SlideShare a Scribd company logo
Integrated Intelligent Research (IIR) International Journal of Data Mining Techniques and Applications
Volume 5, Issue 1, June 2016, Page No.74-75
ISSN: 2278-2419
74
Enabling Cloud Storage Auditing with Key
Exposure Resistance
S.Santhiya1
, R. Arun2
1
PG Scholar, 2
Assistant Professor
Department of ECE, Archana Institute of Technology, Sri Venkateswaraa College of Technology
Abstract - With cloud computing, users can remotely store
their data into the cloud and use on-demand high-quality
applications. Data outsourcing: users are relieved from the
burden of data storage and maintenance When users put their
data (of large size) on the cloud, the data integrity protection is
challenging enabling public audit for cloud data storage
security is important Users can ask an external audit party to
check the integrity of their outsourced data. Purpose of
developing data security for data possession at un-trusted cloud
storage servers we are often limited by the resources at the
cloud server as well as at the client. Given that the data sizes
are large and are stored at remote servers, accessing the entire
file can be expensive in input output costs to the storage server.
Also transmitting the file across the network to the client can
consume heavy bandwidths. Since growth in storage capacity
has far outpaced the growth in data access as well as network
bandwidth, accessing and transmitting the entire archive even
occasionally greatly limits the scalability of the network
resources. Furthermore, the input output to establish the data
proof interferes with the on-demand bandwidth of the server
used for normal storage and retrieving purpose. The Third
Party Auditor is a respective person to manage the remote data
in a global manner.
I. INTRODUCTION
Cloud Computing has been envisioned as the next-generation
architecture of IT enterprise, due to its long list of
unprecedented advantages in the IT history: on-demand self-
service, ubiquitous network access, location independent
resource pooling, rapid resource elasticity, usage-based pricing
and transference of risk. As a disruptive technology with
profound implications, Cloud Computing is transforming the
very nature of how businesses use information technology.
One fundamental aspect of this paradigm shifting is that data is
being centralized or outsourced into the Cloud. From users’
perspective, including both individuals and enterprises, storing
data remotely into the cloud in a flexible on-demand manner
brings appealing benefits: relief of the burden for storage
management, universal data access with independent
geographical locations, and avoidance of capital expenditure
on hardware, software, and personnel maintenances, etc .
While these advantages of using clouds are unarguable, due to
the opaqueness of the Cloud—as separate administrative
entities, the internal operation details of cloud service
providers (CSP) may not be known by cloud users—data
outsourcing is also relinquishing user’s ultimate control over
the fate of their data.
II. PRIVACY-PRESERVING PUBLIC AUDITING
Homomorphic authenticators are unforgeable verification
metadata generated from individual data blocks, which can be
securely aggregated in such a way to assure an auditor that a
linear combination of data blocks is correctly computed by
verifying only the aggregated authenticator. Overview to
achieve privacy-preserving public auditing, we propose to
uniquely integrate the homomorphic authenticator with random
mask technique. In our protocol, the linear combination of
sampled blocks in the server’s response is masked with
randomness generated by a pseudo random function (PRF).
Data Flow Diagram
Figure 1: Data Flow Diagram
Use Case Diagram
User Cloud Server
Registration
View Updated Files
Save the downloaded files
Edit Profile
Upload Files with secure
secured Downloaded Files
View Downloaded Files
Figure 2: Use Case Diagram
Integrated Intelligent Research (IIR) International Journal of Data Mining Techniques and Applications
Volume 5, Issue 1, June 2016, Page No.74-75
ISSN: 2278-2419
75
Screen Shots
Figure 3: Main Page
Owner Login
Figure 4: Owner Login
Secret Key Mail
Figure 5: Secret key mail
Secret Key Login
Figure 6 : Secret Key Login
File Upload
Figure 7: File Upload
III. CONCLUSION
We can further extend our privacy-preserving public auditing
protocol into a multi-user setting, where TPA can perform the
multiple auditing tasks in a batch manner, i.e., simultaneously.
Extensive security and performance analysis shows that the
proposed schemes are provably secure and highly efficient. We
believe all these advantages of the proposed schemes will shed
light on economies of scale for Cloud Computing.
References
[1] H. Abu-Libdeh, L. Princehouse, And H. Weatherspoon.
Racs: A Case For Cloud Storage Diversity. In Proc. Of
Acm Socc, 2010.
[2] R. Ahlswede, N. Cai, S.-Y. R. Li, And R.W. Yeung.
Network Information Flow. Ieee Trans. On Information
Theory, 46(4):1204–1216, Jul 2000.
[3] Amazon Elastic Compute Cloud.
Http://Aws.Amazon.Com/Ec2/.
[4] Amazon Simple Storage Service.
Http://Aws.Amazon.Com/S3/.
[5] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz,
A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica,
And M. Zaharia. A View Of Cloud Computing.
Communications Of The Acm, 53(4):50–58,

More Related Content

PDF
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Editor IJMTER
 
PDF
IRJET- Secure Cloud Storage through Dual Protection
IRJET Journal
 
PDF
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Editor IJMTER
 
PDF
Enhanced security framework to ensure data security in cloud using security b...
eSAT Journals
 
PDF
50120140503020
IAEME Publication
 
PDF
Secure cloud storage privacy preserving public auditing for data storage secu...
rajender147
 
PDF
Enhanced security framework to ensure data security
eSAT Publishing House
 
PDF
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
pharmaindexing
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Editor IJMTER
 
IRJET- Secure Cloud Storage through Dual Protection
IRJET Journal
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Editor IJMTER
 
Enhanced security framework to ensure data security in cloud using security b...
eSAT Journals
 
50120140503020
IAEME Publication
 
Secure cloud storage privacy preserving public auditing for data storage secu...
rajender147
 
Enhanced security framework to ensure data security
eSAT Publishing House
 
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
pharmaindexing
 

Similar to Breast Tissue Identification in Digital Mammogram Using Edge Detection Techniques (20)

PDF
Excellent Manner of Using Secure way of data storage in cloud computing
Editor IJMTER
 
PDF
V04405122126
IJERA Editor
 
PDF
Security Check in Cloud Computing through Third Party Auditor
ijsrd.com
 
PDF
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Editor IJMTER
 
PDF
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET Journal
 
PDF
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
IRJET Journal
 
PDF
Security Issues’ in Cloud Computing and its Solutions.
IJCERT JOURNAL
 
PDF
L04302088092
ijceronline
 
PDF
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
PDF
Iaetsd storage privacy protection against data
Iaetsd Iaetsd
 
PDF
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
PDF
Fs2510501055
IJERA Editor
 
PDF
Paper id 212014106
IJRAT
 
PDF
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET Journal
 
PDF
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
PDF
Paper1
Vikas Khairnar
 
PDF
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET Journal
 
PDF
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
IJCERT JOURNAL
 
PDF
Cloud Computing Using Encryption and Intrusion Detection
ijsrd.com
 
PDF
Anonymous Key Based Secure File Encryption in Cloud
IRJET Journal
 
Excellent Manner of Using Secure way of data storage in cloud computing
Editor IJMTER
 
V04405122126
IJERA Editor
 
Security Check in Cloud Computing through Third Party Auditor
ijsrd.com
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Editor IJMTER
 
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET Journal
 
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
IRJET Journal
 
Security Issues’ in Cloud Computing and its Solutions.
IJCERT JOURNAL
 
L04302088092
ijceronline
 
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
Iaetsd storage privacy protection against data
Iaetsd Iaetsd
 
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Fs2510501055
IJERA Editor
 
Paper id 212014106
IJRAT
 
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET Journal
 
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET Journal
 
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
IJCERT JOURNAL
 
Cloud Computing Using Encryption and Intrusion Detection
ijsrd.com
 
Anonymous Key Based Secure File Encryption in Cloud
IRJET Journal
 

More from IIRindia (20)

DOC
An Investigation into Brain Tumor Segmentation Techniques
IIRindia
 
DOCX
E-Agriculture - A Way to Digitalization
IIRindia
 
DOCX
A Survey on the Analysis of Dissolved Oxygen Level in Water using Data Mining...
IIRindia
 
DOCX
Kidney Failure Due to Diabetics – Detection using Classification Algorithm in...
IIRindia
 
DOCX
Silhouette Threshold Based Text Clustering for Log Analysis
IIRindia
 
DOC
Analysis and Representation of Igbo Text Document for a Text-Based System
IIRindia
 
DOCX
A Survey on E-Learning System with Data Mining
IIRindia
 
DOCX
Image Segmentation Based Survey on the Lung Cancer MRI Images
IIRindia
 
DOCX
The Preface Layer for Auditing Sensual Interacts of Primary Distress Conceali...
IIRindia
 
DOCX
Feature Based Underwater Fish Recognition Using SVM Classifier
IIRindia
 
DOC
A Survey on Educational Data Mining Techniques
IIRindia
 
DOCX
V5_I2_2016_Paper11.docx
IIRindia
 
DOCX
A Study on MRI Liver Image Segmentation using Fuzzy Connected and Watershed T...
IIRindia
 
DOCX
A Clustering Based Collaborative and Pattern based Filtering approach for Big...
IIRindia
 
DOCX
Hadoop and Hive Inspecting Maintenance of Mobile Application for Groceries Ex...
IIRindia
 
DOC
Performance Evaluation of Feature Selection Algorithms in Educational Data Mi...
IIRindia
 
DOCX
A Review of Edge Detection Techniques for Image Segmentation
IIRindia
 
DOC
Leanness Assessment using Fuzzy Logic Approach: A Case of Indian Horn Manufac...
IIRindia
 
DOC
Comparative Analysis of Weighted Emphirical Optimization Algorithm and Lazy C...
IIRindia
 
DOC
Survey on Segmentation Techniques for Spinal Cord Images
IIRindia
 
An Investigation into Brain Tumor Segmentation Techniques
IIRindia
 
E-Agriculture - A Way to Digitalization
IIRindia
 
A Survey on the Analysis of Dissolved Oxygen Level in Water using Data Mining...
IIRindia
 
Kidney Failure Due to Diabetics – Detection using Classification Algorithm in...
IIRindia
 
Silhouette Threshold Based Text Clustering for Log Analysis
IIRindia
 
Analysis and Representation of Igbo Text Document for a Text-Based System
IIRindia
 
A Survey on E-Learning System with Data Mining
IIRindia
 
Image Segmentation Based Survey on the Lung Cancer MRI Images
IIRindia
 
The Preface Layer for Auditing Sensual Interacts of Primary Distress Conceali...
IIRindia
 
Feature Based Underwater Fish Recognition Using SVM Classifier
IIRindia
 
A Survey on Educational Data Mining Techniques
IIRindia
 
V5_I2_2016_Paper11.docx
IIRindia
 
A Study on MRI Liver Image Segmentation using Fuzzy Connected and Watershed T...
IIRindia
 
A Clustering Based Collaborative and Pattern based Filtering approach for Big...
IIRindia
 
Hadoop and Hive Inspecting Maintenance of Mobile Application for Groceries Ex...
IIRindia
 
Performance Evaluation of Feature Selection Algorithms in Educational Data Mi...
IIRindia
 
A Review of Edge Detection Techniques for Image Segmentation
IIRindia
 
Leanness Assessment using Fuzzy Logic Approach: A Case of Indian Horn Manufac...
IIRindia
 
Comparative Analysis of Weighted Emphirical Optimization Algorithm and Lazy C...
IIRindia
 
Survey on Segmentation Techniques for Spinal Cord Images
IIRindia
 

Recently uploaded (20)

PDF
Machine Learning All topics Covers In This Single Slides
AmritTiwari19
 
PDF
Zero Carbon Building Performance standard
BassemOsman1
 
PDF
top-5-use-cases-for-splunk-security-analytics.pdf
yaghutialireza
 
PDF
2010_Book_EnvironmentalBioengineering (1).pdf
EmilianoRodriguezTll
 
PDF
STUDY OF NOVEL CHANNEL MATERIALS USING III-V COMPOUNDS WITH VARIOUS GATE DIEL...
ijoejnl
 
PPTX
Civil Engineering Practices_BY Sh.JP Mishra 23.09.pptx
bineetmishra1990
 
PPTX
Online Cab Booking and Management System.pptx
diptipaneri80
 
PPTX
22PCOAM21 Session 2 Understanding Data Source.pptx
Guru Nanak Technical Institutions
 
PPTX
Tunnel Ventilation System in Kanpur Metro
220105053
 
PPTX
Information Retrieval and Extraction - Module 7
premSankar19
 
PDF
Introduction to Ship Engine Room Systems.pdf
Mahmoud Moghtaderi
 
PPTX
Module2 Data Base Design- ER and NF.pptx
gomathisankariv2
 
PDF
Natural_Language_processing_Unit_I_notes.pdf
sanguleumeshit
 
PDF
AI-Driven IoT-Enabled UAV Inspection Framework for Predictive Maintenance and...
ijcncjournal019
 
PPTX
MULTI LEVEL DATA TRACKING USING COOJA.pptx
dollysharma12ab
 
PDF
Construction of a Thermal Vacuum Chamber for Environment Test of Triple CubeS...
2208441
 
PDF
LEAP-1B presedntation xxxxxxxxxxxxxxxxxxxxxxxxxxxxx
hatem173148
 
PDF
Zero carbon Building Design Guidelines V4
BassemOsman1
 
PDF
All chapters of Strength of materials.ppt
girmabiniyam1234
 
PDF
The Effect of Artifact Removal from EEG Signals on the Detection of Epileptic...
Partho Prosad
 
Machine Learning All topics Covers In This Single Slides
AmritTiwari19
 
Zero Carbon Building Performance standard
BassemOsman1
 
top-5-use-cases-for-splunk-security-analytics.pdf
yaghutialireza
 
2010_Book_EnvironmentalBioengineering (1).pdf
EmilianoRodriguezTll
 
STUDY OF NOVEL CHANNEL MATERIALS USING III-V COMPOUNDS WITH VARIOUS GATE DIEL...
ijoejnl
 
Civil Engineering Practices_BY Sh.JP Mishra 23.09.pptx
bineetmishra1990
 
Online Cab Booking and Management System.pptx
diptipaneri80
 
22PCOAM21 Session 2 Understanding Data Source.pptx
Guru Nanak Technical Institutions
 
Tunnel Ventilation System in Kanpur Metro
220105053
 
Information Retrieval and Extraction - Module 7
premSankar19
 
Introduction to Ship Engine Room Systems.pdf
Mahmoud Moghtaderi
 
Module2 Data Base Design- ER and NF.pptx
gomathisankariv2
 
Natural_Language_processing_Unit_I_notes.pdf
sanguleumeshit
 
AI-Driven IoT-Enabled UAV Inspection Framework for Predictive Maintenance and...
ijcncjournal019
 
MULTI LEVEL DATA TRACKING USING COOJA.pptx
dollysharma12ab
 
Construction of a Thermal Vacuum Chamber for Environment Test of Triple CubeS...
2208441
 
LEAP-1B presedntation xxxxxxxxxxxxxxxxxxxxxxxxxxxxx
hatem173148
 
Zero carbon Building Design Guidelines V4
BassemOsman1
 
All chapters of Strength of materials.ppt
girmabiniyam1234
 
The Effect of Artifact Removal from EEG Signals on the Detection of Epileptic...
Partho Prosad
 

Breast Tissue Identification in Digital Mammogram Using Edge Detection Techniques

  • 1. Integrated Intelligent Research (IIR) International Journal of Data Mining Techniques and Applications Volume 5, Issue 1, June 2016, Page No.74-75 ISSN: 2278-2419 74 Enabling Cloud Storage Auditing with Key Exposure Resistance S.Santhiya1 , R. Arun2 1 PG Scholar, 2 Assistant Professor Department of ECE, Archana Institute of Technology, Sri Venkateswaraa College of Technology Abstract - With cloud computing, users can remotely store their data into the cloud and use on-demand high-quality applications. Data outsourcing: users are relieved from the burden of data storage and maintenance When users put their data (of large size) on the cloud, the data integrity protection is challenging enabling public audit for cloud data storage security is important Users can ask an external audit party to check the integrity of their outsourced data. Purpose of developing data security for data possession at un-trusted cloud storage servers we are often limited by the resources at the cloud server as well as at the client. Given that the data sizes are large and are stored at remote servers, accessing the entire file can be expensive in input output costs to the storage server. Also transmitting the file across the network to the client can consume heavy bandwidths. Since growth in storage capacity has far outpaced the growth in data access as well as network bandwidth, accessing and transmitting the entire archive even occasionally greatly limits the scalability of the network resources. Furthermore, the input output to establish the data proof interferes with the on-demand bandwidth of the server used for normal storage and retrieving purpose. The Third Party Auditor is a respective person to manage the remote data in a global manner. I. INTRODUCTION Cloud Computing has been envisioned as the next-generation architecture of IT enterprise, due to its long list of unprecedented advantages in the IT history: on-demand self- service, ubiquitous network access, location independent resource pooling, rapid resource elasticity, usage-based pricing and transference of risk. As a disruptive technology with profound implications, Cloud Computing is transforming the very nature of how businesses use information technology. One fundamental aspect of this paradigm shifting is that data is being centralized or outsourced into the Cloud. From users’ perspective, including both individuals and enterprises, storing data remotely into the cloud in a flexible on-demand manner brings appealing benefits: relief of the burden for storage management, universal data access with independent geographical locations, and avoidance of capital expenditure on hardware, software, and personnel maintenances, etc . While these advantages of using clouds are unarguable, due to the opaqueness of the Cloud—as separate administrative entities, the internal operation details of cloud service providers (CSP) may not be known by cloud users—data outsourcing is also relinquishing user’s ultimate control over the fate of their data. II. PRIVACY-PRESERVING PUBLIC AUDITING Homomorphic authenticators are unforgeable verification metadata generated from individual data blocks, which can be securely aggregated in such a way to assure an auditor that a linear combination of data blocks is correctly computed by verifying only the aggregated authenticator. Overview to achieve privacy-preserving public auditing, we propose to uniquely integrate the homomorphic authenticator with random mask technique. In our protocol, the linear combination of sampled blocks in the server’s response is masked with randomness generated by a pseudo random function (PRF). Data Flow Diagram Figure 1: Data Flow Diagram Use Case Diagram User Cloud Server Registration View Updated Files Save the downloaded files Edit Profile Upload Files with secure secured Downloaded Files View Downloaded Files Figure 2: Use Case Diagram
  • 2. Integrated Intelligent Research (IIR) International Journal of Data Mining Techniques and Applications Volume 5, Issue 1, June 2016, Page No.74-75 ISSN: 2278-2419 75 Screen Shots Figure 3: Main Page Owner Login Figure 4: Owner Login Secret Key Mail Figure 5: Secret key mail Secret Key Login Figure 6 : Secret Key Login File Upload Figure 7: File Upload III. CONCLUSION We can further extend our privacy-preserving public auditing protocol into a multi-user setting, where TPA can perform the multiple auditing tasks in a batch manner, i.e., simultaneously. Extensive security and performance analysis shows that the proposed schemes are provably secure and highly efficient. We believe all these advantages of the proposed schemes will shed light on economies of scale for Cloud Computing. References [1] H. Abu-Libdeh, L. Princehouse, And H. Weatherspoon. Racs: A Case For Cloud Storage Diversity. In Proc. Of Acm Socc, 2010. [2] R. Ahlswede, N. Cai, S.-Y. R. Li, And R.W. Yeung. Network Information Flow. Ieee Trans. On Information Theory, 46(4):1204–1216, Jul 2000. [3] Amazon Elastic Compute Cloud. Http://Aws.Amazon.Com/Ec2/. [4] Amazon Simple Storage Service. Http://Aws.Amazon.Com/S3/. [5] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, And M. Zaharia. A View Of Cloud Computing. Communications Of The Acm, 53(4):50–58,