IRJET - Virtual Data Auditing at Overcast Environment

IRJET Journal
IRJET JournalFast Track Publications

https://irjet.net/archives/V7/i2/IRJET-V7I2664.pdf

International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3086
VIRTUAL DATA AUDITING AT OVERCAST ENVIRONMENT
Aruna.K.B1, Aarthi.S2, Aishwarya.K.S3, Arunadevi.P4
1Assistant Professor, Dept. of Computer Science Engineering, S.A. Engineering College, TamilNadu, India
2,3,4Student, Dept. of Computer Science Engineering,S.A. Engineering College,
TamilNadu, India
-------------------------------------------------------------------------***------------------------------------------------------------------------
ABSTRACT:- A cloud storage is used to store large amount of data. It provides a storage platform for businesses and
individuals. It can store and access data remotely using the cloud storage system. A remote data integrity check is suggested
to ensure the integrity of the data stored in the cloud. In electronic health care system - records are stored and managed
remotely, the cloud file may contain sensitive information. The confidential information should not be shared with anyone
when the cloud file is released. By encrypting the entire shared file, the confidential information can be hidden, but this shared
file cannot be used by others. A remote data integrity checking scheme is proposed that implements data exchange with
confidential information that is hidden in the document. A disinfection program is used to clean up the data blocks that
correspond to the confidential information of the file and to convert the signatures of these data blocks into valid signatures
for the cleaned file. As a result, the scheme allows the file stored in the cloud to be shared and used by others, provided the
confidential information is hidden, while the remote data integrity check can continue to run efficiently.
Keywords: Cloud Storage, Data Integrity Auditing, Data Sharing, Sensitive Information Hiding
1. INTRODUCTION
Due to the explosive growth in data, it is a major
burden for users to store the sheer volume of data
locally. Therefore, more and more organizations and
individuals want to store their data in the cloud.
However, data stored in the cloud can be damaged or
lost due to inevitable software, hardware, and human
errors in the cloud. To verify that the data is stored
correctly in the cloud, many remote data integrity
verification schemes have been proposed. With remote
data integrity checking schemes, the data owner must
first generate signatures for blocks of data before
uploading them to the cloud. These signatures are used
to prove that the cloud actually owns these data blocks
in the integrity check phase. The data owner then
uploads these data blocks together with the
corresponding signatures to the cloud. The data stored in
the cloud is often shared by several users in many cloud
storage applications such as Google Drive, Dropbox and
iCloud. Sharing data as one of the most common features
in cloud storage allows a number of users to share their
data with others. However, this shared data stored in the
cloud may contain confidential information. The
integrity of the EHRs must be ensured due to human
error and software / hardware errors in the cloud.
Therefore, it is important to perform a remote data
integrity check if the confidential information of the
shared data is protected. One possible way to solve this
problem is to encrypt the entire shared file before
sending it to the cloud, and then generate the signatures
that verify the integrity of this encrypted file. This
encrypted file and the corresponding signatures are then
uploaded to the cloud. This method can detect hiding
sensitive information because only the data owner can
decrypt this file. However, this means that the entire
shared file cannot be used by others. For example,
encrypting the EHRs of patients with infectious diseases
can protect patient and hospital privacy, but these
encrypted EHRs can no longer be used effectively by
researchers. Distributing the decryption key to the
researchers seems to be a possible solution to the above
problem. However, it is not possible to use this method
in real scenarios for the following reasons. First, the
distribution of the decryption key requires secure
channels, which in some cases are difficult to fulfill. In
addition, it appears to be very difficult for a user to know
which researchers will be using their EHRs in the near
future when uploading the EHRs to the cloud. Therefore,
it is impractical to hide confidential information by
encrypting the entire shared file. It is therefore very
important and valuable how the data exchange can be
realized with confidential information that is hidden in
the remote data integrity check. Unfortunately, this
problem has not been researched in previous studies.
2. SYSTEM MODEL
The user hides the data blocks that correspond
to the personal confidential information of the original
file, generates the corresponding signatures and then
sends them to a sanitizer.The sanitizer cleans up these
blended blocks of data in a uniform format and also
purges the blocks of data that correspond to the
organization's confidential information.In addition, the
corresponding signatures are converted into valid
signatures for the cleaned file.This method not only
implements remote data integrity checking, but also
supports data sharing on the condition that confidential
information in the cloud storage is protected. Attackers
are detected and blocked by the cloud server.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3087
The system model comprises six types of
different entities: the cloud, the user, the Sanitizer, the
Private Key Generator (PKG) and the Third Party Auditor
(TPA), the Attacker.
(1) Cloud: The cloud offers the user enormous data
storage space. Through the cloud. The storage service
allows users to upload their data to the cloud and share
their data with others.
(2) User: The user is a member of an organization in
which a large number of files must be saved in the cloud.
(3) Sanitizer: The sanitizeris responsible for sanitizing
the data blocks that the sensitive information (personal
sensitive information and sensitive information of the
organization Information) in the file, the signatures of
these data blocks being valid signatures for the cleaned
file and uploading the cleaned file and the corresponding
signatures to the cloud.
(4) Private Key Generator(PKG): The PKG is classified
as trustworthy by other entities. It is responsible for the
creation of the public system parameters and the private
key for the user according to their identity ID.
(5) Third Party Auditor(TPA): The TPA is a public
examiner. It is responsible for checking the integrity of
the stored data in the cloud on behalf of users.
(6) Attacker: The attacker is an unauthorized person
who changes the content of the data stored in it the cloud
without the user's knowledge.
4. DEFINITION
An identity-based shared data integrity auditing
scheme with sensitive information hiding for secure
cloud storage consists of the following six algorithms:
Initiate, Extricate, DSGen, Sanitize, ProofCreate and
ProofAuth. Specifically, these algorithms are described as
follows:
[4.1]Initiate(1k) is an initiation algorithm directed by
the Private-Key Generator. A security parameter k is
used as input. It publishes public parameters of the
system pps and a secret master key smk.
[4.2]Extricate(pps, smk, ID) is an algorithm that is
executed by the Private-Key Generator for extraction.
The public parameters of the system pps, the secret
master key smk and an identity of the user ID are used as
input. It prints out the user's private key pvk. The user
can only check the correctness of pvk and accept it as his
private key if he passes the check.
[4.3]DSGen(F, pvk, spk, name) is a signature
generation algorithm executed by the user ID. The input
is the original file F, the private key pvk of the user, the
signing private key spk of the user and the name of the
file identifier. It outputs a blinded file bF, the
corresponding signature set s and a file tag t.
[4.4]Sanitize(bF,s) is a disinfection program algorithm
for cleaning up confidential information. The blinded file
bF and its signature sets s are used as input. It outputs
the cleaned file bF and the corresponding signature set s.
[4.5]ProofCreate(bF',s', ch) is a proof generation
algorithm that is executed by the cloud. The cleaned file
bF', the corresponding signature set s' and the test
request ch are used as input. It issues a verification
certificate P, which is used to demonstrate that the cloud
really owns this cleaned file bF'.
[4.6]ProofAuth(ch, pps, P) is a proof verification
algorithm executed by the Third Party Auditor. The test
request ch, the public parameters of the system pps and
the test certificate P are used as input. The Third Party
Auditor can check the accuracy of the proof P.
5. ALGORITHM
[5.1] RANDOMIZED - ADVANCED ENCRYPTION
STANDARD (R-AES)
The main problem with the key extension of the AES
algorithm is that the words generated from the original
key are related. If a word is understandable, the overall
key is derived by the differential method or the liner
methods of cryptanalysis.
We modified the key expansion module from AES with
the Symmetric Random Function Generator (SRFG).
SRFG generates the symmetric symmetric output in
terms of the number of ones and zeros in the output
string regardless of the input string.
The expression for the proposed combined function
generator is given as:
fc= fi
L
where, four universal gates: AND, OR, NOT and XOR; L
represents the length of expression (number of terms in
the combined function); and represents the random
combination. In the experiments we used L = 5. In order
to emphasize the randomness in such a combined
function generator, the above equation can be further
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3088
expressed in the form of the randomness of the input
variables during the selection
fc(V1,V2,….,VN)=fi
L[rand(V1,V2,..,VN)]
For experimentation, the previous equation can be
rewritten as,
fc(V1,V2)= fi
5[rand(V1,V2)]
The main goal of adding SRFG in AES is to activate the
key expansion module with a random function. This
helps prevent the words from being derived from keys
even though a subkey is in hand.
[5.2] DIGITAL SIGNATURE
A digital signature is a mathematical strategy to verify
the authenticity of digital messages or documents. A
valid digital signature that meets the requirements gives
a recipient strong reason to believe that the message was
created by a known sender (authentication) and that the
message was not changed during transmission
(integrity).
A digital signature scheme typically made up of 3
algorithms:
• A key generation algorithm that randomly selects a
private key from a set of possible private keys. The
algorithm provides the private key and a corresponding
public key.
• A signature algorithm that generates a signature based
on a message and a private key.
• An algorithm for checking the signature, which, given
the message, the public key and the signature, either
accepts or rejects the authenticity claim of the message.
[5.3] RANDOM KEY CRYPTOGRAPHY
For creating a random key matrix from size (16x16),
take every key. The size of the key must be less than or
16 characters long. This 16characters can be any 256
Characters (ASCII code 0 to 255). The relative position
and the character itself is very important in the method
to calculate the randomization number, the encryption
number and the relative shifting of the characters in the
start keymatrix. Here we demonstrate a method:
Suppose key = AB
Select the following table to calculate the place value and
character strength of the incoming key:
Length Of Key(n) 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
Base Value(b) 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2
Equation: Sum = Σ ASCII Code * bm ----(1)
m=1
Example-1:
Now calculate the sum for key=”AB” using equation(1)
Sum=65*161 + 66 * 162=17936
Now compute 3 parameters from the above sum: (i)
randomization number (n1), (ii) encryption number (n2)
and (iii) relative shift (n3) with the following procedure:
(i) Randomization number(n1):
num1=1*1+7*2+9*3+3*4+6*5=84
n1=sum mod num1=17936 mod
84=44
Note: if n1=0 then n1=num1 and n1<=128
(ii) Encryption number(n2):
num2=6*1+3*2+9*3+7*4+1*5=72
n2=sum mod num2 =17936
mod 72 =8
Note: if n2=0 then n2=num2 and n2<=64
(iii) Relative shift(n3):
n3= Σall digits in
sum=1+7+9+3+6=26
6. RELATED WORK
[6.1] Cross-Domain Data Sharing in Distributed
Electronic Health Record Systems
A secure EHR system based on cryptographic
constructions is proposed to enable the secure sharing of
sensitive patient data during the collaboration and to
ensure the protection of the patient data.
Standard identity-based cryptography (IBC) enables an
entity's public key to be derived from public identity
information such as name, email address, etc.
With HIBPKI (Hierarchical Identity Based Public Key
Infrastructure), entities from different domains can
authenticate themselves directly with one another
without having to rely on certificates from a certification
authority.
Different possible attacks can be applied to the EHR
system and should be recognized to take appropriate
countermeasures.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3089
[6.2] Panda: Public Auditing for Shared Data with
Efficient User Revocation in the Cloud
A novel public verification mechanism for the integrity of
shared data with a view to efficient revocation of users is
proposed.
Since collusion-resistant proxy re-signature schemes
generally have two levels of signature (that is, the first
level is re-signed by a user and the second level is re-
signed by the proxy), the two levels signature are
different forms and must be verified differently.
The unblockable verifiability at both signature levels and
their joint verification in a public verification mechanism
is a challenge.
[6.3] Identity-Based Remote Data Integrity Checking
With Perfect Data Privacy Preserving for Cloud
Storage
A new structure of the identity-based (ID-based) RDIC
protocol is proposed using a key-homomorphic
cryptographic basic element in order to reduce the
system complexity and the costs for setting up and
managing the public-key authentication framework in
PKI-based RDIC schemes.
ID-based RDIC and its security model is formalized,
including security against a malicious cloud server and
zero-knowledge data protection against a third-party
auditor.
Short signature algorithm: Because of the short
signature, hackers can easily find the key.
7. PROPOSED SCHEME
In the proposed scheme we design a new efficient
signature algorithm in the signature generation phase.
The designed signature scheme supports non-blocking
verifiability, allowing the verifier to verify the integrity
of data without having to download all of the data from
the cloud. In addition, it is based on identity-based
cryptography, which simplifies complicated certificate
management.
If the user wants to upload data to the cloud to get the
personal confidential information of the original file
from the disinfectant, that user must use a blinding
factor to blind the data blocks that correspond to the
personal confidential information of the original file.
If necessary, the user can use this blinding factor to
restore the original file from the blinded one. This user
then uses the designed signature algorithm to generate
signatures for the blinded file.
Finally, the disinfectant uploads the cleaned file and the
corresponding signatures to the cloud.
The PKG generates the private key for the user based on
his identity ID. When researchers access the file, they are
given a key to decrypt the contents of the file, which
hides the confidential information.
When the data integrity verification task runs, the cloud
generates verification evidence according to the TPA
challenge. The TPA can verify the integrity of the cleaned
file stored in the cloud by verifying that this verification
is correct or not. The unauthorized user who changes the
content of the file stored in the cloud can be identified
and reported to the user.
8. CONCLUSION
An identity-based data integrity verification scheme for
secure cloud storage is suggested that supports data
exchange with hidden confidential information. The file
stored in the cloud can be shared and used by others,
provided the confidential information of the file is
concealed. However, the remote data integrity check can
be performed efficiently. It shows the safety case and the
experimental analysis that the proposed scheme
achieves the desired safety and efficiency. The further
development of this project can be made to ensure
enhanced failure recovery.
REFERENCES
[1] J. Sun and Y. Fang, “Cross-domain data sharing in
distributed electronic health record systems,” IEEE
Transactionson Parallel and Distributed Systems, vol. 21,
no. 6,pp. 754–764, June 2010.
[2] Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li,
“Enablingpublic auditability and data dynamics for
storage securityin cloud computing,” IEEE Transactions
on Parallel andDistributed Systems, vol. 22, no. 5, pp.
847–859, May2011.
[3] K. Ren, C. Wang, and Q. Wang, “Security challengesfor
the public cloud,” IEEE Internet Computing, vol. 16,no. 1,
pp. 69–73, Jan 2012.
[4] C. Wang, S. S. M. Chow, Q. Wang, K. Ren, and W.
Lou,“Privacy-preserving public auditing for secure cloud
storage,”
IEEE Transactions on Computers, vol. 62, no. 2,pp. 362–
375, 2013.
[5]HarithaNuthi, HemalathaGoli, Ramakrishna Mathe,”
Data Integrity Proof for Cloud Storage” International
Journal of Advanced Research in Computer Engineering
& Technology (IJARCET) Volume 3 Issue 9, September
2014
[6] B. Wang, B. Li, and H. Li, “Panda: Public auditing
forshared data with efficient user revocation in the
cloud,”
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3090
IEEE Transactions on Services Computing, vol. 8, no.
1,pp. 92–106, Jan.-Feb. 2015.
[7] H. Wang, “Identity-based distributed provable data
possessioninmulticloudstorage,” IEEE Transactions
onServices Computing, vol. 8, no. 2, pp. 328–340, 2015.
[8] J. Yu, K. Ren, and C. Wang, “Enabling cloud
storageauditing with verifiable outsourcing of key
updates,”
IEEE Transactions on Information Forensics and
Security,vol. 11, no. 6, pp. 1362–1375, June 2016.
[9] H. Wang, D. He, J. Yu, and Z. Wang, “Incentiveand
unconditionally anonymous identity-based
publicprovable data possession,” IEEE Transactions on
Services Computing, 2016. Available:
DOI:10.1109/TSC.2016.2633260
[10] J. Li, J. Li, D. Xie, and Z. Cai, “Secure
auditinganddeduplicating data in cloud,” IEEE
Transactions onComputers, vol. 65, no. 8, pp. 2386–
2396, Aug 2016.
[11] A. Fu, S. Yu, Y. Zhang, H. Wang, and C. Huang,“Npp: A
new privacy-aware public auditing schemefor cloud data
sharing with group users,” IEEETransactions on Big Data,
2017. Available:DOI:10.1109/TBDATA.2017.2701347
[12] Y. Yu, M. H. Au, G. Ateniese, X. Huang, W. Susilo,Y.
Dai, and G. Min, “Identity-based remote data
integritychecking with perfect data privacy preserving
for cloudstorage,” IEEE Transactions on Information
Forensicsand Security, vol. 12, no. 4, pp. 767–778, April
2017.
[13]NihilaFathima M, Remitha M. S, Rithanya R. K,
“Blockchain based Secure Data Sharing andSensitive
Information Hiding in Cloud Storage Environment”,
International Journal for Research in Applied Science &
Engineering Technology (IJRASET)ISSN: 2321-9653; IC
Value: 45.98; SJ Impact Factor: 6.887Volume 7 Issue III,
Mar 2019- Available at www.ijraset.com

Recomendados

IRJET- Adaptable Wildcard Searchable Encryption System por
IRJET- Adaptable Wildcard Searchable Encryption SystemIRJET- Adaptable Wildcard Searchable Encryption System
IRJET- Adaptable Wildcard Searchable Encryption SystemIRJET Journal
11 visualizações4 slides
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ... por
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET Journal
10 visualizações22 slides
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A... por
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...IRJET Journal
22 visualizações4 slides
IRJET - Providing High Securtiy for Encrypted Data in Cloud por
IRJET -  	  Providing High Securtiy for Encrypted Data in CloudIRJET -  	  Providing High Securtiy for Encrypted Data in Cloud
IRJET - Providing High Securtiy for Encrypted Data in CloudIRJET Journal
18 visualizações3 slides
IRJET- Securing Cloud Data Under Key Exposure por
IRJET- Securing Cloud Data Under Key ExposureIRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET Journal
203 visualizações5 slides
IJSRED-V2I5P16 por
IJSRED-V2I5P16IJSRED-V2I5P16
IJSRED-V2I5P16IJSRED
19 visualizações4 slides

Mais conteúdo relacionado

Mais procurados

Achieving Secure, Universal, and Fine Grainedquery Results Verification for S... por
Achieving Secure, Universal, and Fine Grainedquery Results Verification for S...Achieving Secure, Universal, and Fine Grainedquery Results Verification for S...
Achieving Secure, Universal, and Fine Grainedquery Results Verification for S...ijtsrd
126 visualizações3 slides
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC por
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET Journal
25 visualizações3 slides
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing por
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingIRJET Journal
59 visualizações3 slides
Data Search in Cloud using the Encrypted Keywords por
Data Search in Cloud using the Encrypted KeywordsData Search in Cloud using the Encrypted Keywords
Data Search in Cloud using the Encrypted KeywordsIRJET Journal
34 visualizações4 slides
Ensuring distributed accountability por
Ensuring distributed accountabilityEnsuring distributed accountability
Ensuring distributed accountabilityNandini Chandran
508 visualizações7 slides
Survey On: Auditing Public Clouds por
Survey On: Auditing Public Clouds Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds IRJET Journal
56 visualizações3 slides

Mais procurados(20)

Achieving Secure, Universal, and Fine Grainedquery Results Verification for S... por ijtsrd
Achieving Secure, Universal, and Fine Grainedquery Results Verification for S...Achieving Secure, Universal, and Fine Grainedquery Results Verification for S...
Achieving Secure, Universal, and Fine Grainedquery Results Verification for S...
ijtsrd126 visualizações
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC por IRJET Journal
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET Journal25 visualizações
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing por IRJET Journal
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
IRJET Journal59 visualizações
Data Search in Cloud using the Encrypted Keywords por IRJET Journal
Data Search in Cloud using the Encrypted KeywordsData Search in Cloud using the Encrypted Keywords
Data Search in Cloud using the Encrypted Keywords
IRJET Journal34 visualizações
Ensuring distributed accountability por Nandini Chandran
Ensuring distributed accountabilityEnsuring distributed accountability
Ensuring distributed accountability
Nandini Chandran508 visualizações
Survey On: Auditing Public Clouds por IRJET Journal
Survey On: Auditing Public Clouds Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds
IRJET Journal56 visualizações
IRJET- Accomplishing Secure, Widespread, and Fine-Grained Question Results Ch... por IRJET Journal
IRJET- Accomplishing Secure, Widespread, and Fine-Grained Question Results Ch...IRJET- Accomplishing Secure, Widespread, and Fine-Grained Question Results Ch...
IRJET- Accomplishing Secure, Widespread, and Fine-Grained Question Results Ch...
IRJET Journal19 visualizações
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along... por IRJET Journal
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
IRJET Journal33 visualizações
IRJET- Protection of Personal Data on Distributed Cloud using Biometrics por IRJET Journal
IRJET- Protection of Personal Data on Distributed Cloud using BiometricsIRJET- Protection of Personal Data on Distributed Cloud using Biometrics
IRJET- Protection of Personal Data on Distributed Cloud using Biometrics
IRJET Journal17 visualizações
Paper id 28201425 por IJRAT
Paper id 28201425Paper id 28201425
Paper id 28201425
IJRAT231 visualizações
Oruta project report por Manasa Chowdary
Oruta project reportOruta project report
Oruta project report
Manasa Chowdary4.7K visualizações
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm por IRJET Journal
IRJET- Secure Data Deduplication for Cloud Server using HMAC AlgorithmIRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET Journal32 visualizações
IRJET- Multiple Keyword Search for Encrypted Cloud Storage por IRJET Journal
IRJET- Multiple Keyword Search for Encrypted Cloud StorageIRJET- Multiple Keyword Search for Encrypted Cloud Storage
IRJET- Multiple Keyword Search for Encrypted Cloud Storage
IRJET Journal12 visualizações
IRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage por IRJET Journal
IRJET- Efficient Traceable Authorization Search System for Secure Cloud StorageIRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
IRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
IRJET Journal71 visualizações
malware_detection_data_mining por David Zivi
malware_detection_data_miningmalware_detection_data_mining
malware_detection_data_mining
David Zivi378 visualizações
Efficient Similarity Search Over Encrypted Data por IRJET Journal
Efficient Similarity Search Over Encrypted DataEfficient Similarity Search Over Encrypted Data
Efficient Similarity Search Over Encrypted Data
IRJET Journal29 visualizações
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu... por IRJET Journal
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET Journal11 visualizações
IRJET - Confidential Image De-Duplication in Cloud Storage por IRJET Journal
IRJET - Confidential Image De-Duplication in Cloud StorageIRJET - Confidential Image De-Duplication in Cloud Storage
IRJET - Confidential Image De-Duplication in Cloud Storage
IRJET Journal11 visualizações
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i... por IRJET Journal
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET Journal103 visualizações
Secure Data Storage and Forwarding in Cloud Using AES and HMAC por IRJET Journal
Secure Data Storage and Forwarding in Cloud Using AES and HMACSecure Data Storage and Forwarding in Cloud Using AES and HMAC
Secure Data Storage and Forwarding in Cloud Using AES and HMAC
IRJET Journal28 visualizações

Similar a IRJET - Virtual Data Auditing at Overcast Environment

IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC por
IRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET Journal
36 visualizações3 slides
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems por
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud SystemsIRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud SystemsIRJET Journal
10 visualizações4 slides
IRJET-Using Downtoken Secure Group Data Sharing on Cloud por
IRJET-Using Downtoken Secure Group Data Sharing on CloudIRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET-Using Downtoken Secure Group Data Sharing on CloudIRJET Journal
22 visualizações3 slides
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C... por
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...IRJET Journal
44 visualizações4 slides
IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai... por
IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...
IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...IRJET Journal
17 visualizações4 slides
IRJET- Sharing Session Key to Protect Data in Cloud Storage por
IRJET- Sharing Session Key to Protect Data in Cloud StorageIRJET- Sharing Session Key to Protect Data in Cloud Storage
IRJET- Sharing Session Key to Protect Data in Cloud StorageIRJET Journal
21 visualizações5 slides

Similar a IRJET - Virtual Data Auditing at Overcast Environment(20)

IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC por IRJET Journal
IRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET Journal36 visualizações
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems por IRJET Journal
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud SystemsIRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET Journal10 visualizações
IRJET-Using Downtoken Secure Group Data Sharing on Cloud por IRJET Journal
IRJET-Using Downtoken Secure Group Data Sharing on CloudIRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET Journal22 visualizações
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C... por IRJET Journal
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET Journal44 visualizações
IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai... por IRJET Journal
IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...
IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...
IRJET Journal17 visualizações
IRJET- Sharing Session Key to Protect Data in Cloud Storage por IRJET Journal
IRJET- Sharing Session Key to Protect Data in Cloud StorageIRJET- Sharing Session Key to Protect Data in Cloud Storage
IRJET- Sharing Session Key to Protect Data in Cloud Storage
IRJET Journal21 visualizações
System Approach for Single Keyword Search for Encrypted Data Files Guarantees... por IRJET Journal
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
IRJET Journal34 visualizações
Improving Efficiency of Security in Multi-Cloud por IJTET Journal
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-Cloud
IJTET Journal317 visualizações
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity... por IRJET Journal
IRJET -  	  Reliable and Efficient Revocation and Data Sharing using Identity...IRJET -  	  Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET Journal5 visualizações
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and... por IRJET Journal
IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET Journal21 visualizações
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data por IRJET Journal
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud DataA Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
IRJET Journal5 visualizações
Insuring Security for Outsourced Data Stored in Cloud Environment por Editor IJCATR
Insuring Security for Outsourced Data Stored in Cloud EnvironmentInsuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud Environment
Editor IJCATR364 visualizações
Ijarcet vol-2-issue-7-2236-2240 por Editor IJARCET
Ijarcet vol-2-issue-7-2236-2240Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240
Editor IJARCET256 visualizações
Ijarcet vol-2-issue-7-2236-2240 por Editor IJARCET
Ijarcet vol-2-issue-7-2236-2240Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240
Editor IJARCET277 visualizações
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage por IRJET Journal
IRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET Journal39 visualizações
IRJET- Redsc: Reliablity of Data Sharing in Cloud por IRJET Journal
IRJET- Redsc: Reliablity of Data Sharing in CloudIRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET Journal38 visualizações
IRJET- Privacy Preserving Encrypted Keyword Search Schemes por IRJET Journal
IRJET-  	  Privacy Preserving Encrypted Keyword Search SchemesIRJET-  	  Privacy Preserving Encrypted Keyword Search Schemes
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET Journal35 visualizações
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr... por IRJET Journal
IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET Journal62 visualizações

Mais de IRJET Journal

SOIL STABILIZATION USING WASTE FIBER MATERIAL por
SOIL STABILIZATION USING WASTE FIBER MATERIALSOIL STABILIZATION USING WASTE FIBER MATERIAL
SOIL STABILIZATION USING WASTE FIBER MATERIALIRJET Journal
27 visualizações7 slides
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles... por
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...IRJET Journal
8 visualizações7 slides
Identification, Discrimination and Classification of Cotton Crop by Using Mul... por
Identification, Discrimination and Classification of Cotton Crop by Using Mul...Identification, Discrimination and Classification of Cotton Crop by Using Mul...
Identification, Discrimination and Classification of Cotton Crop by Using Mul...IRJET Journal
8 visualizações5 slides
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula... por
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...IRJET Journal
13 visualizações11 slides
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR... por
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...IRJET Journal
14 visualizações6 slides
Performance Analysis of Aerodynamic Design for Wind Turbine Blade por
Performance Analysis of Aerodynamic Design for Wind Turbine BladePerformance Analysis of Aerodynamic Design for Wind Turbine Blade
Performance Analysis of Aerodynamic Design for Wind Turbine BladeIRJET Journal
7 visualizações5 slides

Mais de IRJET Journal(20)

SOIL STABILIZATION USING WASTE FIBER MATERIAL por IRJET Journal
SOIL STABILIZATION USING WASTE FIBER MATERIALSOIL STABILIZATION USING WASTE FIBER MATERIAL
SOIL STABILIZATION USING WASTE FIBER MATERIAL
IRJET Journal27 visualizações
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles... por IRJET Journal
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
IRJET Journal8 visualizações
Identification, Discrimination and Classification of Cotton Crop by Using Mul... por IRJET Journal
Identification, Discrimination and Classification of Cotton Crop by Using Mul...Identification, Discrimination and Classification of Cotton Crop by Using Mul...
Identification, Discrimination and Classification of Cotton Crop by Using Mul...
IRJET Journal8 visualizações
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula... por IRJET Journal
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
IRJET Journal13 visualizações
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR... por IRJET Journal
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
IRJET Journal14 visualizações
Performance Analysis of Aerodynamic Design for Wind Turbine Blade por IRJET Journal
Performance Analysis of Aerodynamic Design for Wind Turbine BladePerformance Analysis of Aerodynamic Design for Wind Turbine Blade
Performance Analysis of Aerodynamic Design for Wind Turbine Blade
IRJET Journal7 visualizações
Heart Failure Prediction using Different Machine Learning Techniques por IRJET Journal
Heart Failure Prediction using Different Machine Learning TechniquesHeart Failure Prediction using Different Machine Learning Techniques
Heart Failure Prediction using Different Machine Learning Techniques
IRJET Journal7 visualizações
Experimental Investigation of Solar Hot Case Based on Photovoltaic Panel por IRJET Journal
Experimental Investigation of Solar Hot Case Based on Photovoltaic PanelExperimental Investigation of Solar Hot Case Based on Photovoltaic Panel
Experimental Investigation of Solar Hot Case Based on Photovoltaic Panel
IRJET Journal3 visualizações
Metro Development and Pedestrian Concerns por IRJET Journal
Metro Development and Pedestrian ConcernsMetro Development and Pedestrian Concerns
Metro Development and Pedestrian Concerns
IRJET Journal2 visualizações
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An... por IRJET Journal
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An...Mapping the Crashworthiness Domains: Investigations Based on Scientometric An...
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An...
IRJET Journal3 visualizações
Data Analytics and Artificial Intelligence in Healthcare Industry por IRJET Journal
Data Analytics and Artificial Intelligence in Healthcare IndustryData Analytics and Artificial Intelligence in Healthcare Industry
Data Analytics and Artificial Intelligence in Healthcare Industry
IRJET Journal3 visualizações
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC... por IRJET Journal
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC...DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC...
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC...
IRJET Journal64 visualizações
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur... por IRJET Journal
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur...Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur...
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur...
IRJET Journal12 visualizações
Development of Effective Tomato Package for Post-Harvest Preservation por IRJET Journal
Development of Effective Tomato Package for Post-Harvest PreservationDevelopment of Effective Tomato Package for Post-Harvest Preservation
Development of Effective Tomato Package for Post-Harvest Preservation
IRJET Journal4 visualizações
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION” por IRJET Journal
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION”“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION”
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION”
IRJET Journal5 visualizações
Understanding the Nature of Consciousness with AI por IRJET Journal
Understanding the Nature of Consciousness with AIUnderstanding the Nature of Consciousness with AI
Understanding the Nature of Consciousness with AI
IRJET Journal12 visualizações
Augmented Reality App for Location based Exploration at JNTUK Kakinada por IRJET Journal
Augmented Reality App for Location based Exploration at JNTUK KakinadaAugmented Reality App for Location based Exploration at JNTUK Kakinada
Augmented Reality App for Location based Exploration at JNTUK Kakinada
IRJET Journal6 visualizações
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba... por IRJET Journal
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba...Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba...
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba...
IRJET Journal18 visualizações
Enhancing Real Time Communication and Efficiency With Websocket por IRJET Journal
Enhancing Real Time Communication and Efficiency With WebsocketEnhancing Real Time Communication and Efficiency With Websocket
Enhancing Real Time Communication and Efficiency With Websocket
IRJET Journal5 visualizações
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ... por IRJET Journal
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ...Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ...
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ...
IRJET Journal4 visualizações

Último

Web Dev Session 1.pptx por
Web Dev Session 1.pptxWeb Dev Session 1.pptx
Web Dev Session 1.pptxVedVekhande
23 visualizações22 slides
Field Programmable Gate Arrays : Architecture por
Field Programmable Gate Arrays : ArchitectureField Programmable Gate Arrays : Architecture
Field Programmable Gate Arrays : ArchitectureUsha Mehta
23 visualizações74 slides
Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R... por
Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...
Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...IJCNCJournal
5 visualizações25 slides
ASSIGNMENTS ON FUZZY LOGIC IN TRAFFIC FLOW.pdf por
ASSIGNMENTS ON FUZZY LOGIC IN TRAFFIC FLOW.pdfASSIGNMENTS ON FUZZY LOGIC IN TRAFFIC FLOW.pdf
ASSIGNMENTS ON FUZZY LOGIC IN TRAFFIC FLOW.pdfAlhamduKure
10 visualizações11 slides
MongoDB.pdf por
MongoDB.pdfMongoDB.pdf
MongoDB.pdfArthyR3
51 visualizações6 slides
Programmable Logic Devices : SPLD and CPLD por
Programmable Logic Devices : SPLD and CPLDProgrammable Logic Devices : SPLD and CPLD
Programmable Logic Devices : SPLD and CPLDUsha Mehta
27 visualizações54 slides

Último(20)

Web Dev Session 1.pptx por VedVekhande
Web Dev Session 1.pptxWeb Dev Session 1.pptx
Web Dev Session 1.pptx
VedVekhande23 visualizações
Field Programmable Gate Arrays : Architecture por Usha Mehta
Field Programmable Gate Arrays : ArchitectureField Programmable Gate Arrays : Architecture
Field Programmable Gate Arrays : Architecture
Usha Mehta23 visualizações
Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R... por IJCNCJournal
Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...
Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...
IJCNCJournal5 visualizações
ASSIGNMENTS ON FUZZY LOGIC IN TRAFFIC FLOW.pdf por AlhamduKure
ASSIGNMENTS ON FUZZY LOGIC IN TRAFFIC FLOW.pdfASSIGNMENTS ON FUZZY LOGIC IN TRAFFIC FLOW.pdf
ASSIGNMENTS ON FUZZY LOGIC IN TRAFFIC FLOW.pdf
AlhamduKure10 visualizações
MongoDB.pdf por ArthyR3
MongoDB.pdfMongoDB.pdf
MongoDB.pdf
ArthyR351 visualizações
Programmable Logic Devices : SPLD and CPLD por Usha Mehta
Programmable Logic Devices : SPLD and CPLDProgrammable Logic Devices : SPLD and CPLD
Programmable Logic Devices : SPLD and CPLD
Usha Mehta27 visualizações
taylor-2005-classical-mechanics.pdf por ArturoArreola10
taylor-2005-classical-mechanics.pdftaylor-2005-classical-mechanics.pdf
taylor-2005-classical-mechanics.pdf
ArturoArreola1037 visualizações
BCIC - Manufacturing Conclave - Technology-Driven Manufacturing for Growth por Innomantra
BCIC - Manufacturing Conclave -  Technology-Driven Manufacturing for GrowthBCIC - Manufacturing Conclave -  Technology-Driven Manufacturing for Growth
BCIC - Manufacturing Conclave - Technology-Driven Manufacturing for Growth
Innomantra 22 visualizações
Ansari: Practical experiences with an LLM-based Islamic Assistant por M Waleed Kadous
Ansari: Practical experiences with an LLM-based Islamic AssistantAnsari: Practical experiences with an LLM-based Islamic Assistant
Ansari: Practical experiences with an LLM-based Islamic Assistant
M Waleed Kadous12 visualizações
Automated Remote sensing GPS satellite system for managing resources and moni... por Khalid Abdel Naser Abdel Rahim
Automated Remote sensing GPS satellite system for managing resources and moni...Automated Remote sensing GPS satellite system for managing resources and moni...
Automated Remote sensing GPS satellite system for managing resources and moni...
Khalid Abdel Naser Abdel Rahim5 visualizações
Module-1, Chapter-2 Data Types, Variables, and Arrays por Demian Antony D'Mello
Module-1, Chapter-2 Data Types, Variables, and ArraysModule-1, Chapter-2 Data Types, Variables, and Arrays
Module-1, Chapter-2 Data Types, Variables, and Arrays
Demian Antony D'Mello9 visualizações
dummy.pptx por JamesLamp
dummy.pptxdummy.pptx
dummy.pptx
JamesLamp7 visualizações
Design_Discover_Develop_Campaign.pptx por ShivanshSeth6
Design_Discover_Develop_Campaign.pptxDesign_Discover_Develop_Campaign.pptx
Design_Discover_Develop_Campaign.pptx
ShivanshSeth656 visualizações
CCNA_questions_2021.pdf por VUPHUONGTHAO9
CCNA_questions_2021.pdfCCNA_questions_2021.pdf
CCNA_questions_2021.pdf
VUPHUONGTHAO97 visualizações
Basic Design Flow for Field Programmable Gate Arrays por Usha Mehta
Basic Design Flow for Field Programmable Gate ArraysBasic Design Flow for Field Programmable Gate Arrays
Basic Design Flow for Field Programmable Gate Arrays
Usha Mehta10 visualizações
unit 1.pptx por rrbornarecm
unit 1.pptxunit 1.pptx
unit 1.pptx
rrbornarecm5 visualizações
Global airborne satcom market report por defencereport78
Global airborne satcom market reportGlobal airborne satcom market report
Global airborne satcom market report
defencereport788 visualizações
GDSC Mikroskil Members Onboarding 2023.pdf por gdscmikroskil
GDSC Mikroskil Members Onboarding 2023.pdfGDSC Mikroskil Members Onboarding 2023.pdf
GDSC Mikroskil Members Onboarding 2023.pdf
gdscmikroskil72 visualizações

IRJET - Virtual Data Auditing at Overcast Environment

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3086 VIRTUAL DATA AUDITING AT OVERCAST ENVIRONMENT Aruna.K.B1, Aarthi.S2, Aishwarya.K.S3, Arunadevi.P4 1Assistant Professor, Dept. of Computer Science Engineering, S.A. Engineering College, TamilNadu, India 2,3,4Student, Dept. of Computer Science Engineering,S.A. Engineering College, TamilNadu, India -------------------------------------------------------------------------***------------------------------------------------------------------------ ABSTRACT:- A cloud storage is used to store large amount of data. It provides a storage platform for businesses and individuals. It can store and access data remotely using the cloud storage system. A remote data integrity check is suggested to ensure the integrity of the data stored in the cloud. In electronic health care system - records are stored and managed remotely, the cloud file may contain sensitive information. The confidential information should not be shared with anyone when the cloud file is released. By encrypting the entire shared file, the confidential information can be hidden, but this shared file cannot be used by others. A remote data integrity checking scheme is proposed that implements data exchange with confidential information that is hidden in the document. A disinfection program is used to clean up the data blocks that correspond to the confidential information of the file and to convert the signatures of these data blocks into valid signatures for the cleaned file. As a result, the scheme allows the file stored in the cloud to be shared and used by others, provided the confidential information is hidden, while the remote data integrity check can continue to run efficiently. Keywords: Cloud Storage, Data Integrity Auditing, Data Sharing, Sensitive Information Hiding 1. INTRODUCTION Due to the explosive growth in data, it is a major burden for users to store the sheer volume of data locally. Therefore, more and more organizations and individuals want to store their data in the cloud. However, data stored in the cloud can be damaged or lost due to inevitable software, hardware, and human errors in the cloud. To verify that the data is stored correctly in the cloud, many remote data integrity verification schemes have been proposed. With remote data integrity checking schemes, the data owner must first generate signatures for blocks of data before uploading them to the cloud. These signatures are used to prove that the cloud actually owns these data blocks in the integrity check phase. The data owner then uploads these data blocks together with the corresponding signatures to the cloud. The data stored in the cloud is often shared by several users in many cloud storage applications such as Google Drive, Dropbox and iCloud. Sharing data as one of the most common features in cloud storage allows a number of users to share their data with others. However, this shared data stored in the cloud may contain confidential information. The integrity of the EHRs must be ensured due to human error and software / hardware errors in the cloud. Therefore, it is important to perform a remote data integrity check if the confidential information of the shared data is protected. One possible way to solve this problem is to encrypt the entire shared file before sending it to the cloud, and then generate the signatures that verify the integrity of this encrypted file. This encrypted file and the corresponding signatures are then uploaded to the cloud. This method can detect hiding sensitive information because only the data owner can decrypt this file. However, this means that the entire shared file cannot be used by others. For example, encrypting the EHRs of patients with infectious diseases can protect patient and hospital privacy, but these encrypted EHRs can no longer be used effectively by researchers. Distributing the decryption key to the researchers seems to be a possible solution to the above problem. However, it is not possible to use this method in real scenarios for the following reasons. First, the distribution of the decryption key requires secure channels, which in some cases are difficult to fulfill. In addition, it appears to be very difficult for a user to know which researchers will be using their EHRs in the near future when uploading the EHRs to the cloud. Therefore, it is impractical to hide confidential information by encrypting the entire shared file. It is therefore very important and valuable how the data exchange can be realized with confidential information that is hidden in the remote data integrity check. Unfortunately, this problem has not been researched in previous studies. 2. SYSTEM MODEL The user hides the data blocks that correspond to the personal confidential information of the original file, generates the corresponding signatures and then sends them to a sanitizer.The sanitizer cleans up these blended blocks of data in a uniform format and also purges the blocks of data that correspond to the organization's confidential information.In addition, the corresponding signatures are converted into valid signatures for the cleaned file.This method not only implements remote data integrity checking, but also supports data sharing on the condition that confidential information in the cloud storage is protected. Attackers are detected and blocked by the cloud server.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3087 The system model comprises six types of different entities: the cloud, the user, the Sanitizer, the Private Key Generator (PKG) and the Third Party Auditor (TPA), the Attacker. (1) Cloud: The cloud offers the user enormous data storage space. Through the cloud. The storage service allows users to upload their data to the cloud and share their data with others. (2) User: The user is a member of an organization in which a large number of files must be saved in the cloud. (3) Sanitizer: The sanitizeris responsible for sanitizing the data blocks that the sensitive information (personal sensitive information and sensitive information of the organization Information) in the file, the signatures of these data blocks being valid signatures for the cleaned file and uploading the cleaned file and the corresponding signatures to the cloud. (4) Private Key Generator(PKG): The PKG is classified as trustworthy by other entities. It is responsible for the creation of the public system parameters and the private key for the user according to their identity ID. (5) Third Party Auditor(TPA): The TPA is a public examiner. It is responsible for checking the integrity of the stored data in the cloud on behalf of users. (6) Attacker: The attacker is an unauthorized person who changes the content of the data stored in it the cloud without the user's knowledge. 4. DEFINITION An identity-based shared data integrity auditing scheme with sensitive information hiding for secure cloud storage consists of the following six algorithms: Initiate, Extricate, DSGen, Sanitize, ProofCreate and ProofAuth. Specifically, these algorithms are described as follows: [4.1]Initiate(1k) is an initiation algorithm directed by the Private-Key Generator. A security parameter k is used as input. It publishes public parameters of the system pps and a secret master key smk. [4.2]Extricate(pps, smk, ID) is an algorithm that is executed by the Private-Key Generator for extraction. The public parameters of the system pps, the secret master key smk and an identity of the user ID are used as input. It prints out the user's private key pvk. The user can only check the correctness of pvk and accept it as his private key if he passes the check. [4.3]DSGen(F, pvk, spk, name) is a signature generation algorithm executed by the user ID. The input is the original file F, the private key pvk of the user, the signing private key spk of the user and the name of the file identifier. It outputs a blinded file bF, the corresponding signature set s and a file tag t. [4.4]Sanitize(bF,s) is a disinfection program algorithm for cleaning up confidential information. The blinded file bF and its signature sets s are used as input. It outputs the cleaned file bF and the corresponding signature set s. [4.5]ProofCreate(bF',s', ch) is a proof generation algorithm that is executed by the cloud. The cleaned file bF', the corresponding signature set s' and the test request ch are used as input. It issues a verification certificate P, which is used to demonstrate that the cloud really owns this cleaned file bF'. [4.6]ProofAuth(ch, pps, P) is a proof verification algorithm executed by the Third Party Auditor. The test request ch, the public parameters of the system pps and the test certificate P are used as input. The Third Party Auditor can check the accuracy of the proof P. 5. ALGORITHM [5.1] RANDOMIZED - ADVANCED ENCRYPTION STANDARD (R-AES) The main problem with the key extension of the AES algorithm is that the words generated from the original key are related. If a word is understandable, the overall key is derived by the differential method or the liner methods of cryptanalysis. We modified the key expansion module from AES with the Symmetric Random Function Generator (SRFG). SRFG generates the symmetric symmetric output in terms of the number of ones and zeros in the output string regardless of the input string. The expression for the proposed combined function generator is given as: fc= fi L where, four universal gates: AND, OR, NOT and XOR; L represents the length of expression (number of terms in the combined function); and represents the random combination. In the experiments we used L = 5. In order to emphasize the randomness in such a combined function generator, the above equation can be further
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3088 expressed in the form of the randomness of the input variables during the selection fc(V1,V2,….,VN)=fi L[rand(V1,V2,..,VN)] For experimentation, the previous equation can be rewritten as, fc(V1,V2)= fi 5[rand(V1,V2)] The main goal of adding SRFG in AES is to activate the key expansion module with a random function. This helps prevent the words from being derived from keys even though a subkey is in hand. [5.2] DIGITAL SIGNATURE A digital signature is a mathematical strategy to verify the authenticity of digital messages or documents. A valid digital signature that meets the requirements gives a recipient strong reason to believe that the message was created by a known sender (authentication) and that the message was not changed during transmission (integrity). A digital signature scheme typically made up of 3 algorithms: • A key generation algorithm that randomly selects a private key from a set of possible private keys. The algorithm provides the private key and a corresponding public key. • A signature algorithm that generates a signature based on a message and a private key. • An algorithm for checking the signature, which, given the message, the public key and the signature, either accepts or rejects the authenticity claim of the message. [5.3] RANDOM KEY CRYPTOGRAPHY For creating a random key matrix from size (16x16), take every key. The size of the key must be less than or 16 characters long. This 16characters can be any 256 Characters (ASCII code 0 to 255). The relative position and the character itself is very important in the method to calculate the randomization number, the encryption number and the relative shifting of the characters in the start keymatrix. Here we demonstrate a method: Suppose key = AB Select the following table to calculate the place value and character strength of the incoming key: Length Of Key(n) 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 Base Value(b) 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 Equation: Sum = Σ ASCII Code * bm ----(1) m=1 Example-1: Now calculate the sum for key=”AB” using equation(1) Sum=65*161 + 66 * 162=17936 Now compute 3 parameters from the above sum: (i) randomization number (n1), (ii) encryption number (n2) and (iii) relative shift (n3) with the following procedure: (i) Randomization number(n1): num1=1*1+7*2+9*3+3*4+6*5=84 n1=sum mod num1=17936 mod 84=44 Note: if n1=0 then n1=num1 and n1<=128 (ii) Encryption number(n2): num2=6*1+3*2+9*3+7*4+1*5=72 n2=sum mod num2 =17936 mod 72 =8 Note: if n2=0 then n2=num2 and n2<=64 (iii) Relative shift(n3): n3= Σall digits in sum=1+7+9+3+6=26 6. RELATED WORK [6.1] Cross-Domain Data Sharing in Distributed Electronic Health Record Systems A secure EHR system based on cryptographic constructions is proposed to enable the secure sharing of sensitive patient data during the collaboration and to ensure the protection of the patient data. Standard identity-based cryptography (IBC) enables an entity's public key to be derived from public identity information such as name, email address, etc. With HIBPKI (Hierarchical Identity Based Public Key Infrastructure), entities from different domains can authenticate themselves directly with one another without having to rely on certificates from a certification authority. Different possible attacks can be applied to the EHR system and should be recognized to take appropriate countermeasures.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3089 [6.2] Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud A novel public verification mechanism for the integrity of shared data with a view to efficient revocation of users is proposed. Since collusion-resistant proxy re-signature schemes generally have two levels of signature (that is, the first level is re-signed by a user and the second level is re- signed by the proxy), the two levels signature are different forms and must be verified differently. The unblockable verifiability at both signature levels and their joint verification in a public verification mechanism is a challenge. [6.3] Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage A new structure of the identity-based (ID-based) RDIC protocol is proposed using a key-homomorphic cryptographic basic element in order to reduce the system complexity and the costs for setting up and managing the public-key authentication framework in PKI-based RDIC schemes. ID-based RDIC and its security model is formalized, including security against a malicious cloud server and zero-knowledge data protection against a third-party auditor. Short signature algorithm: Because of the short signature, hackers can easily find the key. 7. PROPOSED SCHEME In the proposed scheme we design a new efficient signature algorithm in the signature generation phase. The designed signature scheme supports non-blocking verifiability, allowing the verifier to verify the integrity of data without having to download all of the data from the cloud. In addition, it is based on identity-based cryptography, which simplifies complicated certificate management. If the user wants to upload data to the cloud to get the personal confidential information of the original file from the disinfectant, that user must use a blinding factor to blind the data blocks that correspond to the personal confidential information of the original file. If necessary, the user can use this blinding factor to restore the original file from the blinded one. This user then uses the designed signature algorithm to generate signatures for the blinded file. Finally, the disinfectant uploads the cleaned file and the corresponding signatures to the cloud. The PKG generates the private key for the user based on his identity ID. When researchers access the file, they are given a key to decrypt the contents of the file, which hides the confidential information. When the data integrity verification task runs, the cloud generates verification evidence according to the TPA challenge. The TPA can verify the integrity of the cleaned file stored in the cloud by verifying that this verification is correct or not. The unauthorized user who changes the content of the file stored in the cloud can be identified and reported to the user. 8. CONCLUSION An identity-based data integrity verification scheme for secure cloud storage is suggested that supports data exchange with hidden confidential information. The file stored in the cloud can be shared and used by others, provided the confidential information of the file is concealed. However, the remote data integrity check can be performed efficiently. It shows the safety case and the experimental analysis that the proposed scheme achieves the desired safety and efficiency. The further development of this project can be made to ensure enhanced failure recovery. REFERENCES [1] J. Sun and Y. Fang, “Cross-domain data sharing in distributed electronic health record systems,” IEEE Transactionson Parallel and Distributed Systems, vol. 21, no. 6,pp. 754–764, June 2010. [2] Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, “Enablingpublic auditability and data dynamics for storage securityin cloud computing,” IEEE Transactions on Parallel andDistributed Systems, vol. 22, no. 5, pp. 847–859, May2011. [3] K. Ren, C. Wang, and Q. Wang, “Security challengesfor the public cloud,” IEEE Internet Computing, vol. 16,no. 1, pp. 69–73, Jan 2012. [4] C. Wang, S. S. M. Chow, Q. Wang, K. Ren, and W. Lou,“Privacy-preserving public auditing for secure cloud storage,” IEEE Transactions on Computers, vol. 62, no. 2,pp. 362– 375, 2013. [5]HarithaNuthi, HemalathaGoli, Ramakrishna Mathe,” Data Integrity Proof for Cloud Storage” International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 3 Issue 9, September 2014 [6] B. Wang, B. Li, and H. Li, “Panda: Public auditing forshared data with efficient user revocation in the cloud,”
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3090 IEEE Transactions on Services Computing, vol. 8, no. 1,pp. 92–106, Jan.-Feb. 2015. [7] H. Wang, “Identity-based distributed provable data possessioninmulticloudstorage,” IEEE Transactions onServices Computing, vol. 8, no. 2, pp. 328–340, 2015. [8] J. Yu, K. Ren, and C. Wang, “Enabling cloud storageauditing with verifiable outsourcing of key updates,” IEEE Transactions on Information Forensics and Security,vol. 11, no. 6, pp. 1362–1375, June 2016. [9] H. Wang, D. He, J. Yu, and Z. Wang, “Incentiveand unconditionally anonymous identity-based publicprovable data possession,” IEEE Transactions on Services Computing, 2016. Available: DOI:10.1109/TSC.2016.2633260 [10] J. Li, J. Li, D. Xie, and Z. Cai, “Secure auditinganddeduplicating data in cloud,” IEEE Transactions onComputers, vol. 65, no. 8, pp. 2386– 2396, Aug 2016. [11] A. Fu, S. Yu, Y. Zhang, H. Wang, and C. Huang,“Npp: A new privacy-aware public auditing schemefor cloud data sharing with group users,” IEEETransactions on Big Data, 2017. Available:DOI:10.1109/TBDATA.2017.2701347 [12] Y. Yu, M. H. Au, G. Ateniese, X. Huang, W. Susilo,Y. Dai, and G. Min, “Identity-based remote data integritychecking with perfect data privacy preserving for cloudstorage,” IEEE Transactions on Information Forensicsand Security, vol. 12, no. 4, pp. 767–778, April 2017. [13]NihilaFathima M, Remitha M. S, Rithanya R. K, “Blockchain based Secure Data Sharing andSensitive Information Hiding in Cloud Storage Environment”, International Journal for Research in Applied Science & Engineering Technology (IJRASET)ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 6.887Volume 7 Issue III, Mar 2019- Available at www.ijraset.com