SlideShare una empresa de Scribd logo
1 de 9
Descargar para leer sin conexión
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 332
SECURE CLOUD STORAGE THROUGH DUAL PROTECTION
AJAY KANNAN.B1 ,SUDHARSANAN.R2,
1Student, Department of Computer Science and Engineering, KVCET, Kolambakkam, Maduranthagam,
Tamil Nadu, India
2Assistant Professor, Department of Computer Science and Engineering, KVCET, Kolambakkam, Maduranthagam
Tamil Nadu, India
-----------------------------------------------------------------------------***----------------------------------------------------------------------------
Abstract - The cloud security is one of the important
roles in cloud, here we can preserve our data into cloud
storage. More and more clients would like to store their
data to PCS (public cloud servers) along with the rapid
development of cloud computing. Cloud storage services
allow users to outsource their data to cloud servers to save
local data storage costs. Multiple verification tasks from
different users can be performed efficiently by the auditor
and the cloud-stored data can be updated dynamically. It
makes the clients check whether their outsourced data is
kept intact without downloading the whole data. In our
system we are using the own auditing based on the token
generation. Using this key generation technique compare
the key values from original keys we can find out the
changes about the file. A novel public verification scheme
for cloud storage using in distinguishability obfuscation,
which requires a lightweight computation on the auditor
and delegate most computation to the cloud. Not only
stored also the content will be encrypted in the cloud
server. If anyone try to hack at the cloud end is not
possible to break the two different blocks. The security of
our scheme under the strongest security model. They need
first decrypt the files and also combine the splitted files
from three different locations. This is not possible by
anyone. Anyone can download the files from the server
with file owner permission. At the time of download key
generated (code based key generation) and it will send to
the file owner. We can download the file need to use the
key for verification and some other users want to
download file owner permission is necessary.
I- INTRODUCTION
Cloud computing has been imagined as the following
creation data innovation (IT) design for undertakings,
because of its extensive rundown of unparalleled
preferences in the IT history: on-request self-benefit,
omnipresent system get to, area self-deciding asset
pooling, fast asset versatility, utilization based
estimating and transference of hazard.
As a disturbing innovation with significant
ramifications, cloud computing is changing the very way
of how organizations utilize data innovation. One
essential part of this outlook changing is that
information are being brought together or outsourced to
the . From clients' view, including together people and IT
endeavors, putting away information remotely to the in
an adaptable on-request technique bring appealing
advantages: arrival of the weight for storage room
administration, boundless information access with place
autonomy, and evasion of assets expenses on equipment,
programming, and staff systems of support, and so on
While cloud computing make these remuneration more
engaging than any other time in recent memory, it
additionally conveys new and testing security dangers to
clients' outsourced information. As administration
suppliers (CSP) are part regulatory elements,
information outsourcing is really surrendering client's
last control more than the destiny of their information.
As a matter of first importance, despite the fact that the
frameworks beneath the are significantly more effective
and dependable than individual registering gadgets, they
are still before the extensive variety of both inside and
outside dangers for information respectability.
1.1 Scope of the project
As high-speed networks and ubiquitous Internet access
become available in recent years, many services are
provided on the Internet such that users can use them
from anywhere at any time. Data robustness is a major
requirement for storage systems. There have been many
proposals of storing data over.
1.2 Need for the project
As a disruptive technology with profound implications,
computing is transforming the very nature of how
businesses use information technology. One
fundamental aspect of this paradigm shifting is that data
Are being centralized or outsourced to the . From users’
perspective, including both individuals and IT
enterprises, storing data remotely to the in a flexible on-
demand manner brings appealing benefits: relief of the
burden for storage management, universal data access
with location independence, and avoidance of capital
expenditure on hardware, software, and personnel
maintenances, etc.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 333
1.3 Objective of the project
service providers (CSP) are separate administrative
entities, data outsourcing is actually relinquishing user’s
ultimate control over the fate of their data. As a result,
the correctness of the data in the is being put at risk due
to the following reasons. First of all, although the
infrastructures under the are much more powerful and
reliable than personal computing devices, they are still
facing the broad range of both internal and external
threats for data integrity.
II-LITERATURE SURVEY
TITLE 1: QUICK SYNC: IMPROVING SYNCHRONIZATION
EFFICIENCY FOR MOBILE STORAGE SERVICES
AUTHOR: Y. Cui, Z. Lai, X. Wang, N. Dai, and C. Miao
DESCRIPTION:
As a primary function of storage services, data
synchronization (sync) enables the client to
automatically update local file changes to the remote
through network communications. Mobile storage
services have gained phenomenal success in recent few
years. In this paper, we identify. For example, a minor
document editing process in Dropbox may result in sync
traffic 10 times that of the modification. Synchronization
efficiency is determined by the speed of updating the
change of client files to the , and considered as one of the
most important performance metrics for storage
services. We further implement QuickSync to support
the sync operation with Dropbox and Seafile. Our
extensive evaluations demonstrate that QuickSync can
effectively save the sync time and reduce the significant
traffic overhead for representative sync workloads.
MERITS:
Personal storage services are gaining
tremendous popularity in recent years by enabling users
to conveniently synchronize files across multiple devices
and back up data. Services like Dropbox, Box, Seafile
have proliferated and become increasingly popular,
attracting many big companies such as Google, Microsoft
or Apple to enter this market and offer their own storage
services.
DEMERITS:
 Analyze and address the synchronization (sync)
inefficiency problem of modern mobile storage
services.
 Our measurement results demonstrate that
existing commercial sync services fail to make
full use of available bandwidth, and generate a
large amount of unnecessary sync traffic in
certain circumstance even though the
incremental sync is implemented.
TITLE 2: ENABLING FINE-GRAINED MULTI-KEYWORD
SEARCH SUPPORTING CLASSIFIED SUB-DICTIONARIES
OVER ENCRYPTED DATA.
AUTHOR: H. Li, Y. Yang, T. H. Luan, X. Liang, L. Zhou, and
X. Shen
DESCRIPTION:
Using computing, individuals can store their data on
remote servers and allow data access to public users
through the servers. As. This, however, significantly
limits the usability of outsourced data due to the
difficulty of searching over the encrypted data. In this
paper, we address this issue by developing the fine-
grained multi-keyword search schemes over encrypted
data. Our original contributions are three-fold. First, we
introduce the relevance scores and preference factors
upon keywords which enable the precise keyword
search and personalized user experience. [6]. simply
encrypting the data may still cause other security
concerns. For instance, Google Search uses SSL (Secure
Sockets Layer) to encrypt the connection between search
user and Google server when private data, such as
documents and emails, appear in the search results. We
have investigated on the fine-grained multi keyword
search (FMS) issue over encrypted data, and proposed
two FMS schemes. The FMS I includes both the relevance
scores and the preference factors of keywords to
enhance more precise search and better users’
experience, respectively. The FMS II achieves secure and
efficient search with practical functionality, i.e., “AND”,
“OR” and “NO” operations of keywords.
MERITS:
 The enhanced schemes supporting classified
sub-dictionaries (FMSCS) to improve efficiency.
 the outsourced data are likely to contain
sensitive privacy information, they are typically
encrypted before uploaded to the
DEMERTIS:
 The data encryption, however, would
significantly lower the usability of data due to
the difficulty of searching over the encrypted
data
TITLE 3: ENABLING PUBLIC AUDITABILITY AND DATA
DYNAMICS FOR STORAGE SECURITY IN COMPUTING
AUTHOR: Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 334
DESCRIPTION:
Computing has been envisioned as the next-
generation architecture of IT Enterprise. This work
studies the problem of ensuring the integrity of data
storage in Computing. In particular, we consider the task
of allowing a third party auditor (TPA), on behalf of the
client, to verify the integrity of the dynamic data stored
in the . The introduction of TPA eliminates the
involvement of the client through the auditing of
whether his data stored in the indeed intact, which can
be important in achieving economies of scale for
Computing. Although envisioned as a promising service
platform for the Internet, this new data storage
paradigm in “” brings about many challenging design
issues which have profound influence on the security
and performance of the overall system. One of the
biggest concerns with data storage is that of data
integrity verification at untrusted servers. Although
schemes. Then, clients are able to delegate the
evaluation of the service performance to an independent
third party auditor (TPA), without devotion of their
computation resources. In the clients themselves are
unreliable or may not be able to afford the overhead of
performing frequent integrity checks.
MERITS:
 Private auditability can achieve higher scheme
efficiency, public auditability allows anyone, not
just the client (data owner), to challenge the
server for correctness of data storage while
keeping no private information
DEMERITS:
 It moves the application software and databases
to the centralized large data centers, where the
management of the data and services may not
be fully trustworthy.
 This unique paradigm brings about many new
security challenges, which have not been well
understood
TITLE 4: REMOTE DATA AUDITING IN COMPUTING
ENVIRONMENTS: A SURVEY, TAXONOMY, AND OPEN
ISSUES
AUTHOR: M. Sookhak, A. Gani, H. Talebian, A.
Akhunzada, S. U. Khan, R. Buyya, and A. Y. Zomaya
DESCRIPTION:
Handling of Big Data and computing are the two
important prime concerns which have become more and
more popular in recent years. In this paper, we Cloud
File System is a client-based application which permits
its users to access, process and modify the data which is
stored on a remote server as if it existed on their local
systems. Centralized cache management is a mechanism
which significantly improves the Query response time of
the file system. It allows users to specify paths to be
cached in main memory by HDFS. In this, the Name Node
will communicate with its Data Nodes that have analyzed
the evolution of cloud file systems, their origin, specialty
and their development. We started our discussion with
the analysis of Network File system and Andrew File
System. We have also discussed the detailed
architectures of GFS and HDFS, the two most significant
cloud file systems of their time capable enough to handle
the Big Data Management. A comparative study between
both GFS and HDFS has been done which has resulted in
the occurrence of some similarities as well as differences
between both GFS and HDFS.
MERITS:
 Due to tremendous hike in data production, the
need for the efficient processing, transaction
storage or retrieval, and management of the
structured and unstructured data have become
one of the important issues of the IT industry.
 Have the requested files on their disks, and
instruct them to cache the blocks in off-heap
caches to improve the efficiency by directly
providing the cached path for the same request
by the other remote user.
DEMERITS:
 Examine the concept of evolution of various
cloud file systems, advantages, and limitations
with respect to the computing paradigm.
TITLE 5: PROVABLE DATA POSSESSION AT
UNTRUSTED STORES
AUTHOR: G. Ateniese, R. Burns, R. Curtmola, J. Herring, L.
Kissner, Z. Peterson, and D. Song
DESCRIPTION:
In recent years, computing has gradually
become the mainstream of Internet services. When
computing environments become more perfect, the
business and user will be an enormous amount of data
stored However, when the data is stored in the storage
device, a long time, enterprises and users inevitably will
have security concerns, fearing that the information is
actually stored in the is still in the storage device or too
long without access to, has long been the server removed
or destroyed. Therefore, this scheme goal to research
and design for data storage computing environments
that are proved. Therefore, how to backup data files in
the user not the case, found an efficient and securely
ways of good information to perform periodically
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 335
verification, allowing users to know his information file
is stored securely on the server,. From the above, the
user data files stored on the server in the , in order to
know whether the server actually storing data files,
users will be timely made to the server a number of
challenges (Challenge), so that the server that the use of
the archives were stored in the does to the user ease.
Shows the first user data files stored on the server,
shows the server certificate data to the user actually
stored on the server. In the literature, proposed a data
storage proved Provable Data Possession (PDP) system,
which applies to of in an untrusted storage server, based
on RSA of main plant with state verify that the label is
used to check the integrity of the data stored in the ,
which allows unlimited number of storage server
authentication, and also provides a public authentication
method, but also the use of asymmetric-key system and
the data must be calculated in each block encryption and
tags the action, making it a relatively large amount of
computation. Compared to the literature of PDP
protocol, the literature for the previous method
proposed by PDP extension of a new dynamic storage
technology, because, in this new method uses
MERITS:
 The symmetric cryptography to encrypt, making
information storage, bandwidth and
computational smaller, more efficient.
 In the remote storage devices, hoping to achieve
random access, data collection, reduce costs, and
facilitate the sharing of other services.
DEMERITS:
 This data storage is computing environment is
an important security issue.
 Resulting in businesses and users in the future
can’t access or restore the data files
TITLE 6: ENGINEERING SEARCHABLE ENCRYPTION OF
MOBILE NETWORKS: WHEN QOE MEETS QOP
AUTHOR: H. Li, D. Liu, Y. Dai, and T. H. Luan
DESCRIPTION: The mobile computing applications, data
outsourcing, such as i, is fundamental, which outsources
a mobile user’s data to external servers and accordingly
provides a scalable and “always on” approach for public
data access. With although encryption increases the
quality of protection (QoP) of data outsourcing, it
significantly reduces data usability and thus harms the
mobile user’s quality of experience (QoE).Mobile
applications, such as social networking, healthcare, and
media streaming, have already become an integral part
of our daily lives. However, weak processing rate, and
limited local storage, have significantly impeded the
improvement of mobile service utilities. This article
investigates the QoE and QoP balancing of data
outsourcing by developing a flexible and fine-grained
searchable encryption scheme over outsourced data. In
the remainder of this article we first overview the
searchable encryption technique in mobile networks
from the perspective of system definition and modelling.
Then we identify the key influencing factors of QoE and
QoP in searchable encryption and the state-of-the-art
research.
MERITS:
 Mobile computing can effectively address the
resource limitations of mobile devices, and is
therefore essential to enable extensive resource
consuming mobile computing and
communication applications.
DEMERITS:
 Mobile computing, by integrating computing in
mobile networks, has been recognized as a key
technique to provide mobile users with more
diversified and flexible services.
 The inherent limitations of mobile devices
including low battery life,
TITLE 7: AN EFFICIENT AND SECURE DYNAMIC
AUDITING PROTOCOL FOR DATA STORAGE IN
COMPUTING
AUTHOR: Kan Yang, Xiaohua Jia
DESCRIPTION:
Due to the data outsourcing, however, this new
paradigm of data hosting service also introduces new
security challenges, which requires an independent
auditing service to check the data integrity in the It
protects the data privacy against the auditor by
combining the cryptography method with the linearity
property of bilinear paring, rather than using the mask
technique. Thus, our multi- batch auditing protocol does
not require any additional organizer. Our batch auditing
protocol can also support the batch auditing for multiple
owners. Furthermore, thus. In this paper, we first design
an auditing framework for storage systems and propose
an efficient and privacy-preserving auditing protocol.
Then, we extend our auditing protocol to support the
data dynamic operations, which is efficient and provably
secure in the random oracle model. We further extend
our auditing protocol to support batch auditing for both
multiple owners and multiple s, without using any
trusted organizer. The analysis and simulation results
show that our proposed auditing protocols are secure
and efficient, especially it reduce the computation cost of
the auditor.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 336
MERITS:
 Our auditing scheme incurs less communication
cost and less computation cost of the auditor by
moving the computing loads of auditing from
the auditor to the server, which greatly
improves the auditing performance and can be
applied to large scale storage systems.
 an efficient and secure dynamic auditing
protocol is desired to convince data owners that
the data are correctly stored in the
DEMERITS:
 Some existing remote integrity checking
methods can only serve for static archive data
and thus cannot be applied to the auditing
service since the data in the can be dynamically
updated.
TITLE 8: PRIVACY-PRESERVING PUBLIC AUDITING FOR
DATA STORAGE SECURITY IN COMPUTING
AUTHOR: Cong Wang, Qian Wang, and Kui Ren, Wenjing
Lou
DESCRIPTION:
In this paper, we utilize and uniquely combine
the public key based homomorphic authenticator with
random masking to achieve the privacy-preserving
public data auditing system, which meets all above
requirements, we further explore the technique of
bilinear aggregate signature to extend our main result
into a multi-user setting, where TPA can perform
multiple auditing tasks simultaneously. In this paper, we
propose a privacy-preserving public auditing system for
data storage security in Computing. We utilize the
homomorphism authenticator and random masking to
guarantee that TPA would not learn any knowledge
about the data content stored on the server during the
efficient auditing process,. Considering TPA may
concurrently handle multiple audit sessions from
different users for their outsourced data files, we further
extend our privacy-preserving public auditing protocol
into a multi-user setting, where TPA can perform the
multiple auditing tasks in a batch manner.
MERITS:
 Extensive security and performance analysis
shows the proposed schemes are provably
secure and highly efficient.
 To support efficient handling of multiple
auditing tasks
DEMERITS:
 Which not only eliminates the burden of user
from the tedious and possibly expensive
auditing task, but also alleviates the users’ fear
of their outsourced data leakage
TITLE 9: SCALABLE AND EFFICIENT PROVABLE DATA
POSSESSION
AUTHOR: Giuseppe Ateniese, Roberto Di Pietro, Luigi V.
Mancini, and Gene Tsudik.
DESCRIPTION:
The main issue is how too frequently, the
storage server is assumed to be untrusted in terms of
both security and reliability. (In other words, it might
maliciously or accidentally erase hosted data; it might
also relegate it to slow or off-line storage.) The problem
is exacerbated by the client being a small computing
device with limited resources. In this paper, we
construct a highly efficient and provably secure PDP
technique based entirely on symmetric key
cryptography, while not requiring any bulk encryption.
We developed and presented a step-by-step design of a
very light-weight and provably secure PDP scheme. It
surpasses prior work on several counts, including
storage, bandwidth and computation overheads as well
as the support for dynamic operations. However, since it
is based upon symmetric key cryptography, it is
unsuitable for public (third-party) verification. A natural
solution to this would be a hybrid scheme combining
elements of and our scheme. To summarize, the work
described in this paper represents an important step
forward towards practical PDP techniques. We expect
that the salient features of our scheme make it attractive
for realistic applications.
MERITS:
 Efficiently and securely verify that a storage
server is faithfully storing its client’s (potentially
very large) outsourced data.
 Very low cost and support for dynamic
outsourced data
DEMERITS:
 Prior work has addressed this problem using
either public key cryptography or requiring the
client to outsource its data in encrypted form.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 337
TITLE 10: HIDING SECRETS IN SOFTWARE: A
CRYPTOGRAPHIC APPROACH TO PROGRAM
OBFUSCATION
AUTHOR: Sanjam Garg, Craig Gentry, Shai Halevi,
Mariana Raykova, Amit Sahai, and Brent Waters
DESCRIPTION:
In this article, we describe some rigorous
cryptographic answers to these quasi-philosophical
questions. We also discuss our recent “candidate in
distinguishability obfuscation” scheme and its
implications. However, it is a recurring theme in security
engineering that resistance to one set of attacks is no
guarantee that a system cannot be broken by other
means. And so, many of these obfuscation schemes have
been followed by corresponding schemes for
deobfuscation. We described a candidate in
distinguishability obfuscation scheme, and some of the
exciting applications it makes possible. However,
MERITS:
 a lot remains to be done—to base obfuscation
on well-established assumptions, to build a
practical scheme to truly understand what
obfuscation means—before cryptographic
obfuscation can move from being a proof of
concept to a widely-deployed privacy enhancing
technology.
DEMERITS:
 Previous work on obfuscation has focused on
making code resistant/unintelligible to
particular attacks, such as known techniques for
static and dynamic analysis.
2.1 EXISTING SYSTEM
 In public environment, most clients upload their
data to PCS and check their remote data’s
integrity by Internet. When the client is an
individual manager, some practical problems
will happen.
 The computation overhead of verification by the
auditor linearly increases with the size of the
verified data set.
 Here third party public auditing scheme for the
regenerating-code-based storage. To solve the
regeneration problem of failed authenticators in
the absence of data owners, if these data cannot
be processed just in time, the manager will face
the loss of economic interest.
 In order to prevent the case happening, the
manager has to delegate the proxy to process its
data. In PKI (public key infrastructure), remote
data integrity checking protocol will perform
the certificate management.
 When the manager delegates some entities to
perform the remote data integrity checking, it
will incur considerable overheads since the
verifier will check the certificate when it checks
the remote data integrity.
2.1.1 DISADVANTAGE OF EXISTING SYSTEM:
 The cryptographic techniques for the purpose of
data security protection cannot be directly
user’s control.
 Therefore, verification of correct data storage in
the must be conducted without explicit
knowledge of the whole data.
 Considering various kinds of data for each user
stored in the and the demand of long term
continuous assurance of their data safety, the
problem of verifying correctness of data storage
in the becomes even more challenging.
 This is not just a third party data warehouse.
The data stored in the may be often updated by
the users.
2.2 PROPOSED SYSTEM
 An efficient cloud scheme with data in been
made. Here we are using the erasure code
technique for distribute the data to locations
and access the data from.
 User can register and login into their account.
Provided an option to store, share and access
the data from storage. Here we are using the
double ensured scheme for storing data into the.
cloud
 First is your data or file splited into multiple
parts and it will store into different server
locations. Each and every file generates the key-
code for auditing.
 Then second is each and every splited file will
encrypt before store into different locations. The
shared users can edit the file in the with file
owner’s permission. That file eligible of own
public auditing.
 Search and download the files, at the time of
download user should use the security key. As
an authentication success it will be decrypt and
combine to get the original data from.
 Moreover, we design a novel public verifiable
authenticator, which is generated by a couple of
keys and can be regenerated using partial keys.
 Thus, our scheme can completely release data
owners from online burden. In addition, we
randomize the encode coefficients with a
pseudorandom function to preserve data
privacy.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 338
 Extensive security analysis shows that our
scheme is provable secure under random oracle
model and experimental evaluation indicates
that our scheme is highly efficient and can be
feasibly integrated into the regenerating code-
based storage.
2.2.1 Advantages of Proposed System:
 Compared to a lot of its predecessors, which
only provide binary results about the storage
state across the cloud servers, the challenge-
response protocol in our work more provides
the localization of data error.
 Unlike most prior works used for ensuring
remote data integrity, the new scheme supports
secure and efficient dynamic operations on data
blocks, including: update, delete and append.
 Extensive protection and act analysis
demonstrate that the proposed scheme is
extremely efficient and resilient beside
Byzantine failure, malicious data modification
attack, and even server colluding attacks
III-SYSTEM REQUIRMENTS
3.1 HARDWARE REQUIREMENTS
Proces: Pentium Dual Core 2.3 GHz
Hard Disk: 250 GB or Higher
Ram: 1 GB (Min)
3.2. SOFTWARE REQUIREMENTS
Operating System : Windows XP or Higher
Languages used: Java (JSP, Servlet), HTML
Tools: JDK 1.7, Net Beans 7.0.1, SQLyog
Backend: My SQL
IV-SYSTEM DESIGN
4.1 SYSTEM ARCHITECTURE
4.2 MODULES
• User Interface
• File Uploading Process
• Secret Key Generation
• File Sharing Process
• File Auditing Process
• File Downloading Process
• Mail Alert Process
Module Description
User interface:
In our Secure System we have a user friendly
user interface to interact with our System. Every Act dual
role as a data owner and data consumer while uploading
file they are the owner of that file if they search other’s
file than they are the consumer. Users can create the
account them self for that we have new pages, in that
page we will get the details from the user and we
generate the account for the user’s. We have
authentication system; we only allow authorized users to
access our System.
In our System we providing the easy file
searching user’s don’t want to keep remember all
uploaded file’s exact name, for that we have given the
keywords while uploading the files it will help to search
the file easily.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 339
File uploading process:
Storing data over storage servers one way to
provide data robustness is to replicate a message such
that each storage server stores a message. Another way
is to encode a message of k symbols into a codeword of n
symbols by erasure coding. To store a message, each of
its codeword symbols is stored in a different storage
server. A storage server corresponds to an erasure error
of the codeword symbol. As long as the number of
servers is under the tolerance threshold of the erasure
code, the message can be recovered from the codeword
symbols stored in the available storage servers by the
decoding process.
Secret key generation:
Firstly the secret key will be generated as the
initial step while uploading the file, every which is
uploaded, will have unique secret key. This key will be
taken as an identification of every file. The secret key
which we are using is a three digit number we will make
it use for both uploading and downloading. If the user
want download some file and if he gives the download
request the secret key of that file will be sent to the file
owner of the file maybe he can share it.
DATA FLOW DIAGRAM
DFD diagram for user registration and login
DFD diagram for user uploading process
VI-CONCLUSION
A privacy-preserving public auditing system for
data storage security in computing. We utilize the
homomorphism linear authenticator and random masking
to guarantee that the TPA would not learn any knowledge
about the data content stored on the server during the
efficient auditing process, which not only eliminates the
burden of user from the tedious and possibly expensive
auditing task, but also alleviates the users’ fear of their
outsourced data leakage. Considering TPA may
concurrently handle multiple audit sessions from different
users for their outsourced data files, we further extend our
privacy-preserving public auditing protocol into a
multiuser setting, where the TPA can perform multiple
auditing tasks in a batch manner for better efficiency.
VII-FUTURE ENHANCEMENT
• We further extend our privacy-preserving public
auditing protocol into a multi user setting,
where the TPA can perform multiple auditing
tasks in a batch manner for better efficiency.
• In prospective we will improving the
performance.
• In this system we used only text files, In future
we will include the image, audio, video files. In
our system the OTP sent to owner mail id,
coming up the client will receive the OTP on
mobile by using the mobile number.
REFERENCE:
1. G. Ateniese, R. Burns, R. Curtmola, J. Herring, L.
Kissner, Z. Peterson, and D. Song, “Provable data
possession at untrusted stores,” in Proceedings
of CCS. ACM, 2007, pp. 598–609.
2. G. Ateniese, R. D. Pietro, L. V. Mancini, and G.
Tsudik, “Scalable and efficient provable data
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 340
possession,” in Proceedings of Secure Comm.
ACM, 2008.
3. C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-
preserving public auditing for data storage
security in computing,” in Proceedings of
INFOCOM. IEEE, 2010, pp. 19.
4. Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li,
“Enabling public auditability and data dynamics
for storage security in computing,” IEEE
Transactions on Parallel and Cloud Systems, vol.
22, no. 5, pp. 847–859, 2011.
5. K. Yang and X. Jia, “An efficient and secure
dynamic auditing protocol for data storage in
computing,” IEEE Transactions on Parallel and
Cloud Systems, vol. 24, no. 9, pp. 1717–1726,
2013.
6. M. Sookhak, A. Gani, H. Talebian, A. Akhunzada,
S. U. Khan, R. Buyya, and A. Y. Zomaya, “Remote
data auditing in computing environments: A
survey, taxonomy, and open issues,” ACM
Computing Surveys, vol. 47, no. 4, 2015.
7. Y. Cui, Z. Lai, X. Wang, N. Dai, and C. Miao,
“Quicksync: Improving synchronization
efficiency for mobile storage services,” in
Proceedings of MobiCom. ACM, 2015, pp. 592–
603.

Más contenido relacionado

La actualidad más candente

A survey on secured data outsourcing in cloud computing
A survey on secured data outsourcing in cloud computingA survey on secured data outsourcing in cloud computing
A survey on secured data outsourcing in cloud computing
IAEME Publication
 
Authenticated and unrestricted auditing of big data space on cloud through v...
Authenticated and unrestricted auditing of big data space on  cloud through v...Authenticated and unrestricted auditing of big data space on  cloud through v...
Authenticated and unrestricted auditing of big data space on cloud through v...
IJMER
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaS
IJMER
 
Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409
Editor IJARCET
 
Cloud Computing- Proposal (Autosaved)
Cloud Computing- Proposal (Autosaved)Cloud Computing- Proposal (Autosaved)
Cloud Computing- Proposal (Autosaved)
Zuhair Haroon khan
 
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEYSECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
Editor Jacotech
 

La actualidad más candente (19)

Reseach paper-mla-sample
Reseach paper-mla-sampleReseach paper-mla-sample
Reseach paper-mla-sample
 
Enhancement of the Cloud Data Storage Architectural Framework in Private Cloud
Enhancement of the Cloud Data Storage Architectural Framework in Private CloudEnhancement of the Cloud Data Storage Architectural Framework in Private Cloud
Enhancement of the Cloud Data Storage Architectural Framework in Private Cloud
 
A survey on secured data outsourcing in cloud computing
A survey on secured data outsourcing in cloud computingA survey on secured data outsourcing in cloud computing
A survey on secured data outsourcing in cloud computing
 
G033030035
G033030035G033030035
G033030035
 
Authenticated and unrestricted auditing of big data space on cloud through v...
Authenticated and unrestricted auditing of big data space on  cloud through v...Authenticated and unrestricted auditing of big data space on  cloud through v...
Authenticated and unrestricted auditing of big data space on cloud through v...
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaS
 
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud StorageEnhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
 
The Riisk and Challllenges off Clloud Computtiing
The Riisk and Challllenges off Clloud ComputtiingThe Riisk and Challllenges off Clloud Computtiing
The Riisk and Challllenges off Clloud Computtiing
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
 
Privacy Issues In Cloud Computing
Privacy Issues In Cloud ComputingPrivacy Issues In Cloud Computing
Privacy Issues In Cloud Computing
 
Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409
 
I42024349
I42024349I42024349
I42024349
 
Cloud Computing- Proposal (Autosaved)
Cloud Computing- Proposal (Autosaved)Cloud Computing- Proposal (Autosaved)
Cloud Computing- Proposal (Autosaved)
 
Fog doc
Fog doc Fog doc
Fog doc
 
Challenges and Proposed Solutions for Cloud Forensic
Challenges and Proposed Solutions for Cloud ForensicChallenges and Proposed Solutions for Cloud Forensic
Challenges and Proposed Solutions for Cloud Forensic
 
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
 
70 74
70 7470 74
70 74
 
IRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud DataIRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud Data
 
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEYSECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
 

Similar a IRJET- Secure Cloud Storage through Dual Protection

Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...
Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...
Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...
IIRindia
 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Editor IJMTER
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Editor IJMTER
 
Excellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingExcellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computing
Editor IJMTER
 

Similar a IRJET- Secure Cloud Storage through Dual Protection (20)

Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...
Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...
Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...
 
Secure cloud storage privacy preserving public auditing for data storage secu...
Secure cloud storage privacy preserving public auditing for data storage secu...Secure cloud storage privacy preserving public auditing for data storage secu...
Secure cloud storage privacy preserving public auditing for data storage secu...
 
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
 
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
 
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
 
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud StorageA Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
 
Fs2510501055
Fs2510501055Fs2510501055
Fs2510501055
 
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- Secure Database Management and Privacy Preserving in Cloud ServerIRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
 
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTINGSECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
 
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on CloudIRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on Cloud
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
 
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
 
50120140507005 2
50120140507005 250120140507005 2
50120140507005 2
 
50120140507005
5012014050700550120140507005
50120140507005
 
Excellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingExcellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computing
 
Data Division in Cloud for Secured Data Storage using RSA Algorithm
Data Division in Cloud for Secured Data Storage using RSA AlgorithmData Division in Cloud for Secured Data Storage using RSA Algorithm
Data Division in Cloud for Secured Data Storage using RSA Algorithm
 
Cloud Data Protection for the Masses
Cloud Data Protection for the MassesCloud Data Protection for the Masses
Cloud Data Protection for the Masses
 

Más de IRJET Journal

Más de IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Último

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
chumtiyababu
 

Último (20)

data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 

IRJET- Secure Cloud Storage through Dual Protection

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 332 SECURE CLOUD STORAGE THROUGH DUAL PROTECTION AJAY KANNAN.B1 ,SUDHARSANAN.R2, 1Student, Department of Computer Science and Engineering, KVCET, Kolambakkam, Maduranthagam, Tamil Nadu, India 2Assistant Professor, Department of Computer Science and Engineering, KVCET, Kolambakkam, Maduranthagam Tamil Nadu, India -----------------------------------------------------------------------------***---------------------------------------------------------------------------- Abstract - The cloud security is one of the important roles in cloud, here we can preserve our data into cloud storage. More and more clients would like to store their data to PCS (public cloud servers) along with the rapid development of cloud computing. Cloud storage services allow users to outsource their data to cloud servers to save local data storage costs. Multiple verification tasks from different users can be performed efficiently by the auditor and the cloud-stored data can be updated dynamically. It makes the clients check whether their outsourced data is kept intact without downloading the whole data. In our system we are using the own auditing based on the token generation. Using this key generation technique compare the key values from original keys we can find out the changes about the file. A novel public verification scheme for cloud storage using in distinguishability obfuscation, which requires a lightweight computation on the auditor and delegate most computation to the cloud. Not only stored also the content will be encrypted in the cloud server. If anyone try to hack at the cloud end is not possible to break the two different blocks. The security of our scheme under the strongest security model. They need first decrypt the files and also combine the splitted files from three different locations. This is not possible by anyone. Anyone can download the files from the server with file owner permission. At the time of download key generated (code based key generation) and it will send to the file owner. We can download the file need to use the key for verification and some other users want to download file owner permission is necessary. I- INTRODUCTION Cloud computing has been imagined as the following creation data innovation (IT) design for undertakings, because of its extensive rundown of unparalleled preferences in the IT history: on-request self-benefit, omnipresent system get to, area self-deciding asset pooling, fast asset versatility, utilization based estimating and transference of hazard. As a disturbing innovation with significant ramifications, cloud computing is changing the very way of how organizations utilize data innovation. One essential part of this outlook changing is that information are being brought together or outsourced to the . From clients' view, including together people and IT endeavors, putting away information remotely to the in an adaptable on-request technique bring appealing advantages: arrival of the weight for storage room administration, boundless information access with place autonomy, and evasion of assets expenses on equipment, programming, and staff systems of support, and so on While cloud computing make these remuneration more engaging than any other time in recent memory, it additionally conveys new and testing security dangers to clients' outsourced information. As administration suppliers (CSP) are part regulatory elements, information outsourcing is really surrendering client's last control more than the destiny of their information. As a matter of first importance, despite the fact that the frameworks beneath the are significantly more effective and dependable than individual registering gadgets, they are still before the extensive variety of both inside and outside dangers for information respectability. 1.1 Scope of the project As high-speed networks and ubiquitous Internet access become available in recent years, many services are provided on the Internet such that users can use them from anywhere at any time. Data robustness is a major requirement for storage systems. There have been many proposals of storing data over. 1.2 Need for the project As a disruptive technology with profound implications, computing is transforming the very nature of how businesses use information technology. One fundamental aspect of this paradigm shifting is that data Are being centralized or outsourced to the . From users’ perspective, including both individuals and IT enterprises, storing data remotely to the in a flexible on- demand manner brings appealing benefits: relief of the burden for storage management, universal data access with location independence, and avoidance of capital expenditure on hardware, software, and personnel maintenances, etc.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 333 1.3 Objective of the project service providers (CSP) are separate administrative entities, data outsourcing is actually relinquishing user’s ultimate control over the fate of their data. As a result, the correctness of the data in the is being put at risk due to the following reasons. First of all, although the infrastructures under the are much more powerful and reliable than personal computing devices, they are still facing the broad range of both internal and external threats for data integrity. II-LITERATURE SURVEY TITLE 1: QUICK SYNC: IMPROVING SYNCHRONIZATION EFFICIENCY FOR MOBILE STORAGE SERVICES AUTHOR: Y. Cui, Z. Lai, X. Wang, N. Dai, and C. Miao DESCRIPTION: As a primary function of storage services, data synchronization (sync) enables the client to automatically update local file changes to the remote through network communications. Mobile storage services have gained phenomenal success in recent few years. In this paper, we identify. For example, a minor document editing process in Dropbox may result in sync traffic 10 times that of the modification. Synchronization efficiency is determined by the speed of updating the change of client files to the , and considered as one of the most important performance metrics for storage services. We further implement QuickSync to support the sync operation with Dropbox and Seafile. Our extensive evaluations demonstrate that QuickSync can effectively save the sync time and reduce the significant traffic overhead for representative sync workloads. MERITS: Personal storage services are gaining tremendous popularity in recent years by enabling users to conveniently synchronize files across multiple devices and back up data. Services like Dropbox, Box, Seafile have proliferated and become increasingly popular, attracting many big companies such as Google, Microsoft or Apple to enter this market and offer their own storage services. DEMERITS:  Analyze and address the synchronization (sync) inefficiency problem of modern mobile storage services.  Our measurement results demonstrate that existing commercial sync services fail to make full use of available bandwidth, and generate a large amount of unnecessary sync traffic in certain circumstance even though the incremental sync is implemented. TITLE 2: ENABLING FINE-GRAINED MULTI-KEYWORD SEARCH SUPPORTING CLASSIFIED SUB-DICTIONARIES OVER ENCRYPTED DATA. AUTHOR: H. Li, Y. Yang, T. H. Luan, X. Liang, L. Zhou, and X. Shen DESCRIPTION: Using computing, individuals can store their data on remote servers and allow data access to public users through the servers. As. This, however, significantly limits the usability of outsourced data due to the difficulty of searching over the encrypted data. In this paper, we address this issue by developing the fine- grained multi-keyword search schemes over encrypted data. Our original contributions are three-fold. First, we introduce the relevance scores and preference factors upon keywords which enable the precise keyword search and personalized user experience. [6]. simply encrypting the data may still cause other security concerns. For instance, Google Search uses SSL (Secure Sockets Layer) to encrypt the connection between search user and Google server when private data, such as documents and emails, appear in the search results. We have investigated on the fine-grained multi keyword search (FMS) issue over encrypted data, and proposed two FMS schemes. The FMS I includes both the relevance scores and the preference factors of keywords to enhance more precise search and better users’ experience, respectively. The FMS II achieves secure and efficient search with practical functionality, i.e., “AND”, “OR” and “NO” operations of keywords. MERITS:  The enhanced schemes supporting classified sub-dictionaries (FMSCS) to improve efficiency.  the outsourced data are likely to contain sensitive privacy information, they are typically encrypted before uploaded to the DEMERTIS:  The data encryption, however, would significantly lower the usability of data due to the difficulty of searching over the encrypted data TITLE 3: ENABLING PUBLIC AUDITABILITY AND DATA DYNAMICS FOR STORAGE SECURITY IN COMPUTING AUTHOR: Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 334 DESCRIPTION: Computing has been envisioned as the next- generation architecture of IT Enterprise. This work studies the problem of ensuring the integrity of data storage in Computing. In particular, we consider the task of allowing a third party auditor (TPA), on behalf of the client, to verify the integrity of the dynamic data stored in the . The introduction of TPA eliminates the involvement of the client through the auditing of whether his data stored in the indeed intact, which can be important in achieving economies of scale for Computing. Although envisioned as a promising service platform for the Internet, this new data storage paradigm in “” brings about many challenging design issues which have profound influence on the security and performance of the overall system. One of the biggest concerns with data storage is that of data integrity verification at untrusted servers. Although schemes. Then, clients are able to delegate the evaluation of the service performance to an independent third party auditor (TPA), without devotion of their computation resources. In the clients themselves are unreliable or may not be able to afford the overhead of performing frequent integrity checks. MERITS:  Private auditability can achieve higher scheme efficiency, public auditability allows anyone, not just the client (data owner), to challenge the server for correctness of data storage while keeping no private information DEMERITS:  It moves the application software and databases to the centralized large data centers, where the management of the data and services may not be fully trustworthy.  This unique paradigm brings about many new security challenges, which have not been well understood TITLE 4: REMOTE DATA AUDITING IN COMPUTING ENVIRONMENTS: A SURVEY, TAXONOMY, AND OPEN ISSUES AUTHOR: M. Sookhak, A. Gani, H. Talebian, A. Akhunzada, S. U. Khan, R. Buyya, and A. Y. Zomaya DESCRIPTION: Handling of Big Data and computing are the two important prime concerns which have become more and more popular in recent years. In this paper, we Cloud File System is a client-based application which permits its users to access, process and modify the data which is stored on a remote server as if it existed on their local systems. Centralized cache management is a mechanism which significantly improves the Query response time of the file system. It allows users to specify paths to be cached in main memory by HDFS. In this, the Name Node will communicate with its Data Nodes that have analyzed the evolution of cloud file systems, their origin, specialty and their development. We started our discussion with the analysis of Network File system and Andrew File System. We have also discussed the detailed architectures of GFS and HDFS, the two most significant cloud file systems of their time capable enough to handle the Big Data Management. A comparative study between both GFS and HDFS has been done which has resulted in the occurrence of some similarities as well as differences between both GFS and HDFS. MERITS:  Due to tremendous hike in data production, the need for the efficient processing, transaction storage or retrieval, and management of the structured and unstructured data have become one of the important issues of the IT industry.  Have the requested files on their disks, and instruct them to cache the blocks in off-heap caches to improve the efficiency by directly providing the cached path for the same request by the other remote user. DEMERITS:  Examine the concept of evolution of various cloud file systems, advantages, and limitations with respect to the computing paradigm. TITLE 5: PROVABLE DATA POSSESSION AT UNTRUSTED STORES AUTHOR: G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song DESCRIPTION: In recent years, computing has gradually become the mainstream of Internet services. When computing environments become more perfect, the business and user will be an enormous amount of data stored However, when the data is stored in the storage device, a long time, enterprises and users inevitably will have security concerns, fearing that the information is actually stored in the is still in the storage device or too long without access to, has long been the server removed or destroyed. Therefore, this scheme goal to research and design for data storage computing environments that are proved. Therefore, how to backup data files in the user not the case, found an efficient and securely ways of good information to perform periodically
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 335 verification, allowing users to know his information file is stored securely on the server,. From the above, the user data files stored on the server in the , in order to know whether the server actually storing data files, users will be timely made to the server a number of challenges (Challenge), so that the server that the use of the archives were stored in the does to the user ease. Shows the first user data files stored on the server, shows the server certificate data to the user actually stored on the server. In the literature, proposed a data storage proved Provable Data Possession (PDP) system, which applies to of in an untrusted storage server, based on RSA of main plant with state verify that the label is used to check the integrity of the data stored in the , which allows unlimited number of storage server authentication, and also provides a public authentication method, but also the use of asymmetric-key system and the data must be calculated in each block encryption and tags the action, making it a relatively large amount of computation. Compared to the literature of PDP protocol, the literature for the previous method proposed by PDP extension of a new dynamic storage technology, because, in this new method uses MERITS:  The symmetric cryptography to encrypt, making information storage, bandwidth and computational smaller, more efficient.  In the remote storage devices, hoping to achieve random access, data collection, reduce costs, and facilitate the sharing of other services. DEMERITS:  This data storage is computing environment is an important security issue.  Resulting in businesses and users in the future can’t access or restore the data files TITLE 6: ENGINEERING SEARCHABLE ENCRYPTION OF MOBILE NETWORKS: WHEN QOE MEETS QOP AUTHOR: H. Li, D. Liu, Y. Dai, and T. H. Luan DESCRIPTION: The mobile computing applications, data outsourcing, such as i, is fundamental, which outsources a mobile user’s data to external servers and accordingly provides a scalable and “always on” approach for public data access. With although encryption increases the quality of protection (QoP) of data outsourcing, it significantly reduces data usability and thus harms the mobile user’s quality of experience (QoE).Mobile applications, such as social networking, healthcare, and media streaming, have already become an integral part of our daily lives. However, weak processing rate, and limited local storage, have significantly impeded the improvement of mobile service utilities. This article investigates the QoE and QoP balancing of data outsourcing by developing a flexible and fine-grained searchable encryption scheme over outsourced data. In the remainder of this article we first overview the searchable encryption technique in mobile networks from the perspective of system definition and modelling. Then we identify the key influencing factors of QoE and QoP in searchable encryption and the state-of-the-art research. MERITS:  Mobile computing can effectively address the resource limitations of mobile devices, and is therefore essential to enable extensive resource consuming mobile computing and communication applications. DEMERITS:  Mobile computing, by integrating computing in mobile networks, has been recognized as a key technique to provide mobile users with more diversified and flexible services.  The inherent limitations of mobile devices including low battery life, TITLE 7: AN EFFICIENT AND SECURE DYNAMIC AUDITING PROTOCOL FOR DATA STORAGE IN COMPUTING AUTHOR: Kan Yang, Xiaohua Jia DESCRIPTION: Due to the data outsourcing, however, this new paradigm of data hosting service also introduces new security challenges, which requires an independent auditing service to check the data integrity in the It protects the data privacy against the auditor by combining the cryptography method with the linearity property of bilinear paring, rather than using the mask technique. Thus, our multi- batch auditing protocol does not require any additional organizer. Our batch auditing protocol can also support the batch auditing for multiple owners. Furthermore, thus. In this paper, we first design an auditing framework for storage systems and propose an efficient and privacy-preserving auditing protocol. Then, we extend our auditing protocol to support the data dynamic operations, which is efficient and provably secure in the random oracle model. We further extend our auditing protocol to support batch auditing for both multiple owners and multiple s, without using any trusted organizer. The analysis and simulation results show that our proposed auditing protocols are secure and efficient, especially it reduce the computation cost of the auditor.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 336 MERITS:  Our auditing scheme incurs less communication cost and less computation cost of the auditor by moving the computing loads of auditing from the auditor to the server, which greatly improves the auditing performance and can be applied to large scale storage systems.  an efficient and secure dynamic auditing protocol is desired to convince data owners that the data are correctly stored in the DEMERITS:  Some existing remote integrity checking methods can only serve for static archive data and thus cannot be applied to the auditing service since the data in the can be dynamically updated. TITLE 8: PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN COMPUTING AUTHOR: Cong Wang, Qian Wang, and Kui Ren, Wenjing Lou DESCRIPTION: In this paper, we utilize and uniquely combine the public key based homomorphic authenticator with random masking to achieve the privacy-preserving public data auditing system, which meets all above requirements, we further explore the technique of bilinear aggregate signature to extend our main result into a multi-user setting, where TPA can perform multiple auditing tasks simultaneously. In this paper, we propose a privacy-preserving public auditing system for data storage security in Computing. We utilize the homomorphism authenticator and random masking to guarantee that TPA would not learn any knowledge about the data content stored on the server during the efficient auditing process,. Considering TPA may concurrently handle multiple audit sessions from different users for their outsourced data files, we further extend our privacy-preserving public auditing protocol into a multi-user setting, where TPA can perform the multiple auditing tasks in a batch manner. MERITS:  Extensive security and performance analysis shows the proposed schemes are provably secure and highly efficient.  To support efficient handling of multiple auditing tasks DEMERITS:  Which not only eliminates the burden of user from the tedious and possibly expensive auditing task, but also alleviates the users’ fear of their outsourced data leakage TITLE 9: SCALABLE AND EFFICIENT PROVABLE DATA POSSESSION AUTHOR: Giuseppe Ateniese, Roberto Di Pietro, Luigi V. Mancini, and Gene Tsudik. DESCRIPTION: The main issue is how too frequently, the storage server is assumed to be untrusted in terms of both security and reliability. (In other words, it might maliciously or accidentally erase hosted data; it might also relegate it to slow or off-line storage.) The problem is exacerbated by the client being a small computing device with limited resources. In this paper, we construct a highly efficient and provably secure PDP technique based entirely on symmetric key cryptography, while not requiring any bulk encryption. We developed and presented a step-by-step design of a very light-weight and provably secure PDP scheme. It surpasses prior work on several counts, including storage, bandwidth and computation overheads as well as the support for dynamic operations. However, since it is based upon symmetric key cryptography, it is unsuitable for public (third-party) verification. A natural solution to this would be a hybrid scheme combining elements of and our scheme. To summarize, the work described in this paper represents an important step forward towards practical PDP techniques. We expect that the salient features of our scheme make it attractive for realistic applications. MERITS:  Efficiently and securely verify that a storage server is faithfully storing its client’s (potentially very large) outsourced data.  Very low cost and support for dynamic outsourced data DEMERITS:  Prior work has addressed this problem using either public key cryptography or requiring the client to outsource its data in encrypted form.
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 337 TITLE 10: HIDING SECRETS IN SOFTWARE: A CRYPTOGRAPHIC APPROACH TO PROGRAM OBFUSCATION AUTHOR: Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova, Amit Sahai, and Brent Waters DESCRIPTION: In this article, we describe some rigorous cryptographic answers to these quasi-philosophical questions. We also discuss our recent “candidate in distinguishability obfuscation” scheme and its implications. However, it is a recurring theme in security engineering that resistance to one set of attacks is no guarantee that a system cannot be broken by other means. And so, many of these obfuscation schemes have been followed by corresponding schemes for deobfuscation. We described a candidate in distinguishability obfuscation scheme, and some of the exciting applications it makes possible. However, MERITS:  a lot remains to be done—to base obfuscation on well-established assumptions, to build a practical scheme to truly understand what obfuscation means—before cryptographic obfuscation can move from being a proof of concept to a widely-deployed privacy enhancing technology. DEMERITS:  Previous work on obfuscation has focused on making code resistant/unintelligible to particular attacks, such as known techniques for static and dynamic analysis. 2.1 EXISTING SYSTEM  In public environment, most clients upload their data to PCS and check their remote data’s integrity by Internet. When the client is an individual manager, some practical problems will happen.  The computation overhead of verification by the auditor linearly increases with the size of the verified data set.  Here third party public auditing scheme for the regenerating-code-based storage. To solve the regeneration problem of failed authenticators in the absence of data owners, if these data cannot be processed just in time, the manager will face the loss of economic interest.  In order to prevent the case happening, the manager has to delegate the proxy to process its data. In PKI (public key infrastructure), remote data integrity checking protocol will perform the certificate management.  When the manager delegates some entities to perform the remote data integrity checking, it will incur considerable overheads since the verifier will check the certificate when it checks the remote data integrity. 2.1.1 DISADVANTAGE OF EXISTING SYSTEM:  The cryptographic techniques for the purpose of data security protection cannot be directly user’s control.  Therefore, verification of correct data storage in the must be conducted without explicit knowledge of the whole data.  Considering various kinds of data for each user stored in the and the demand of long term continuous assurance of their data safety, the problem of verifying correctness of data storage in the becomes even more challenging.  This is not just a third party data warehouse. The data stored in the may be often updated by the users. 2.2 PROPOSED SYSTEM  An efficient cloud scheme with data in been made. Here we are using the erasure code technique for distribute the data to locations and access the data from.  User can register and login into their account. Provided an option to store, share and access the data from storage. Here we are using the double ensured scheme for storing data into the. cloud  First is your data or file splited into multiple parts and it will store into different server locations. Each and every file generates the key- code for auditing.  Then second is each and every splited file will encrypt before store into different locations. The shared users can edit the file in the with file owner’s permission. That file eligible of own public auditing.  Search and download the files, at the time of download user should use the security key. As an authentication success it will be decrypt and combine to get the original data from.  Moreover, we design a novel public verifiable authenticator, which is generated by a couple of keys and can be regenerated using partial keys.  Thus, our scheme can completely release data owners from online burden. In addition, we randomize the encode coefficients with a pseudorandom function to preserve data privacy.
  • 7. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 338  Extensive security analysis shows that our scheme is provable secure under random oracle model and experimental evaluation indicates that our scheme is highly efficient and can be feasibly integrated into the regenerating code- based storage. 2.2.1 Advantages of Proposed System:  Compared to a lot of its predecessors, which only provide binary results about the storage state across the cloud servers, the challenge- response protocol in our work more provides the localization of data error.  Unlike most prior works used for ensuring remote data integrity, the new scheme supports secure and efficient dynamic operations on data blocks, including: update, delete and append.  Extensive protection and act analysis demonstrate that the proposed scheme is extremely efficient and resilient beside Byzantine failure, malicious data modification attack, and even server colluding attacks III-SYSTEM REQUIRMENTS 3.1 HARDWARE REQUIREMENTS Proces: Pentium Dual Core 2.3 GHz Hard Disk: 250 GB or Higher Ram: 1 GB (Min) 3.2. SOFTWARE REQUIREMENTS Operating System : Windows XP or Higher Languages used: Java (JSP, Servlet), HTML Tools: JDK 1.7, Net Beans 7.0.1, SQLyog Backend: My SQL IV-SYSTEM DESIGN 4.1 SYSTEM ARCHITECTURE 4.2 MODULES • User Interface • File Uploading Process • Secret Key Generation • File Sharing Process • File Auditing Process • File Downloading Process • Mail Alert Process Module Description User interface: In our Secure System we have a user friendly user interface to interact with our System. Every Act dual role as a data owner and data consumer while uploading file they are the owner of that file if they search other’s file than they are the consumer. Users can create the account them self for that we have new pages, in that page we will get the details from the user and we generate the account for the user’s. We have authentication system; we only allow authorized users to access our System. In our System we providing the easy file searching user’s don’t want to keep remember all uploaded file’s exact name, for that we have given the keywords while uploading the files it will help to search the file easily.
  • 8. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 339 File uploading process: Storing data over storage servers one way to provide data robustness is to replicate a message such that each storage server stores a message. Another way is to encode a message of k symbols into a codeword of n symbols by erasure coding. To store a message, each of its codeword symbols is stored in a different storage server. A storage server corresponds to an erasure error of the codeword symbol. As long as the number of servers is under the tolerance threshold of the erasure code, the message can be recovered from the codeword symbols stored in the available storage servers by the decoding process. Secret key generation: Firstly the secret key will be generated as the initial step while uploading the file, every which is uploaded, will have unique secret key. This key will be taken as an identification of every file. The secret key which we are using is a three digit number we will make it use for both uploading and downloading. If the user want download some file and if he gives the download request the secret key of that file will be sent to the file owner of the file maybe he can share it. DATA FLOW DIAGRAM DFD diagram for user registration and login DFD diagram for user uploading process VI-CONCLUSION A privacy-preserving public auditing system for data storage security in computing. We utilize the homomorphism linear authenticator and random masking to guarantee that the TPA would not learn any knowledge about the data content stored on the server during the efficient auditing process, which not only eliminates the burden of user from the tedious and possibly expensive auditing task, but also alleviates the users’ fear of their outsourced data leakage. Considering TPA may concurrently handle multiple audit sessions from different users for their outsourced data files, we further extend our privacy-preserving public auditing protocol into a multiuser setting, where the TPA can perform multiple auditing tasks in a batch manner for better efficiency. VII-FUTURE ENHANCEMENT • We further extend our privacy-preserving public auditing protocol into a multi user setting, where the TPA can perform multiple auditing tasks in a batch manner for better efficiency. • In prospective we will improving the performance. • In this system we used only text files, In future we will include the image, audio, video files. In our system the OTP sent to owner mail id, coming up the client will receive the OTP on mobile by using the mobile number. REFERENCE: 1. G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable data possession at untrusted stores,” in Proceedings of CCS. ACM, 2007, pp. 598–609. 2. G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, “Scalable and efficient provable data
  • 9. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 340 possession,” in Proceedings of Secure Comm. ACM, 2008. 3. C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy- preserving public auditing for data storage security in computing,” in Proceedings of INFOCOM. IEEE, 2010, pp. 19. 4. Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, “Enabling public auditability and data dynamics for storage security in computing,” IEEE Transactions on Parallel and Cloud Systems, vol. 22, no. 5, pp. 847–859, 2011. 5. K. Yang and X. Jia, “An efficient and secure dynamic auditing protocol for data storage in computing,” IEEE Transactions on Parallel and Cloud Systems, vol. 24, no. 9, pp. 1717–1726, 2013. 6. M. Sookhak, A. Gani, H. Talebian, A. Akhunzada, S. U. Khan, R. Buyya, and A. Y. Zomaya, “Remote data auditing in computing environments: A survey, taxonomy, and open issues,” ACM Computing Surveys, vol. 47, no. 4, 2015. 7. Y. Cui, Z. Lai, X. Wang, N. Dai, and C. Miao, “Quicksync: Improving synchronization efficiency for mobile storage services,” in Proceedings of MobiCom. ACM, 2015, pp. 592– 603.