IRJET-Auditing and Resisting Key Exposure on Cloud Storage

IRJET Journal
IRJET JournalFast Track Publications

https://irjet.net/archives/V4/i6/IRJET-V4I6774.pdf

International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 3240
Auditing and Resisting Key Exposure on Cloud Storage
Akshata M. Bhand, D. A. Meshram
Student, ME (IT) , RMD Sinhgad School of Engineering,Pune,
Assistant Professor, ME (IT), RMD Sinhgad School of Engineering, Pune
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract— In the cloud computing auditing is an important
service to maintain the integrity. Existing examining
conventions are altogether in light of the supposition that the
Client's mystery key for examining is totally secured. Such
supposition may not generally be held, due to the likely frail
suspicion that all is well and good and additionally low
security settings at the customer. In a large portion of the
current evaluating conventions would unavoidably get to be
distinctly not able to work when a mystery key for evaluating
is uncovered. It is explored on the best way to decrease the
harm of the customer's key disclosure in distributed storage
evaluating, and give the main helpful illustration to this new
issue setting. Formalized the definition and the securitymodel
of inspecting convention with key-presentation strength and
propose such a convention. Used and built up a novel
authenticator developmenttobolstertheforwardsecurityand
the property of piece less undeniable nature utilizing the
current plan. The security verification and the execution
investigation appear that the anticipated convention is
secured and efficient.
Key words — Data storage, cloud storage auditing,
homomorphic linear authenticator, cloud computation,
keyexposure resistance.
1 INTRODUCTION
Cloud storage auditing is used to verify the integrity of the
data stored in public cloud, which is one of the important
security techniques in cloud storage. In recent years,
auditing protocols for cloud storage have attracted much
attention and have been researched intensively [1]. These
protocols focus on several different aspects of auditing, and
how to achieve high bandwidth and computation efficiency
is one of the essential concerns [3]. For that purpose, the
Homomorphism Linear Authenticator (HLA) technique that
supports block less verification is explored to reduce the
overheads of computation and communication in auditing
protocols, which allows the auditor to verify the integrity of
the data in cloud without retrieving the whole data.
Many cloud storage auditing protocols like have been
proposed based on this technique [1]-[8]. The privacy
protection of data is also an important aspect of cloud
storage auditing. In order to reduce the computational
burden of the client, a third-party auditor (TPA) is
introduced to help the client to periodically check the
integrity of the data in cloud. However, it is possible for the
TPA to get the client‟s data after it executes the auditing
protocol multiple times [3]. Auditing protocols are designed
to ensure the privacy of the client‟s data in cloud. Another
aspect having been addressed in cloud storage auditing is
how to support data dynamic operations [9].
Key exposure could happen due to several reasons:
1) Key management- Key management is a process which is
done by the client. In case any fault occurs and if the client is
using a cheap software-based key management, then key
exposure is possible.
2) Internet based security attacks- Suppose if a client
downloads any data or file and if that it contains malicious
program, then it may infect the system. This allows the
hackers to easily access any confidential data [4].
3) Trading with hackers- It can happen that cloud also earns
incentives by trading with the concerned hackers. In this
process, the cloud can get the client’s data and forge the
authenticator by regenerating false data or by hiding data
loss. Thus, dealing with key exposure is a vital issue in cloud
storage and various methodologies were adopted
2 RELATED WORKS
1. Enabling Cloud Storage Auditing With Key-Exposure
Resistance
Authors- Jia Yu, Kui Ren, Cong Wang and Vijay Varadharajan
In this paper manage the customer's key introduction in
distributed storage examining. Creator propose another
worldview called evaluating convention with key-
introduction strength. In such a convention, the uprightness
of the information beforehand put away in cloud can at
present be confirmed regardless of the possibility that the
customer's present mystery key for distributed storage
evaluating is uncovered. Formalize the definition and the
security model of evaluating convention with key-
presentation versatility, and afterward propose theprimary
handy arrangement. The security confirmation and the
asymptotic execution assessment demonstrate that the
proposed convention is secure and proficient [1].
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 3241
2.“ Enhancing Data Security In Cloud Storage Auditing
With Key Abstraction”
Authors- Priyadharshni, and Geo Jenefer. G
in this paper two essential answers for the key-presentation
issue of distributed storage evaluating is talked about and
actualized. The first is an innocent arrangement, which in
truth can't in a general sense take care of this issue. The
second is a marginally better arrangement, which can tackle
this issue however has a substantial overhead.Theyare both
unfeasible when connected in practical settings. And after
that center convention that is a great deal more productive
than both of the essential arrangements [2] .
3.“ An Efficient Cloud Storage Batch Auditing Without
Key Exposure Resistance Using Public Verifier”
Authors- T Yawaikha, R Meyanand
Paper presents think about on the most proficientmethod to
manage the customer's key without uncovering into the
cloud. The evaluating performed by open verifier reviews
the information as well as checks the honesty of the
information in cloud. The idea of client repudiation permits
to renounce the invalid key enlisted.Formalizethedefinition
and the security model ofreviewingconventionwithoutkey-
introduction versatility, and after that propose and confirm
the principal down to earth arrangement [3]
4.“ Survey Paper On Cloud Storage Auditing With
Exposure Resistance”
Authors- Sneha Singha, S. D. Satav
As this total paper portrays the diverse approachs on
empowering distributed storage evaluating with key
presentation strength, yet none of the systems is by all
accounts idealize. Along these lines, this study paper as a bit
proposes a technique for a viable key presentation
resistance where we embrace the deduplication system of
information. Besides, it will check the duplicacy of
information and dispense with the excess one utilizing MD5
hashing calculation. After people in general and privatekeys
are created, it utilizes tile bitmap technique wherein it will
check the past and the present adaptations of the
information to facilitate the inspector's workload and to
make the framework more effective [4]
5.“ Efficient provable data possession for hybrid clouds”
Authors- Y. Zhu, H. Wang, Z. Hu, G.-J. Ahn, H. Hu, and S.S. Yau
This paper tended to the development of PDP plan for cross
breed mists. In light of homomorphic undeniable reactions
and hash record chain of command, Author proposed an
agreeable PDP plan to bolster dynamic versatility on
different stockpiling servers. Tests demonstrated that our
plans require a little, steady measure of overhead [5] .
3 PROPOSED SCHEME
At a high level, our setting of interest is an enterprise
network, consisting of a group of affiliated clients (for
example, employees of a company) who will use the SCSP
and store data with deduplication technique. In
deduplication can be frequently used in these settings for
data backup and disaster recoveryapplicationswhilegreatly
reducing storage space. Such systems are widespread and
are often more suitable, in to user file backup and
synchronization applications than richer storage
abstractions [14]. There are three entities defined in our
system, that is, users, private cloud and S-CSP in public
cloud. The S-CSP performs deduplication by checking if the
contents of two files are the same and stores only one of
them. The access right to a file is defined based on a set of
privileges. Cloud data storage service includes the user(U),
who has the large data to be stored in cloud; the cloud
server(CS), managed by cloud service provider(CSP) with
significant storage; the third party auditor(TPA), trusted to
access the CSP according to users request. When user store
the data, the copy is sent to both the CSP and TPA. To verify
the correctness of data stored in cloud, auditing process is
done.
Fig -1: System Architecture
Here the auditing process is carried out TPA, it must
efficiently audit without bringing any changestotheoriginal
data. For auditing, the data which is in TPA is used. Public
auditability: Allow the TPA to verify the correctness of data
without demanding the copy of data. Privacy preserving: To
ensure that TPA cannot retrieve the data content during the
auditing process. Lightweight: To allow TPA to perform
auditing with minimum communication and computation
overhead.
5. ALGORITHM USED
An auditing protocol with key-exposure resilience is
composed by five algorithms (SysSetup,
KeyUpdate, AuthGen, ProofGen, ProofVerify), shown below:
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 3242
5.1. SysSetup(1k, T ) →(PK, SK0):
The system setup algorithm is a probabilistic algorithm
which takes as input a security parameter k and the total
number of time periods T, and generates a public key PKand
the initial client‟s secret key SK0. This algorithm is run by
the client.
5.2. KeyUpdate(PK, j, SK j ) → (SK j+1):
The key update algorithm is a probabilistic algorithm which
takes as input the public key PK, the current period j and a
client‟s secret key SK j , and generates a new secret key SK
j+1 for the next period j + 1. This algorithm is run by the
client.
5.3. AuthGen(PK, j, SK j , F) → (_):
The authenticator generation algorithm is a probabilistic
algorithm which takes as input the public key PK,thecurrent
period j , a client‟s secret key SK j and a file F, and generates
the set of authenticators _ for F in time period j. This
algorithm is also run by the client.
5.4. Proof Gen(PK, j,Chal, F,_) → (P):
The proof generation algorithm is a probabilistic algorithm
which takes as input the public key PK, a time period j , a
challenge Chal, a file F and the set of authenticators _, and
generates a proof P which means the cloud possesses F.
Here, ( j,Chal) pair is issued by the auditor, and then used by
the cloud. This algorithm is run by the cloud.
5.5.Proof Veri f y(PK, j,Chal, P) → (“True” or “False”):
The proof verifying algorithm is a deterministic algorithm
which takes as input the public key PK, a time period j , a
challenge Chal and a proof P, and returns “True” or “False”.
Thisalgorithm is run by the client.
6. MATHEMATICAL MODEL
S is the system
S={I, O, F , K,T, Success, Failure }
Where,
I = Set of Input
I={I1, I2, I3}
Where,
I1=Login user ID
I2=Login password
I3=File
K=Key set of Secret key and Public key
K={(S1,P1), (S2,P3) ….., (Si,Pi)}
O=Set of Outputs
O= {O1, O2, O3, O4}
Where,
O1=Authentication Message
O2=Encrypted File
O3= Attack Detection
O4= Periodic key
O5=Original Data file
T= Time Period for key generation
F=Set of Functions
F={F1, F2, F3, F4,F5}
Where,
F1=Authentication
O1F1(I1, I2)
F2=Encryption
O2F2(I3,K)
F3=Attack Detection
O3F3(K)
F4= Periodic key Generation
O4F4(O3,T)
F5= Decryption
O5F5(O2,K)
7. RESULT TABLES
Following table shows result comes from the system
performance, it shows that the the required to create a key
with respect to file size of file size.
Table -1: Time required to genearte key
Sr.No Time(Sec) File Size(KB)
1 100 7
2 160 8
3 200 11
4 310 12
5 400 13
Chart -1: Result graph
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 3243
As shown in figure 2 the graph represents time require to
assign generate key. If file size is increasing rapidly then the
time is also increased.
9. IMPLEMENTATION STATUS
Project is developed up to the base paper work, so remains
just an proposed or contribution work. Development
completed up to the 60% of total work.
10. S/W REQUIREMENT SPECIFICATION
Table - 2: Minimum Hardware Requirements
Hardware Minimum Requirement
Processor Pentium Dual Core 2.80
GHz or above
Primary Memory 1GB RAM or more
Secondary Memory 20 GB (minimum)
Table -3: Minimum Software Requirements
Software
Minimum Requirement
Front End (Prog. Lang.) J2SDK1.5 Java and J2EE
Backend (DB) My SQL
Development Tool (IDE) Eclipse
11. POSSIBLE FUTURE WORKS
The cloud storage auditing with key exposure resilience
protocol is used in paper .The user can upload their data in
the cloud and they can protect their data by using the Third
Party Auditor. The key update algorithm is used to protect
the client‟s key from the unauthorized user. In paper, the
data owner independently upload the data to the Cloud and
it is difficult to monitor the data and checking the process in
offline. Thus data owner stands in online for integrity
checking. This can be achieved by introducing Proxy
component to check for the integrity. This is an added
advantage to the data owner that he need not stay online for
integrity checking. The data owner provides a key to the
proxy server using that key proxyisresponsibleforchecking
the data. This should be considering as the future work to
overcome this drawback.
12. CONCLUSIONS
We examine on the best way to manage the client‟s enter
introduction in distributed storage evaluating. We propose
another worldview called reviewing convention with key-
presentation flexibility.Insucha convention,theuprightness
of the information beforehand put away in cloud can at
present be confirmed regardless of the possibility that the
client‟s current mystery key for distributed storage
inspecting is uncovered. We formalize the definition andthe
security model of reviewing convention with key-
presentation versatility, and after that propose theprincipal
down to earth arrangement. The security confirmation and
the asymptotic execution assessment demonstrate that the
proposed convention is secure and proficient.
13. REFERENCES
[1] Vijay varadhanajan , Jia Yu ,Kai Ren “Enabling Cloud
Storage Auditing With Key Exposure Resistance” IEEE
Transaction on information forensics and security,Vol 10.
[2] Priyadharshni, Geo Jenefer. G “ Enhancing Data Security
In Cloud Storage Auditing With Key Abstraction” Vo.2,Issue
2,Oct 2015.
[3] T Yawaikha,R Meyanand, “ An Efficient Cloud Storage
Batch Auditing Without Key Exposure Resistance Using
Public Verifier” International conference on system 2016
[4] Sneha Singha”Survey Paper On Cloud Storage Auditing
With Exposure Resistance” IJSR
[5] Y. Zhu, H. Wang, Z. Hu, G.-J. Ahn, H. Hu, and S. S. Yau,
“Efficient provable data possession for hybrid clouds,” in
Proc. 17th ACM Conf. Comput. Commun. Secur., 2010, pp.
756–758.
[6] K. Yang and X. Jia, “Data storage auditing service in cloud
computing: Challenges, methods and opportunities,” World
Wide Web, vol. 15, no. 4, pp. 409–428, 2012.
[7] H. Shacham and B. Waters, “Compact proofs of
retrievability,” in Advances in Cryptology—ASIACRYPT.
Berlin, Germany: Springer-Verlag, 2008, pp. 90–107.
[8] C. Wang, K. Ren, W. Lou, and J. Li, “Toward publicly
auditable secure cloud data storage services,” IEEE Netw.,
vol. 24, no. 4, pp. 19–24, Jul./Aug. 2010.
[9] K. Yang and X. Jia, “An efficient and secure dynamic
auditing protocol for data storage in cloud computing,” IEEE
Trans. Parallel Distrib. Syst., mvol. 24, no. 9, pp. 1717–1726,
Sep. 2013.
[10] C. Wang, S. S. M. Chow, Q. Wang, K. Ren, and W. Lou,
“Privacy preserving public auditing for secure cloud
storage,” IEEE Trans. Comput., vol. 62, no. 2, pp. 362–375,
Feb. 2013.

Recomendados

Insuring Security for Outsourced Data Stored in Cloud Environment por
Insuring Security for Outsourced Data Stored in Cloud EnvironmentInsuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentEditor IJCATR
364 vistas5 diapositivas
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou... por
Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...IOSR Journals
628 vistas6 diapositivas
International Journal of Computational Engineering Research(IJCER) por
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
275 vistas5 diapositivas
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud por
 IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET - Efficient and Verifiable Queries over Encrypted Data in CloudIRJET Journal
12 vistas3 diapositivas
An4201262267 por
An4201262267An4201262267
An4201262267IJERA Editor
386 vistas6 diapositivas
Iaetsd storage privacy protection against data por
Iaetsd storage privacy protection against dataIaetsd storage privacy protection against data
Iaetsd storage privacy protection against dataIaetsd Iaetsd
168 vistas5 diapositivas

Más contenido relacionado

La actualidad más candente

A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in... por
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...IRJET Journal
18 vistas2 diapositivas
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm por
IRJET- Secure Data Deduplication for Cloud Server using HMAC AlgorithmIRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC AlgorithmIRJET Journal
32 vistas4 diapositivas
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou... por
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...IRJET Journal
62 vistas5 diapositivas
V04405122126 por
V04405122126V04405122126
V04405122126IJERA Editor
451 vistas5 diapositivas
Efficient Implementation of Proof of Retrievability (OPOR) In Cloud Computing... por
Efficient Implementation of Proof of Retrievability (OPOR) In Cloud Computing...Efficient Implementation of Proof of Retrievability (OPOR) In Cloud Computing...
Efficient Implementation of Proof of Retrievability (OPOR) In Cloud Computing...IJERA Editor
47 vistas6 diapositivas
IRJET- Deduplication of Encrypted Bigdata on Cloud por
IRJET- Deduplication of Encrypted Bigdata on CloudIRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on CloudIRJET Journal
55 vistas11 diapositivas

La actualidad más candente(19)

A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in... por IRJET Journal
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
IRJET Journal18 vistas
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm por IRJET Journal
IRJET- Secure Data Deduplication for Cloud Server using HMAC AlgorithmIRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET Journal32 vistas
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou... por IRJET Journal
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
IRJET Journal62 vistas
Efficient Implementation of Proof of Retrievability (OPOR) In Cloud Computing... por IJERA Editor
Efficient Implementation of Proof of Retrievability (OPOR) In Cloud Computing...Efficient Implementation of Proof of Retrievability (OPOR) In Cloud Computing...
Efficient Implementation of Proof of Retrievability (OPOR) In Cloud Computing...
IJERA Editor47 vistas
IRJET- Deduplication of Encrypted Bigdata on Cloud por IRJET Journal
IRJET- Deduplication of Encrypted Bigdata on CloudIRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET Journal55 vistas
Development of Effective Audit Service to Maintain Integrity of Migrated Data... por IRJET Journal
Development of Effective Audit Service to Maintain Integrity of Migrated Data...Development of Effective Audit Service to Maintain Integrity of Migrated Data...
Development of Effective Audit Service to Maintain Integrity of Migrated Data...
IRJET Journal31 vistas
Improving Efficiency of Security in Multi-Cloud por IJTET Journal
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-Cloud
IJTET Journal317 vistas
A Novel privacy preserving public auditing for shared data in cloud por JAVVAJI VENKATA RAO
A Novel privacy preserving public auditing for shared data in cloudA Novel privacy preserving public auditing for shared data in cloud
A Novel privacy preserving public auditing for shared data in cloud
JAVVAJI VENKATA RAO1.2K vistas
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING por ijcsit
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
ijcsit42 vistas
IRJET- Two ways Verification for Securing Cloud Data por IRJET Journal
IRJET- Two ways Verification for Securing Cloud DataIRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud Data
IRJET Journal16 vistas
A Survey on Batch Auditing Systems for Cloud Storage por IRJET Journal
A Survey on Batch Auditing Systems for Cloud StorageA Survey on Batch Auditing Systems for Cloud Storage
A Survey on Batch Auditing Systems for Cloud Storage
IRJET Journal44 vistas
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag... por INFOGAIN PUBLICATION
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction por paperpublications3
Enhancing Data Security in Cloud Storage Auditing With Key AbstractionEnhancing Data Security in Cloud Storage Auditing With Key Abstraction
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction
paperpublications3122 vistas
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera... por IJERA Editor
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...
IJERA Editor264 vistas
Privacy preserving public auditing for regenerating-code-based cloud storage por LeMeniz Infotech
Privacy preserving public auditing for regenerating-code-based cloud storagePrivacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storage
LeMeniz Infotech883 vistas
Authenticated and unrestricted auditing of big data space on cloud through v... por IJMER
Authenticated and unrestricted auditing of big data space on  cloud through v...Authenticated and unrestricted auditing of big data space on  cloud through v...
Authenticated and unrestricted auditing of big data space on cloud through v...
IJMER413 vistas
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage por 1crore projects
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud StoragePrivacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
1crore projects58 vistas

Similar a IRJET-Auditing and Resisting Key Exposure on Cloud Storage

Improve HLA based Encryption Process using fixed Size Aggregate Key generation por
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationEditor IJMTER
219 vistas9 diapositivas
50120140507005 2 por
50120140507005 250120140507005 2
50120140507005 2IAEME Publication
271 vistas7 diapositivas
50120140507005 por
5012014050700550120140507005
50120140507005IAEME Publication
376 vistas7 diapositivas
Enabling Cloud Storage Auditing with Key Exposure Resistance por
Enabling Cloud Storage Auditing with Key Exposure ResistanceEnabling Cloud Storage Auditing with Key Exposure Resistance
Enabling Cloud Storage Auditing with Key Exposure ResistanceIRJET Journal
3 vistas6 diapositivas
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur... por
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...ijsrd.com
162 vistas2 diapositivas
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security por
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEditor IJMTER
299 vistas8 diapositivas

Similar a IRJET-Auditing and Resisting Key Exposure on Cloud Storage(20)

Improve HLA based Encryption Process using fixed Size Aggregate Key generation por Editor IJMTER
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Editor IJMTER219 vistas
Enabling Cloud Storage Auditing with Key Exposure Resistance por IRJET Journal
Enabling Cloud Storage Auditing with Key Exposure ResistanceEnabling Cloud Storage Auditing with Key Exposure Resistance
Enabling Cloud Storage Auditing with Key Exposure Resistance
IRJET Journal3 vistas
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur... por ijsrd.com
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
ijsrd.com162 vistas
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security por Editor IJMTER
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Editor IJMTER299 vistas
Security Check in Cloud Computing through Third Party Auditor por ijsrd.com
Security Check in Cloud Computing through Third Party AuditorSecurity Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party Auditor
ijsrd.com211 vistas
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo... por IEEEGLOBALSOFTTECHNOLOGIES
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...
Privacy preserving public auditing for secure cloud storage por IEEEFINALYEARPROJECTS
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storage
IEEEFINALYEARPROJECTS1.8K vistas
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing for ... por IEEEGLOBALSOFTTECHNOLOGIES
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing for ...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing for ...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing for ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ... por IRJET Journal
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET Journal10 vistas
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri... por IRJET Journal
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET Journal35 vistas
Enhanced security framework to ensure data security in cloud using security b... por eSAT Journals
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
eSAT Journals137 vistas
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage por IRJET Journal
A Trusted TPA Model, to Improve Security & Reliability for Cloud StorageA Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
IRJET Journal46 vistas
IRJET- A Survey on Remote Data Possession Verification Protocol in Cloud Storage por IRJET Journal
IRJET- A Survey on Remote Data Possession Verification Protocol in Cloud StorageIRJET- A Survey on Remote Data Possession Verification Protocol in Cloud Storage
IRJET- A Survey on Remote Data Possession Verification Protocol in Cloud Storage
IRJET Journal18 vistas
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage por IRJET Journal
IRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET Journal39 vistas
Efficient and Empiric Keyword Search Using Cloud por IRJET Journal
Efficient and Empiric Keyword Search Using CloudEfficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using Cloud
IRJET Journal0 vistas
Privacy preserving public auditing for secure cloud storage por JPINFOTECH JAYAPRAKASH
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storage

Más de IRJET Journal

SOIL STABILIZATION USING WASTE FIBER MATERIAL por
SOIL STABILIZATION USING WASTE FIBER MATERIALSOIL STABILIZATION USING WASTE FIBER MATERIAL
SOIL STABILIZATION USING WASTE FIBER MATERIALIRJET Journal
22 vistas7 diapositivas
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles... por
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...IRJET Journal
8 vistas7 diapositivas
Identification, Discrimination and Classification of Cotton Crop by Using Mul... por
Identification, Discrimination and Classification of Cotton Crop by Using Mul...Identification, Discrimination and Classification of Cotton Crop by Using Mul...
Identification, Discrimination and Classification of Cotton Crop by Using Mul...IRJET Journal
8 vistas5 diapositivas
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula... por
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...IRJET Journal
13 vistas11 diapositivas
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR... por
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...IRJET Journal
14 vistas6 diapositivas
Performance Analysis of Aerodynamic Design for Wind Turbine Blade por
Performance Analysis of Aerodynamic Design for Wind Turbine BladePerformance Analysis of Aerodynamic Design for Wind Turbine Blade
Performance Analysis of Aerodynamic Design for Wind Turbine BladeIRJET Journal
7 vistas5 diapositivas

Más de IRJET Journal(20)

SOIL STABILIZATION USING WASTE FIBER MATERIAL por IRJET Journal
SOIL STABILIZATION USING WASTE FIBER MATERIALSOIL STABILIZATION USING WASTE FIBER MATERIAL
SOIL STABILIZATION USING WASTE FIBER MATERIAL
IRJET Journal22 vistas
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles... por IRJET Journal
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
IRJET Journal8 vistas
Identification, Discrimination and Classification of Cotton Crop by Using Mul... por IRJET Journal
Identification, Discrimination and Classification of Cotton Crop by Using Mul...Identification, Discrimination and Classification of Cotton Crop by Using Mul...
Identification, Discrimination and Classification of Cotton Crop by Using Mul...
IRJET Journal8 vistas
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula... por IRJET Journal
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
IRJET Journal13 vistas
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR... por IRJET Journal
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
IRJET Journal14 vistas
Performance Analysis of Aerodynamic Design for Wind Turbine Blade por IRJET Journal
Performance Analysis of Aerodynamic Design for Wind Turbine BladePerformance Analysis of Aerodynamic Design for Wind Turbine Blade
Performance Analysis of Aerodynamic Design for Wind Turbine Blade
IRJET Journal7 vistas
Heart Failure Prediction using Different Machine Learning Techniques por IRJET Journal
Heart Failure Prediction using Different Machine Learning TechniquesHeart Failure Prediction using Different Machine Learning Techniques
Heart Failure Prediction using Different Machine Learning Techniques
IRJET Journal7 vistas
Experimental Investigation of Solar Hot Case Based on Photovoltaic Panel por IRJET Journal
Experimental Investigation of Solar Hot Case Based on Photovoltaic PanelExperimental Investigation of Solar Hot Case Based on Photovoltaic Panel
Experimental Investigation of Solar Hot Case Based on Photovoltaic Panel
IRJET Journal3 vistas
Metro Development and Pedestrian Concerns por IRJET Journal
Metro Development and Pedestrian ConcernsMetro Development and Pedestrian Concerns
Metro Development and Pedestrian Concerns
IRJET Journal2 vistas
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An... por IRJET Journal
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An...Mapping the Crashworthiness Domains: Investigations Based on Scientometric An...
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An...
IRJET Journal3 vistas
Data Analytics and Artificial Intelligence in Healthcare Industry por IRJET Journal
Data Analytics and Artificial Intelligence in Healthcare IndustryData Analytics and Artificial Intelligence in Healthcare Industry
Data Analytics and Artificial Intelligence in Healthcare Industry
IRJET Journal3 vistas
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC... por IRJET Journal
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC...DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC...
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC...
IRJET Journal53 vistas
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur... por IRJET Journal
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur...Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur...
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur...
IRJET Journal11 vistas
Development of Effective Tomato Package for Post-Harvest Preservation por IRJET Journal
Development of Effective Tomato Package for Post-Harvest PreservationDevelopment of Effective Tomato Package for Post-Harvest Preservation
Development of Effective Tomato Package for Post-Harvest Preservation
IRJET Journal4 vistas
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION” por IRJET Journal
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION”“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION”
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION”
IRJET Journal5 vistas
Understanding the Nature of Consciousness with AI por IRJET Journal
Understanding the Nature of Consciousness with AIUnderstanding the Nature of Consciousness with AI
Understanding the Nature of Consciousness with AI
IRJET Journal12 vistas
Augmented Reality App for Location based Exploration at JNTUK Kakinada por IRJET Journal
Augmented Reality App for Location based Exploration at JNTUK KakinadaAugmented Reality App for Location based Exploration at JNTUK Kakinada
Augmented Reality App for Location based Exploration at JNTUK Kakinada
IRJET Journal6 vistas
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba... por IRJET Journal
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba...Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba...
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba...
IRJET Journal18 vistas
Enhancing Real Time Communication and Efficiency With Websocket por IRJET Journal
Enhancing Real Time Communication and Efficiency With WebsocketEnhancing Real Time Communication and Efficiency With Websocket
Enhancing Real Time Communication and Efficiency With Websocket
IRJET Journal5 vistas
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ... por IRJET Journal
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ...Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ...
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ...
IRJET Journal4 vistas

Último

Renewal Projects in Seismic Construction por
Renewal Projects in Seismic ConstructionRenewal Projects in Seismic Construction
Renewal Projects in Seismic ConstructionEngineering & Seismic Construction
5 vistas8 diapositivas
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx por
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptxlwang78
109 vistas19 diapositivas
REACTJS.pdf por
REACTJS.pdfREACTJS.pdf
REACTJS.pdfArthyR3
34 vistas16 diapositivas
Codes and Conventions.pptx por
Codes and Conventions.pptxCodes and Conventions.pptx
Codes and Conventions.pptxIsabellaGraceAnkers
13 vistas5 diapositivas
Design of machine elements-UNIT 3.pptx por
Design of machine elements-UNIT 3.pptxDesign of machine elements-UNIT 3.pptx
Design of machine elements-UNIT 3.pptxgopinathcreddy
33 vistas31 diapositivas
MongoDB.pdf por
MongoDB.pdfMongoDB.pdf
MongoDB.pdfArthyR3
45 vistas6 diapositivas

Último(20)

2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx por lwang78
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx
lwang78109 vistas
REACTJS.pdf por ArthyR3
REACTJS.pdfREACTJS.pdf
REACTJS.pdf
ArthyR334 vistas
Design of machine elements-UNIT 3.pptx por gopinathcreddy
Design of machine elements-UNIT 3.pptxDesign of machine elements-UNIT 3.pptx
Design of machine elements-UNIT 3.pptx
gopinathcreddy33 vistas
MongoDB.pdf por ArthyR3
MongoDB.pdfMongoDB.pdf
MongoDB.pdf
ArthyR345 vistas
GDSC Mikroskil Members Onboarding 2023.pdf por gdscmikroskil
GDSC Mikroskil Members Onboarding 2023.pdfGDSC Mikroskil Members Onboarding 2023.pdf
GDSC Mikroskil Members Onboarding 2023.pdf
gdscmikroskil58 vistas
Effect of deep chemical mixing columns on properties of surrounding soft clay... por AltinKaradagli
Effect of deep chemical mixing columns on properties of surrounding soft clay...Effect of deep chemical mixing columns on properties of surrounding soft clay...
Effect of deep chemical mixing columns on properties of surrounding soft clay...
AltinKaradagli10 vistas
Proposal Presentation.pptx por keytonallamon
Proposal Presentation.pptxProposal Presentation.pptx
Proposal Presentation.pptx
keytonallamon52 vistas
DevOps-ITverse-2023-IIT-DU.pptx por Anowar Hossain
DevOps-ITverse-2023-IIT-DU.pptxDevOps-ITverse-2023-IIT-DU.pptx
DevOps-ITverse-2023-IIT-DU.pptx
Anowar Hossain12 vistas
_MAKRIADI-FOTEINI_diploma thesis.pptx por fotinimakriadi
_MAKRIADI-FOTEINI_diploma thesis.pptx_MAKRIADI-FOTEINI_diploma thesis.pptx
_MAKRIADI-FOTEINI_diploma thesis.pptx
fotinimakriadi8 vistas
Searching in Data Structure por raghavbirla63
Searching in Data StructureSearching in Data Structure
Searching in Data Structure
raghavbirla6314 vistas
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc... por csegroupvn
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc...Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc...
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc...
csegroupvn5 vistas

IRJET-Auditing and Resisting Key Exposure on Cloud Storage

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 3240 Auditing and Resisting Key Exposure on Cloud Storage Akshata M. Bhand, D. A. Meshram Student, ME (IT) , RMD Sinhgad School of Engineering,Pune, Assistant Professor, ME (IT), RMD Sinhgad School of Engineering, Pune ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract— In the cloud computing auditing is an important service to maintain the integrity. Existing examining conventions are altogether in light of the supposition that the Client's mystery key for examining is totally secured. Such supposition may not generally be held, due to the likely frail suspicion that all is well and good and additionally low security settings at the customer. In a large portion of the current evaluating conventions would unavoidably get to be distinctly not able to work when a mystery key for evaluating is uncovered. It is explored on the best way to decrease the harm of the customer's key disclosure in distributed storage evaluating, and give the main helpful illustration to this new issue setting. Formalized the definition and the securitymodel of inspecting convention with key-presentation strength and propose such a convention. Used and built up a novel authenticator developmenttobolstertheforwardsecurityand the property of piece less undeniable nature utilizing the current plan. The security verification and the execution investigation appear that the anticipated convention is secured and efficient. Key words — Data storage, cloud storage auditing, homomorphic linear authenticator, cloud computation, keyexposure resistance. 1 INTRODUCTION Cloud storage auditing is used to verify the integrity of the data stored in public cloud, which is one of the important security techniques in cloud storage. In recent years, auditing protocols for cloud storage have attracted much attention and have been researched intensively [1]. These protocols focus on several different aspects of auditing, and how to achieve high bandwidth and computation efficiency is one of the essential concerns [3]. For that purpose, the Homomorphism Linear Authenticator (HLA) technique that supports block less verification is explored to reduce the overheads of computation and communication in auditing protocols, which allows the auditor to verify the integrity of the data in cloud without retrieving the whole data. Many cloud storage auditing protocols like have been proposed based on this technique [1]-[8]. The privacy protection of data is also an important aspect of cloud storage auditing. In order to reduce the computational burden of the client, a third-party auditor (TPA) is introduced to help the client to periodically check the integrity of the data in cloud. However, it is possible for the TPA to get the client‟s data after it executes the auditing protocol multiple times [3]. Auditing protocols are designed to ensure the privacy of the client‟s data in cloud. Another aspect having been addressed in cloud storage auditing is how to support data dynamic operations [9]. Key exposure could happen due to several reasons: 1) Key management- Key management is a process which is done by the client. In case any fault occurs and if the client is using a cheap software-based key management, then key exposure is possible. 2) Internet based security attacks- Suppose if a client downloads any data or file and if that it contains malicious program, then it may infect the system. This allows the hackers to easily access any confidential data [4]. 3) Trading with hackers- It can happen that cloud also earns incentives by trading with the concerned hackers. In this process, the cloud can get the client’s data and forge the authenticator by regenerating false data or by hiding data loss. Thus, dealing with key exposure is a vital issue in cloud storage and various methodologies were adopted 2 RELATED WORKS 1. Enabling Cloud Storage Auditing With Key-Exposure Resistance Authors- Jia Yu, Kui Ren, Cong Wang and Vijay Varadharajan In this paper manage the customer's key introduction in distributed storage examining. Creator propose another worldview called evaluating convention with key- introduction strength. In such a convention, the uprightness of the information beforehand put away in cloud can at present be confirmed regardless of the possibility that the customer's present mystery key for distributed storage evaluating is uncovered. Formalize the definition and the security model of evaluating convention with key- presentation versatility, and afterward propose theprimary handy arrangement. The security confirmation and the asymptotic execution assessment demonstrate that the proposed convention is secure and proficient [1].
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 3241 2.“ Enhancing Data Security In Cloud Storage Auditing With Key Abstraction” Authors- Priyadharshni, and Geo Jenefer. G in this paper two essential answers for the key-presentation issue of distributed storage evaluating is talked about and actualized. The first is an innocent arrangement, which in truth can't in a general sense take care of this issue. The second is a marginally better arrangement, which can tackle this issue however has a substantial overhead.Theyare both unfeasible when connected in practical settings. And after that center convention that is a great deal more productive than both of the essential arrangements [2] . 3.“ An Efficient Cloud Storage Batch Auditing Without Key Exposure Resistance Using Public Verifier” Authors- T Yawaikha, R Meyanand Paper presents think about on the most proficientmethod to manage the customer's key without uncovering into the cloud. The evaluating performed by open verifier reviews the information as well as checks the honesty of the information in cloud. The idea of client repudiation permits to renounce the invalid key enlisted.Formalizethedefinition and the security model ofreviewingconventionwithoutkey- introduction versatility, and after that propose and confirm the principal down to earth arrangement [3] 4.“ Survey Paper On Cloud Storage Auditing With Exposure Resistance” Authors- Sneha Singha, S. D. Satav As this total paper portrays the diverse approachs on empowering distributed storage evaluating with key presentation strength, yet none of the systems is by all accounts idealize. Along these lines, this study paper as a bit proposes a technique for a viable key presentation resistance where we embrace the deduplication system of information. Besides, it will check the duplicacy of information and dispense with the excess one utilizing MD5 hashing calculation. After people in general and privatekeys are created, it utilizes tile bitmap technique wherein it will check the past and the present adaptations of the information to facilitate the inspector's workload and to make the framework more effective [4] 5.“ Efficient provable data possession for hybrid clouds” Authors- Y. Zhu, H. Wang, Z. Hu, G.-J. Ahn, H. Hu, and S.S. Yau This paper tended to the development of PDP plan for cross breed mists. In light of homomorphic undeniable reactions and hash record chain of command, Author proposed an agreeable PDP plan to bolster dynamic versatility on different stockpiling servers. Tests demonstrated that our plans require a little, steady measure of overhead [5] . 3 PROPOSED SCHEME At a high level, our setting of interest is an enterprise network, consisting of a group of affiliated clients (for example, employees of a company) who will use the SCSP and store data with deduplication technique. In deduplication can be frequently used in these settings for data backup and disaster recoveryapplicationswhilegreatly reducing storage space. Such systems are widespread and are often more suitable, in to user file backup and synchronization applications than richer storage abstractions [14]. There are three entities defined in our system, that is, users, private cloud and S-CSP in public cloud. The S-CSP performs deduplication by checking if the contents of two files are the same and stores only one of them. The access right to a file is defined based on a set of privileges. Cloud data storage service includes the user(U), who has the large data to be stored in cloud; the cloud server(CS), managed by cloud service provider(CSP) with significant storage; the third party auditor(TPA), trusted to access the CSP according to users request. When user store the data, the copy is sent to both the CSP and TPA. To verify the correctness of data stored in cloud, auditing process is done. Fig -1: System Architecture Here the auditing process is carried out TPA, it must efficiently audit without bringing any changestotheoriginal data. For auditing, the data which is in TPA is used. Public auditability: Allow the TPA to verify the correctness of data without demanding the copy of data. Privacy preserving: To ensure that TPA cannot retrieve the data content during the auditing process. Lightweight: To allow TPA to perform auditing with minimum communication and computation overhead. 5. ALGORITHM USED An auditing protocol with key-exposure resilience is composed by five algorithms (SysSetup, KeyUpdate, AuthGen, ProofGen, ProofVerify), shown below:
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 3242 5.1. SysSetup(1k, T ) →(PK, SK0): The system setup algorithm is a probabilistic algorithm which takes as input a security parameter k and the total number of time periods T, and generates a public key PKand the initial client‟s secret key SK0. This algorithm is run by the client. 5.2. KeyUpdate(PK, j, SK j ) → (SK j+1): The key update algorithm is a probabilistic algorithm which takes as input the public key PK, the current period j and a client‟s secret key SK j , and generates a new secret key SK j+1 for the next period j + 1. This algorithm is run by the client. 5.3. AuthGen(PK, j, SK j , F) → (_): The authenticator generation algorithm is a probabilistic algorithm which takes as input the public key PK,thecurrent period j , a client‟s secret key SK j and a file F, and generates the set of authenticators _ for F in time period j. This algorithm is also run by the client. 5.4. Proof Gen(PK, j,Chal, F,_) → (P): The proof generation algorithm is a probabilistic algorithm which takes as input the public key PK, a time period j , a challenge Chal, a file F and the set of authenticators _, and generates a proof P which means the cloud possesses F. Here, ( j,Chal) pair is issued by the auditor, and then used by the cloud. This algorithm is run by the cloud. 5.5.Proof Veri f y(PK, j,Chal, P) → (“True” or “False”): The proof verifying algorithm is a deterministic algorithm which takes as input the public key PK, a time period j , a challenge Chal and a proof P, and returns “True” or “False”. Thisalgorithm is run by the client. 6. MATHEMATICAL MODEL S is the system S={I, O, F , K,T, Success, Failure } Where, I = Set of Input I={I1, I2, I3} Where, I1=Login user ID I2=Login password I3=File K=Key set of Secret key and Public key K={(S1,P1), (S2,P3) ….., (Si,Pi)} O=Set of Outputs O= {O1, O2, O3, O4} Where, O1=Authentication Message O2=Encrypted File O3= Attack Detection O4= Periodic key O5=Original Data file T= Time Period for key generation F=Set of Functions F={F1, F2, F3, F4,F5} Where, F1=Authentication O1F1(I1, I2) F2=Encryption O2F2(I3,K) F3=Attack Detection O3F3(K) F4= Periodic key Generation O4F4(O3,T) F5= Decryption O5F5(O2,K) 7. RESULT TABLES Following table shows result comes from the system performance, it shows that the the required to create a key with respect to file size of file size. Table -1: Time required to genearte key Sr.No Time(Sec) File Size(KB) 1 100 7 2 160 8 3 200 11 4 310 12 5 400 13 Chart -1: Result graph
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 3243 As shown in figure 2 the graph represents time require to assign generate key. If file size is increasing rapidly then the time is also increased. 9. IMPLEMENTATION STATUS Project is developed up to the base paper work, so remains just an proposed or contribution work. Development completed up to the 60% of total work. 10. S/W REQUIREMENT SPECIFICATION Table - 2: Minimum Hardware Requirements Hardware Minimum Requirement Processor Pentium Dual Core 2.80 GHz or above Primary Memory 1GB RAM or more Secondary Memory 20 GB (minimum) Table -3: Minimum Software Requirements Software Minimum Requirement Front End (Prog. Lang.) J2SDK1.5 Java and J2EE Backend (DB) My SQL Development Tool (IDE) Eclipse 11. POSSIBLE FUTURE WORKS The cloud storage auditing with key exposure resilience protocol is used in paper .The user can upload their data in the cloud and they can protect their data by using the Third Party Auditor. The key update algorithm is used to protect the client‟s key from the unauthorized user. In paper, the data owner independently upload the data to the Cloud and it is difficult to monitor the data and checking the process in offline. Thus data owner stands in online for integrity checking. This can be achieved by introducing Proxy component to check for the integrity. This is an added advantage to the data owner that he need not stay online for integrity checking. The data owner provides a key to the proxy server using that key proxyisresponsibleforchecking the data. This should be considering as the future work to overcome this drawback. 12. CONCLUSIONS We examine on the best way to manage the client‟s enter introduction in distributed storage evaluating. We propose another worldview called reviewing convention with key- presentation flexibility.Insucha convention,theuprightness of the information beforehand put away in cloud can at present be confirmed regardless of the possibility that the client‟s current mystery key for distributed storage inspecting is uncovered. We formalize the definition andthe security model of reviewing convention with key- presentation versatility, and after that propose theprincipal down to earth arrangement. The security confirmation and the asymptotic execution assessment demonstrate that the proposed convention is secure and proficient. 13. REFERENCES [1] Vijay varadhanajan , Jia Yu ,Kai Ren “Enabling Cloud Storage Auditing With Key Exposure Resistance” IEEE Transaction on information forensics and security,Vol 10. [2] Priyadharshni, Geo Jenefer. G “ Enhancing Data Security In Cloud Storage Auditing With Key Abstraction” Vo.2,Issue 2,Oct 2015. [3] T Yawaikha,R Meyanand, “ An Efficient Cloud Storage Batch Auditing Without Key Exposure Resistance Using Public Verifier” International conference on system 2016 [4] Sneha Singha”Survey Paper On Cloud Storage Auditing With Exposure Resistance” IJSR [5] Y. Zhu, H. Wang, Z. Hu, G.-J. Ahn, H. Hu, and S. S. Yau, “Efficient provable data possession for hybrid clouds,” in Proc. 17th ACM Conf. Comput. Commun. Secur., 2010, pp. 756–758. [6] K. Yang and X. Jia, “Data storage auditing service in cloud computing: Challenges, methods and opportunities,” World Wide Web, vol. 15, no. 4, pp. 409–428, 2012. [7] H. Shacham and B. Waters, “Compact proofs of retrievability,” in Advances in Cryptology—ASIACRYPT. Berlin, Germany: Springer-Verlag, 2008, pp. 90–107. [8] C. Wang, K. Ren, W. Lou, and J. Li, “Toward publicly auditable secure cloud data storage services,” IEEE Netw., vol. 24, no. 4, pp. 19–24, Jul./Aug. 2010. [9] K. Yang and X. Jia, “An efficient and secure dynamic auditing protocol for data storage in cloud computing,” IEEE Trans. Parallel Distrib. Syst., mvol. 24, no. 9, pp. 1717–1726, Sep. 2013. [10] C. Wang, S. S. M. Chow, Q. Wang, K. Ren, and W. Lou, “Privacy preserving public auditing for secure cloud storage,” IEEE Trans. Comput., vol. 62, no. 2, pp. 362–375, Feb. 2013.