 2014. [2]. C. Wang, S.S.M Chow, Q. wang , K Ren and W. Lou,”Privacy-Preserving Public Auditing for Secure Cloud
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 08 | August-2015, Available @ http://www.ijret.org 55 Storage,” IEEE Transactions on COMPUTERS, VOL.62, NO.2, FEBRUARY 2013. [3]. L. A. Dunning and R. Kresman, Privacy Preserving Data Sharing With Anonymous ID Assignment,” IEEE Transactions on Information forensics and Security, vol. 8, no. 2, pp. 402-413, 2013. [4]. X. Liu, Y. Zhang, B. Wang, and J. Yan, ”Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud,” IEEE Transactions on Parallel and Distributed systems.[online]ieeexplore.ieee.org/stamp/stamp.jsp?tp=arn u mber=6374615, 2012. [5]. C. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou, Toward Secure and Dependable Storage Services in Cloud Computing,” IEEE Transactions on Services Computing,Vol.5, no. 2, pp. 220-232, 2012. [6]. M. Nabeel, N. Shang and E. Bertino, “Privacy reserving Policy Based Content Sharing in Public Clouds,” IEEE Transactions on Knowledge and Data Engineering, [online] ieexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=629889 1, 2012. BIOGRAPHIES Mr. Manoj Shantaram Tore received the B.E. degree in In Computer Engineering from University of Pune, in 2012. Currently he is pursuing Master‟s degree in Computer Engineering from Amrutvahini college of Engineering, Sangamner under University of Pune. His areas of interest are network Security and cloud computing. He is currently working in the field of Network security and Cloud computing. Prof. S. K. Sonkar received the Master degree in Computer science and Engineering from SRTMU Nanded. He is currently pursuing the Ph.D. degree in computer science from University of Pune. He is presently working as Assistant Professor in Dept. of Computer Engineering in Amrutvahini college of Engineering, Sangamner, India. His current research interests include network security and Cloud Computing.