SlideShare une entreprise Scribd logo
1  sur  5
Télécharger pour lire hors ligne
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 353
SECRET KEYS AND THE PACKETS TRANSPORTATION FOR PRIVACY
DATA FORWARDING METHOD IN CLOUD SERVER
P. Velavan1
, K. Balaji2
, R.Ganesh3
1
Assistant Professor, Dept of CSE, Apollo Engineering College, Chennai, India
2
Student, Dept of CSE, Apollo Engineering College, Chennai, India
3
PG Scholar, A.R.J.I.T, Tamilnadu, India
Abstract
The Cloud computing is the process of storing the data in the Remote server. This process doesn‘t speak much about confidentiality
and robustness of the data. To improve the security and confidentiality the uploaded file from a data owner is splitted into multiple
packets and stored in multiple cloud servers. These packets are encrypted using the primary key. These different keys are also
distributed in multiple key servers. User id is appended for verification. If the data owner forwards the file then the keys are verified
for the data access. In this we are proposing sending the secret key as SMS to the shared or forwarded nodes for the process of proper
Security. This technique integrates the concepts of encryption, encoding and forwarding.
Keywords-cloud computing, encryption, storage system
------------------------------------------------------------------------***---------------------------------------------------------------------
1. INTRODUCTION
Cloud computing is a computing paradigm, where a large
pool of systems are connected in private or public networks,
to provide dynamically scalable infrastructure for
application, data and file storage The idea of cloud
computing is based on a very fundamental principal of
―reusability of IT capabilities Cloud computing is one of
the hottest trends in the industry. This has proven as a bliss
for small business and enterprise-sized IT. Cloud hosting has
considered as the major shift in the way companies use to
look their IT infrastructure. This type of approach to IT relies
on the Internet, and usually involves provisioned, scalable,
dynamic and virtual solutions. Cloud computing pulls the
details of IT infrastructure management away from the
business and puts it squarely in the hands of true experts.
Storing the data in the cloud server makes serious concern on
data confidentiality .To avoid that ,the user can encrypt the
messages using encryption algorithms before applying the
erasure code method to encode and store messages. The
erasure code will reduce the expansion times of encoded
messages [5],[7].
In this paper we are proposing the security concerns in the
data forwarding scheme. The data owner will send the data
to the cloud server .The cloud server will receive the data
and do tDhe encryption for the data. The data owner holding
the private key and pubic key pair. The encrypted data will
be stored in data server and key servers separately. The data
packets will be stored in the randomly chosen data servers
and the generated keys will be stored in the key servers. If
any authorized user want to modify them data in the cloud
server, they will send the request to cloud server by
appending user-id as an verification code.
After verification is done by the server side, the cloud server
will give the permission to the data owner to modify the
data. If the data owner wants to forward the data to the other
data owner, they can forward. But the new one will receive
the encrypted data only. They can‘t view the data without
the decryption process. For the decryption process the data
owner will send the key for the who got the encrypted data
recently. For the secured transformation of the key, that will
be sending by an SMS. So, the intruder can‘t aware of the
secret key transformation.
The decentralized architecture gives better scalability and
robustness rather than the existing architectures in the
Distributed environment [1][3]. These erasure codes are
random linear codes with specific randomized structure of
network. The proxy re-encryption scheme scores best
granularity on the granted right of the key servers [2].
Accomplishing the integration with consideration of
distributed environment is more challenging task. Cloud has
been used as the metaphor for the internet computing.
The cloud can be categorized into SaaS(service as a
software), IaaS ( Infrastructure as a service) & PaaS
(Platform as a Service). While SaaS is by far the most
common type of cloud computing implementation today,
other types are rapidly gaining popularity as companies see
the cost and expertise advantages of each. It also make use
of Web 2.0 and other virtual technologies, applications are
provided to users via the net with the data stored on the
provider‘s servers
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 354
2. RELEATED WORK.
2.1 Farsite
Farsite is a server less, distributed file system that does not
assume mutual trust among the client computers on which it
runs [4]. Logically, the system functions as a central file
server, but physically, there is no central server machine.
Instead, a group of desktop client computers collaboratively
establish a virtual file server that can be accessed by any of
the clients. The system provides a global name space for
files, location-transparent access to both private files and
shared public files, and improved reliability relative to
storing files on a desktop workstation. It does this by
distributing multiple encrypted replicas of each file among a
set of client machines. Files are referenced through a
hierarchical directory structure that is maintained by a
distributed directory service
2.2 Decentralized Erasure Code
The decentralized erasure codes which are randomized linear
codes with specific probabilistic structure that leads to
optimally sparse generator matrices. These codes canbe
created by randomized network protocol. The decentralized
erasure codes will reduce the communication, storage and
computation cost over random linear coding .The
decentralized erasure codes are the key factor to avoid the
problem of large number of storage nodes with limited
number of memory nodes. These codes will pre-rouets its
data packet to O(log n) randomly and independently selected
storage nodes. Decentralized erasure codes have minimal
data node degree which corresponds to a maximal sparsity of
the generator matrix and minimal number of pre routed
packets
The key advantage of decentralized erasure code is that there
is no need for co-ordination among the data nodes[5][7][10].
2.3 Proxy Re-Encryption
Proxy Re-Encryption scheme in which the proxy server can
transfer a cipher text under a public key PKA to a new one
under another public key PKB by using the re-encryption
key RKA→B The server does not know the plain text during
the transformation. The proxy Re- Encryption schemes gives
better secured sharing methodology to the cloud server
.When the user want to share the message to them
neighborhood, user will send a re-encryption key to the
storage server will do the re-encryption for the authorized
user. This scenario describes the better confidentiality in the
forwarding scheme.
2.4 Secure Cloud Storage Scheme
The cloud server will be having two type of storage servers.
They are data server, key server. The data server which will
be used to store the data packets after the decomposition of
encrypted packets from the data owner The key server which
is used to store keys for encrypted data. A decentralized in
the cloud server gives better scalability because there is no
central authority to control the storage server to join or
leave. Making replicas of each message and store them in
different server will improve the robustness of the cloud
server.
2.5 Ocean Store
Ocean store system in composed of a multitude of highly
connected pools among which data is allowed to flow freely.
Clients connect to one or more pool, perhaps intermittently.
An ocean store provide persistent about data in server the
cloud. This architecture will provide continuous access to
persistent information. Ocean store have two type of access
control .They are ‗reader restriction‘ and ‗writer
restriction‘. Ocean store can be used to create very large
digital libraries and repository for scientific data. Ocean
store provides a common mechanism for storing and
managing large data collections
3. PROPOED SYSTEM
In existing system, the data owner will forward his
encrypted message to the user who made the request for the
data, along with the user id to the cloud server. The storage
server verifies the user- id for authentication purpose and
allow the data owner to send the encrypted data packets to
the new user. For the decryption process the combination of
data owner‘s secret key and new user‘s public key. That key
will be used for decryption process. By improving the data
confidentiality we proposes sending the combination of
secret key and the public key pair by sms. By doing this type
of protection over transmitting of pair of keys will improve
tight security concerns.
Architecture of Cloud Server Environment
Fig 1 Architecture Diagram of Cloud Server Environment
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 355
m1 , m2……. mn – Message blocks
c1 ,c2.. .cn—Cipher text s of messages
SS — Storage Servers
KS – Key Servers
PK—Public Key
PR—Private Key
The above figure demonstrates the fundamental concept of
our proposed work. There are five phases in our proposal.
The first phase is the system management phase, in this
phase the cloud manager chooses parameter of the cloud
environment and publishes them. In our cloud environment
there are ‗s‘ storage servers and ‗p‘ key servers are
available. The storage servers which are used to store the
data units of the data owner who upload the data. The key
servers which are used to store key values of the each
encrypted packets in the storage servers.
The second phase is the data Storage phase. In this phase
User A encrypts his message using any encryption algorithm
and send the encrypted texts to the cloud server. The cloud
server will decompose them into multiple packets of data.
These encrypted texts again will go for the encryption for
improving the security mechanism, for both encryptions
different type of keys will be used. After the completion
process of encryption the cipher texts will store randomly
chosen storage servers and the key for encrypted data will be
maintained separately in the key servers[3]. Upon receiving
cipher texts from a user ,each storage server linearly
combines codeword symbols and store it.
The third phase is the data forwarding phase .User in the
cloud server may want to share his data to another user in the
cloud server or they want send the information to the outside
user apart from cloud environment. In such cases the original
user who want to share or forward his message ,first the user
have to get an permission from the cloud server for an
authorized entry for data manipulation in the cloud. For
getting authorized entry, the user should have to append
password as an verification code. After successful
verification the user has the privilege to forward or modify
the data.If the user forwarding the data means the receiver
will receive the decrypted code only,do the decryption in
receiving side require valid key.
The pair of keys will be made very confidentially by the
cloud server, that decryption key containing the secret key of
user and the public key of the receiver. The receiver‘s public
key is known by the user who send the data from cloud ,how
means the receiver while sending an request with public key
to the user, he will notify the public key very secretly.
The final phase is the data retrieving phase, the user requests
to retrieve a message from the cloud, the storage server
holding data in cloud[10] .The message may be either stored
by him in the cloud or forwarded to him in the cloud. Upon
receiving the retrieval request from the cloud user and
executing the proper authentication with the user, each key
servers requests randomly chosen storage server to get the
code word symbols and does the partial on the received
codeword symbols by using the combined key
3.1 Data Owner
The data owner after registering with the cloud server, he
will have the Admin password as a private key. With the
help of that key he has the privilege to data access the
information stored in the cloud server. Here the user who
stores his information in the cloud server are termed as Data
owner. He has the right to modify the existing data and he
has the privilege to add the new data in the cloud server.
Before entering into the cloud sever, the data owner have to
register them with the cloud server for the authorization
purpose .Once the data owner has completed his registration,
the cloud server will give the password for confidential uses
of data manipulation purposes. That key should be
maintained secretly ,otherwise it may bring out to wrong
type of security
3.2 Cloud Server
The data owner stores the information in the cloud server,
where the data is splitted into multiple packets randomly and
thus each of the packets are stored in a separate cloud
servers, namely the first packet to be stored in the cloud
server(CS1),the second packet to be stored in the cloud
server(CS2) and so on. Under the cloud server, there are
both data servers and the key servers.
3.3 Randomized Network Algorithm
Fig 2 Randomized network algorithm
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 356
The Randomized Network algorithm is used to construct a
decentralized erasure code in a cloud network. Each data
node picks one out of the n storage nodes randomly ,pre-
routes its packet and repeats d(k )= c ln (k) times .Each
storage node multiplies whatever it happen to receive with
coefficients selected uniformly and independently in Fq and
stores the result and the coefficients
3.4 Encryption
In this proposal we use encryption scheme twice in the
system, for improving security and Confidentiality in the
cloud server. First encryption will be done before splitting
the message into multiple packets and second encryption will
be done for the splitted packets and those packets will be
stored randomly chosen data servers. In each of the data
server, encryption is done and thus the encrypted key will be
generated for each of the data server[5],[7]
The first encryption process takes place before splitting data
into smaller data units .After the completion of first
encryption process the cloud server will format the encrypted
data units in smaller number of equal cipher text units. These
first level cipher texts get through one more time for
encryption. In second level encryption, the cipher texts takes
one more encryption process. This double encryption scheme
provides higher level of tight security mechanism and
increased data confidentiality for the data owners in the
cloud environment.
Even though we are increasing the security mechanism, the
double encryption scheme lead the cloud environment into
performance degrading why because is that double
encryption increase the execution time of the cloud
environment.
3.5 SMS Alert
During the data sharing process, the user who needs the data
get the encrypted keys from the data owner by means of the
SMS [8],[9]. The keys are later utilized by the user in cloud
servers and as a result he can get the data from the cloud
servers which he needs. In order to improve the security and
confidentiality of the combined key from the data owner to
new user who got the encrypted data, that key send by an
sms. By sending sms the intruder or the hacker may not
aware of mobile number of the new user.
3.6 Error Recovery
If the storage server get fails due to any reasons suddenly,
then the cloud will add the new storage for replace the failed
one[6]. The new storage server quires the available storage
servers, linearly combines the received Codeword symbols
as a new one and store it back all data by using the erasure
code mechanism.
4. CONCLUSIONS
This paper gives one of the approach to improve the security
mechanism in data forwarding scheme in cloud server.This
approach gives better confidentiality and provide good
security rather than existing system. The future work can go
with the direction by improving the scalability of the cloud
and increasing the execution process of the cloud server.
ACKNOWLEDGMENTS
We thank our HOD and staff members of SRM University
for guiding us throughout our research.
REFERENCES
[1] J. Kubiatowicz, D. Bindel, Y. Chen, P. Eaton, D.
Geels, R. Gummadi, S. Rhea, H. Weatherspoon, W.
Weimer, C. Wells, and B. Zhao,―Oceanstore: An
architecture for global-scale persistent storage,‖ in
Proceedings of the 9th International Conference on
Architectural Support for Programming Languages
and Operating Systems - ASPLOS, pp. 190–201,
ACM, 2000.
[2] P. Druschel and A. Rowstron, ―PAST: A large-
scale, persistent peer-topeer storage utility,‖ in
Proceedings of the 8th Workshop on Hot Topics in
Operating System - HotOS VIII, pp. 75–80,
USENIX, 2001.
[3] H.Ying Lin,Wen-Guey Tzeng‖A Secure Erasure code
based cloud storage system with secure data
forwarding‖ in Proceedings of the 8th Workshop on
Hot Topics in cryptography – Hot CRY VIII, pp. 75–
80, USENIX, 2011
[4] A. Adya, W. J. Bolosky, M. Castro, G. Cermak, R.
Chaiken, J. R. Douceur, J. Howell, J. R. Lorch, M.
Theimer, and R. Wattenhofer, ―Farsite: Federated,
available, and reliable storage for an incompletely
trusted environment,‖ in Proceedings of the 5th
Symposium on Operating System Design and
Implementation - OSDI, pp. 1–14, 2002.
[5] A. Haeberlen, A. Mislove, and P. Druschel,
―Glacier: Highly durable, decentralized storage
despite massive correlated failures,‖ in Proceedings of
the 2nd Symposium on Networked Systems Design
and Implementation - NSDI, pp. 143–158, USENIX,
2005.
[6] Z. Wilcox-O‘Hearn and B. Warner, ―Tahoe: the
least-authority filesystem,‖ in Proceedings of the 4th
ACM International Workshop on Storage Security
and Survivability - StorageSS, pp. 21–26, ACM,
2008.
[7] H.-Y. Lin and W.-G. Tzeng, ―A secure
decentralized erasure code for distributed network
storage,‖ IEEEnsactions on Parallel and Distributed
Systems, vol. 21, pp. 1586–1594, 2010.
[8] D. R. Brownbridge, L. F. Marshall, and B. Randell,
―The Newcastle connection or unixes of the world
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 357
unite!,‖ Software Practice and Experience, vol. 12, no.
12, pp. 1147–1162, 1982.
[9] R. Sandberg, D. Goldberg, S. Kleiman, D. Walsh, and
B. Lyon, ―Design and implementation of the sun
network filesystem,‖ 1985.
[10] M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang,
and K. Fu, ―Plutus: Scalable secure file sharing on
untrusted storage,‖ in Proceedings of the 2nd
USENIX Conference on File and Storage
Technologies - FAST, pp. 29–42, USENIX, 2003.

Contenu connexe

Tendances

Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloud
Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using CloudSecure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloud
Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloudpaperpublications3
 
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...IJSRED
 
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET Journal
 
Implementation of De-Duplication Algorithm
Implementation of De-Duplication AlgorithmImplementation of De-Duplication Algorithm
Implementation of De-Duplication AlgorithmIRJET Journal
 
Revocation based De-duplication Systems for Improving Reliability in Cloud St...
Revocation based De-duplication Systems for Improving Reliability in Cloud St...Revocation based De-duplication Systems for Improving Reliability in Cloud St...
Revocation based De-duplication Systems for Improving Reliability in Cloud St...IRJET Journal
 
Secure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliabilitySecure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliabilityPvrtechnologies Nellore
 
PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO...
 PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO... PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO...
PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO...Nexgen Technology
 
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...
Ieeepro techno solutions   2014 ieee java project - query services in cost ef...Ieeepro techno solutions   2014 ieee java project - query services in cost ef...
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...hemanthbbc
 
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET-  	  Privacy Preserving Encrypted Keyword Search SchemesIRJET-  	  Privacy Preserving Encrypted Keyword Search Schemes
IRJET- Privacy Preserving Encrypted Keyword Search SchemesIRJET Journal
 
Iaetsd secure data sharing of multi-owner groups in cloud
Iaetsd secure data sharing of multi-owner groups in cloudIaetsd secure data sharing of multi-owner groups in cloud
Iaetsd secure data sharing of multi-owner groups in cloudIaetsd Iaetsd
 
Data Leakage Detection and Security Using Cloud Computing
Data Leakage Detection and Security Using Cloud ComputingData Leakage Detection and Security Using Cloud Computing
Data Leakage Detection and Security Using Cloud ComputingIJERA Editor
 
Hybrid Cloud Approach for Secure Authorized Deduplication
Hybrid Cloud Approach for Secure Authorized DeduplicationHybrid Cloud Approach for Secure Authorized Deduplication
Hybrid Cloud Approach for Secure Authorized DeduplicationPrem Rao
 
Audit free cloud storage via deniable attribute-based encryption
Audit free cloud storage via deniable attribute-based encryptionAudit free cloud storage via deniable attribute-based encryption
Audit free cloud storage via deniable attribute-based encryptionPvrtechnologies Nellore
 
Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...Shakas Technologies
 
A Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized DeduplicationA Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized Deduplication1crore projects
 

Tendances (19)

Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloud
Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using CloudSecure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloud
Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloud
 
L01246974
L01246974L01246974
L01246974
 
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
 
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
 
Implementation of De-Duplication Algorithm
Implementation of De-Duplication AlgorithmImplementation of De-Duplication Algorithm
Implementation of De-Duplication Algorithm
 
Revocation based De-duplication Systems for Improving Reliability in Cloud St...
Revocation based De-duplication Systems for Improving Reliability in Cloud St...Revocation based De-duplication Systems for Improving Reliability in Cloud St...
Revocation based De-duplication Systems for Improving Reliability in Cloud St...
 
Secure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliabilitySecure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliability
 
PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO...
 PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO... PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO...
PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO...
 
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...
Ieeepro techno solutions   2014 ieee java project - query services in cost ef...Ieeepro techno solutions   2014 ieee java project - query services in cost ef...
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...
 
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET-  	  Privacy Preserving Encrypted Keyword Search SchemesIRJET-  	  Privacy Preserving Encrypted Keyword Search Schemes
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
 
Iaetsd secure data sharing of multi-owner groups in cloud
Iaetsd secure data sharing of multi-owner groups in cloudIaetsd secure data sharing of multi-owner groups in cloud
Iaetsd secure data sharing of multi-owner groups in cloud
 
E0952731
E0952731E0952731
E0952731
 
Data Leakage Detection and Security Using Cloud Computing
Data Leakage Detection and Security Using Cloud ComputingData Leakage Detection and Security Using Cloud Computing
Data Leakage Detection and Security Using Cloud Computing
 
As03302670271
As03302670271As03302670271
As03302670271
 
Hybrid Cloud Approach for Secure Authorized Deduplication
Hybrid Cloud Approach for Secure Authorized DeduplicationHybrid Cloud Approach for Secure Authorized Deduplication
Hybrid Cloud Approach for Secure Authorized Deduplication
 
Audit free cloud storage via deniable attribute-based encryption
Audit free cloud storage via deniable attribute-based encryptionAudit free cloud storage via deniable attribute-based encryption
Audit free cloud storage via deniable attribute-based encryption
 
Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...
 
V5 i7 0169
V5 i7 0169V5 i7 0169
V5 i7 0169
 
A Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized DeduplicationA Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized Deduplication
 

En vedette

Security constrained optimal load dispatch using hpso technique for thermal s...
Security constrained optimal load dispatch using hpso technique for thermal s...Security constrained optimal load dispatch using hpso technique for thermal s...
Security constrained optimal load dispatch using hpso technique for thermal s...eSAT Publishing House
 
Gsm or x10 based scada system for industrial
Gsm or x10 based scada system for industrialGsm or x10 based scada system for industrial
Gsm or x10 based scada system for industrialeSAT Publishing House
 
A virtual analysis on various techniques using ann with
A virtual analysis on various techniques using ann withA virtual analysis on various techniques using ann with
A virtual analysis on various techniques using ann witheSAT Publishing House
 
Scour investigation around single and two piers
Scour investigation around single and two piersScour investigation around single and two piers
Scour investigation around single and two pierseSAT Publishing House
 
Stirling engine performance prediction using schmidt
Stirling engine performance prediction using schmidtStirling engine performance prediction using schmidt
Stirling engine performance prediction using schmidteSAT Publishing House
 
Location updation for energy efficient geographic routing in
Location updation for energy efficient geographic routing inLocation updation for energy efficient geographic routing in
Location updation for energy efficient geographic routing ineSAT Publishing House
 
Pilot aided scheduling for uplink ofdma
Pilot aided scheduling for uplink ofdmaPilot aided scheduling for uplink ofdma
Pilot aided scheduling for uplink ofdmaeSAT Publishing House
 
Secure file sharing of dynamic audit services in cloud storage
Secure file sharing of dynamic audit services in cloud storageSecure file sharing of dynamic audit services in cloud storage
Secure file sharing of dynamic audit services in cloud storageeSAT Publishing House
 
Laboratory studies of dense bituminous mixes ii with
Laboratory studies of dense bituminous mixes ii withLaboratory studies of dense bituminous mixes ii with
Laboratory studies of dense bituminous mixes ii witheSAT Publishing House
 
Radiation effects on heat and mass transfer of a mhd
Radiation effects on heat and mass transfer of a mhdRadiation effects on heat and mass transfer of a mhd
Radiation effects on heat and mass transfer of a mhdeSAT Publishing House
 
Analysis of river flow data to develop stage discharge relationship
Analysis of river flow data to develop stage discharge relationshipAnalysis of river flow data to develop stage discharge relationship
Analysis of river flow data to develop stage discharge relationshipeSAT Publishing House
 
I slip algorithm for low latency on hybrid noc architecture
I slip algorithm for low latency on hybrid noc architectureI slip algorithm for low latency on hybrid noc architecture
I slip algorithm for low latency on hybrid noc architectureeSAT Publishing House
 
Fusion method used to tolerate the faults occurred in disrtibuted system
Fusion method used to tolerate the faults occurred in disrtibuted systemFusion method used to tolerate the faults occurred in disrtibuted system
Fusion method used to tolerate the faults occurred in disrtibuted systemeSAT Publishing House
 
Sentence level sentiment polarity calculation for customer reviews by conside...
Sentence level sentiment polarity calculation for customer reviews by conside...Sentence level sentiment polarity calculation for customer reviews by conside...
Sentence level sentiment polarity calculation for customer reviews by conside...eSAT Publishing House
 
A design for improving the core shelf system in a core
A design for improving the core shelf system in a coreA design for improving the core shelf system in a core
A design for improving the core shelf system in a coreeSAT Publishing House
 
Microwave drying of spinacia oleracea
Microwave drying of spinacia oleraceaMicrowave drying of spinacia oleracea
Microwave drying of spinacia oleraceaeSAT Publishing House
 
Analysis and experimental investigation to mitigate
Analysis and experimental investigation to mitigateAnalysis and experimental investigation to mitigate
Analysis and experimental investigation to mitigateeSAT Publishing House
 
A continuous time adc and digital signal processing system for smart dust and...
A continuous time adc and digital signal processing system for smart dust and...A continuous time adc and digital signal processing system for smart dust and...
A continuous time adc and digital signal processing system for smart dust and...eSAT Publishing House
 
Parameter study of stable walking gaits for nao
Parameter study of stable walking gaits for naoParameter study of stable walking gaits for nao
Parameter study of stable walking gaits for naoeSAT Publishing House
 
Emission characteristics of a diesel engine using soyabean oil and diesel blends
Emission characteristics of a diesel engine using soyabean oil and diesel blendsEmission characteristics of a diesel engine using soyabean oil and diesel blends
Emission characteristics of a diesel engine using soyabean oil and diesel blendseSAT Publishing House
 

En vedette (20)

Security constrained optimal load dispatch using hpso technique for thermal s...
Security constrained optimal load dispatch using hpso technique for thermal s...Security constrained optimal load dispatch using hpso technique for thermal s...
Security constrained optimal load dispatch using hpso technique for thermal s...
 
Gsm or x10 based scada system for industrial
Gsm or x10 based scada system for industrialGsm or x10 based scada system for industrial
Gsm or x10 based scada system for industrial
 
A virtual analysis on various techniques using ann with
A virtual analysis on various techniques using ann withA virtual analysis on various techniques using ann with
A virtual analysis on various techniques using ann with
 
Scour investigation around single and two piers
Scour investigation around single and two piersScour investigation around single and two piers
Scour investigation around single and two piers
 
Stirling engine performance prediction using schmidt
Stirling engine performance prediction using schmidtStirling engine performance prediction using schmidt
Stirling engine performance prediction using schmidt
 
Location updation for energy efficient geographic routing in
Location updation for energy efficient geographic routing inLocation updation for energy efficient geographic routing in
Location updation for energy efficient geographic routing in
 
Pilot aided scheduling for uplink ofdma
Pilot aided scheduling for uplink ofdmaPilot aided scheduling for uplink ofdma
Pilot aided scheduling for uplink ofdma
 
Secure file sharing of dynamic audit services in cloud storage
Secure file sharing of dynamic audit services in cloud storageSecure file sharing of dynamic audit services in cloud storage
Secure file sharing of dynamic audit services in cloud storage
 
Laboratory studies of dense bituminous mixes ii with
Laboratory studies of dense bituminous mixes ii withLaboratory studies of dense bituminous mixes ii with
Laboratory studies of dense bituminous mixes ii with
 
Radiation effects on heat and mass transfer of a mhd
Radiation effects on heat and mass transfer of a mhdRadiation effects on heat and mass transfer of a mhd
Radiation effects on heat and mass transfer of a mhd
 
Analysis of river flow data to develop stage discharge relationship
Analysis of river flow data to develop stage discharge relationshipAnalysis of river flow data to develop stage discharge relationship
Analysis of river flow data to develop stage discharge relationship
 
I slip algorithm for low latency on hybrid noc architecture
I slip algorithm for low latency on hybrid noc architectureI slip algorithm for low latency on hybrid noc architecture
I slip algorithm for low latency on hybrid noc architecture
 
Fusion method used to tolerate the faults occurred in disrtibuted system
Fusion method used to tolerate the faults occurred in disrtibuted systemFusion method used to tolerate the faults occurred in disrtibuted system
Fusion method used to tolerate the faults occurred in disrtibuted system
 
Sentence level sentiment polarity calculation for customer reviews by conside...
Sentence level sentiment polarity calculation for customer reviews by conside...Sentence level sentiment polarity calculation for customer reviews by conside...
Sentence level sentiment polarity calculation for customer reviews by conside...
 
A design for improving the core shelf system in a core
A design for improving the core shelf system in a coreA design for improving the core shelf system in a core
A design for improving the core shelf system in a core
 
Microwave drying of spinacia oleracea
Microwave drying of spinacia oleraceaMicrowave drying of spinacia oleracea
Microwave drying of spinacia oleracea
 
Analysis and experimental investigation to mitigate
Analysis and experimental investigation to mitigateAnalysis and experimental investigation to mitigate
Analysis and experimental investigation to mitigate
 
A continuous time adc and digital signal processing system for smart dust and...
A continuous time adc and digital signal processing system for smart dust and...A continuous time adc and digital signal processing system for smart dust and...
A continuous time adc and digital signal processing system for smart dust and...
 
Parameter study of stable walking gaits for nao
Parameter study of stable walking gaits for naoParameter study of stable walking gaits for nao
Parameter study of stable walking gaits for nao
 
Emission characteristics of a diesel engine using soyabean oil and diesel blends
Emission characteristics of a diesel engine using soyabean oil and diesel blendsEmission characteristics of a diesel engine using soyabean oil and diesel blends
Emission characteristics of a diesel engine using soyabean oil and diesel blends
 

Similaire à Secret keys and the packets transportation for privacy data forwarding method in cloud server

Security in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architectureSecurity in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architectureeSAT Journals
 
Security in multi cloud data storage with sic
Security in multi cloud data storage with sicSecurity in multi cloud data storage with sic
Security in multi cloud data storage with siceSAT Publishing House
 
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...IJECEIAES
 
Enabling Integrity for the Compressed Files in Cloud Server
Enabling Integrity for the Compressed Files in Cloud ServerEnabling Integrity for the Compressed Files in Cloud Server
Enabling Integrity for the Compressed Files in Cloud ServerIOSR Journals
 
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...eSAT Journals
 
Dynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudDynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudAM Publications
 
E041212224
E041212224E041212224
E041212224IOSR-JEN
 
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...rahulmonikasharma
 
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingIRJET Journal
 
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...pharmaindexing
 
Volume 2-issue-6-2073-2076
Volume 2-issue-6-2073-2076Volume 2-issue-6-2073-2076
Volume 2-issue-6-2073-2076Editor IJARCET
 
Volume 2-issue-6-2073-2076
Volume 2-issue-6-2073-2076Volume 2-issue-6-2073-2076
Volume 2-issue-6-2073-2076Editor IJARCET
 
Secure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliabilitySecure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliabilityPvrtechnologies Nellore
 
A secure erasure code based cloud storage
A secure erasure code based cloud storageA secure erasure code based cloud storage
A secure erasure code based cloud storageIMPULSE_TECHNOLOGY
 
A Security and Privacy Measure for Encrypted Cloud Database
A Security and Privacy Measure for Encrypted Cloud DatabaseA Security and Privacy Measure for Encrypted Cloud Database
A Security and Privacy Measure for Encrypted Cloud DatabaseIJTET Journal
 
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...IRJET Journal
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudIJERA Editor
 
IJSRED-V2I3P52
IJSRED-V2I3P52IJSRED-V2I3P52
IJSRED-V2I3P52IJSRED
 

Similaire à Secret keys and the packets transportation for privacy data forwarding method in cloud server (20)

Security in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architectureSecurity in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architecture
 
Security in multi cloud data storage with sic
Security in multi cloud data storage with sicSecurity in multi cloud data storage with sic
Security in multi cloud data storage with sic
 
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
 
Enabling Integrity for the Compressed Files in Cloud Server
Enabling Integrity for the Compressed Files in Cloud ServerEnabling Integrity for the Compressed Files in Cloud Server
Enabling Integrity for the Compressed Files in Cloud Server
 
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
 
Dynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudDynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for Cloud
 
E041212224
E041212224E041212224
E041212224
 
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
 
L018137479
L018137479L018137479
L018137479
 
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
 
C04932125
C04932125C04932125
C04932125
 
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
 
Volume 2-issue-6-2073-2076
Volume 2-issue-6-2073-2076Volume 2-issue-6-2073-2076
Volume 2-issue-6-2073-2076
 
Volume 2-issue-6-2073-2076
Volume 2-issue-6-2073-2076Volume 2-issue-6-2073-2076
Volume 2-issue-6-2073-2076
 
Secure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliabilitySecure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliability
 
A secure erasure code based cloud storage
A secure erasure code based cloud storageA secure erasure code based cloud storage
A secure erasure code based cloud storage
 
A Security and Privacy Measure for Encrypted Cloud Database
A Security and Privacy Measure for Encrypted Cloud DatabaseA Security and Privacy Measure for Encrypted Cloud Database
A Security and Privacy Measure for Encrypted Cloud Database
 
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
 
IJSRED-V2I3P52
IJSRED-V2I3P52IJSRED-V2I3P52
IJSRED-V2I3P52
 

Plus de eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 

Plus de eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Dernier

Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationBhangaleSonal
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringmulugeta48
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...SUHANI PANDEY
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityMorshed Ahmed Rahath
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptNANDHAKUMARA10
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptMsecMca
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 

Dernier (20)

Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 

Secret keys and the packets transportation for privacy data forwarding method in cloud server

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 353 SECRET KEYS AND THE PACKETS TRANSPORTATION FOR PRIVACY DATA FORWARDING METHOD IN CLOUD SERVER P. Velavan1 , K. Balaji2 , R.Ganesh3 1 Assistant Professor, Dept of CSE, Apollo Engineering College, Chennai, India 2 Student, Dept of CSE, Apollo Engineering College, Chennai, India 3 PG Scholar, A.R.J.I.T, Tamilnadu, India Abstract The Cloud computing is the process of storing the data in the Remote server. This process doesn‘t speak much about confidentiality and robustness of the data. To improve the security and confidentiality the uploaded file from a data owner is splitted into multiple packets and stored in multiple cloud servers. These packets are encrypted using the primary key. These different keys are also distributed in multiple key servers. User id is appended for verification. If the data owner forwards the file then the keys are verified for the data access. In this we are proposing sending the secret key as SMS to the shared or forwarded nodes for the process of proper Security. This technique integrates the concepts of encryption, encoding and forwarding. Keywords-cloud computing, encryption, storage system ------------------------------------------------------------------------***--------------------------------------------------------------------- 1. INTRODUCTION Cloud computing is a computing paradigm, where a large pool of systems are connected in private or public networks, to provide dynamically scalable infrastructure for application, data and file storage The idea of cloud computing is based on a very fundamental principal of ―reusability of IT capabilities Cloud computing is one of the hottest trends in the industry. This has proven as a bliss for small business and enterprise-sized IT. Cloud hosting has considered as the major shift in the way companies use to look their IT infrastructure. This type of approach to IT relies on the Internet, and usually involves provisioned, scalable, dynamic and virtual solutions. Cloud computing pulls the details of IT infrastructure management away from the business and puts it squarely in the hands of true experts. Storing the data in the cloud server makes serious concern on data confidentiality .To avoid that ,the user can encrypt the messages using encryption algorithms before applying the erasure code method to encode and store messages. The erasure code will reduce the expansion times of encoded messages [5],[7]. In this paper we are proposing the security concerns in the data forwarding scheme. The data owner will send the data to the cloud server .The cloud server will receive the data and do tDhe encryption for the data. The data owner holding the private key and pubic key pair. The encrypted data will be stored in data server and key servers separately. The data packets will be stored in the randomly chosen data servers and the generated keys will be stored in the key servers. If any authorized user want to modify them data in the cloud server, they will send the request to cloud server by appending user-id as an verification code. After verification is done by the server side, the cloud server will give the permission to the data owner to modify the data. If the data owner wants to forward the data to the other data owner, they can forward. But the new one will receive the encrypted data only. They can‘t view the data without the decryption process. For the decryption process the data owner will send the key for the who got the encrypted data recently. For the secured transformation of the key, that will be sending by an SMS. So, the intruder can‘t aware of the secret key transformation. The decentralized architecture gives better scalability and robustness rather than the existing architectures in the Distributed environment [1][3]. These erasure codes are random linear codes with specific randomized structure of network. The proxy re-encryption scheme scores best granularity on the granted right of the key servers [2]. Accomplishing the integration with consideration of distributed environment is more challenging task. Cloud has been used as the metaphor for the internet computing. The cloud can be categorized into SaaS(service as a software), IaaS ( Infrastructure as a service) & PaaS (Platform as a Service). While SaaS is by far the most common type of cloud computing implementation today, other types are rapidly gaining popularity as companies see the cost and expertise advantages of each. It also make use of Web 2.0 and other virtual technologies, applications are provided to users via the net with the data stored on the provider‘s servers
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 354 2. RELEATED WORK. 2.1 Farsite Farsite is a server less, distributed file system that does not assume mutual trust among the client computers on which it runs [4]. Logically, the system functions as a central file server, but physically, there is no central server machine. Instead, a group of desktop client computers collaboratively establish a virtual file server that can be accessed by any of the clients. The system provides a global name space for files, location-transparent access to both private files and shared public files, and improved reliability relative to storing files on a desktop workstation. It does this by distributing multiple encrypted replicas of each file among a set of client machines. Files are referenced through a hierarchical directory structure that is maintained by a distributed directory service 2.2 Decentralized Erasure Code The decentralized erasure codes which are randomized linear codes with specific probabilistic structure that leads to optimally sparse generator matrices. These codes canbe created by randomized network protocol. The decentralized erasure codes will reduce the communication, storage and computation cost over random linear coding .The decentralized erasure codes are the key factor to avoid the problem of large number of storage nodes with limited number of memory nodes. These codes will pre-rouets its data packet to O(log n) randomly and independently selected storage nodes. Decentralized erasure codes have minimal data node degree which corresponds to a maximal sparsity of the generator matrix and minimal number of pre routed packets The key advantage of decentralized erasure code is that there is no need for co-ordination among the data nodes[5][7][10]. 2.3 Proxy Re-Encryption Proxy Re-Encryption scheme in which the proxy server can transfer a cipher text under a public key PKA to a new one under another public key PKB by using the re-encryption key RKA→B The server does not know the plain text during the transformation. The proxy Re- Encryption schemes gives better secured sharing methodology to the cloud server .When the user want to share the message to them neighborhood, user will send a re-encryption key to the storage server will do the re-encryption for the authorized user. This scenario describes the better confidentiality in the forwarding scheme. 2.4 Secure Cloud Storage Scheme The cloud server will be having two type of storage servers. They are data server, key server. The data server which will be used to store the data packets after the decomposition of encrypted packets from the data owner The key server which is used to store keys for encrypted data. A decentralized in the cloud server gives better scalability because there is no central authority to control the storage server to join or leave. Making replicas of each message and store them in different server will improve the robustness of the cloud server. 2.5 Ocean Store Ocean store system in composed of a multitude of highly connected pools among which data is allowed to flow freely. Clients connect to one or more pool, perhaps intermittently. An ocean store provide persistent about data in server the cloud. This architecture will provide continuous access to persistent information. Ocean store have two type of access control .They are ‗reader restriction‘ and ‗writer restriction‘. Ocean store can be used to create very large digital libraries and repository for scientific data. Ocean store provides a common mechanism for storing and managing large data collections 3. PROPOED SYSTEM In existing system, the data owner will forward his encrypted message to the user who made the request for the data, along with the user id to the cloud server. The storage server verifies the user- id for authentication purpose and allow the data owner to send the encrypted data packets to the new user. For the decryption process the combination of data owner‘s secret key and new user‘s public key. That key will be used for decryption process. By improving the data confidentiality we proposes sending the combination of secret key and the public key pair by sms. By doing this type of protection over transmitting of pair of keys will improve tight security concerns. Architecture of Cloud Server Environment Fig 1 Architecture Diagram of Cloud Server Environment
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 355 m1 , m2……. mn – Message blocks c1 ,c2.. .cn—Cipher text s of messages SS — Storage Servers KS – Key Servers PK—Public Key PR—Private Key The above figure demonstrates the fundamental concept of our proposed work. There are five phases in our proposal. The first phase is the system management phase, in this phase the cloud manager chooses parameter of the cloud environment and publishes them. In our cloud environment there are ‗s‘ storage servers and ‗p‘ key servers are available. The storage servers which are used to store the data units of the data owner who upload the data. The key servers which are used to store key values of the each encrypted packets in the storage servers. The second phase is the data Storage phase. In this phase User A encrypts his message using any encryption algorithm and send the encrypted texts to the cloud server. The cloud server will decompose them into multiple packets of data. These encrypted texts again will go for the encryption for improving the security mechanism, for both encryptions different type of keys will be used. After the completion process of encryption the cipher texts will store randomly chosen storage servers and the key for encrypted data will be maintained separately in the key servers[3]. Upon receiving cipher texts from a user ,each storage server linearly combines codeword symbols and store it. The third phase is the data forwarding phase .User in the cloud server may want to share his data to another user in the cloud server or they want send the information to the outside user apart from cloud environment. In such cases the original user who want to share or forward his message ,first the user have to get an permission from the cloud server for an authorized entry for data manipulation in the cloud. For getting authorized entry, the user should have to append password as an verification code. After successful verification the user has the privilege to forward or modify the data.If the user forwarding the data means the receiver will receive the decrypted code only,do the decryption in receiving side require valid key. The pair of keys will be made very confidentially by the cloud server, that decryption key containing the secret key of user and the public key of the receiver. The receiver‘s public key is known by the user who send the data from cloud ,how means the receiver while sending an request with public key to the user, he will notify the public key very secretly. The final phase is the data retrieving phase, the user requests to retrieve a message from the cloud, the storage server holding data in cloud[10] .The message may be either stored by him in the cloud or forwarded to him in the cloud. Upon receiving the retrieval request from the cloud user and executing the proper authentication with the user, each key servers requests randomly chosen storage server to get the code word symbols and does the partial on the received codeword symbols by using the combined key 3.1 Data Owner The data owner after registering with the cloud server, he will have the Admin password as a private key. With the help of that key he has the privilege to data access the information stored in the cloud server. Here the user who stores his information in the cloud server are termed as Data owner. He has the right to modify the existing data and he has the privilege to add the new data in the cloud server. Before entering into the cloud sever, the data owner have to register them with the cloud server for the authorization purpose .Once the data owner has completed his registration, the cloud server will give the password for confidential uses of data manipulation purposes. That key should be maintained secretly ,otherwise it may bring out to wrong type of security 3.2 Cloud Server The data owner stores the information in the cloud server, where the data is splitted into multiple packets randomly and thus each of the packets are stored in a separate cloud servers, namely the first packet to be stored in the cloud server(CS1),the second packet to be stored in the cloud server(CS2) and so on. Under the cloud server, there are both data servers and the key servers. 3.3 Randomized Network Algorithm Fig 2 Randomized network algorithm
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 356 The Randomized Network algorithm is used to construct a decentralized erasure code in a cloud network. Each data node picks one out of the n storage nodes randomly ,pre- routes its packet and repeats d(k )= c ln (k) times .Each storage node multiplies whatever it happen to receive with coefficients selected uniformly and independently in Fq and stores the result and the coefficients 3.4 Encryption In this proposal we use encryption scheme twice in the system, for improving security and Confidentiality in the cloud server. First encryption will be done before splitting the message into multiple packets and second encryption will be done for the splitted packets and those packets will be stored randomly chosen data servers. In each of the data server, encryption is done and thus the encrypted key will be generated for each of the data server[5],[7] The first encryption process takes place before splitting data into smaller data units .After the completion of first encryption process the cloud server will format the encrypted data units in smaller number of equal cipher text units. These first level cipher texts get through one more time for encryption. In second level encryption, the cipher texts takes one more encryption process. This double encryption scheme provides higher level of tight security mechanism and increased data confidentiality for the data owners in the cloud environment. Even though we are increasing the security mechanism, the double encryption scheme lead the cloud environment into performance degrading why because is that double encryption increase the execution time of the cloud environment. 3.5 SMS Alert During the data sharing process, the user who needs the data get the encrypted keys from the data owner by means of the SMS [8],[9]. The keys are later utilized by the user in cloud servers and as a result he can get the data from the cloud servers which he needs. In order to improve the security and confidentiality of the combined key from the data owner to new user who got the encrypted data, that key send by an sms. By sending sms the intruder or the hacker may not aware of mobile number of the new user. 3.6 Error Recovery If the storage server get fails due to any reasons suddenly, then the cloud will add the new storage for replace the failed one[6]. The new storage server quires the available storage servers, linearly combines the received Codeword symbols as a new one and store it back all data by using the erasure code mechanism. 4. CONCLUSIONS This paper gives one of the approach to improve the security mechanism in data forwarding scheme in cloud server.This approach gives better confidentiality and provide good security rather than existing system. The future work can go with the direction by improving the scalability of the cloud and increasing the execution process of the cloud server. ACKNOWLEDGMENTS We thank our HOD and staff members of SRM University for guiding us throughout our research. REFERENCES [1] J. Kubiatowicz, D. Bindel, Y. Chen, P. Eaton, D. Geels, R. Gummadi, S. Rhea, H. Weatherspoon, W. Weimer, C. Wells, and B. Zhao,―Oceanstore: An architecture for global-scale persistent storage,‖ in Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems - ASPLOS, pp. 190–201, ACM, 2000. [2] P. Druschel and A. Rowstron, ―PAST: A large- scale, persistent peer-topeer storage utility,‖ in Proceedings of the 8th Workshop on Hot Topics in Operating System - HotOS VIII, pp. 75–80, USENIX, 2001. [3] H.Ying Lin,Wen-Guey Tzeng‖A Secure Erasure code based cloud storage system with secure data forwarding‖ in Proceedings of the 8th Workshop on Hot Topics in cryptography – Hot CRY VIII, pp. 75– 80, USENIX, 2011 [4] A. Adya, W. J. Bolosky, M. Castro, G. Cermak, R. Chaiken, J. R. Douceur, J. Howell, J. R. Lorch, M. Theimer, and R. Wattenhofer, ―Farsite: Federated, available, and reliable storage for an incompletely trusted environment,‖ in Proceedings of the 5th Symposium on Operating System Design and Implementation - OSDI, pp. 1–14, 2002. [5] A. Haeberlen, A. Mislove, and P. Druschel, ―Glacier: Highly durable, decentralized storage despite massive correlated failures,‖ in Proceedings of the 2nd Symposium on Networked Systems Design and Implementation - NSDI, pp. 143–158, USENIX, 2005. [6] Z. Wilcox-O‘Hearn and B. Warner, ―Tahoe: the least-authority filesystem,‖ in Proceedings of the 4th ACM International Workshop on Storage Security and Survivability - StorageSS, pp. 21–26, ACM, 2008. [7] H.-Y. Lin and W.-G. Tzeng, ―A secure decentralized erasure code for distributed network storage,‖ IEEEnsactions on Parallel and Distributed Systems, vol. 21, pp. 1586–1594, 2010. [8] D. R. Brownbridge, L. F. Marshall, and B. Randell, ―The Newcastle connection or unixes of the world
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 357 unite!,‖ Software Practice and Experience, vol. 12, no. 12, pp. 1147–1162, 1982. [9] R. Sandberg, D. Goldberg, S. Kleiman, D. Walsh, and B. Lyon, ―Design and implementation of the sun network filesystem,‖ 1985. [10] M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, ―Plutus: Scalable secure file sharing on untrusted storage,‖ in Proceedings of the 2nd USENIX Conference on File and Storage Technologies - FAST, pp. 29–42, USENIX, 2003.