You are on page 1of 3

ISSN 2394-3777 (Print)

ISSN 2394-3785 (Online)


Available online at www.ijartet.com

International Journal of Advanced Research Trends in Engineering and Technology (IJARTET)


Vol. 4, Issue 7, July 2017

Identity Based Data Outsourcing with


Comprehensive Auditing In Clouds
A.Arocika Alangara Jenitaa., M.Phil and R. Banumathib, M.Phil. , M.Tech. (CSE)
a
Research Scholar, Department of Computer Science, PRIST University, Thanjavur.
b
Research Supervisor, Department of Computer Science, PRIST University, Thanjavur.

Abstract: Cloud storage system provides facilitative le storage and sharing services for distributed clients. To address
integrity, controllable outsourcing and origin auditing concerns on outsourced les, we propose an identity-based data
outsourcing (IBDO).A thorough comparison of our scheme with several related schemes in terms of delegated data
outsourcing, certicate-freeness, data origin auditing, data consistence validation and public veriability. We also conduct
extensive experiments on our proposed IBDO scheme and make comparisons with Shacham and Waters (SW) PoR
scheme. Both theoretical analyses and experimental results conrm that the IBDO proposal provides resilient security
properties without incurring any signicant performance penalties.
Keywords: Bluetooth, Tracking, Humanmachine interface, Wi-Fi.
individual registering gadgets, they are still before the
I. INTRODUCTION extensive variety of both inside and outside dangers for
Cloud computing has been imagined as the information respectability.
following creation data innovation (IT) design for
undertakings, because of its extensive rundown of II. CLOUD OVERVIEW
unparalleled preferences in the IT history: on-request self- Cloud Computing is a general term used to
benefit, omnipresent system get to, area self-deciding asset describe a new class of network based computing that takes
pooling, fast asset versatility, utilization based estimating place over the Internet, Cloud computing means that instead
and transference of hazard. of all the computer hardware and software you're using
As a disturbing innovation with significant sitting on your desktop, or somewhere inside your
ramifications, cloud computing is changing the very way of company's network, it's provided for you as a service by
how organizations utilize data innovation. One essential part another company and accessed over the Internet, usually in a
of this outlook changing is that information are being completely seamless way. Exactly where the hardware and
brought together or outsourced to the cloud. From clients' software is located and how it all works doesn't matter to
view, including together people and IT endeavors, putting you, the userit's just somewhere up in the nebulous
away information remotely to the cloud in an adaptable on- "cloud" that the Internet represents. Cloud computing is a
request technique bring appealing advantages: arrival of the buzzword that means different things to different people. For
weight for storage room administration, boundless some, it's just another way of describing IT (information
information access with place autonomy, and evasion of technology) "outsourcing"; others use it to mean any
assets expenses on equipment, programming, and staff computing service provided over the Internet or a similar
systems of support, and so on network; and some define it as any bought-in computer
While cloud computing make these remuneration service you use that sits outside your firewall. However we
more engaging than any other time in recent memory, it define cloud computing, there's no doubt it makes most
additionally conveys new and testing security dangers to sense when we stop talking about abstract definitions and
clients' outsourced information. As cloud administration look at some simple, real examplesso let's do just that.
suppliers (CSP) are part regulatory elements, information 2.1 Types of Cloud Computing:
outsourcing is really surrendering client's last control more IT people talk about three different kinds of cloud
than the destiny of their information. As a matter of first computing, where different services are being provided for
importance, despite the fact that the frameworks beneath the you. Note that there's a certain amount of vagueness about
cloud are significantly more effective and dependable than

All Rights Reserved 2017 IJARTET 11


ISSN 2394-3777 (Print)
ISSN 2394-3785 (Online)
Available online at www.ijartet.com

International Journal of Advanced Research Trends in Engineering and Technology (IJARTET)


Vol. 4, Issue 7, July 2017

how these things are defined and some overlap between Internet. When the client is an individual manager, some
them. practical problems will happen. Recently, regenerating codes
Infrastructure as a Service (IaaS) means you're have gained popularity due to their lower repair bandwidth
buying access to raw computing hardware over the Net, such while providing fault tolerance. The manager will be
as servers or storage. Since you buy what you need and pay- restricted to access the network in order to guard against
as-you-go, this is often referred to as utility computing. collusion. Here third party public auditing scheme for the
Ordinary web hosting is a simple example of IaaS: you pay a regenerating-code-based cloud storage. To solve the
monthly subscription or a per-megabyte/gigabyte fee to have regeneration problem of failed authenticators in the absence
a hosting company serves up files for your website from of data owners, if these data cannot be processed just in
their servers. time, the manager will face the loss of economic interest. In
Software as a Service (SaaS) means you use a order to prevent the case happening, the manager has to
complete application running on someone else's system. delegate the proxy to process its data. In PKI (public key
Web-based email and Google Documents are perhaps the infrastructure), remote data integrity checking protocol will
best-known examples. Zoho is another well-known SaaS perform the certificate management. When the manager
provider offering a variety of office applications online. delegates some entities to perform the remote data integrity
Platform as a Service (PaaS) means you develop checking, it will incur considerable overheads since the
applications using Web-based tools so they run on systems verifier will check the certificate when it checks the remote
software and hardware provided by another company. So, data integrity.
for example, you might develop your own ecommerce
website but have the whole thing, including the shopping 3.1.1 Disadvantage of Existing System:
cart, checkout, and payment mechanism running on a Data security protection cannot be directly users
merchant's server. Force.com (from salesforce.com) and the control.
Google App Engine are examples of PaaS.
Software as a Service (SaaS) Therefore, verification of correct data storage in the
Platform as a service(PaaS) cloud must be conducted without explicit
Infrastructure as a service (IaaS) knowledge of the whole data.

2.2 The purpose and benefits Considering various kinds of data for each user
Cloud computing enables companies and stored in the cloud and the demand of long term
applications, which are system infrastructure continuous assurance of their data safety,
dependent, to be infrastructure-less.
By using the Cloud infrastructure on pay as used This is not just a third party data warehouse.
and on demand, all of us can save in capital and
IV. SYSTEM ARCHITECTURE
operational investment!
Clients can:
o Put their data on the platform instead of on
their own desktop PCs and/or on their own
servers.
o They can put their applications on the
cloud and use the servers within the cloud
to do processing and data manipulations
etc.

III. SYSTEM COMPONENTS 4.1 Proposed System


An efficient cloud scheme with data in the cloud is been
3.1 Existing System made. Here we are using the erasure code technique for
In public cloud environment, most clients upload their distribute the data to cloud locations and access the data from
data to PCS and check their remote datas integrity by cloud. User can register and login into their account.

All Rights Reserved 2017 IJARTET 12


ISSN 2394-3777 (Print)
ISSN 2394-3785 (Online)
Available online at www.ijartet.com

International Journal of Advanced Research Trends in Engineering and Technology (IJARTET)


Vol. 4, Issue 7, July 2017

Provided a option to store, share and access the data from REFERENCES
cloud storage. Here we are using the double ensured scheme [1]. Z. Fu, X. Sun, Q. Liu, L. Zhou, J. Shu, Achieving efficient cloud
for storing data into the cloud. First is your data or file splited search services: multi keyword ranked search over encrypted cloud
into multiple parts and it will store into different cloud server data supporting parallel computing, IEICE Transactions on
locations? Each and every file generates the key-code for Communications, vol. E98-B, no. 1, pp.190-200, 2015.
auditing. Then second is each and every splited file will [2]. Y. Ren, J. Shen, J. Wang, J. Han, S. Lee, Mutual verifiable provable
encrypt before store into different locations. The shared users data auditing in public cloud storage, Journal of Internet
can edit the file in the cloud with file owners permission. Technology, vol. 16, no. 2, pp. 317-323, 2015.
That file eligible of own public auditing. Search and [3]. C. Wang, Q. Wang, K. Ren, W. Lou, Privacy-preserving public
download the files, at the time of download user should use auditing for data storage security in cloud computing, INFOCOM
2010, pp. 1-9, 2010.
the security key. As a authentication success it will be
decrypt and combine to get the original data from cloud. [4]. H. Guo, Z. Zhang, J. Zhang, Proxy re-encryption with unforgeable
Moreover, we design a novel public verifiable authenticator, reencryptionKeys, Cryptology and Network Security, LNCS 8813,
pp. 20-33, 2014.
which is generated by a couple of keys and can be
regenerated using partial keys. Thus, our scheme can [5]. G. Ateniese, R. DiPietro, L. V. Mancini, G. Tsudik, Scalable and
completely release data owners from online burden. efficient provable data possession, SecureComm 2008, 2008.
[6]. Lynn B., On the implementation of pairing-based cryptosystems,
4.2 Advantages of Proposed System: Ph.D. dissertation, http://crypto.stanford.edu/pbc/thesis.pdf, Stanford
Compared to a lot of its predecessors, which only University,2008.
provide binary results about the storage state across the
[7]. Q. Wang, C. Wang, K. Ren, W. Lou, J. Li, Enabling public
cloud servers, the challenge-response protocol in our auditability and data dynamics for storage security in cloud
work more provides the localization of data error. computing, IEEE Transactions on Parallel And Distributed Systems ,
Unlike most prior works used for ensuring remote data vol. 22, no. 5, pp. 847-859, 2011.
integrity, the new scheme supports secure and efficient
dynamic operations on data blocks, including: update,
delete and append.
Extensive protection and act analysis demonstrate that
the proposed scheme is extremely efficient and resilient
beside Byzantine failure, malicious data modification
attack, and even server colluding attacks.

V. CONCLUSIONS
A privacy-preserving public auditing system for
data storage security in cloud computing. We utilize the
homomorphism linear authenticator and random masking to
guarantee that the TPA would not learn any knowledge
about the data content stored on the cloud server during the
efficient auditing process, which not only eliminates the
burden of cloud user from the tedious and possibly
expensive auditing task, but also alleviates the users fear of
their outsourced data leakage. Considering TPA may
concurrently handle multiple audit sessions from different
users for their outsourced data files, we further extend our
privacy-preserving public auditing protocol into a multiuser
setting, where the TPA can perform multiple auditing tasks
in a batch manner for better efficiency.

All Rights Reserved 2017 IJARTET 13

You might also like