SlideShare a Scribd company logo
1 of 8
Download to read offline
International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 6, December 2017
DOI:10.5121/ijcsit.2017.9606 59
DISTRIBUTED SCHEME TO AUTHENTICATE DATA
STORAGE SECURITY IN CLOUD COMPUTING
B. Rakesh1
, K. Lalitha1
, M. Ismail1
and H. Parveen Sultana2
1
Assistant Professor, Department of CSSE, SVEC (Autonomous)
2
Associate Professor, SCOPE, VIT University, Vellore, India
ABSTRACT
Cloud Computing is the revolution in current generation IT enterprise. Cloud computing displaces
database and application software to the large data centres, where the management of services and data
may not be predictable, where as the conventional solutions, for IT services are under proper logical,
physical and personal controls. This aspect attribute, however comprises different security challenges
which have not been well understood. It concentrates on cloud data storage security which has always been
an important aspect of quality of service (QOS). In this paper, we designed and simulated an adaptable and
efficient scheme to guarantee the correctness of user data stored in the cloud and also with some prominent
features. Homomorphic token is used for distributed verification of erasure – coded data. By using this
scheme, we can identify misbehaving servers. In spite of past works, our scheme supports effective and
secure dynamic operations on data blocks such as data insertion, deletion and modification. In contrast to
traditional solutions, where the IT services are under proper physical, logical and personnel controls,
cloud computing moves the application software and databases to the large data centres, where the data
management and services may not be absolutely truthful. This effective security and performance analysis
describes that the proposed scheme is extremely flexible against malicious data modification, convoluted
failures and server clouding attacks.
KEYWORDS
Cloud Computing, Cloud Storage Security, Homomorphic token, EC2, S3
1.INTRODUCTION
The Cloud Computing provides the service over the internet by using the computing resources i.e.
hardware and software. By using software as a service, users can access software and database in
the business model. The management of infrastructure and platform is done by using Cloud
providers. Sometimes, software as a service is referred to as on-demand software. Because of
that Cloud providers charged on pay per use basis. So this causes proponents to get the
computing resources in Outsourcing manner. That’s why the maintenance of hardware and
software is being reduced for users. Introducing of Cloud Computing avoids direct management
of hardware and it causes great convenience to users. Amazon Elastic Compute Cloud (EC2)
and Amazon Simple Storage Service (S3) are the best examples for initiators of Cloud
Computing. In the Cloud Computing the responsibility of local machines is eliminating due to
computing platform shift. Here in the Cloud Computing, the data is integrated so that’s why the
users are showing kindliness towards the cloud service providers.
Providing security to the data is a very important factor which has always been an important
factor of quality of service. Cloud Computing is exhibiting new challenges due to many reasons.
In Cloud Computing the very important thing is that data should be under the control of user. But
by using the traditional cryptographic techniques the users lose the control of data. So traditional
International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 6, December 2017
60
Cryptographic primitives cannot be adopted directly. If we use the traditional Cryptographic
primitives directly, we will have conduct the verification for correctness of data stored in the
cloud without having the proper knowledge about the whole data. It is even more challenging
that to provide the continuous assurance of the data safety, if we store different categories of data
stored by different users.
The users are updating the data continuously stored in the cloud. The updation of the data
includes insertion, deletion, modification, appending, reordering etc. During the dynamic data
updation it is very important task that to assure the storage correctness of data. Techniques which
are used can be useful to give assurance to storage correctness without possessing data of user,
where it cannot addresses all the security threat of data storage in cloud, since they all
concentrating on single server situation and a large portion of them don't consider dynamic
operations on data. As a balancing approach, researchers have also proposed protocols which are
distributed for ensuring storage correctness data throughout multiple servers or peers. Again, in
these no distributed schemes is conscious about operations on dynamic data. As a result, their
applicability on cloud data storage can be considerably limited.
In this paper, we present a viable and flexible distributed scheme with dynamic data support
explicitly to verify the user’s data correctness in the cloud. We rely on erasure correcting code in
the file distribution preparation to provide redundancies and guarantee the data dependability.
This development radically diminishes the communication and storage overhead when contrasted
with the conventional techniques of replication-based file distribution. Utilization of
homomorphic token with distributed verification of erasure-coded data, this scheme achieves the
storage correctness insurance as well as data error localization: whenever data corruption has
been identified during the verification of storage correctness, this scheme can localize the data
errors concurrently, i.e., the identification of the misbehaving server(s).
• Compared to many of its predecessors, which only provide binary results about the
storage state across the distributed servers, the challenge-response protocol in our work
further provides the localization of data error.
• Dislike past works for guaranteeing data integrity remotely, on data blocks the new
scheme supports efficient and secure dynamic operations, which includes update, delete
and append.
• The highly efficient security and performance analysis shows that the proposed scheme is
extremely efficient and rigid against Byzantine failure, server colluding attack, , and even
malicious data modification attacks.
1.1 Cloud Data Storage Architecture
The network architecture for cloud data storage is as represented in the figure1. The architecture
is consisting of three different network modules as represented below:
Users: There are different categories of users. The users consisting of both organizations and
individual users. The users are having the data to store in the cloud. The users must have the trust
on the cloud computation.
Cloud Service Provider (CSP) : A cloud service provider has the knowledge and important
resources in building and managing distributed cloud storage servers. A cloud service provider
poses and operates live Cloud Computing systems.
Third Party Auditor (TPA): An optional TPA, who has expertise and capabilities that users may
not have, ills trusted to assess and expose risk of cloud storage services on behalf of the users
International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 6, December 2017
61
upon request. In cloud data storage, a user stores his data through a CSP into a set of cloud
servers, which are running in a simultaneous, cooperated and distributed manner. Redundancy of
data redundancy can be engaged with technique of erasure-correcting code to tolerate server crash
or faults as data of the user grows in importance and also size.
After that for the purpose of application, the user interacts with the cloud servers via Cloud
Service Provider (CSP) to retrieve or access his data. In some cases, block level operations has
been performed by user on his data.
Fig 1: Cloud Data Storage Architecture
Most general styles are block insert, delete, update and append are different operations. As
users now not possess their knowledge for data locality, it’s of critical importance to guarantee
users that their data are being properly stored and maintained. That is, users ought to be equipped
with security means that in order that they'll build continuous correctness assurance of their data
stored in cloud even without existence of copy of data locally.
Fig 2: Cloud Server Data Security Architecture
In case if the users don’t necessarily have the time, possibility of resources to check their data,
they can hand over the tasks to an optional trusted Third Party Auditor (TPA) of their relevant
choices. In this model, we presume that the point-to-point communication channels between each
user and the cloud server is authenticated and trustworthy, which can be achieved in practice with
little overhead. Note that we don’t address this type of data privacy issue here, as in Cloud
Computing, data privacy is orthogonal to the problem what we study here
International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 6, December 2017
62
2. KEY GENERATION ALGORITHM
2.1. Key generation (µ)
Step 1. Start
2. Obtain parameters (g,h,p).
3. G1 can be generated by g and h.
4. G2 can be generated by prime number p.
5. Set µ=(g,h,ẽ,G1,G2,p,f)
6. f:Zp*{0,1} Zp*Is a one-way hash function
7. User A selects three parameters a1;a2; a3 Zp
*
8. PKA=( ),ska=(a1,a2,a3).
9. Stop.
2.2. Share Key Generation Algorithm
Saharekeygen(SKA,t,m)
Step 1. Start
2. Select m key servers
3. Share secret key SKA to key server ksi
4. SKA,i=(fA,1(i),fA,2(i)) where 1≤i ≤m.
5. Stop.
2.3. Encryption Algorithm
Encryption(PKA,T,m1,m2,…..mk)
Step 1: Start
2. Divide message in to m1,m2,…..mk
3. Calculate cipher text c1,c2,…..ck by using
)
4. Stop.
2.4. Key Recovery Algorithm
Key Recover(SKA,i1 , SKA,i2 , SKA,i3 , SKA,i4…………… , SKA,in )
Step 1. Start
2. User searches for first component a1.
3. if (a1 found)
No need of key recovery.
4. if (a1 not found)
Recovered by using
5. Stop
International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 6, December 2017
63
2.5. Re Key Generation Algorithm
ReKeyGen(PKA,SKA,ID,PKB)
Step 1. Start
2. Encrypt the data by using SKA.
3. Select a random number e from Zp*.
4.Compute rekey for proxy reencryption by using
5. Stop.
2.6. Proxy Re-Encryption Algorithm
ProxyReEncryption()
Step 1. Start
2. Calculate RK,C’.
3. ReEncrypted symbol can be computed as
4. Stop
3. IMPLEMENTATION
3.1Client Module
In this client module, the server receives query from the client. Based on the query sent by user to
the server it sends the corresponding file to the client. Before doing this process, the client should
authorize. At the server side; it verifies the client name and its password for security process. If it
is verified successfully and received the queries form the client and search those corresponding
files in the database. Finally, it finds that files and sends to the client. If the server finds the
intruder means, it set the alternative Path to those intruders.
3.2. System Module
Representative network architecture for cloud data storage is illustrated in Figure 1. There are 3
network entities which can be identified as below.
3.2.1. User
Users, who have data to be stored in the cloud and rely on the cloud for data computation, consist
of both individual consumers and organizations.
3.2.2. Cloud Service Provider (CSP)
A Cloud Service Provider, who has considerable resources and expertise in managing and
building distributed servers of cloud storage, owns an operative live Computing systems of cloud.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 6, December 2017
64
3.2.3. Third Party Auditor (TPA)
An optional TPA, who has expertise and capabilities that users may not have, is trusted to assess
and expose risk of cloud storage services on behalf of the users up on request.
3.3. Cloud data storage Module
This is where an user stores his data by using CSP into a group of cloud servers, which are
running concurrently, then the user interacts with the cloud servers via CSP to retrieve or access
his data. In some cases, the user may need to perform block level operations on his own data. So,
users ought to be equipped with security means that in order to build continuous correctness
verification of their data stored in cloud even without existence of copy of data locally. If in case
the use don’t have time and feasibility of resources to monitor their data, they can hand over the
tasks to optional trusted Third Party Auditor(TPA) of their respective choices.
In this model, we presume that the point-to-point communication channels between user and the
cloud server, if user is authenticated and reliable, which can be achieved with little overhead in
practice
3.4. Cloud Authentication Server
The Authentication Server (AS) which functions as any Authentication Server would with a few
more behaviours added to the typical protocol which named as client-authentication protocol.
First, sending information of the client authentication to the masquerading router. The
Authentication Server also functions as authorizing permission control and tickets on the
application network. There is one more optional function that should be supported by the AS is
the updating of client lists, causing a reduction in authentication time or even the removal of the
client as a valid client depending upon the request.
3.5. Unauthorized data modification and corruption module
One of the important issue is to detect any unauthorized modification of data and corruption
effectively, possibly due to server conciliation and/or random Byzantine failures. Also, in the
distributed case when that type of inconsistencies are successfully detected, to find the data error
lies in which server is also of great significance.
3.6. Adversary Module
Threats for Security faced by data storage in cloud can come from two different resources. First, a
CSP can be self-interested, and not trusted and possibly malicious. Its desire is to not only move
data which is not been or is rarely used to a lower tier of storage than accepted for monitoring
reasons, but there is one more chance also attempt to hide a data loss incident which is caused due
to Byzantine failures or management errors and so on.
Second, there may be a chance for existence of adversary who is an economically motivated, it
has capability to compromise a number of cloud data storage servers subsequently in different
time intervals and it is able to modify or delete user’s data for certain period while remaining
undetected by CSPs. Consider two diiferent types of adversary models with different capability
levels.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 6, December 2017
65
3.6.1. Weak Adversary
This adversary is interested in mortifying the data files of user stored on individual servers. If one
server is comprised, this adversary can corrupt the original data files by introducing or modifying
by its own deceptive data to avoid the original data which is retrieved by user.
3.6.2. Strong Adversary
This adversary is the worst case scenario, where we expect that the adversary can compromise all
the other servers which are used for storage so that he/she can intentionally change the data files
as long as they are internally reliable. In fact, this is equivalent to the situation where all the
servers are colluding together to conceal a data loss or corruption occurrence.
4. CONCLUSION AND FUTURE WORK
Here in this paper, we examine data security problem of data storage in cloud, which is essentially
in a distributed storage system. To verify the correctness of users’ data of data storage in cloud,
here we proposed an effective and supple distributed scheme with dynamic data support
explicitly, including block update, append, and delete. Here we depend on erasure-correcting code
for the preparation of distribution of file to provide parity vector of redundancy and guarantees
the dependability of data. By using the homomorphic token of erasure coded data with distributed
verification, our system achieves that integration of storage correctness assurance and localization
of data errors, that is whenever data corruption has been detected during the correctness
verification of data storage in the cloud across the distributed servers. Now, we can almost
guarantee that the concurrent identification of the misbehaving servers. Through this detailed
performance and security analysis, we proved that our scheme is highly resilient and efficient to
malicious data modification attack, Byzantine Failures and server colluding attacks.
We believes that storage security for data in Cloud Computing is an area with full of challenges
and have vital importance, is still in its immaturity now, and there are many research problems are
yet to be identified in this area. We imagine many possible directions for future research in this
area. The most hopeful one we believe that is a model in which public verifiability is compulsory.
Public verifiability, supported in allows the Third Party Auditor (TPA) to audit the data storage in
cloud without demanding users’ time, resources or feasibility. An interesting question here is if
we can build a scheme to achieve both storage correctness assurance and public verifiability of
dynamic data. Besides, with this research on dynamic data storage in cloud, we also plan to
examine the problem of fine-grained error localization of data.
REFERENCES
[1] Cong Wang, Qian Wang, and Kui Ren, ”Ensuring Data Storage Security in Cloud Computing ” in
Proc. of IWQoS’09, July 2009, pp. 1–9
[2] G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, “Scalable and Efficient Provable Data
Possession,” Proc. of SecureComm ’08, pp. 1–10, 2008.
[3] Amazon.com, “Amazon Web Services (AWS),” Online at http://aws.amazon.com, 2008.
[4] A. Juels and J. Burton S. Kaliski, “PORs: Proofs of Retrievability for Large Files,” Proc. of CCS ’07,
pp. 584–597, 2007.
[5] H. Shacham and B. Waters, “Compact Proofs of Retrievability,” Proc. of Asiacrypt ’08, Dec. 2008.
[6] K. D. Bowers, A. Juels, and A. Oprea, “Proofs of Retrievability: Theory and Implementation,”
Cryptology ePrint Archive, Report 2008/175, 2008, http://eprint.iacr.org/.
[7] K. D. Bowers, A. Juels, and A. Oprea, “HAIL: A High-Availability and Integrity Layer for Cloud
Storage,” Cryptology ePrint Archive, Report 2008/489, 2008, http://eprint.iacr.org/.
[8] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable Data
Possession at Untrusted Stores,” Proc. Of CCS ’07, pp. 598–609, 2007.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 6, December 2017
66
[9] R. Curtmola, O. Khan, R. Burns, and G. Ateniese, “MR-PDP: Multiple- Replica Provable Data
Possession,” Proc. of ICDCS ’08, pp. 411–420, 2008.
[10] M. Lillibridge, S. Elnikety, A. Birrell, M. Burrows, and M. Isard, “A Cooperative Internet Backup
Scheme,” Proc. of the 2003 USENIX Annual Technical Conference (General Track), pp. 29–41,
2003.
[11] D. L. G. Filho and P. S. L. M. Barreto, “Demonstrating Data Possession and Uncheatable Data
Transfer,” Cryptology ePrint Archive, Report 2006/150, 2006, http://eprint.iacr.org/.
[12] M. A. Shah, M. Baker, J. C. Mogul, and R. Swaminathan, “Auditing to Keep Online Storage
Services Honest,” Proc. 11th USENIX Workshop on Hot Topics in Operating Systems (HOTOS
’07), pp. 1–6, 2007.
[13] T. S. J. Schwarz and E. L. Miller, “Store, Forget, and Check: Using Algebraic Signatures to Check
Remotely Administered Storage,” Proc. of ICDCS ’06, pp. 12–12, 2006.
[14] N. Gohring, “Amazon’s S3 down for several hours,” Online at
http://www.pcworld.com/businesscenter/article/142549/amazons s3 down for several hours.html,
2008.
[15] K. D. Bowers, A. Juels, and A. Oprea, “HAIL: A High-Availability and Integrity Layer for Cloud
Storage,” Cryptology ePrint Archive, Report 2008/489, 2008, http://eprint.iacr.org/.
[16] L. Carter and M. Wegman, “Universal Hash Functions,” Journal of Computer and System Sciences,
vol. 18, no. 2, pp. 143–154, 1979.
[17] J. Hendricks, G. Ganger, and M. Reiter, “Verifying Distributed Erasurecoded Data,” Proc. 26th
ACM Symposium on Principles of Distributed Computing, pp. 139–146, 2007.
[18] J. S. Plank and Y. Ding, “Note: Correction to the 1997 Tutorial on Reed-Solomon Coding,”
University of Tennessee, Tech. Rep. CS-03- 504, 2003.
[19] Q. Wang, K. Ren, W. Lou, and Y. Zhang, “Dependable and Secure Sensor Data Storage with
Dynamic Integrity Assurance,” Proc. of IEEE INFOCOM, 2009.
[20] R. Curtmola, O. Khan, R. Burns, and G. Ateniese, “MR-PDP: Multiple- Replica Provable Data
Possession,” Proc. of ICDCS ’08, pp. 411–420,2008.
[21] D. L. G. Filho and P. S. L. M. Barreto, “Demonstrating Data Possession and Uncheatable Data
Transfer,” Cryptology ePrint Archive, Report 2006/150, 2006, http://eprint.iacr.org/.

More Related Content

What's hot

Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...IOSR Journals
 
Guaranteed Availability of Cloud Data with Efficient Cost
Guaranteed Availability of Cloud Data with Efficient CostGuaranteed Availability of Cloud Data with Efficient Cost
Guaranteed Availability of Cloud Data with Efficient CostIRJET Journal
 
IRJET- Securely Performing Operations on Images using PSNR
IRJET-  	  Securely Performing Operations on Images using PSNRIRJET-  	  Securely Performing Operations on Images using PSNR
IRJET- Securely Performing Operations on Images using PSNRIRJET Journal
 
Ijarcet vol-2-issue-3-951-956
Ijarcet vol-2-issue-3-951-956Ijarcet vol-2-issue-3-951-956
Ijarcet vol-2-issue-3-951-956Editor IJARCET
 
Drops division and replication of data in cloud for optimal performance and s...
Drops division and replication of data in cloud for optimal performance and s...Drops division and replication of data in cloud for optimal performance and s...
Drops division and replication of data in cloud for optimal performance and s...Pvrtechnologies Nellore
 
A Novel privacy preserving public auditing for shared data in cloud
A Novel privacy preserving public auditing for shared data in cloudA Novel privacy preserving public auditing for shared data in cloud
A Novel privacy preserving public auditing for shared data in cloudJAVVAJI VENKATA RAO
 
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudeSAT Journals
 
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudeSAT Publishing House
 
Excellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingExcellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingEditor IJMTER
 
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...ijiert bestjournal
 
DATA PROVENENCE IN PUBLIC CLOUD
DATA PROVENENCE IN PUBLIC CLOUDDATA PROVENENCE IN PUBLIC CLOUD
DATA PROVENENCE IN PUBLIC CLOUDijsrd.com
 
Data Partitioning Technique In Cloud: A Survey On Limitation And Benefits
Data Partitioning Technique In Cloud: A Survey On Limitation And BenefitsData Partitioning Technique In Cloud: A Survey On Limitation And Benefits
Data Partitioning Technique In Cloud: A Survey On Limitation And BenefitsIJERA Editor
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Survey on Division and Replication of Data in Cloud for Optimal Performance a...
Survey on Division and Replication of Data in Cloud for Optimal Performance a...Survey on Division and Replication of Data in Cloud for Optimal Performance a...
Survey on Division and Replication of Data in Cloud for Optimal Performance a...IJSRD
 

What's hot (17)

Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
 
Guaranteed Availability of Cloud Data with Efficient Cost
Guaranteed Availability of Cloud Data with Efficient CostGuaranteed Availability of Cloud Data with Efficient Cost
Guaranteed Availability of Cloud Data with Efficient Cost
 
Br36413417
Br36413417Br36413417
Br36413417
 
IRJET- Securely Performing Operations on Images using PSNR
IRJET-  	  Securely Performing Operations on Images using PSNRIRJET-  	  Securely Performing Operations on Images using PSNR
IRJET- Securely Performing Operations on Images using PSNR
 
Ijarcet vol-2-issue-3-951-956
Ijarcet vol-2-issue-3-951-956Ijarcet vol-2-issue-3-951-956
Ijarcet vol-2-issue-3-951-956
 
Drops division and replication of data in cloud for optimal performance and s...
Drops division and replication of data in cloud for optimal performance and s...Drops division and replication of data in cloud for optimal performance and s...
Drops division and replication of data in cloud for optimal performance and s...
 
V04405122126
V04405122126V04405122126
V04405122126
 
A Novel privacy preserving public auditing for shared data in cloud
A Novel privacy preserving public auditing for shared data in cloudA Novel privacy preserving public auditing for shared data in cloud
A Novel privacy preserving public auditing for shared data in cloud
 
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloud
 
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloud
 
Excellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingExcellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computing
 
Iw qo s09 (1)
Iw qo s09 (1)Iw qo s09 (1)
Iw qo s09 (1)
 
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
 
DATA PROVENENCE IN PUBLIC CLOUD
DATA PROVENENCE IN PUBLIC CLOUDDATA PROVENENCE IN PUBLIC CLOUD
DATA PROVENENCE IN PUBLIC CLOUD
 
Data Partitioning Technique In Cloud: A Survey On Limitation And Benefits
Data Partitioning Technique In Cloud: A Survey On Limitation And BenefitsData Partitioning Technique In Cloud: A Survey On Limitation And Benefits
Data Partitioning Technique In Cloud: A Survey On Limitation And Benefits
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Survey on Division and Replication of Data in Cloud for Optimal Performance a...
Survey on Division and Replication of Data in Cloud for Optimal Performance a...Survey on Division and Replication of Data in Cloud for Optimal Performance a...
Survey on Division and Replication of Data in Cloud for Optimal Performance a...
 

Similar to DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING

Dynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudDynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudAM Publications
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Editor IJMTER
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageBio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageIJERA Editor
 
Crypto multi tenant an environment of secure computing using cloud sql
Crypto multi tenant an environment of secure computing using cloud sqlCrypto multi tenant an environment of secure computing using cloud sql
Crypto multi tenant an environment of secure computing using cloud sqlijdpsjournal
 
Enhancement of the Cloud Data Storage Architectural Framework in Private Cloud
Enhancement of the Cloud Data Storage Architectural Framework in Private CloudEnhancement of the Cloud Data Storage Architectural Framework in Private Cloud
Enhancement of the Cloud Data Storage Architectural Framework in Private CloudINFOGAIN PUBLICATION
 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Editor IJMTER
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data securityeSAT Publishing House
 
Security for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi CloudsSecurity for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi CloudsEditor IJCATR
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationEditor IJMTER
 
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud StorageEnhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud StorageIRJET Journal
 
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...dbpublications
 
Secure Data Storage in Cloud Using Encryption and Steganography
Secure Data Storage in Cloud Using Encryption and SteganographySecure Data Storage in Cloud Using Encryption and Steganography
Secure Data Storage in Cloud Using Encryption and Steganographyiosrjce
 

Similar to DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING (20)

Dynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudDynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for Cloud
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageBio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
 
L01246974
L01246974L01246974
L01246974
 
Crypto multi tenant an environment of secure computing using cloud sql
Crypto multi tenant an environment of secure computing using cloud sqlCrypto multi tenant an environment of secure computing using cloud sql
Crypto multi tenant an environment of secure computing using cloud sql
 
50120140507005 2
50120140507005 250120140507005 2
50120140507005 2
 
50120140507005
5012014050700550120140507005
50120140507005
 
C017421624
C017421624C017421624
C017421624
 
Enhancement of the Cloud Data Storage Architectural Framework in Private Cloud
Enhancement of the Cloud Data Storage Architectural Framework in Private CloudEnhancement of the Cloud Data Storage Architectural Framework in Private Cloud
Enhancement of the Cloud Data Storage Architectural Framework in Private Cloud
 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
 
Security for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi CloudsSecurity for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi Clouds
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
 
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud StorageEnhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
 
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
 
J017236366
J017236366J017236366
J017236366
 
Secure Data Storage in Cloud Using Encryption and Steganography
Secure Data Storage in Cloud Using Encryption and SteganographySecure Data Storage in Cloud Using Encryption and Steganography
Secure Data Storage in Cloud Using Encryption and Steganography
 

More from AIRCC Publishing Corporation

Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...AIRCC Publishing Corporation
 
Discover Cutting-Edge Research in Computer Science and Information Technology!
Discover Cutting-Edge Research in Computer Science and Information Technology!Discover Cutting-Edge Research in Computer Science and Information Technology!
Discover Cutting-Edge Research in Computer Science and Information Technology!AIRCC Publishing Corporation
 
Constraint-based and Fuzzy Logic Student Modeling for Arabic Grammar
Constraint-based and Fuzzy Logic Student Modeling for Arabic GrammarConstraint-based and Fuzzy Logic Student Modeling for Arabic Grammar
Constraint-based and Fuzzy Logic Student Modeling for Arabic GrammarAIRCC Publishing Corporation
 
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...AIRCC Publishing Corporation
 
Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...AIRCC Publishing Corporation
 
Image Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural NetworkImage Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural NetworkAIRCC Publishing Corporation
 
International Journal of Computer Science & Information Technology (IJCSIT)
International Journal of Computer Science & Information Technology (IJCSIT)International Journal of Computer Science & Information Technology (IJCSIT)
International Journal of Computer Science & Information Technology (IJCSIT)AIRCC Publishing Corporation
 
Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...
Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...
Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...AIRCC Publishing Corporation
 
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3AIRCC Publishing Corporation
 
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...AIRCC Publishing Corporation
 
Image Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural NetworkImage Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural NetworkAIRCC Publishing Corporation
 
Use of Neuronal Networks and Fuzzy Logic to Modelling the Foot Sizes
Use of Neuronal Networks and Fuzzy Logic to Modelling the Foot SizesUse of Neuronal Networks and Fuzzy Logic to Modelling the Foot Sizes
Use of Neuronal Networks and Fuzzy Logic to Modelling the Foot SizesAIRCC Publishing Corporation
 
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...AIRCC Publishing Corporation
 
Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...AIRCC Publishing Corporation
 
Current Issue - February 2024, Volume 16, Number 1 - International Journal o...
Current Issue - February 2024, Volume 16, Number 1  - International Journal o...Current Issue - February 2024, Volume 16, Number 1  - International Journal o...
Current Issue - February 2024, Volume 16, Number 1 - International Journal o...AIRCC Publishing Corporation
 
Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...
Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...
Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...AIRCC Publishing Corporation
 
Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...AIRCC Publishing Corporation
 
February 2024-: Top Read Articles in Computer Science & Information Technology
February 2024-: Top Read Articles in Computer Science & Information TechnologyFebruary 2024-: Top Read Articles in Computer Science & Information Technology
February 2024-: Top Read Articles in Computer Science & Information TechnologyAIRCC Publishing Corporation
 
Call for Articles- International Journal of Computer Science & Information T...
Call for Articles-  International Journal of Computer Science & Information T...Call for Articles-  International Journal of Computer Science & Information T...
Call for Articles- International Journal of Computer Science & Information T...AIRCC Publishing Corporation
 

More from AIRCC Publishing Corporation (20)

Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...
 
The Smart Parking Management System - IJCSIT
The Smart Parking Management System  - IJCSITThe Smart Parking Management System  - IJCSIT
The Smart Parking Management System - IJCSIT
 
Discover Cutting-Edge Research in Computer Science and Information Technology!
Discover Cutting-Edge Research in Computer Science and Information Technology!Discover Cutting-Edge Research in Computer Science and Information Technology!
Discover Cutting-Edge Research in Computer Science and Information Technology!
 
Constraint-based and Fuzzy Logic Student Modeling for Arabic Grammar
Constraint-based and Fuzzy Logic Student Modeling for Arabic GrammarConstraint-based and Fuzzy Logic Student Modeling for Arabic Grammar
Constraint-based and Fuzzy Logic Student Modeling for Arabic Grammar
 
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
 
Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...
 
Image Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural NetworkImage Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural Network
 
International Journal of Computer Science & Information Technology (IJCSIT)
International Journal of Computer Science & Information Technology (IJCSIT)International Journal of Computer Science & Information Technology (IJCSIT)
International Journal of Computer Science & Information Technology (IJCSIT)
 
Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...
Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...
Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...
 
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3
 
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
 
Image Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural NetworkImage Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural Network
 
Use of Neuronal Networks and Fuzzy Logic to Modelling the Foot Sizes
Use of Neuronal Networks and Fuzzy Logic to Modelling the Foot SizesUse of Neuronal Networks and Fuzzy Logic to Modelling the Foot Sizes
Use of Neuronal Networks and Fuzzy Logic to Modelling the Foot Sizes
 
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...
 
Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...
 
Current Issue - February 2024, Volume 16, Number 1 - International Journal o...
Current Issue - February 2024, Volume 16, Number 1  - International Journal o...Current Issue - February 2024, Volume 16, Number 1  - International Journal o...
Current Issue - February 2024, Volume 16, Number 1 - International Journal o...
 
Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...
Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...
Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...
 
Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...
 
February 2024-: Top Read Articles in Computer Science & Information Technology
February 2024-: Top Read Articles in Computer Science & Information TechnologyFebruary 2024-: Top Read Articles in Computer Science & Information Technology
February 2024-: Top Read Articles in Computer Science & Information Technology
 
Call for Articles- International Journal of Computer Science & Information T...
Call for Articles-  International Journal of Computer Science & Information T...Call for Articles-  International Journal of Computer Science & Information T...
Call for Articles- International Journal of Computer Science & Information T...
 

Recently uploaded

Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 

Recently uploaded (20)

Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 

DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING

  • 1. International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 6, December 2017 DOI:10.5121/ijcsit.2017.9606 59 DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING B. Rakesh1 , K. Lalitha1 , M. Ismail1 and H. Parveen Sultana2 1 Assistant Professor, Department of CSSE, SVEC (Autonomous) 2 Associate Professor, SCOPE, VIT University, Vellore, India ABSTRACT Cloud Computing is the revolution in current generation IT enterprise. Cloud computing displaces database and application software to the large data centres, where the management of services and data may not be predictable, where as the conventional solutions, for IT services are under proper logical, physical and personal controls. This aspect attribute, however comprises different security challenges which have not been well understood. It concentrates on cloud data storage security which has always been an important aspect of quality of service (QOS). In this paper, we designed and simulated an adaptable and efficient scheme to guarantee the correctness of user data stored in the cloud and also with some prominent features. Homomorphic token is used for distributed verification of erasure – coded data. By using this scheme, we can identify misbehaving servers. In spite of past works, our scheme supports effective and secure dynamic operations on data blocks such as data insertion, deletion and modification. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centres, where the data management and services may not be absolutely truthful. This effective security and performance analysis describes that the proposed scheme is extremely flexible against malicious data modification, convoluted failures and server clouding attacks. KEYWORDS Cloud Computing, Cloud Storage Security, Homomorphic token, EC2, S3 1.INTRODUCTION The Cloud Computing provides the service over the internet by using the computing resources i.e. hardware and software. By using software as a service, users can access software and database in the business model. The management of infrastructure and platform is done by using Cloud providers. Sometimes, software as a service is referred to as on-demand software. Because of that Cloud providers charged on pay per use basis. So this causes proponents to get the computing resources in Outsourcing manner. That’s why the maintenance of hardware and software is being reduced for users. Introducing of Cloud Computing avoids direct management of hardware and it causes great convenience to users. Amazon Elastic Compute Cloud (EC2) and Amazon Simple Storage Service (S3) are the best examples for initiators of Cloud Computing. In the Cloud Computing the responsibility of local machines is eliminating due to computing platform shift. Here in the Cloud Computing, the data is integrated so that’s why the users are showing kindliness towards the cloud service providers. Providing security to the data is a very important factor which has always been an important factor of quality of service. Cloud Computing is exhibiting new challenges due to many reasons. In Cloud Computing the very important thing is that data should be under the control of user. But by using the traditional cryptographic techniques the users lose the control of data. So traditional
  • 2. International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 6, December 2017 60 Cryptographic primitives cannot be adopted directly. If we use the traditional Cryptographic primitives directly, we will have conduct the verification for correctness of data stored in the cloud without having the proper knowledge about the whole data. It is even more challenging that to provide the continuous assurance of the data safety, if we store different categories of data stored by different users. The users are updating the data continuously stored in the cloud. The updation of the data includes insertion, deletion, modification, appending, reordering etc. During the dynamic data updation it is very important task that to assure the storage correctness of data. Techniques which are used can be useful to give assurance to storage correctness without possessing data of user, where it cannot addresses all the security threat of data storage in cloud, since they all concentrating on single server situation and a large portion of them don't consider dynamic operations on data. As a balancing approach, researchers have also proposed protocols which are distributed for ensuring storage correctness data throughout multiple servers or peers. Again, in these no distributed schemes is conscious about operations on dynamic data. As a result, their applicability on cloud data storage can be considerably limited. In this paper, we present a viable and flexible distributed scheme with dynamic data support explicitly to verify the user’s data correctness in the cloud. We rely on erasure correcting code in the file distribution preparation to provide redundancies and guarantee the data dependability. This development radically diminishes the communication and storage overhead when contrasted with the conventional techniques of replication-based file distribution. Utilization of homomorphic token with distributed verification of erasure-coded data, this scheme achieves the storage correctness insurance as well as data error localization: whenever data corruption has been identified during the verification of storage correctness, this scheme can localize the data errors concurrently, i.e., the identification of the misbehaving server(s). • Compared to many of its predecessors, which only provide binary results about the storage state across the distributed servers, the challenge-response protocol in our work further provides the localization of data error. • Dislike past works for guaranteeing data integrity remotely, on data blocks the new scheme supports efficient and secure dynamic operations, which includes update, delete and append. • The highly efficient security and performance analysis shows that the proposed scheme is extremely efficient and rigid against Byzantine failure, server colluding attack, , and even malicious data modification attacks. 1.1 Cloud Data Storage Architecture The network architecture for cloud data storage is as represented in the figure1. The architecture is consisting of three different network modules as represented below: Users: There are different categories of users. The users consisting of both organizations and individual users. The users are having the data to store in the cloud. The users must have the trust on the cloud computation. Cloud Service Provider (CSP) : A cloud service provider has the knowledge and important resources in building and managing distributed cloud storage servers. A cloud service provider poses and operates live Cloud Computing systems. Third Party Auditor (TPA): An optional TPA, who has expertise and capabilities that users may not have, ills trusted to assess and expose risk of cloud storage services on behalf of the users
  • 3. International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 6, December 2017 61 upon request. In cloud data storage, a user stores his data through a CSP into a set of cloud servers, which are running in a simultaneous, cooperated and distributed manner. Redundancy of data redundancy can be engaged with technique of erasure-correcting code to tolerate server crash or faults as data of the user grows in importance and also size. After that for the purpose of application, the user interacts with the cloud servers via Cloud Service Provider (CSP) to retrieve or access his data. In some cases, block level operations has been performed by user on his data. Fig 1: Cloud Data Storage Architecture Most general styles are block insert, delete, update and append are different operations. As users now not possess their knowledge for data locality, it’s of critical importance to guarantee users that their data are being properly stored and maintained. That is, users ought to be equipped with security means that in order that they'll build continuous correctness assurance of their data stored in cloud even without existence of copy of data locally. Fig 2: Cloud Server Data Security Architecture In case if the users don’t necessarily have the time, possibility of resources to check their data, they can hand over the tasks to an optional trusted Third Party Auditor (TPA) of their relevant choices. In this model, we presume that the point-to-point communication channels between each user and the cloud server is authenticated and trustworthy, which can be achieved in practice with little overhead. Note that we don’t address this type of data privacy issue here, as in Cloud Computing, data privacy is orthogonal to the problem what we study here
  • 4. International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 6, December 2017 62 2. KEY GENERATION ALGORITHM 2.1. Key generation (µ) Step 1. Start 2. Obtain parameters (g,h,p). 3. G1 can be generated by g and h. 4. G2 can be generated by prime number p. 5. Set µ=(g,h,ẽ,G1,G2,p,f) 6. f:Zp*{0,1} Zp*Is a one-way hash function 7. User A selects three parameters a1;a2; a3 Zp * 8. PKA=( ),ska=(a1,a2,a3). 9. Stop. 2.2. Share Key Generation Algorithm Saharekeygen(SKA,t,m) Step 1. Start 2. Select m key servers 3. Share secret key SKA to key server ksi 4. SKA,i=(fA,1(i),fA,2(i)) where 1≤i ≤m. 5. Stop. 2.3. Encryption Algorithm Encryption(PKA,T,m1,m2,…..mk) Step 1: Start 2. Divide message in to m1,m2,…..mk 3. Calculate cipher text c1,c2,…..ck by using ) 4. Stop. 2.4. Key Recovery Algorithm Key Recover(SKA,i1 , SKA,i2 , SKA,i3 , SKA,i4…………… , SKA,in ) Step 1. Start 2. User searches for first component a1. 3. if (a1 found) No need of key recovery. 4. if (a1 not found) Recovered by using 5. Stop
  • 5. International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 6, December 2017 63 2.5. Re Key Generation Algorithm ReKeyGen(PKA,SKA,ID,PKB) Step 1. Start 2. Encrypt the data by using SKA. 3. Select a random number e from Zp*. 4.Compute rekey for proxy reencryption by using 5. Stop. 2.6. Proxy Re-Encryption Algorithm ProxyReEncryption() Step 1. Start 2. Calculate RK,C’. 3. ReEncrypted symbol can be computed as 4. Stop 3. IMPLEMENTATION 3.1Client Module In this client module, the server receives query from the client. Based on the query sent by user to the server it sends the corresponding file to the client. Before doing this process, the client should authorize. At the server side; it verifies the client name and its password for security process. If it is verified successfully and received the queries form the client and search those corresponding files in the database. Finally, it finds that files and sends to the client. If the server finds the intruder means, it set the alternative Path to those intruders. 3.2. System Module Representative network architecture for cloud data storage is illustrated in Figure 1. There are 3 network entities which can be identified as below. 3.2.1. User Users, who have data to be stored in the cloud and rely on the cloud for data computation, consist of both individual consumers and organizations. 3.2.2. Cloud Service Provider (CSP) A Cloud Service Provider, who has considerable resources and expertise in managing and building distributed servers of cloud storage, owns an operative live Computing systems of cloud.
  • 6. International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 6, December 2017 64 3.2.3. Third Party Auditor (TPA) An optional TPA, who has expertise and capabilities that users may not have, is trusted to assess and expose risk of cloud storage services on behalf of the users up on request. 3.3. Cloud data storage Module This is where an user stores his data by using CSP into a group of cloud servers, which are running concurrently, then the user interacts with the cloud servers via CSP to retrieve or access his data. In some cases, the user may need to perform block level operations on his own data. So, users ought to be equipped with security means that in order to build continuous correctness verification of their data stored in cloud even without existence of copy of data locally. If in case the use don’t have time and feasibility of resources to monitor their data, they can hand over the tasks to optional trusted Third Party Auditor(TPA) of their respective choices. In this model, we presume that the point-to-point communication channels between user and the cloud server, if user is authenticated and reliable, which can be achieved with little overhead in practice 3.4. Cloud Authentication Server The Authentication Server (AS) which functions as any Authentication Server would with a few more behaviours added to the typical protocol which named as client-authentication protocol. First, sending information of the client authentication to the masquerading router. The Authentication Server also functions as authorizing permission control and tickets on the application network. There is one more optional function that should be supported by the AS is the updating of client lists, causing a reduction in authentication time or even the removal of the client as a valid client depending upon the request. 3.5. Unauthorized data modification and corruption module One of the important issue is to detect any unauthorized modification of data and corruption effectively, possibly due to server conciliation and/or random Byzantine failures. Also, in the distributed case when that type of inconsistencies are successfully detected, to find the data error lies in which server is also of great significance. 3.6. Adversary Module Threats for Security faced by data storage in cloud can come from two different resources. First, a CSP can be self-interested, and not trusted and possibly malicious. Its desire is to not only move data which is not been or is rarely used to a lower tier of storage than accepted for monitoring reasons, but there is one more chance also attempt to hide a data loss incident which is caused due to Byzantine failures or management errors and so on. Second, there may be a chance for existence of adversary who is an economically motivated, it has capability to compromise a number of cloud data storage servers subsequently in different time intervals and it is able to modify or delete user’s data for certain period while remaining undetected by CSPs. Consider two diiferent types of adversary models with different capability levels.
  • 7. International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 6, December 2017 65 3.6.1. Weak Adversary This adversary is interested in mortifying the data files of user stored on individual servers. If one server is comprised, this adversary can corrupt the original data files by introducing or modifying by its own deceptive data to avoid the original data which is retrieved by user. 3.6.2. Strong Adversary This adversary is the worst case scenario, where we expect that the adversary can compromise all the other servers which are used for storage so that he/she can intentionally change the data files as long as they are internally reliable. In fact, this is equivalent to the situation where all the servers are colluding together to conceal a data loss or corruption occurrence. 4. CONCLUSION AND FUTURE WORK Here in this paper, we examine data security problem of data storage in cloud, which is essentially in a distributed storage system. To verify the correctness of users’ data of data storage in cloud, here we proposed an effective and supple distributed scheme with dynamic data support explicitly, including block update, append, and delete. Here we depend on erasure-correcting code for the preparation of distribution of file to provide parity vector of redundancy and guarantees the dependability of data. By using the homomorphic token of erasure coded data with distributed verification, our system achieves that integration of storage correctness assurance and localization of data errors, that is whenever data corruption has been detected during the correctness verification of data storage in the cloud across the distributed servers. Now, we can almost guarantee that the concurrent identification of the misbehaving servers. Through this detailed performance and security analysis, we proved that our scheme is highly resilient and efficient to malicious data modification attack, Byzantine Failures and server colluding attacks. We believes that storage security for data in Cloud Computing is an area with full of challenges and have vital importance, is still in its immaturity now, and there are many research problems are yet to be identified in this area. We imagine many possible directions for future research in this area. The most hopeful one we believe that is a model in which public verifiability is compulsory. Public verifiability, supported in allows the Third Party Auditor (TPA) to audit the data storage in cloud without demanding users’ time, resources or feasibility. An interesting question here is if we can build a scheme to achieve both storage correctness assurance and public verifiability of dynamic data. Besides, with this research on dynamic data storage in cloud, we also plan to examine the problem of fine-grained error localization of data. REFERENCES [1] Cong Wang, Qian Wang, and Kui Ren, ”Ensuring Data Storage Security in Cloud Computing ” in Proc. of IWQoS’09, July 2009, pp. 1–9 [2] G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, “Scalable and Efficient Provable Data Possession,” Proc. of SecureComm ’08, pp. 1–10, 2008. [3] Amazon.com, “Amazon Web Services (AWS),” Online at http://aws.amazon.com, 2008. [4] A. Juels and J. Burton S. Kaliski, “PORs: Proofs of Retrievability for Large Files,” Proc. of CCS ’07, pp. 584–597, 2007. [5] H. Shacham and B. Waters, “Compact Proofs of Retrievability,” Proc. of Asiacrypt ’08, Dec. 2008. [6] K. D. Bowers, A. Juels, and A. Oprea, “Proofs of Retrievability: Theory and Implementation,” Cryptology ePrint Archive, Report 2008/175, 2008, http://eprint.iacr.org/. [7] K. D. Bowers, A. Juels, and A. Oprea, “HAIL: A High-Availability and Integrity Layer for Cloud Storage,” Cryptology ePrint Archive, Report 2008/489, 2008, http://eprint.iacr.org/. [8] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable Data Possession at Untrusted Stores,” Proc. Of CCS ’07, pp. 598–609, 2007.
  • 8. International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 6, December 2017 66 [9] R. Curtmola, O. Khan, R. Burns, and G. Ateniese, “MR-PDP: Multiple- Replica Provable Data Possession,” Proc. of ICDCS ’08, pp. 411–420, 2008. [10] M. Lillibridge, S. Elnikety, A. Birrell, M. Burrows, and M. Isard, “A Cooperative Internet Backup Scheme,” Proc. of the 2003 USENIX Annual Technical Conference (General Track), pp. 29–41, 2003. [11] D. L. G. Filho and P. S. L. M. Barreto, “Demonstrating Data Possession and Uncheatable Data Transfer,” Cryptology ePrint Archive, Report 2006/150, 2006, http://eprint.iacr.org/. [12] M. A. Shah, M. Baker, J. C. Mogul, and R. Swaminathan, “Auditing to Keep Online Storage Services Honest,” Proc. 11th USENIX Workshop on Hot Topics in Operating Systems (HOTOS ’07), pp. 1–6, 2007. [13] T. S. J. Schwarz and E. L. Miller, “Store, Forget, and Check: Using Algebraic Signatures to Check Remotely Administered Storage,” Proc. of ICDCS ’06, pp. 12–12, 2006. [14] N. Gohring, “Amazon’s S3 down for several hours,” Online at http://www.pcworld.com/businesscenter/article/142549/amazons s3 down for several hours.html, 2008. [15] K. D. Bowers, A. Juels, and A. Oprea, “HAIL: A High-Availability and Integrity Layer for Cloud Storage,” Cryptology ePrint Archive, Report 2008/489, 2008, http://eprint.iacr.org/. [16] L. Carter and M. Wegman, “Universal Hash Functions,” Journal of Computer and System Sciences, vol. 18, no. 2, pp. 143–154, 1979. [17] J. Hendricks, G. Ganger, and M. Reiter, “Verifying Distributed Erasurecoded Data,” Proc. 26th ACM Symposium on Principles of Distributed Computing, pp. 139–146, 2007. [18] J. S. Plank and Y. Ding, “Note: Correction to the 1997 Tutorial on Reed-Solomon Coding,” University of Tennessee, Tech. Rep. CS-03- 504, 2003. [19] Q. Wang, K. Ren, W. Lou, and Y. Zhang, “Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance,” Proc. of IEEE INFOCOM, 2009. [20] R. Curtmola, O. Khan, R. Burns, and G. Ateniese, “MR-PDP: Multiple- Replica Provable Data Possession,” Proc. of ICDCS ’08, pp. 411–420,2008. [21] D. L. G. Filho and P. S. L. M. Barreto, “Demonstrating Data Possession and Uncheatable Data Transfer,” Cryptology ePrint Archive, Report 2006/150, 2006, http://eprint.iacr.org/.