SlideShare a Scribd company logo
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
Public Integrity Auditing for Shared Dynamic
Cloud Data with Group User Revocation
Abstract:
The advent of the cloud computing makes storage outsourcing become a rising trend, which
promotes the secure remote data auditing a hot topic that appeared in the research literature.
Recently some research consider the problem of secure and efficient public data integrity
auditing for shared dynamic data. However, these schemes are still not secure against the
collusion of cloud storage server and revoked group users during user revocation In practical
cloud storage system. In this paper, we figure out the collusion attack in the exiting scheme and
provide an efficient public integrity auditing scheme with secure group user revocation based on
vector commitment and verifier-local revocation group signature. We design a concrete scheme
based on the our scheme definition. Our scheme supports the public checking and efficient user
revocation and also some nice properties, such as confidently, efficiency, count ability and
traceability of secure group user revocation. Finally, the security and experimental analysis show
that, compared with its relevant schemes our scheme is also secure and efficient.
EXISTING SYSTEM:
Considering data privacy, a traditional way to ensure it is to rely on the server to enforce the
access control after authentication, which means any unexpected privilege escalation will expose
all data. In a shared-tenancy cloud computing environment, things become even worse. Data
from different clients can be hosted on separate virtual machines (VMs) but reside on a single
physical machine. Data in a target VM could be stolen by instantiating another VM co-resident
with the target one. Regarding availability of files, there are a series of cryptographic schemes
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
which go as far as allowing a third-party auditor to check the availability of files on behalf of the
data owner without leaking anything about the data, or without compromising the data owner’s
anonymity. Likewise, cloud users probably will not hold the strong belief that the cloud server is
doing a good job in terms of confidentiality. A cryptographic solution, with proven security
relied on number-theoretic assumptions is more desirable, whenever the user is not perfectly
happy with trusting the security of the VM or the honesty of the technical staff. These users are
motivated to encrypt their data with their own keys before uploading them to the server.
DISADVANTAGES OF EXISTING SYSTEM:
Unexpected privilege escalation will expose all
It is not efficient.
Shared data will not be secure.
Proposed System:
providing the integrity and availability of remote cloud store, some solutions and their variants
have been proposed. In these solutions, when a scheme supports data modification, we call it
dynamic scheme, otherwise static one (or limited dynamic scheme, if a scheme could only
efficiently support some specified operation, such as append). A scheme is publicly verifiable
means that the data integrity check can be performed not only by data owners, but also by any
third-party auditor. However, the dynamic schemes above focus on the cases where there is a
data owner and only the data owner could modify the data.
these software development environments, multiple users in a group need to share the source
code, and they need to access, modify, compile and run the shared source code at any time and
place. The new cooperation network model in cloud makes the remote data auditing schemes
become infeasible, where only the data owner can update its data. Obviously, trivially extending
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
a scheme with an online data owner to update the data for a group is inappropriate for the data
owner. It will cause tremendous communication and computation overhead to data owner, which
will result in the single point of data owner.
ImplementationModules:
1. Data Group sharing,
2. Public integrity auditing
3. Revoked Group Users
4. Group signature
5. Cloud Storage Model
1. Data Group sharing,
server can use this aggregate trapdoor and some public information to perform keyword search and return
the result to Bob. Therefore, in KASE, the delegation of keyword search right can be achieved by sharing
the single aggregate key. We note that the delegation of decryption rights can be achieved using the key-
aggregate encryption approach recently proposed in [4], but it remains an open problem to delegate the
keyword search rights together with the decryption rights, which is the subject topic of this paper. To
summarize, the problem of constructing a KASE .
2. Public integrity auditing
public integrity auditing for shared dynamicdata with group user revocation. Our contributionsare three
folds:1) We explore on the secure and efficient shareddata integrate auditing for multi-user operation
for ciphertext database.2) By incorporating the primitives of victor commitment, asymmetric group key
agreement and group signature, we propose an efficient data auditing scheme while at the same time
providing some new features, such as traceability and countability. 3) We provide the security and
efficiency analysis of our scheme, and the analysis results show that our scheme is secure and efficient.
3. Cloud Storage Model
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
Cloud storage is a model of data storage where the digital data is stored in logical pools, the physical
storage spans multiple servers (and often locations), and the physical environment is typically owned and
managed by a hosting company. These cloud storage providers are responsible for keeping the data
available and accessible, and the physical environment protected and running. People and organizations
buy or lease storage capacity from the providers to store user, organization, or application data.Cloud
storage services may be accessed through a co-located cloud computer service, a web service application
programming interface (API) or by applications that utilize the API, such as cloud desktop storage, a
cloud storage gateway or Web-based content management systems.
who are authorized to access and modify the data by the data owner. The cloud storage server is semi-
trusted, who provides data storage services for the group users. TPA could be any entity in the cloud,
which will be able to conduct the data integrity of the shared data stored in the cloud server. In our
system, the data owner could encrypt and upload its data to the remote cloud storage server. Also, he/she
shares the privilege such as access and modify (compile and execute if necessary) to a number of group
users.
4.RevokedGroup Users
The group signature will prevent the collusion of cloud and revoked group users, where the data owner
will take part in the user revocation phase and the cloud could not revoke the data that last modified by
the revoked user.An attacker out side the group (include the revoked group user cloud storage server) may
obtain some knowledge of the plaintext of the data. Actually, this kind of attacker has to at lease break the
security of the adopted group data encryption scheme. The cloud storage server colludes with the revoked
group users, and they want to provide a illegal data without being detected. Actually, in cloud
environment, we assume that the cloud storage server is semi-trusted. Thus, it is reasonable that a revoked
user will collude with the cloud server and share its secret group key to the cloud storage server. In this
case, although the server proxy group user revocation way [24] brings much communication and
computation cost saving, it will make the scheme insecure against a malicious cloud storage server who
can get the secret key of revoked users during the user revocation phase. Thus, a malicious cloud server
will be able to make data m, last modified by a user that needed to be revoked, into a malicious data m′.
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
In the user revocation process, the cloud could make the malicious data m′ become valid. To overcome
the problems above,
Group signature
Group signature is introduced by Chaum and Heyst It provides anonymity for signers, where each group
member has a private key that enables the user to sign messages. However,the resulting signature keeps
the identity of the signer secret. Usually, there is a third party that can conduct the signature anonymity
using a special trapdoor. Some systems support revocation where group membership can be disabled
without affecting the signing ability of unrevoked users. Boneh and Shacham proposed an efficient group
signature with verifier-local revocation. The scheme provides the properties of group signature such as
selfless-anonymity and traceability. Also, the scheme is a short signature scheme where user revocation
only requires sending revocation information to signature verifiers. Libert et al. proposed a new scalable
revocation method for group signature based on the broadcast encryption framework. However,the
scheme introduces important storage overhead at group user side. Later,Libert et al. designed a scheme
to enhance the former scheme which could obtain private key of constant size. In their scheme,the
unrevoked members still do not need to update their keys at each revocation.
System Configuration:
HARDWARE REQUIREMENTS:
Hardware - Pentium
Speed - 1.1 GHz
RAM - 1GB
Hard Disk - 20 GB
Key Board - Standard Windows Keyboard
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
Mouse - Two or Three Button Mouse
Monitor - SVGA
SOFTWARE REQUIREMENTS:
Operating System : Windows
Technology : Java and J2EE
Web Technologies : Html, JavaScript, CSS
IDE : My Eclipse
Web Server : Tomcat
Tool kit : Android Phone
Database : My SQL
Java Version : J2SDK1.5

More Related Content

What's hot (18)

PDF
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
Editor IJCATR
 
PDF
IRJET - Providing High Securtiy for Encrypted Data in Cloud
IRJET Journal
 
DOCX
Secure distributed deduplication systems with improved reliability
Pvrtechnologies Nellore
 
PDF
Oruta project report
Manasa Chowdary
 
PDF
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
IJNSA Journal
 
PDF
Insuring Security for Outsourced Data Stored in Cloud Environment
Editor IJCATR
 
PDF
Secure Data Sharing in Cloud through Limiting Trust in Third Party/Server
IRJET Journal
 
PDF
5.[40 44]enhancing security in cloud computing
Alexander Decker
 
PDF
Enhanced Security Through Token
IRJET Journal
 
DOCX
Public integrity auditing for shared dynamic cloud data with group user revoc...
Shakas Technologies
 
PDF
Enhanced security framework to ensure data security
eSAT Publishing House
 
PDF
Maintaining Data Integrity for Shared Data in Cloud
IJERA Editor
 
PDF
Enhanced security framework to ensure data security in cloud using security b...
eSAT Journals
 
DOC
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
Shakas Technologies
 
PDF
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
IRJET Journal
 
PDF
A Survey on Different Techniques Used in Decentralized Cloud Computing
Editor IJCATR
 
PDF
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
IRJET Journal
 
PDF
Secure Data Storage in Cloud Using Encryption and Steganography
iosrjce
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
Editor IJCATR
 
IRJET - Providing High Securtiy for Encrypted Data in Cloud
IRJET Journal
 
Secure distributed deduplication systems with improved reliability
Pvrtechnologies Nellore
 
Oruta project report
Manasa Chowdary
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
IJNSA Journal
 
Insuring Security for Outsourced Data Stored in Cloud Environment
Editor IJCATR
 
Secure Data Sharing in Cloud through Limiting Trust in Third Party/Server
IRJET Journal
 
5.[40 44]enhancing security in cloud computing
Alexander Decker
 
Enhanced Security Through Token
IRJET Journal
 
Public integrity auditing for shared dynamic cloud data with group user revoc...
Shakas Technologies
 
Enhanced security framework to ensure data security
eSAT Publishing House
 
Maintaining Data Integrity for Shared Data in Cloud
IJERA Editor
 
Enhanced security framework to ensure data security in cloud using security b...
eSAT Journals
 
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
Shakas Technologies
 
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
IRJET Journal
 
A Survey on Different Techniques Used in Decentralized Cloud Computing
Editor IJCATR
 
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
IRJET Journal
 
Secure Data Storage in Cloud Using Encryption and Steganography
iosrjce
 

Viewers also liked (7)

DOCX
Detecting malicious facebook applications
nexgentech15
 
PDF
Final PPT
Arjun Aravind
 
DOCX
Fr app e detecting malicious facebook applications
CloudTechnologies
 
DOCX
Fr app e detecting malicious facebook applications
Pvrtechnologies Nellore
 
PPTX
FRAppE Detecting Malicious Facebook Applications
Nagamalleswararao Tadikonda
 
DOCX
DETECTING MALICIOUS FACEBOOK APPLICATIONS - IEEE PROJECTS IN PONDICHERRY,BUL...
Nexgen Technology
 
PPTX
Blue Eyes Technology
Colloquium
 
Detecting malicious facebook applications
nexgentech15
 
Final PPT
Arjun Aravind
 
Fr app e detecting malicious facebook applications
CloudTechnologies
 
Fr app e detecting malicious facebook applications
Pvrtechnologies Nellore
 
FRAppE Detecting Malicious Facebook Applications
Nagamalleswararao Tadikonda
 
DETECTING MALICIOUS FACEBOOK APPLICATIONS - IEEE PROJECTS IN PONDICHERRY,BUL...
Nexgen Technology
 
Blue Eyes Technology
Colloquium
 
Ad

Similar to Public integrity auditing for shared dynamic cloud data with group user revocation (20)

PDF
Public integrity auditing for shared dynamic cloud data with group user revoc...
Pvrtechnologies Nellore
 
PDF
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revoc...
1crore projects
 
DOCX
Public integrity auditing for shared dynamic cloud data with group user revoc...
Shakas Technologies
 
DOCX
PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO...
Nexgen Technology
 
PDF
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
ijiert bestjournal
 
PDF
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET Journal
 
PDF
Survey On: Auditing Public Clouds
IRJET Journal
 
DOCX
Secure auditing and deduplicating data in cloud
Pvrtechnologies Nellore
 
PDF
public truthfulness assessment for shared active cloud data storage with grou...
Ijripublishers Ijri
 
PDF
Maintaining Data Integrity for Shared Data in Cloud
acijjournal
 
PDF
Iaetsd secure data sharing of multi-owner groups in cloud
Iaetsd Iaetsd
 
DOCX
A secure-anti-collusion-data-sharing-scheme-for-dynamic-groups-in-the-cloud
Pvrtechnologies Nellore
 
PDF
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...
IRJET Journal
 
PDF
Security Check in Cloud Computing through Third Party Auditor
ijsrd.com
 
PDF
Panda: Public Auditing for Shared Data with Efficient User Revocation in the ...
1crore projects
 
PDF
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET Journal
 
DOCX
Reshma.docx
VIVEKANAND BONAL
 
PDF
IRJET- A Novel Approach for Appreciable Group Data Allocation System with...
IRJET Journal
 
PDF
A Noval Method for Data Auditing and Integrity Checking in Public Cloud
rahulmonikasharma
 
PDF
Preserving Privacy Policy- Preserving public auditing for data in the cloud
inventionjournals
 
Public integrity auditing for shared dynamic cloud data with group user revoc...
Pvrtechnologies Nellore
 
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revoc...
1crore projects
 
Public integrity auditing for shared dynamic cloud data with group user revoc...
Shakas Technologies
 
PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO...
Nexgen Technology
 
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
ijiert bestjournal
 
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET Journal
 
Survey On: Auditing Public Clouds
IRJET Journal
 
Secure auditing and deduplicating data in cloud
Pvrtechnologies Nellore
 
public truthfulness assessment for shared active cloud data storage with grou...
Ijripublishers Ijri
 
Maintaining Data Integrity for Shared Data in Cloud
acijjournal
 
Iaetsd secure data sharing of multi-owner groups in cloud
Iaetsd Iaetsd
 
A secure-anti-collusion-data-sharing-scheme-for-dynamic-groups-in-the-cloud
Pvrtechnologies Nellore
 
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...
IRJET Journal
 
Security Check in Cloud Computing through Third Party Auditor
ijsrd.com
 
Panda: Public Auditing for Shared Data with Efficient User Revocation in the ...
1crore projects
 
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET Journal
 
Reshma.docx
VIVEKANAND BONAL
 
IRJET- A Novel Approach for Appreciable Group Data Allocation System with...
IRJET Journal
 
A Noval Method for Data Auditing and Integrity Checking in Public Cloud
rahulmonikasharma
 
Preserving Privacy Policy- Preserving public auditing for data in the cloud
inventionjournals
 
Ad

More from Pvrtechnologies Nellore (20)

DOCX
A High Throughput List Decoder Architecture for Polar Codes
Pvrtechnologies Nellore
 
DOCX
Performance/Power Space Exploration for Binary64 Division Units
Pvrtechnologies Nellore
 
DOCX
Hybrid LUT/Multiplexer FPGA Logic Architectures
Pvrtechnologies Nellore
 
DOCX
Input-Based Dynamic Reconfiguration of Approximate Arithmetic Units for Video...
Pvrtechnologies Nellore
 
DOCX
2016 2017 ieee matlab project titles
Pvrtechnologies Nellore
 
DOCX
2016 2017 ieee vlsi project titles
Pvrtechnologies Nellore
 
DOCX
2016 2017 ieee ece embedded- project titles
Pvrtechnologies Nellore
 
DOCX
A High-Speed FPGA Implementation of an RSD-Based ECC Processor
Pvrtechnologies Nellore
 
DOCX
6On Efficient Retiming of Fixed-Point Circuits
Pvrtechnologies Nellore
 
DOCX
Pre encoded multipliers based on non-redundant radix-4 signed-digit encoding
Pvrtechnologies Nellore
 
DOCX
Quality of-protection-driven data forwarding for intermittently connected wir...
Pvrtechnologies Nellore
 
DOC
11.online library management system
Pvrtechnologies Nellore
 
DOC
06.e voting system
Pvrtechnologies Nellore
 
DOCX
New web based projects list
Pvrtechnologies Nellore
 
DOCX
Power controlled medium access control
Pvrtechnologies Nellore
 
DOCX
IEEE PROJECTS LIST
Pvrtechnologies Nellore
 
DOCX
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
Pvrtechnologies Nellore
 
DOCX
Control cloud data access privilege and anonymity with fully anonymous attrib...
Pvrtechnologies Nellore
 
DOCX
Cloud keybank privacy and owner authorization
Pvrtechnologies Nellore
 
DOCX
Circuit ciphertext policy attribute-based hybrid encryption with verifiable
Pvrtechnologies Nellore
 
A High Throughput List Decoder Architecture for Polar Codes
Pvrtechnologies Nellore
 
Performance/Power Space Exploration for Binary64 Division Units
Pvrtechnologies Nellore
 
Hybrid LUT/Multiplexer FPGA Logic Architectures
Pvrtechnologies Nellore
 
Input-Based Dynamic Reconfiguration of Approximate Arithmetic Units for Video...
Pvrtechnologies Nellore
 
2016 2017 ieee matlab project titles
Pvrtechnologies Nellore
 
2016 2017 ieee vlsi project titles
Pvrtechnologies Nellore
 
2016 2017 ieee ece embedded- project titles
Pvrtechnologies Nellore
 
A High-Speed FPGA Implementation of an RSD-Based ECC Processor
Pvrtechnologies Nellore
 
6On Efficient Retiming of Fixed-Point Circuits
Pvrtechnologies Nellore
 
Pre encoded multipliers based on non-redundant radix-4 signed-digit encoding
Pvrtechnologies Nellore
 
Quality of-protection-driven data forwarding for intermittently connected wir...
Pvrtechnologies Nellore
 
11.online library management system
Pvrtechnologies Nellore
 
06.e voting system
Pvrtechnologies Nellore
 
New web based projects list
Pvrtechnologies Nellore
 
Power controlled medium access control
Pvrtechnologies Nellore
 
IEEE PROJECTS LIST
Pvrtechnologies Nellore
 
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
Pvrtechnologies Nellore
 
Control cloud data access privilege and anonymity with fully anonymous attrib...
Pvrtechnologies Nellore
 
Cloud keybank privacy and owner authorization
Pvrtechnologies Nellore
 
Circuit ciphertext policy attribute-based hybrid encryption with verifiable
Pvrtechnologies Nellore
 

Recently uploaded (20)

PDF
Reverse Engineering of Security Products: Developing an Advanced Microsoft De...
nwbxhhcyjv
 
PDF
New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
PDF
HubSpot Main Hub: A Unified Growth Platform
Jaswinder Singh
 
PPTX
Building Search Using OpenSearch: Limitations and Workarounds
Sease
 
PDF
"AI Transformation: Directions and Challenges", Pavlo Shaternik
Fwdays
 
PDF
LLMs.txt: Easily Control How AI Crawls Your Site
Keploy
 
PDF
[Newgen] NewgenONE Marvin Brochure 1.pdf
darshakparmar
 
PDF
Agentic AI lifecycle for Enterprise Hyper-Automation
Debmalya Biswas
 
PDF
Jak MŚP w Europie Środkowo-Wschodniej odnajdują się w świecie AI
dominikamizerska1
 
PPTX
Q2 FY26 Tableau User Group Leader Quarterly Call
lward7
 
PDF
The Builder’s Playbook - 2025 State of AI Report.pdf
jeroen339954
 
PDF
Empower Inclusion Through Accessible Java Applications
Ana-Maria Mihalceanu
 
PDF
Transcript: New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
PDF
Complete JavaScript Notes: From Basics to Advanced Concepts.pdf
haydendavispro
 
PDF
Log-Based Anomaly Detection: Enhancing System Reliability with Machine Learning
Mohammed BEKKOUCHE
 
PDF
How Startups Are Growing Faster with App Developers in Australia.pdf
India App Developer
 
PDF
Bitcoin for Millennials podcast with Bram, Power Laws of Bitcoin
Stephen Perrenod
 
PPTX
UiPath Academic Alliance Educator Panels: Session 2 - Business Analyst Content
DianaGray10
 
PPTX
WooCommerce Workshop: Bring Your Laptop
Laura Hartwig
 
PDF
From Code to Challenge: Crafting Skill-Based Games That Engage and Reward
aiyshauae
 
Reverse Engineering of Security Products: Developing an Advanced Microsoft De...
nwbxhhcyjv
 
New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
HubSpot Main Hub: A Unified Growth Platform
Jaswinder Singh
 
Building Search Using OpenSearch: Limitations and Workarounds
Sease
 
"AI Transformation: Directions and Challenges", Pavlo Shaternik
Fwdays
 
LLMs.txt: Easily Control How AI Crawls Your Site
Keploy
 
[Newgen] NewgenONE Marvin Brochure 1.pdf
darshakparmar
 
Agentic AI lifecycle for Enterprise Hyper-Automation
Debmalya Biswas
 
Jak MŚP w Europie Środkowo-Wschodniej odnajdują się w świecie AI
dominikamizerska1
 
Q2 FY26 Tableau User Group Leader Quarterly Call
lward7
 
The Builder’s Playbook - 2025 State of AI Report.pdf
jeroen339954
 
Empower Inclusion Through Accessible Java Applications
Ana-Maria Mihalceanu
 
Transcript: New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
Complete JavaScript Notes: From Basics to Advanced Concepts.pdf
haydendavispro
 
Log-Based Anomaly Detection: Enhancing System Reliability with Machine Learning
Mohammed BEKKOUCHE
 
How Startups Are Growing Faster with App Developers in Australia.pdf
India App Developer
 
Bitcoin for Millennials podcast with Bram, Power Laws of Bitcoin
Stephen Perrenod
 
UiPath Academic Alliance Educator Panels: Session 2 - Business Analyst Content
DianaGray10
 
WooCommerce Workshop: Bring Your Laptop
Laura Hartwig
 
From Code to Challenge: Crafting Skill-Based Games That Engage and Reward
aiyshauae
 

Public integrity auditing for shared dynamic cloud data with group user revocation

  • 1. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: [email protected], Ph: 81432 71457 Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation Abstract: The advent of the cloud computing makes storage outsourcing become a rising trend, which promotes the secure remote data auditing a hot topic that appeared in the research literature. Recently some research consider the problem of secure and efficient public data integrity auditing for shared dynamic data. However, these schemes are still not secure against the collusion of cloud storage server and revoked group users during user revocation In practical cloud storage system. In this paper, we figure out the collusion attack in the exiting scheme and provide an efficient public integrity auditing scheme with secure group user revocation based on vector commitment and verifier-local revocation group signature. We design a concrete scheme based on the our scheme definition. Our scheme supports the public checking and efficient user revocation and also some nice properties, such as confidently, efficiency, count ability and traceability of secure group user revocation. Finally, the security and experimental analysis show that, compared with its relevant schemes our scheme is also secure and efficient. EXISTING SYSTEM: Considering data privacy, a traditional way to ensure it is to rely on the server to enforce the access control after authentication, which means any unexpected privilege escalation will expose all data. In a shared-tenancy cloud computing environment, things become even worse. Data from different clients can be hosted on separate virtual machines (VMs) but reside on a single physical machine. Data in a target VM could be stolen by instantiating another VM co-resident with the target one. Regarding availability of files, there are a series of cryptographic schemes
  • 2. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: [email protected], Ph: 81432 71457 which go as far as allowing a third-party auditor to check the availability of files on behalf of the data owner without leaking anything about the data, or without compromising the data owner’s anonymity. Likewise, cloud users probably will not hold the strong belief that the cloud server is doing a good job in terms of confidentiality. A cryptographic solution, with proven security relied on number-theoretic assumptions is more desirable, whenever the user is not perfectly happy with trusting the security of the VM or the honesty of the technical staff. These users are motivated to encrypt their data with their own keys before uploading them to the server. DISADVANTAGES OF EXISTING SYSTEM: Unexpected privilege escalation will expose all It is not efficient. Shared data will not be secure. Proposed System: providing the integrity and availability of remote cloud store, some solutions and their variants have been proposed. In these solutions, when a scheme supports data modification, we call it dynamic scheme, otherwise static one (or limited dynamic scheme, if a scheme could only efficiently support some specified operation, such as append). A scheme is publicly verifiable means that the data integrity check can be performed not only by data owners, but also by any third-party auditor. However, the dynamic schemes above focus on the cases where there is a data owner and only the data owner could modify the data. these software development environments, multiple users in a group need to share the source code, and they need to access, modify, compile and run the shared source code at any time and place. The new cooperation network model in cloud makes the remote data auditing schemes become infeasible, where only the data owner can update its data. Obviously, trivially extending
  • 3. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: [email protected], Ph: 81432 71457 a scheme with an online data owner to update the data for a group is inappropriate for the data owner. It will cause tremendous communication and computation overhead to data owner, which will result in the single point of data owner. ImplementationModules: 1. Data Group sharing, 2. Public integrity auditing 3. Revoked Group Users 4. Group signature 5. Cloud Storage Model 1. Data Group sharing, server can use this aggregate trapdoor and some public information to perform keyword search and return the result to Bob. Therefore, in KASE, the delegation of keyword search right can be achieved by sharing the single aggregate key. We note that the delegation of decryption rights can be achieved using the key- aggregate encryption approach recently proposed in [4], but it remains an open problem to delegate the keyword search rights together with the decryption rights, which is the subject topic of this paper. To summarize, the problem of constructing a KASE . 2. Public integrity auditing public integrity auditing for shared dynamicdata with group user revocation. Our contributionsare three folds:1) We explore on the secure and efficient shareddata integrate auditing for multi-user operation for ciphertext database.2) By incorporating the primitives of victor commitment, asymmetric group key agreement and group signature, we propose an efficient data auditing scheme while at the same time providing some new features, such as traceability and countability. 3) We provide the security and efficiency analysis of our scheme, and the analysis results show that our scheme is secure and efficient. 3. Cloud Storage Model
  • 4. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: [email protected], Ph: 81432 71457 Cloud storage is a model of data storage where the digital data is stored in logical pools, the physical storage spans multiple servers (and often locations), and the physical environment is typically owned and managed by a hosting company. These cloud storage providers are responsible for keeping the data available and accessible, and the physical environment protected and running. People and organizations buy or lease storage capacity from the providers to store user, organization, or application data.Cloud storage services may be accessed through a co-located cloud computer service, a web service application programming interface (API) or by applications that utilize the API, such as cloud desktop storage, a cloud storage gateway or Web-based content management systems. who are authorized to access and modify the data by the data owner. The cloud storage server is semi- trusted, who provides data storage services for the group users. TPA could be any entity in the cloud, which will be able to conduct the data integrity of the shared data stored in the cloud server. In our system, the data owner could encrypt and upload its data to the remote cloud storage server. Also, he/she shares the privilege such as access and modify (compile and execute if necessary) to a number of group users. 4.RevokedGroup Users The group signature will prevent the collusion of cloud and revoked group users, where the data owner will take part in the user revocation phase and the cloud could not revoke the data that last modified by the revoked user.An attacker out side the group (include the revoked group user cloud storage server) may obtain some knowledge of the plaintext of the data. Actually, this kind of attacker has to at lease break the security of the adopted group data encryption scheme. The cloud storage server colludes with the revoked group users, and they want to provide a illegal data without being detected. Actually, in cloud environment, we assume that the cloud storage server is semi-trusted. Thus, it is reasonable that a revoked user will collude with the cloud server and share its secret group key to the cloud storage server. In this case, although the server proxy group user revocation way [24] brings much communication and computation cost saving, it will make the scheme insecure against a malicious cloud storage server who can get the secret key of revoked users during the user revocation phase. Thus, a malicious cloud server will be able to make data m, last modified by a user that needed to be revoked, into a malicious data m′.
  • 5. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: [email protected], Ph: 81432 71457 In the user revocation process, the cloud could make the malicious data m′ become valid. To overcome the problems above, Group signature Group signature is introduced by Chaum and Heyst It provides anonymity for signers, where each group member has a private key that enables the user to sign messages. However,the resulting signature keeps the identity of the signer secret. Usually, there is a third party that can conduct the signature anonymity using a special trapdoor. Some systems support revocation where group membership can be disabled without affecting the signing ability of unrevoked users. Boneh and Shacham proposed an efficient group signature with verifier-local revocation. The scheme provides the properties of group signature such as selfless-anonymity and traceability. Also, the scheme is a short signature scheme where user revocation only requires sending revocation information to signature verifiers. Libert et al. proposed a new scalable revocation method for group signature based on the broadcast encryption framework. However,the scheme introduces important storage overhead at group user side. Later,Libert et al. designed a scheme to enhance the former scheme which could obtain private key of constant size. In their scheme,the unrevoked members still do not need to update their keys at each revocation. System Configuration: HARDWARE REQUIREMENTS: Hardware - Pentium Speed - 1.1 GHz RAM - 1GB Hard Disk - 20 GB Key Board - Standard Windows Keyboard
  • 6. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: [email protected], Ph: 81432 71457 Mouse - Two or Three Button Mouse Monitor - SVGA SOFTWARE REQUIREMENTS: Operating System : Windows Technology : Java and J2EE Web Technologies : Html, JavaScript, CSS IDE : My Eclipse Web Server : Tomcat Tool kit : Android Phone Database : My SQL Java Version : J2SDK1.5