International Research Journal of Engineering and Technology (IRJET) Volume: 04 Issue: 02 | Feb -2017
www.irjet.net
e-ISSN: 2395 -0056 p-ISSN: 2395-0072
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage Anju Panicker1, Ankita Bhavsar2, Monika Mandge3, Pooja Bothara4 1Anju
Panicker, Dept. of Information Technology, NDMVP’s KBTCOE, Nasik Bhavsar, Dept. of Information Technology, NDMVP’s KBTCOE, Nasik 3Monika Mandge, Dept. of Information Technology, NDMVP’s KBTCOE, Nasik 4Pooja Bothara, Dept. of Information Technology, NDMVP’s KBTCOE, Nasik 2Ankita
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Cloud computing known to be the latest
development in data center technology. User use to store their confidential data on cloud, so security and data integrity is main concern while using cloud services. Thus, enabling public auditability for cloud storage is of critical importance so that users can resort to a third-party auditor (TPA) to check the integrity of outsourced data and be worry free, but while using TPA, there is chances of data leakage from TPA, so we are handling data leakage from TPA. Along with that in our system extensive security and performance analysis is handled by encryption algorithms like AES , RSA.
symmetric algorithm, both parties share the secret key for both encryption/decryption, and from privacy perceptive it is important that this key is not compromised, because cascading data will then be compromised. On the other hand in asymmetric algorithm uses Pairs of keys, of which one key is used for encryption while other key is used for decryption. In this paper to check the performance analysis one of symmetric algorithm and one of the asymmetric algorithm is used i.e. AES and RSA. Multilevel trust has been identified as vital component for establishing and maintaining successful relational exchanges between e-commerce trading partners in cloud environment.
Key Words: Privacy preserving, Public auditability, Random masking, Encryption algorithms, Batch auditing.
2. LITERATURE SURVEY [1] G. Ateniese, R. Burns, R. Curtmola , J. Herring, L. Kissner, Z.Peterson, and D. Song, “Provable Data Possession at Untrusted Stores,” In this paper public auditability is defined as “provable data possession” model for ensuring possession of files on untrusted storages. In their scheme, they utilize RSA-based homomorphic tags for auditing outsourced data, thus public auditability is achieved. However, they do not consider the case of dynamic data storage, and the direct extension of their scheme from static data storage to dynamic case may suffer design and security problems.
1. INTRODUCTION The recently emerged cloud computing, known to be the latest development in data center technology. Users can remotely store their data and enjoy the on-demand highquality applications and services from a shared pool of configurable computing resources, without the burden of local data storage and maintenance. From user’s perspective, including both individuals and IT enterprises, storing data remotely to the cloud in a flexible on-demand manner brings appealing benefits relief of the burden for storage management,universal data access with location independence. While cloud computing makes these advantages more appealing than ever, it also brings new and challenging security threats toward user’ s outsourced data. As users no longer physically possess the storage of their data, To fully ensure the data integrity and save the cloud user’ s computation resources as well as online burden, it is of critical importance to enable public auditing service for cloud data storage, so that users may resort to an independent third-party auditor (TPA) to audit the outsourced data when needed. The TPA, who has expertise and capabilities that users do not, can periodically check the integrity of all the data stored in the cloud on behalf of the users, which provides a much more easier and affordable way for the users to ensure their storage correctness in the cloud. In these paper we are also focusing on encryption algorithms for data security and data integrity. For extensive security and integrity we are using encryption algorithm. In
© 2017, IRJET
|
Impact Factor value: 5.181
[2] Chang Liu*, Rajiv Ranjan+, Xuyun Zhang*, Chi Yang*, Dimitrios Georgakopoulos+, Jinjun Chen, “Public Auditing for Big Data Storage in Cloud Computing -- A Survey”, In this paper we provide an analysis on authenticator-based efficient data integrity verification. In their scheme, they introduce two standard signature schemes (RSA and BLS) and one authenticated data structure (MHT). For Dynamic data possession they utilized another authenticated data structure rank-based skip list mainly for verification of updates. They also proposed a new scheme that can support both dynamic data and public verifiability at the same time. Although the current formalizations and security model seemed very rigorous and potent, new exploits can always exist, especially with dynamic data streams and varying user groups. Finding the security holes and fixing them can be a long-lasting game. [3] Prof. D. N. Rewadkar, Suchita Y. Ghatage, Cloud Storage System Enabling Secure Privacy Preserving Third Party
|
ISO 9001:2008 Certified Journal
|
Page 363