SlideShare a Scribd company logo
1 of 7
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3326
Improving Data Spillage in Multi-Cloud Capacity Administration
1Nivedha.D, 2Vinitha.R
3 Mrs. N.Gowri Vidhya, M.E Associate professor,
Department of Computer Science and Engineering,
Prince Dr K Vasudevan college of Engineering And Technology, Chennai, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract--In provable multi-cloud, is used to prevent the data from the data leakage. First they should register their details in the user
registration and in owner details. If user want to upload a file, it may be any kind of file. Here weareusingAES/ABSalgorithmtouploadafile.
Then it will be compressed by using compressor. After compressed give the new file name and then it will be encrypted and data will be
splitted by using Fully Homomorphic Encryption(FHE). The splitted fileswillbestoredindifferentdatabase.Afterfinishingtheprocessitwill
automatically generate two secret key. If they user want to download the file or view the file, by giving the new filename and the two- secret
key. StoreSim, an information leakage aware storage system in multicloud. StoreSim aims to store syntactically similar data on the same
cloud, thus minimizing the user’s information leakage across multiple clouds. It reduce access timeand communication from users. Convert
zip while upload the data. The authorized users send the file request to cloud server again server send the encrypted data to authorized
user. And authorized user get the decrypt key from data owner. we introduced new technique that is Fully Homomorphic
Encryption(FHE) for take Multi copy of data, File security, Data Corrupted. In this Project wehavetoFHEalgorithmforprotect
the data. That are keygen, copygen and taggen. Above the process done in Existing system using Single copy of Dynamic Data.
StoreSim, an information leakage aware storage system in multicloud. StoreSim aims to store syntactically similar data onthe
same cloud, thus minimizing the user’s information leakage across multiple clouds.
Keywords—Cloud computing , Searchable encryption , privacy- preserving , Keyword search , Ranked search.
I. INTRODUCTION
Cloud computing is a new form of internet based computing resources and data to computes and other devices on-
demand. It is the hostel services over the internet. Services can be public, private and hybrid services. It is used to provide a
service paradigm of user workloads. The three main purpose of cloud computing are self-services provisioning, elasticity and
pay per use .The cloud computing infrastructure as a service, platform as a service and software as a service. This architecture
consists of front-end platform called cloud clients. It is a model for enabling shared pool of configurable computing resources.
Security and privacy is the biggest concern about cloud computing. Since data managementandinfrastructuremanagementin
cloud is provided by third-party, it is always a risk to handover the sensitive information tosuchproviders.Althoughthecloud
computing vendors ensure more secure password protected accounts,anysignofsecuritybreachwouldresultinlossofclients
and businesses. LOCK-IN is very difficult for the customers to switch from one Cloud Service Provider (CSP) to another. It
results in dependency on a particular Cloud Service Provider for service.
Security and privacy is the biggest concern about cloud computing. Since data managementandinfrastructuremanagement
in cloud is provided by third-party, it is always a risk to handover the sensitive information to such providers. Although the
cloud computing vendors ensure more secure password protected accounts, any sign of security breachwouldresultinlossof
clients and businesses. LOCK-IN is very difficult for the customers to switch from one Cloud Service Provider(CSP)toanother.
It results in dependency on a particular Cloud Service Provider for service. Isolation failure risk involves the isolation
mechanism that separates storage, memory, routing between the different tenants.
In deployment model, public cloud performs the service providers, provides services for all the users or organization
whenever is making use of it and easy to implement. Private cloud, like the name suggest, owned by particular institution.
Hybrid cloud ,contains both public and private cloud and more over it can ensure safety, scalability and performances.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3327
Isolation failure risk involves the isolation mechanism that separates storage, memory, routing between the different
tenants. Manipulate and configure the application online at any time. It does notrequiretoinstall a specificpieceof softwareto
access or manipulate cloud application. Cloud Computing offers online developmentanddeploymenttools,programmingrun-
time environment through Platform as a Service model. Cloud resources are available over the network in a manner that
provides platform independent access to any type of clients. Cloud Computing offers on-demand self-service.
The resources can be used without interaction with cloud service provider. Cloud Computing is highly cost effective
because it operates at higher efficiency with greater utilization. It just requires anInternetconnection.CloudComputingoffers
load balancing that makes it more reliable. Risks Although Cloud Computing is a great innovation in the world of computing,
there also exist downsides of cloud computing.
II. PROPOSED SYSTEM
In Provable Multi files Dynamic data Possession in cloud computing deals with stored data in Dynamic way to cloud
server. Multi files Means, data to be copied in multiple server. In this the owner to upload the data in cloud server with
automatically data to take multiple files then that files are stored in multiple server. If upload the data in multi server to avoid
the data loss from Hacking and server crash.
The uploaded data are stored in multiple server (Multi files).In proposed one scheme FHE algorithms are used. If Owner
upload the data, automatically prepare three files then stored in three server that why for security and avoid server overload.
That copies also encrypted so cloud service provider or any others cant hack the data. If owners upload the data, server
automatically convert to zip formats. So server reduce the file size automatically. Owner sharethefiletoauthorized user.Then
authorized user send the file request to cloud server again server send the encrypted data to authorized user. And authorized
user get the decrypt key from data owner.
Introduced new technique that is Fully Homomorphic Encryption(FHE) for take Multi files of data, File security, Data
Corrupted. In this Project we have to FHE algorithm for protect the data. That are keygen, copygen and taggen.Multifiles Data,
So reduce access time and communication from users. If one copy corrupted it will be redirect to anotherservercandownload
the file. Convert Zip while upload the data.
III. SYSTEM ARCHITECTURE
A system architecture is the conceptual design that defines the structure and the behavior of a system.Anarchitecture
description is a formal description of a system, organized in a way that supports reasoning about the structural properties of
the system.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3328
IV. EFFICIENT MEASUREMENT OF PAIRWISE INFORMATION LEAKAGE
The pairwise information leakage as delta Jaccard similarity. For each pair of data nodes(chunks),weconvertthedata
nodes as sets of words and compute the Jaccard similarity. However, the set operations for measuring pairwise similarity can
be quit expensive [10], even assuming small-sizedchunks,giventhatthenumberof pairsincreasesquadraticallyasthenumber
of chunks increases. Thus, we need an efficient algorithm to compute the Jaccard similarity with less computationandstorage
overhead. In the following, we first introduce the background of MinHash algorithm, which provides a fast way to compute
Jaccard similarity, and explain why we cannot apply the existing approaches directly. Next we present BFSMinHash, a Bloom
filter sketch for MinHash in order to reduce storage overhead.
A. MinHash Background MinHash [10, 11] uses hashing to quicklyestimatetheJaccardsimilarityoftwosetswhichcan
be also interpreted as “the probability that a random element from the union of two sets is also in their intersection”, P
rob[min(h(t1)) = min(h(t2))] = | t1 ∩ t2 t1 ∪ t2 | = P(t1, t2) where h is the independent hash function and min(h(S1)) givesthe
minimum value of h(x), x ∈ t1. Therefore, we can choose a sequence of hash functions s1, s2, · · · , sk and computethe minimum
values of each hash function as MinHash signatures, i.e., Sig(S) = {min(hi(t))|i = 1, · · · , k}. It follows that Jaccard similarity of
two sets is approximated as |Sig(t1) ∩ Sig(t2)|/k. However, MinHash withmanyhashfunctionsneedstocomputetheresultsof
multiple hash functions for every member of every set, which is computationally expensive. Although it reduces the storage
cost greatly, it can still be heavy given the huge number of data nodes.
To reduce the storage overhead reduce the storage space. However,thisapproachdoes notwork fortheMinHashwith
a single hash function since all the signatures are computed by the same hash function. Instead, we design BFS MinHash, a
Bloom-filter sketching scheme for Minhash, which uses a single hash function. MinHash Background MinHash [10, 11] uses
hashing to quickly estimate the Jaccard.
similarity of two sets which can be also interpreted as “the probability that a random element from the union of two
sets is also in their intersection”, P rob [min(h(t1)) = min(h(t2))] = | t1 ∩ t2 t1 ∪ t2 | = J(t1, t2) where h is the independenthash
function and min(h(S1)) gives the minimum value of h(x), x ∈ S1. There are three steps in BFS MinHash: shingling,
fingerprinting and sketching. Firstly, we convert each data chunk to a set of shingles which are contiguous subsequences of
tokens. The process of shingling is to tokenize the byte stream into a set of shingles. For example, if theinputis“abcde”andthe
size of a shingle is 2, the set of shingles is {ab, bc, cd, de}. From this perspective, we only consider the similarity in a syntactic
11.7%.
In our case, we aim to keep the size of Bloom filter as small as possible and therefore the Bloom filter in our BFS
MinHash algorithm always employs a single hash function.
V. SECURE INNER PRODUCT COMPUTATION
In KNN scheme [27], the distance between the data record and the query vector. The secret key is composed of (n+1)-bit
vector as N and two (n+1) * (n+1) matrices as {S1,S2}, where n is the number of field for each record. A randomnumberR>0as
(rq, R). Then pi
-> is split into two random vectors (pi, pi
n) and q is split in to two random vectors (q, qn), namely if the jth bits of n
is 0, pi
1 [j] and pi
n [j] are set as same as pi [j], while q1[j] and qn [j] are the set of two random numbers. So that the sum is equal to
q[j]; the split data vector pair {pi
1,pi
n} is encrypted as {S1
v,pi
1,S2
v,pi
n}.
The split query vector pair {q1,qn} is encrypted as {S1
v,qi
1,S2
v,qi
n}. The query step, the product of data vector pair and query
vector pair, i.e., 0:5R( ||piR2||-2pi.q), is serving as the indicator of euclidean distance (RpiR2 - 2pi. Q+Rq2) to select k nearest
neighbors. As the MRSE is using the inner product similarity instead of the euclidean distance, we need to do some
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3329
modifications on the data structure to fit the MRSE framework. One way to do that is by eliminating the dimension extension,
the final result changes to be the inner product as Rpi.q. While the encryption of either data record or query vector involves
two multiplications of a n * n matrix and a d-dimension vector with complexity O ( n2 ) the final inner product computation
involves two multiplications of two d-dimension vectors with complexity O ( n ) . In the known cipher text model, the splitting
vector N is unknown so pi
1 and pi
n are consider as two random n-dimensional vectors. To solve the data vectors or { S1 , S2 },
similarly q1 and qn are also consider as two random n- dimensional vectors.
TABLE 1
K3 Appears in Every Document
Doc Query {k1,k2,k3} Query {k1,k2}
1 x1=3,y1=R(3+€1)+t x1’=2,y1’=R’(2+€1)+t’
2 X2=2,y2=R(2+€2)+t X2’=1,y2’=R’(2+€2)+t’
3 X3=1,y3=R(1+€3)+t X3’=0,y3’=R’(2+€3)+t’
Query (Vw , k , i) with the trap door Vw , the cloud server computes the similarity spose of each document Ei as in (1) WLOG
assume that R > 0 . After sorting the scores server becomes top-k ranked in the list Ew.
Ji . Vw = { S1
v Ci
1 , S2
v Ci
n } . { S1
v Di
1 , S2
v Di
n }
= Ci
1 . Di
1 + Ci
n . Di
n
= Ci . Di
= ( Ci €i , 1 ) . ( RD , R, t )
= R ( Ci . D + €I ) + t.
VI. MULTI-CLOUD STORAGE SERVICES
Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data. In thistoSolvethechallengingproblem
of privacy-preserving multi- keyword ranked search over encrypted data in cloud computing (MRSE). Related works on
searchable encryption focus on SingleKeywordsearch (or) BooleanKeywordsearch.Amongvariousmultikeywordsemantics,
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3330
we choose efficient similarity measure of “coordinate matching”. Verifiable attribute-based keyword search over outsourced
encrypted data. The cloud cannot be fully trusted, so that outsourced data should be encrypted.
To overcome the proposed a novel cryptographic solution, called verifiable attribute-based keyword search (VABKS). The
solution allows a data user, whose credentials satisfy a data owner’s access control policy, to search over the data owner’s
outsourced encrypted data, outsource the tedious search operations to the cloud, verify whether the cloud has faithfully
executed the search operations. SPANStore which is for cost effective and to minimize an application providers cost we
combine three principles. SPANStore spans multiple cloud providers to increase the geographical density of data centers. It
satisfies latency goals with the higher storage. .Data propogation cost in order to satisfy fault tolerance and consistency
requirements. To implement a task using two phase locking and data propogation.
Fig : Scalia versus a fixed set of providers during active repair
SCALIA, a cloud storage brokage solution that continuously adapt the placement of data. To avoid vendor lock-in and to
increase availability and durability. Orchestration of a non static set of public cloud and corporate-owned private storage
resources. Orchestration which of data can be stored in a sequencemanner. Searchable encryptionisa cryptographic primitive
allowing for private keyword based search. To bridge this gap, we are motivated to propose a practical multi-user searchable
encryption scheme. In the approaches we improve the search efficiency at the cost of large storage. A Secure and Dynamic
Multi-Keyword Ranked Search Scheme over EncryptedCloudData anditsupportsdynamicupdateoperationslike deletionand
insertion of documents. Based on special tree-based index structure and propose a “Greedy Depth-first Search” algorithm to
provide efficient multi-keyword ranked search.
The secure kNN algorithm is utilized to encrypt the index and query vectors, and meanwhile ensure accurate relevance
score calculation between encrypted index and query vectors. In order to resiststatistical attacks,phantomtermsareadded to
the index vector for blinding search results. Search over encrypted data is a critically important enabling technique in cloud
computing. To protecting user data privacy in the untrusted cloud server environment by using attribute-based encryption
(ABE). Our scheme allows multiple owners to encrypt and outsource their data to the cloud server independently.
Fine-grained search authorization is also implemented by the owner-enforced access policy on the index of each
file.Users can generate their own search capabilities without relying on an always online trusted authority. Enabling Public
Auditability and Data Dynamics for Storage Security in Cloud Computing for to support fordata dynamicsvia themostgeneral
forms of data operation, such as block modification, insertion, and deletion, is also a significant step toward practically.
Computing are not limited to archive or backup data only. While prior works on ensuring remote data integrity often
lacks the support of either public auditability or dynamic data operations,thispaperachieves both.Firstidentifythe difficulties
and potential security problems of directly with fully dynamic data updates from prior works. TPA can perform multiple
auditing tasks simultaneously.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3331
A uniform, integrated, machine-readable, semantic representation of cloud services, patterns, appliances and their
compositions. Our approach aims at supporting the development of new applications for the Cloud environment,. Using
semantic models and automatic reasoning to enhance potability and interoperability in multiple platform. Perform automatic
discovery of Cloud services and Appliances; map between agnostic and vendor dependent Cloud Patterns and Services in
semantic representations of cloud pattern. For future work, we plan to build a graphical tool for an easier, user-friendly
categorization of Cloud services.
Easier querying, with automatic translation into our semantic machine-readable representation Used in multiple
platform. Public-key encryption with keyword search (PEKS) is a versatile tool. It allows a third party knowing the search
trapdoor of a keyword to search encrypted documents containingthatkeyword withoutdecryptingthedocumentsorknowing
the keyword.A keyword privacy enhanced variant of PEKS referred to as public-key encryption with fuzzy keyword search
(PEFKS).The search takes time linear in the size of the database storing by using of PEKS Schemes. It reduce the searchtimein
both PEKS and PEFKS schemes.
RELATED WORK
Cloud deployment benefits based on the recent works addresses when to use the cloud services and when to migrate
applications from the application provider. However these effects do not consider issue such as cost and consistency by using
multipole cloud services like RACS, safe store,depsky.Thesesystemfocuson issuespertainingtoavailability,durability,vendor
lock. Unlike SPANStore none of the system are used to minimize the cost across the providers.
Optimizing cost and scalable storage of provisioning cost effective storage based on the work load characterization. To
reduce a CPU overhead using minhash algorithm. In Storesim based on four main components that is deduplication based on
SHA-1 algorithm, LMlayer based on BFS minhash and encryption decryption based on AES- 256. The storage depends on the
bloom filter size in BFS minhash algorithm. It is very low and constant and increase the size of total data. . The additional
aspects reinforce the logic aspect by enabling more pervasive inferences.Asrepresentativeconsiderthefirsttwoservicesasin
table Service able to discover the equivalences among these two services due to the differences of operation exposed and
parameters exchanged. the context of a particular pattern but cannot be defined equivalent in general. These loose equivalent
services can be exchanged without trouble of the services is used in the context of a particular pattern. In both existing PEKS
schemes and our keyword privacy enhanced PEFKS scheme, the search takes time linear in the size of thedatabase storingthe
keyword searchable ciphertexts. This is an affordable of the database if it is large. Hence, it is an interesting to reduce the
search time in both PEKS and PEFKS schemes. We leave this for future work.
To ensure data security in cloud storage, it is critical to use a TPA technique to evaluate the service quality from an
objective and independent perspective.The public auditability also allows clients to delegate the integrity of the verification
tasks to TPA themselves can be unreliable or not be able to commit necessary computation resources performing continuous
verifications. Another major concern is to construct verification protocolsthatcan be usedtoaccommodatedynamicdata files.
It explored the problem of providing simultaneousof the public auditability and data dynamicsforremotedata integritycheck
in Cloud Computing. Our construction is based on the deliberately designed to meet these two important goalswith efficiency
being kept closely in mind. To achieve efficient data dynamics, we have to improve the existing proof of storage models by
manipulating the Hash Tree construction for block tag authentication. To support efficient handlingof multipleauditingtasks,
The further explore the technique of is based on the bilinear aggregate signature to extend our main result into the multiuser
task setting, where TPA can perform multiple auditing tasks simultaneously. Extensive security and performance is used to
analysis that the proposed scheme is highly efficient and provably secure.
CONCLUSION
A secure, efficient and dynamic search scheme is used to propose,that does not supports only the accurate multi keyword
ranked search but also the dynamic deletion and insertion of documents can be performed using it. We construct a special
keyword balanced binary tree as the index, and to obtain better efficiency than linear search. We proposed a hybrid scheme
that combines public key encryption and fully homomorphic encryption. The proposedschemeissuitableforcloudcomputing
environments since it has low storage requirement, and supports efficient computing on encrypteddata.Oursolutionprovides
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3332
the size of the transmitted ciphertexts and the conversion. The parameters of our hybrid scheme are very large when the
message space of the FHE. StoreSim aims to store syntactically similar data on the same cloud, thus minimizing the user’s
information leakage across multiple clouds.
REFERENCES
[1] Ning Cao, Cong Wang, Ming Li, Kui Ren, Wenjing Lou
“Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data” IEEE 2017.
[2] Qingji Zheng, Shouhuai Xu, Giuseppe Ateniese ”VABKS: Verifiable Attribute based Keyword Search over Outsourced
Encrypted Data IEEE 2016.
[3] Zhe Wu,Michael Butkiewicz,Dorian Perkins” SPANStore:Cost-Effective Geo-Replicated Storage Spanning Multiple Cloud
Services” IEEE 2015.
[4] T.G. Papaionnou,N.Borvin,K.Aberer IEEE “SCALIA: An Adaptive Scheme For Effective Multi-Cloud Storage”2012.
[5] Yanjiang Yang, Haibing Lu, Jian Weng “Multi-User Private Keyword Search for Cloud Computing” IEEE 2013.
[6] Zhihua Xia, Member, Xinhui Wang, Xingming Sun,Wang,Qian Wang “A Secure and Dynamic Multi-KeywordRankedSearch
Scheme over Encrypted Cloud Data” IEEE Transactions on Parallel And Distributed Systems Vol. 27 February 2012.60
[7] Wenhai Sun, Shucheng Yu, Wenjing Lou, Y. Thomas Hou, and Hui Li Xidian University,Xi’an,Shaanxi“ProtectingYourRight:
Attribute -based Keyword Search with Fine-grained Owner-enforced Search Authorization in the Cloud”IEEE 2011.
[8] Qian Wang, Cong Wang, Kui Ren, Wenjing Lou, and Jin Li“Enabling Public Auditability and Data Dynamics for Storage
Security in Cloud Computing”IEEE Transactions vol. 22, May 2011.
[9] Peng Xu, Hai Jin, Qianhong Wu, and Wei Wang “Public-Key Encryption with Fuzzy KeywordSearch: A Provably Secure
Scheme Under Keyword Guessing Attack”IEEE 2011.
[10] Beniamino Di Martino, Antonio Esposito and Giuseppina Cretella “SemanticRepresentationofCloudPatternsandServices
with Automated Reasoning to support Cloud Application Portability”IEEE 2010.

More Related Content

What's hot

Iaetsd secured and efficient data scheduling of intermediate data sets
Iaetsd secured and efficient data scheduling of intermediate data setsIaetsd secured and efficient data scheduling of intermediate data sets
Iaetsd secured and efficient data scheduling of intermediate data sets
Iaetsd Iaetsd
 

What's hot (18)

El35782786
El35782786El35782786
El35782786
 
Reactive Data Centric Architectures with Vortex, Spark and ReactiveX
Reactive Data Centric Architectures with Vortex, Spark and ReactiveXReactive Data Centric Architectures with Vortex, Spark and ReactiveX
Reactive Data Centric Architectures with Vortex, Spark and ReactiveX
 
Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic AlgorithmEnhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
 
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-Cloud
 
an enhanced multi layered cryptosystem based secure
an enhanced multi layered cryptosystem based securean enhanced multi layered cryptosystem based secure
an enhanced multi layered cryptosystem based secure
 
Iaetsd secured and efficient data scheduling of intermediate data sets
Iaetsd secured and efficient data scheduling of intermediate data setsIaetsd secured and efficient data scheduling of intermediate data sets
Iaetsd secured and efficient data scheduling of intermediate data sets
 
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
 
An efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environmentAn efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environment
 
Guaranteed Availability of Cloud Data with Efficient Cost
Guaranteed Availability of Cloud Data with Efficient CostGuaranteed Availability of Cloud Data with Efficient Cost
Guaranteed Availability of Cloud Data with Efficient Cost
 
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelMulti- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
 
Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...
Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...
Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...
 
Aes based secured framework for cloud databases
Aes based secured framework for cloud databasesAes based secured framework for cloud databases
Aes based secured framework for cloud databases
 
Dn35636640
Dn35636640Dn35636640
Dn35636640
 
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTINGSECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
 
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
 
Ppt 1
Ppt 1Ppt 1
Ppt 1
 
Micro services Architecture with Vortex -- Part I
Micro services Architecture with Vortex -- Part IMicro services Architecture with Vortex -- Part I
Micro services Architecture with Vortex -- Part I
 
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
 

Similar to IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration

An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...
IJECEIAES
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
IJTET Journal
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
IJTET Journal
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
AIRCC Publishing Corporation
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
AIRCC Publishing Corporation
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
ijcsit
 
Excellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingExcellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computing
Editor IJMTER
 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Editor IJMTER
 

Similar to IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration (20)

IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...
 
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in CloudAn Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
 
Fs2510501055
Fs2510501055Fs2510501055
Fs2510501055
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud Computing
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
improve cloud security
improve cloud securityimprove cloud security
improve cloud security
 
A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...
A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...
A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...
 
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
 
Excellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingExcellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computing
 
Data Division in Cloud for Secured Data Storage using RSA Algorithm
Data Division in Cloud for Secured Data Storage using RSA AlgorithmData Division in Cloud for Secured Data Storage using RSA Algorithm
Data Division in Cloud for Secured Data Storage using RSA Algorithm
 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
 

More from IRJET Journal

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
dharasingh5698
 

Recently uploaded (20)

VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
Intro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdfIntro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdf
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 

IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3326 Improving Data Spillage in Multi-Cloud Capacity Administration 1Nivedha.D, 2Vinitha.R 3 Mrs. N.Gowri Vidhya, M.E Associate professor, Department of Computer Science and Engineering, Prince Dr K Vasudevan college of Engineering And Technology, Chennai, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract--In provable multi-cloud, is used to prevent the data from the data leakage. First they should register their details in the user registration and in owner details. If user want to upload a file, it may be any kind of file. Here weareusingAES/ABSalgorithmtouploadafile. Then it will be compressed by using compressor. After compressed give the new file name and then it will be encrypted and data will be splitted by using Fully Homomorphic Encryption(FHE). The splitted fileswillbestoredindifferentdatabase.Afterfinishingtheprocessitwill automatically generate two secret key. If they user want to download the file or view the file, by giving the new filename and the two- secret key. StoreSim, an information leakage aware storage system in multicloud. StoreSim aims to store syntactically similar data on the same cloud, thus minimizing the user’s information leakage across multiple clouds. It reduce access timeand communication from users. Convert zip while upload the data. The authorized users send the file request to cloud server again server send the encrypted data to authorized user. And authorized user get the decrypt key from data owner. we introduced new technique that is Fully Homomorphic Encryption(FHE) for take Multi copy of data, File security, Data Corrupted. In this Project wehavetoFHEalgorithmforprotect the data. That are keygen, copygen and taggen. Above the process done in Existing system using Single copy of Dynamic Data. StoreSim, an information leakage aware storage system in multicloud. StoreSim aims to store syntactically similar data onthe same cloud, thus minimizing the user’s information leakage across multiple clouds. Keywords—Cloud computing , Searchable encryption , privacy- preserving , Keyword search , Ranked search. I. INTRODUCTION Cloud computing is a new form of internet based computing resources and data to computes and other devices on- demand. It is the hostel services over the internet. Services can be public, private and hybrid services. It is used to provide a service paradigm of user workloads. The three main purpose of cloud computing are self-services provisioning, elasticity and pay per use .The cloud computing infrastructure as a service, platform as a service and software as a service. This architecture consists of front-end platform called cloud clients. It is a model for enabling shared pool of configurable computing resources. Security and privacy is the biggest concern about cloud computing. Since data managementandinfrastructuremanagementin cloud is provided by third-party, it is always a risk to handover the sensitive information tosuchproviders.Althoughthecloud computing vendors ensure more secure password protected accounts,anysignofsecuritybreachwouldresultinlossofclients and businesses. LOCK-IN is very difficult for the customers to switch from one Cloud Service Provider (CSP) to another. It results in dependency on a particular Cloud Service Provider for service. Security and privacy is the biggest concern about cloud computing. Since data managementandinfrastructuremanagement in cloud is provided by third-party, it is always a risk to handover the sensitive information to such providers. Although the cloud computing vendors ensure more secure password protected accounts, any sign of security breachwouldresultinlossof clients and businesses. LOCK-IN is very difficult for the customers to switch from one Cloud Service Provider(CSP)toanother. It results in dependency on a particular Cloud Service Provider for service. Isolation failure risk involves the isolation mechanism that separates storage, memory, routing between the different tenants. In deployment model, public cloud performs the service providers, provides services for all the users or organization whenever is making use of it and easy to implement. Private cloud, like the name suggest, owned by particular institution. Hybrid cloud ,contains both public and private cloud and more over it can ensure safety, scalability and performances.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3327 Isolation failure risk involves the isolation mechanism that separates storage, memory, routing between the different tenants. Manipulate and configure the application online at any time. It does notrequiretoinstall a specificpieceof softwareto access or manipulate cloud application. Cloud Computing offers online developmentanddeploymenttools,programmingrun- time environment through Platform as a Service model. Cloud resources are available over the network in a manner that provides platform independent access to any type of clients. Cloud Computing offers on-demand self-service. The resources can be used without interaction with cloud service provider. Cloud Computing is highly cost effective because it operates at higher efficiency with greater utilization. It just requires anInternetconnection.CloudComputingoffers load balancing that makes it more reliable. Risks Although Cloud Computing is a great innovation in the world of computing, there also exist downsides of cloud computing. II. PROPOSED SYSTEM In Provable Multi files Dynamic data Possession in cloud computing deals with stored data in Dynamic way to cloud server. Multi files Means, data to be copied in multiple server. In this the owner to upload the data in cloud server with automatically data to take multiple files then that files are stored in multiple server. If upload the data in multi server to avoid the data loss from Hacking and server crash. The uploaded data are stored in multiple server (Multi files).In proposed one scheme FHE algorithms are used. If Owner upload the data, automatically prepare three files then stored in three server that why for security and avoid server overload. That copies also encrypted so cloud service provider or any others cant hack the data. If owners upload the data, server automatically convert to zip formats. So server reduce the file size automatically. Owner sharethefiletoauthorized user.Then authorized user send the file request to cloud server again server send the encrypted data to authorized user. And authorized user get the decrypt key from data owner. Introduced new technique that is Fully Homomorphic Encryption(FHE) for take Multi files of data, File security, Data Corrupted. In this Project we have to FHE algorithm for protect the data. That are keygen, copygen and taggen.Multifiles Data, So reduce access time and communication from users. If one copy corrupted it will be redirect to anotherservercandownload the file. Convert Zip while upload the data. III. SYSTEM ARCHITECTURE A system architecture is the conceptual design that defines the structure and the behavior of a system.Anarchitecture description is a formal description of a system, organized in a way that supports reasoning about the structural properties of the system.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3328 IV. EFFICIENT MEASUREMENT OF PAIRWISE INFORMATION LEAKAGE The pairwise information leakage as delta Jaccard similarity. For each pair of data nodes(chunks),weconvertthedata nodes as sets of words and compute the Jaccard similarity. However, the set operations for measuring pairwise similarity can be quit expensive [10], even assuming small-sizedchunks,giventhatthenumberof pairsincreasesquadraticallyasthenumber of chunks increases. Thus, we need an efficient algorithm to compute the Jaccard similarity with less computationandstorage overhead. In the following, we first introduce the background of MinHash algorithm, which provides a fast way to compute Jaccard similarity, and explain why we cannot apply the existing approaches directly. Next we present BFSMinHash, a Bloom filter sketch for MinHash in order to reduce storage overhead. A. MinHash Background MinHash [10, 11] uses hashing to quicklyestimatetheJaccardsimilarityoftwosetswhichcan be also interpreted as “the probability that a random element from the union of two sets is also in their intersection”, P rob[min(h(t1)) = min(h(t2))] = | t1 ∩ t2 t1 ∪ t2 | = P(t1, t2) where h is the independent hash function and min(h(S1)) givesthe minimum value of h(x), x ∈ t1. Therefore, we can choose a sequence of hash functions s1, s2, · · · , sk and computethe minimum values of each hash function as MinHash signatures, i.e., Sig(S) = {min(hi(t))|i = 1, · · · , k}. It follows that Jaccard similarity of two sets is approximated as |Sig(t1) ∩ Sig(t2)|/k. However, MinHash withmanyhashfunctionsneedstocomputetheresultsof multiple hash functions for every member of every set, which is computationally expensive. Although it reduces the storage cost greatly, it can still be heavy given the huge number of data nodes. To reduce the storage overhead reduce the storage space. However,thisapproachdoes notwork fortheMinHashwith a single hash function since all the signatures are computed by the same hash function. Instead, we design BFS MinHash, a Bloom-filter sketching scheme for Minhash, which uses a single hash function. MinHash Background MinHash [10, 11] uses hashing to quickly estimate the Jaccard. similarity of two sets which can be also interpreted as “the probability that a random element from the union of two sets is also in their intersection”, P rob [min(h(t1)) = min(h(t2))] = | t1 ∩ t2 t1 ∪ t2 | = J(t1, t2) where h is the independenthash function and min(h(S1)) gives the minimum value of h(x), x ∈ S1. There are three steps in BFS MinHash: shingling, fingerprinting and sketching. Firstly, we convert each data chunk to a set of shingles which are contiguous subsequences of tokens. The process of shingling is to tokenize the byte stream into a set of shingles. For example, if theinputis“abcde”andthe size of a shingle is 2, the set of shingles is {ab, bc, cd, de}. From this perspective, we only consider the similarity in a syntactic 11.7%. In our case, we aim to keep the size of Bloom filter as small as possible and therefore the Bloom filter in our BFS MinHash algorithm always employs a single hash function. V. SECURE INNER PRODUCT COMPUTATION In KNN scheme [27], the distance between the data record and the query vector. The secret key is composed of (n+1)-bit vector as N and two (n+1) * (n+1) matrices as {S1,S2}, where n is the number of field for each record. A randomnumberR>0as (rq, R). Then pi -> is split into two random vectors (pi, pi n) and q is split in to two random vectors (q, qn), namely if the jth bits of n is 0, pi 1 [j] and pi n [j] are set as same as pi [j], while q1[j] and qn [j] are the set of two random numbers. So that the sum is equal to q[j]; the split data vector pair {pi 1,pi n} is encrypted as {S1 v,pi 1,S2 v,pi n}. The split query vector pair {q1,qn} is encrypted as {S1 v,qi 1,S2 v,qi n}. The query step, the product of data vector pair and query vector pair, i.e., 0:5R( ||piR2||-2pi.q), is serving as the indicator of euclidean distance (RpiR2 - 2pi. Q+Rq2) to select k nearest neighbors. As the MRSE is using the inner product similarity instead of the euclidean distance, we need to do some
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3329 modifications on the data structure to fit the MRSE framework. One way to do that is by eliminating the dimension extension, the final result changes to be the inner product as Rpi.q. While the encryption of either data record or query vector involves two multiplications of a n * n matrix and a d-dimension vector with complexity O ( n2 ) the final inner product computation involves two multiplications of two d-dimension vectors with complexity O ( n ) . In the known cipher text model, the splitting vector N is unknown so pi 1 and pi n are consider as two random n-dimensional vectors. To solve the data vectors or { S1 , S2 }, similarly q1 and qn are also consider as two random n- dimensional vectors. TABLE 1 K3 Appears in Every Document Doc Query {k1,k2,k3} Query {k1,k2} 1 x1=3,y1=R(3+€1)+t x1’=2,y1’=R’(2+€1)+t’ 2 X2=2,y2=R(2+€2)+t X2’=1,y2’=R’(2+€2)+t’ 3 X3=1,y3=R(1+€3)+t X3’=0,y3’=R’(2+€3)+t’ Query (Vw , k , i) with the trap door Vw , the cloud server computes the similarity spose of each document Ei as in (1) WLOG assume that R > 0 . After sorting the scores server becomes top-k ranked in the list Ew. Ji . Vw = { S1 v Ci 1 , S2 v Ci n } . { S1 v Di 1 , S2 v Di n } = Ci 1 . Di 1 + Ci n . Di n = Ci . Di = ( Ci €i , 1 ) . ( RD , R, t ) = R ( Ci . D + €I ) + t. VI. MULTI-CLOUD STORAGE SERVICES Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data. In thistoSolvethechallengingproblem of privacy-preserving multi- keyword ranked search over encrypted data in cloud computing (MRSE). Related works on searchable encryption focus on SingleKeywordsearch (or) BooleanKeywordsearch.Amongvariousmultikeywordsemantics,
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3330 we choose efficient similarity measure of “coordinate matching”. Verifiable attribute-based keyword search over outsourced encrypted data. The cloud cannot be fully trusted, so that outsourced data should be encrypted. To overcome the proposed a novel cryptographic solution, called verifiable attribute-based keyword search (VABKS). The solution allows a data user, whose credentials satisfy a data owner’s access control policy, to search over the data owner’s outsourced encrypted data, outsource the tedious search operations to the cloud, verify whether the cloud has faithfully executed the search operations. SPANStore which is for cost effective and to minimize an application providers cost we combine three principles. SPANStore spans multiple cloud providers to increase the geographical density of data centers. It satisfies latency goals with the higher storage. .Data propogation cost in order to satisfy fault tolerance and consistency requirements. To implement a task using two phase locking and data propogation. Fig : Scalia versus a fixed set of providers during active repair SCALIA, a cloud storage brokage solution that continuously adapt the placement of data. To avoid vendor lock-in and to increase availability and durability. Orchestration of a non static set of public cloud and corporate-owned private storage resources. Orchestration which of data can be stored in a sequencemanner. Searchable encryptionisa cryptographic primitive allowing for private keyword based search. To bridge this gap, we are motivated to propose a practical multi-user searchable encryption scheme. In the approaches we improve the search efficiency at the cost of large storage. A Secure and Dynamic Multi-Keyword Ranked Search Scheme over EncryptedCloudData anditsupportsdynamicupdateoperationslike deletionand insertion of documents. Based on special tree-based index structure and propose a “Greedy Depth-first Search” algorithm to provide efficient multi-keyword ranked search. The secure kNN algorithm is utilized to encrypt the index and query vectors, and meanwhile ensure accurate relevance score calculation between encrypted index and query vectors. In order to resiststatistical attacks,phantomtermsareadded to the index vector for blinding search results. Search over encrypted data is a critically important enabling technique in cloud computing. To protecting user data privacy in the untrusted cloud server environment by using attribute-based encryption (ABE). Our scheme allows multiple owners to encrypt and outsource their data to the cloud server independently. Fine-grained search authorization is also implemented by the owner-enforced access policy on the index of each file.Users can generate their own search capabilities without relying on an always online trusted authority. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing for to support fordata dynamicsvia themostgeneral forms of data operation, such as block modification, insertion, and deletion, is also a significant step toward practically. Computing are not limited to archive or backup data only. While prior works on ensuring remote data integrity often lacks the support of either public auditability or dynamic data operations,thispaperachieves both.Firstidentifythe difficulties and potential security problems of directly with fully dynamic data updates from prior works. TPA can perform multiple auditing tasks simultaneously.
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3331 A uniform, integrated, machine-readable, semantic representation of cloud services, patterns, appliances and their compositions. Our approach aims at supporting the development of new applications for the Cloud environment,. Using semantic models and automatic reasoning to enhance potability and interoperability in multiple platform. Perform automatic discovery of Cloud services and Appliances; map between agnostic and vendor dependent Cloud Patterns and Services in semantic representations of cloud pattern. For future work, we plan to build a graphical tool for an easier, user-friendly categorization of Cloud services. Easier querying, with automatic translation into our semantic machine-readable representation Used in multiple platform. Public-key encryption with keyword search (PEKS) is a versatile tool. It allows a third party knowing the search trapdoor of a keyword to search encrypted documents containingthatkeyword withoutdecryptingthedocumentsorknowing the keyword.A keyword privacy enhanced variant of PEKS referred to as public-key encryption with fuzzy keyword search (PEFKS).The search takes time linear in the size of the database storing by using of PEKS Schemes. It reduce the searchtimein both PEKS and PEFKS schemes. RELATED WORK Cloud deployment benefits based on the recent works addresses when to use the cloud services and when to migrate applications from the application provider. However these effects do not consider issue such as cost and consistency by using multipole cloud services like RACS, safe store,depsky.Thesesystemfocuson issuespertainingtoavailability,durability,vendor lock. Unlike SPANStore none of the system are used to minimize the cost across the providers. Optimizing cost and scalable storage of provisioning cost effective storage based on the work load characterization. To reduce a CPU overhead using minhash algorithm. In Storesim based on four main components that is deduplication based on SHA-1 algorithm, LMlayer based on BFS minhash and encryption decryption based on AES- 256. The storage depends on the bloom filter size in BFS minhash algorithm. It is very low and constant and increase the size of total data. . The additional aspects reinforce the logic aspect by enabling more pervasive inferences.Asrepresentativeconsiderthefirsttwoservicesasin table Service able to discover the equivalences among these two services due to the differences of operation exposed and parameters exchanged. the context of a particular pattern but cannot be defined equivalent in general. These loose equivalent services can be exchanged without trouble of the services is used in the context of a particular pattern. In both existing PEKS schemes and our keyword privacy enhanced PEFKS scheme, the search takes time linear in the size of thedatabase storingthe keyword searchable ciphertexts. This is an affordable of the database if it is large. Hence, it is an interesting to reduce the search time in both PEKS and PEFKS schemes. We leave this for future work. To ensure data security in cloud storage, it is critical to use a TPA technique to evaluate the service quality from an objective and independent perspective.The public auditability also allows clients to delegate the integrity of the verification tasks to TPA themselves can be unreliable or not be able to commit necessary computation resources performing continuous verifications. Another major concern is to construct verification protocolsthatcan be usedtoaccommodatedynamicdata files. It explored the problem of providing simultaneousof the public auditability and data dynamicsforremotedata integritycheck in Cloud Computing. Our construction is based on the deliberately designed to meet these two important goalswith efficiency being kept closely in mind. To achieve efficient data dynamics, we have to improve the existing proof of storage models by manipulating the Hash Tree construction for block tag authentication. To support efficient handlingof multipleauditingtasks, The further explore the technique of is based on the bilinear aggregate signature to extend our main result into the multiuser task setting, where TPA can perform multiple auditing tasks simultaneously. Extensive security and performance is used to analysis that the proposed scheme is highly efficient and provably secure. CONCLUSION A secure, efficient and dynamic search scheme is used to propose,that does not supports only the accurate multi keyword ranked search but also the dynamic deletion and insertion of documents can be performed using it. We construct a special keyword balanced binary tree as the index, and to obtain better efficiency than linear search. We proposed a hybrid scheme that combines public key encryption and fully homomorphic encryption. The proposedschemeissuitableforcloudcomputing environments since it has low storage requirement, and supports efficient computing on encrypteddata.Oursolutionprovides
  • 7. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3332 the size of the transmitted ciphertexts and the conversion. The parameters of our hybrid scheme are very large when the message space of the FHE. StoreSim aims to store syntactically similar data on the same cloud, thus minimizing the user’s information leakage across multiple clouds. REFERENCES [1] Ning Cao, Cong Wang, Ming Li, Kui Ren, Wenjing Lou “Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data” IEEE 2017. [2] Qingji Zheng, Shouhuai Xu, Giuseppe Ateniese ”VABKS: Verifiable Attribute based Keyword Search over Outsourced Encrypted Data IEEE 2016. [3] Zhe Wu,Michael Butkiewicz,Dorian Perkins” SPANStore:Cost-Effective Geo-Replicated Storage Spanning Multiple Cloud Services” IEEE 2015. [4] T.G. Papaionnou,N.Borvin,K.Aberer IEEE “SCALIA: An Adaptive Scheme For Effective Multi-Cloud Storage”2012. [5] Yanjiang Yang, Haibing Lu, Jian Weng “Multi-User Private Keyword Search for Cloud Computing” IEEE 2013. [6] Zhihua Xia, Member, Xinhui Wang, Xingming Sun,Wang,Qian Wang “A Secure and Dynamic Multi-KeywordRankedSearch Scheme over Encrypted Cloud Data” IEEE Transactions on Parallel And Distributed Systems Vol. 27 February 2012.60 [7] Wenhai Sun, Shucheng Yu, Wenjing Lou, Y. Thomas Hou, and Hui Li Xidian University,Xi’an,Shaanxi“ProtectingYourRight: Attribute -based Keyword Search with Fine-grained Owner-enforced Search Authorization in the Cloud”IEEE 2011. [8] Qian Wang, Cong Wang, Kui Ren, Wenjing Lou, and Jin Li“Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing”IEEE Transactions vol. 22, May 2011. [9] Peng Xu, Hai Jin, Qianhong Wu, and Wei Wang “Public-Key Encryption with Fuzzy KeywordSearch: A Provably Secure Scheme Under Keyword Guessing Attack”IEEE 2011. [10] Beniamino Di Martino, Antonio Esposito and Giuseppina Cretella “SemanticRepresentationofCloudPatternsandServices with Automated Reasoning to support Cloud Application Portability”IEEE 2010.