CFP last date
21 October 2024
Reseach Article

Preserving Privacy using Third Party Auditor in Cloud for Data Storage

Published on December 2015 by Yogesh Shinde, Ramesh M. Kagalkar
National Conference on Advances in Computing
Foundation of Computer Science USA
NCAC2015 - Number 1
December 2015
Authors: Yogesh Shinde, Ramesh M. Kagalkar
783b8111-4552-4600-88b7-90b74c4819da

Yogesh Shinde, Ramesh M. Kagalkar . Preserving Privacy using Third Party Auditor in Cloud for Data Storage. National Conference on Advances in Computing. NCAC2015, 1 (December 2015), 1-6.

@article{
author = { Yogesh Shinde, Ramesh M. Kagalkar },
title = { Preserving Privacy using Third Party Auditor in Cloud for Data Storage },
journal = { National Conference on Advances in Computing },
issue_date = { December 2015 },
volume = { NCAC2015 },
number = { 1 },
month = { December },
year = { 2015 },
issn = 0975-8887,
pages = { 1-6 },
numpages = 6,
url = { /proceedings/ncac2015/number1/23353-5010/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Advances in Computing
%A Yogesh Shinde
%A Ramesh M. Kagalkar
%T Preserving Privacy using Third Party Auditor in Cloud for Data Storage
%J National Conference on Advances in Computing
%@ 0975-8887
%V NCAC2015
%N 1
%P 1-6
%D 2015
%I International Journal of Computer Applications
Abstract

Cloud computing is a internet based thing or next generation in information technology. Users store their large amount of data on a cloud server at the remote place without worrying about storage correctness and integrity of data. Security is viewed as one of the top positioned open issues in cloud computing. In most of the before proposed schemes, RSA algorithm was used for storage security. AES being faster in encryption and decryption as compared to RSA. The proposed system makes use of AES algorithm to maintain data integrity at the untrusted server. The client can alternative to a Third Party Auditor (TPA) to check the integrity of outsourced data and be worry free because user does not physical present at all time. The proposed storage security scheme also assures recovery of data files, in case of data loss or corruption. To recover of that block or file to maintain data availability in the cloud server. It supports data dynamics where the user can perform different operations on files such as insert, delete and update as well as batch auditing, where multiple cloud client requests for storage correctness will be handled simultaneously which decrease communication and also computing cost. To expand the user level safety, proposed procedure supplied a click on point based graphical password scheme and One Time Password (OTP) on the time of uploading the file.

References
  1. Cong Wang ,Sherman S. M. Chow ,Qian Wang ,KuiRen and Wenjing Lou ,"Privacy- Preserving Public Auditing for Secure Cloud Storage",IEEE Transactions on Computers,Vol. 62, No. 2, Feb. 2013.
  2. C. Wang, Q. Wang, K. Ren, and W. Lou, "Privacy Preserving Public Auditing for Storage Security in Cloud Computing", Proc. IEEE INFOCOM 10, Mar. 2010.
  3. H. Takabi, J. B. D. Joshi, and G. Ahn, "Security and Privacy Challenges in Cloud Computing Environments",Article in IEEE Security and Privacy, Vol. 8, No. 6, Nov-Dec. 2010.
  4. Y. Deswarte, J. -J. Quisquater, and A. Saidane ,"Remote integrity checking ", In Proc. Of Conference on Integrity and Internal Control in Information Systems (IICIS),Vol. 3 , Nov. 2003.
  5. Betzy K. Thomas, M. NewlinRajkumar,"A Dynamic Public Auditing Security Scheme To Preserve Privacy In Cloud Storage",International Journal of Software and Hardware Research in Engineering,Vol. 2,Issue 1,Jan. 2014.
  6. Giuseppe Ateniese, Roberto Di Pietro, Luigi V. Mancini, and Gene Tsudik. , "Scalable and Efficient Provable Data Possession",Proc. SecureComm 08, Sept. 2008. pp. 24-31.
  7. YogeshShinde ,OmprakashTembhurne ,"A Review of Protect The Integrity of Outsourced Data using Third Party Auditing for Secure Cloud Storage ", International Journal of Science and Research (IJSR),ISSN(Online):2319-7064,Vol-3, Issue 10 , Oct. 2014.
  8. YogeshShinde ,AlkaVishwa,"Privacy Preserving using Data Partitioning Technique for Secure Cloud Storage",International Journal of Computer Applications (0975 8887), Vol. 116 ,No. 16, Apr. 2015.
  9. YogeshShinde , AlkaVishwa,"Public Auditing Security Scheme To Preserving Privacy For Secure Cloud Storage", Fourth Post Graduate Conference for Computer Engineering students (cPGCON) , Mar. 2015.
  10. FarnazTowhidi, Maslin Masrom ,"A Survey on Recognition-Based Graphical User Authentication Algorithms ",International Journal of Computer Science and Information Security,Vol. 6, No. 2, Nov. 2009.
  11. T. Schwarz and E. L. Miller, "Store, forget, and check: Using algebraic signatures to check remotely administered storage,In Proceedings of ICDCS . IEEE Computer Society, 2006.
  12. G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, "Provable Data Possession at Untrusted Stores",Proc. 14th ACM Conf. Computer and Communication Security(CCS 07), PP. 598-609, 2007.
  13. A. Juels and J. Burton, S. Kaliski, "PORs: Proofs of Retrievability for Large Files",Proc. ACM Conf. Computer and Comm. Security(CCS 07), pp. 584-597, Oct. 2007.
  14. Cong Wang,QianWang,KuiRen, Ning Cao , and Wenjing Lou "Toward Secure and Dependable Storage Services in Cloud Computing",IEEE Transaction On Service Computing,Vol. 5,No. 2,Apr-Jun. 2012.
  15. Huaqun Wang, "Proxy Provable Data Possession in Public Clouds ",IEEE Transactions On Services Computing, Vol. 6,ISSN: 1939-1374 , No. 4, Oct-Dec 2013.
  16. Poonam M. Pardeshi, Prof. Bharat Tidke,"Improving Data Integrity for Data Storage Security in Cloud Computing",International Journal of Computer Science and Information Technologies, Vol. 5, May 2014.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Storage Data Availability Data Auditing Graphical Password Privacy And Security.