SlideShare a Scribd company logo
Integrated Intelligent Research (IIR) International Journal of Data Mining Techniques and Applications
Volume 5, Issue 1, June 2016, Page No.74-75
ISSN: 2278-2419
74
Enabling Cloud Storage Auditing with Key
Exposure Resistance
S.Santhiya1
, R. Arun2
1
PG Scholar, 2
Assistant Professor
Department of ECE, Archana Institute of Technology, Sri Venkateswaraa College of Technology
Abstract - With cloud computing, users can remotely store
their data into the cloud and use on-demand high-quality
applications. Data outsourcing: users are relieved from the
burden of data storage and maintenance When users put their
data (of large size) on the cloud, the data integrity protection is
challenging enabling public audit for cloud data storage
security is important Users can ask an external audit party to
check the integrity of their outsourced data. Purpose of
developing data security for data possession at un-trusted cloud
storage servers we are often limited by the resources at the
cloud server as well as at the client. Given that the data sizes
are large and are stored at remote servers, accessing the entire
file can be expensive in input output costs to the storage server.
Also transmitting the file across the network to the client can
consume heavy bandwidths. Since growth in storage capacity
has far outpaced the growth in data access as well as network
bandwidth, accessing and transmitting the entire archive even
occasionally greatly limits the scalability of the network
resources. Furthermore, the input output to establish the data
proof interferes with the on-demand bandwidth of the server
used for normal storage and retrieving purpose. The Third
Party Auditor is a respective person to manage the remote data
in a global manner.
I. INTRODUCTION
Cloud Computing has been envisioned as the next-generation
architecture of IT enterprise, due to its long list of
unprecedented advantages in the IT history: on-demand self-
service, ubiquitous network access, location independent
resource pooling, rapid resource elasticity, usage-based pricing
and transference of risk. As a disruptive technology with
profound implications, Cloud Computing is transforming the
very nature of how businesses use information technology.
One fundamental aspect of this paradigm shifting is that data is
being centralized or outsourced into the Cloud. From users’
perspective, including both individuals and enterprises, storing
data remotely into the cloud in a flexible on-demand manner
brings appealing benefits: relief of the burden for storage
management, universal data access with independent
geographical locations, and avoidance of capital expenditure
on hardware, software, and personnel maintenances, etc .
While these advantages of using clouds are unarguable, due to
the opaqueness of the Cloud—as separate administrative
entities, the internal operation details of cloud service
providers (CSP) may not be known by cloud users—data
outsourcing is also relinquishing user’s ultimate control over
the fate of their data.
II. PRIVACY-PRESERVING PUBLIC AUDITING
Homomorphic authenticators are unforgeable verification
metadata generated from individual data blocks, which can be
securely aggregated in such a way to assure an auditor that a
linear combination of data blocks is correctly computed by
verifying only the aggregated authenticator. Overview to
achieve privacy-preserving public auditing, we propose to
uniquely integrate the homomorphic authenticator with random
mask technique. In our protocol, the linear combination of
sampled blocks in the server’s response is masked with
randomness generated by a pseudo random function (PRF).
Data Flow Diagram
Figure 1: Data Flow Diagram
Use Case Diagram
User Cloud Server
Registration
View Updated Files
Save the downloaded files
Edit Profile
Upload Files with secure
secured Downloaded Files
View Downloaded Files
Figure 2: Use Case Diagram
Integrated Intelligent Research (IIR) International Journal of Data Mining Techniques and Applications
Volume 5, Issue 1, June 2016, Page No.74-75
ISSN: 2278-2419
75
Screen Shots
Figure 3: Main Page
Owner Login
Figure 4: Owner Login
Secret Key Mail
Figure 5: Secret key mail
Secret Key Login
Figure 6 : Secret Key Login
File Upload
Figure 7: File Upload
III. CONCLUSION
We can further extend our privacy-preserving public auditing
protocol into a multi-user setting, where TPA can perform the
multiple auditing tasks in a batch manner, i.e., simultaneously.
Extensive security and performance analysis shows that the
proposed schemes are provably secure and highly efficient. We
believe all these advantages of the proposed schemes will shed
light on economies of scale for Cloud Computing.
References
[1] H. Abu-Libdeh, L. Princehouse, And H. Weatherspoon.
Racs: A Case For Cloud Storage Diversity. In Proc. Of
Acm Socc, 2010.
[2] R. Ahlswede, N. Cai, S.-Y. R. Li, And R.W. Yeung.
Network Information Flow. Ieee Trans. On Information
Theory, 46(4):1204–1216, Jul 2000.
[3] Amazon Elastic Compute Cloud.
Http://Aws.Amazon.Com/Ec2/.
[4] Amazon Simple Storage Service.
Http://Aws.Amazon.Com/S3/.
[5] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz,
A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica,
And M. Zaharia. A View Of Cloud Computing.
Communications Of The Acm, 53(4):50–58,

More Related Content

Similar to Breast Tissue Identification in Digital Mammogram Using Edge Detection Techniques (20)

PDF
Privacy preserving public auditing for
karthika kathirvel
 
PDF
Privacy preserving public auditing for secure cloud storage
Muthu Sybian
 
PDF
50120140507005 2
IAEME Publication
 
PDF
50120140507005
IAEME Publication
 
PDF
Privacy preserving external auditing for data storage security in cloud
eSAT Publishing House
 
PDF
V04405122126
IJERA Editor
 
PDF
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
IRJET Journal
 
PDF
Enabling Cloud Storage Auditing With Key-Exposure Resistance
1crore projects
 
PDF
Security Check in Cloud Computing through Third Party Auditor
ijsrd.com
 
PDF
Secure cloud storage privacy preserving public auditing for data storage secu...
rajender147
 
PPTX
211880_Litterature Review.pptx
MuhammadMazhar83
 
PDF
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET Journal
 
PDF
Ijarcet vol-2-issue-3-951-956
Editor IJARCET
 
PDF
Periodic Auditing of Data in Cloud Using Random Bits
IJTET Journal
 
PDF
Iaetsd storage privacy protection against data
Iaetsd Iaetsd
 
PDF
Development of Effective Audit Service to Maintain Integrity of Migrated Data...
IRJET Journal
 
PDF
A Survey on Batch Auditing Systems for Cloud Storage
IRJET Journal
 
PDF
Privacy and Integrity Preserving in Cloud Storage Devices
IOSR Journals
 
PDF
Third Party Public Auditing Scheme for Security in Cloud Storage
ijtsrd
 
PPTX
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
Bharath Nair
 
Privacy preserving public auditing for
karthika kathirvel
 
Privacy preserving public auditing for secure cloud storage
Muthu Sybian
 
50120140507005 2
IAEME Publication
 
50120140507005
IAEME Publication
 
Privacy preserving external auditing for data storage security in cloud
eSAT Publishing House
 
V04405122126
IJERA Editor
 
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
IRJET Journal
 
Enabling Cloud Storage Auditing With Key-Exposure Resistance
1crore projects
 
Security Check in Cloud Computing through Third Party Auditor
ijsrd.com
 
Secure cloud storage privacy preserving public auditing for data storage secu...
rajender147
 
211880_Litterature Review.pptx
MuhammadMazhar83
 
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET Journal
 
Ijarcet vol-2-issue-3-951-956
Editor IJARCET
 
Periodic Auditing of Data in Cloud Using Random Bits
IJTET Journal
 
Iaetsd storage privacy protection against data
Iaetsd Iaetsd
 
Development of Effective Audit Service to Maintain Integrity of Migrated Data...
IRJET Journal
 
A Survey on Batch Auditing Systems for Cloud Storage
IRJET Journal
 
Privacy and Integrity Preserving in Cloud Storage Devices
IOSR Journals
 
Third Party Public Auditing Scheme for Security in Cloud Storage
ijtsrd
 
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
Bharath Nair
 

More from IIRindia (20)

DOC
An Investigation into Brain Tumor Segmentation Techniques
IIRindia
 
DOCX
E-Agriculture - A Way to Digitalization
IIRindia
 
DOCX
A Survey on the Analysis of Dissolved Oxygen Level in Water using Data Mining...
IIRindia
 
DOCX
Kidney Failure Due to Diabetics – Detection using Classification Algorithm in...
IIRindia
 
DOCX
Silhouette Threshold Based Text Clustering for Log Analysis
IIRindia
 
DOC
Analysis and Representation of Igbo Text Document for a Text-Based System
IIRindia
 
DOCX
A Survey on E-Learning System with Data Mining
IIRindia
 
DOCX
Image Segmentation Based Survey on the Lung Cancer MRI Images
IIRindia
 
DOCX
The Preface Layer for Auditing Sensual Interacts of Primary Distress Conceali...
IIRindia
 
DOCX
Feature Based Underwater Fish Recognition Using SVM Classifier
IIRindia
 
DOC
A Survey on Educational Data Mining Techniques
IIRindia
 
DOCX
V5_I2_2016_Paper11.docx
IIRindia
 
DOCX
A Study on MRI Liver Image Segmentation using Fuzzy Connected and Watershed T...
IIRindia
 
DOCX
A Clustering Based Collaborative and Pattern based Filtering approach for Big...
IIRindia
 
DOCX
Hadoop and Hive Inspecting Maintenance of Mobile Application for Groceries Ex...
IIRindia
 
DOC
Performance Evaluation of Feature Selection Algorithms in Educational Data Mi...
IIRindia
 
DOCX
A Review of Edge Detection Techniques for Image Segmentation
IIRindia
 
DOC
Leanness Assessment using Fuzzy Logic Approach: A Case of Indian Horn Manufac...
IIRindia
 
DOC
Comparative Analysis of Weighted Emphirical Optimization Algorithm and Lazy C...
IIRindia
 
DOC
Survey on Segmentation Techniques for Spinal Cord Images
IIRindia
 
An Investigation into Brain Tumor Segmentation Techniques
IIRindia
 
E-Agriculture - A Way to Digitalization
IIRindia
 
A Survey on the Analysis of Dissolved Oxygen Level in Water using Data Mining...
IIRindia
 
Kidney Failure Due to Diabetics – Detection using Classification Algorithm in...
IIRindia
 
Silhouette Threshold Based Text Clustering for Log Analysis
IIRindia
 
Analysis and Representation of Igbo Text Document for a Text-Based System
IIRindia
 
A Survey on E-Learning System with Data Mining
IIRindia
 
Image Segmentation Based Survey on the Lung Cancer MRI Images
IIRindia
 
The Preface Layer for Auditing Sensual Interacts of Primary Distress Conceali...
IIRindia
 
Feature Based Underwater Fish Recognition Using SVM Classifier
IIRindia
 
A Survey on Educational Data Mining Techniques
IIRindia
 
V5_I2_2016_Paper11.docx
IIRindia
 
A Study on MRI Liver Image Segmentation using Fuzzy Connected and Watershed T...
IIRindia
 
A Clustering Based Collaborative and Pattern based Filtering approach for Big...
IIRindia
 
Hadoop and Hive Inspecting Maintenance of Mobile Application for Groceries Ex...
IIRindia
 
Performance Evaluation of Feature Selection Algorithms in Educational Data Mi...
IIRindia
 
A Review of Edge Detection Techniques for Image Segmentation
IIRindia
 
Leanness Assessment using Fuzzy Logic Approach: A Case of Indian Horn Manufac...
IIRindia
 
Comparative Analysis of Weighted Emphirical Optimization Algorithm and Lazy C...
IIRindia
 
Survey on Segmentation Techniques for Spinal Cord Images
IIRindia
 

Recently uploaded (20)

PDF
Zero Carbon Building Performance standard
BassemOsman1
 
PDF
2010_Book_EnvironmentalBioengineering (1).pdf
EmilianoRodriguezTll
 
PDF
勉強会資料_An Image is Worth More Than 16x16 Patches
NABLAS株式会社
 
PPTX
Inventory management chapter in automation and robotics.
atisht0104
 
PPTX
Precedence and Associativity in C prog. language
Mahendra Dheer
 
PDF
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
PPTX
Water resources Engineering GIS KRT.pptx
Krunal Thanki
 
PPTX
ENSA_Module_7.pptx_wide_area_network_concepts
RanaMukherjee24
 
PDF
4 Tier Teamcenter Installation part1.pdf
VnyKumar1
 
PDF
STUDY OF NOVEL CHANNEL MATERIALS USING III-V COMPOUNDS WITH VARIOUS GATE DIEL...
ijoejnl
 
PPTX
Online Cab Booking and Management System.pptx
diptipaneri80
 
PDF
All chapters of Strength of materials.ppt
girmabiniyam1234
 
PPTX
Basics of Auto Computer Aided Drafting .pptx
Krunal Thanki
 
PDF
EVS+PRESENTATIONS EVS+PRESENTATIONS like
saiyedaqib429
 
PPTX
filteration _ pre.pptx 11111110001.pptx
awasthivaibhav825
 
PDF
Advanced LangChain & RAG: Building a Financial AI Assistant with Real-Time Data
Soufiane Sejjari
 
PPTX
MT Chapter 1.pptx- Magnetic particle testing
ABCAnyBodyCanRelax
 
PDF
Zero carbon Building Design Guidelines V4
BassemOsman1
 
PDF
Jual GPS Geodetik CHCNAV i93 IMU-RTK Lanjutan dengan Survei Visual
Budi Minds
 
PPTX
22PCOAM21 Session 1 Data Management.pptx
Guru Nanak Technical Institutions
 
Zero Carbon Building Performance standard
BassemOsman1
 
2010_Book_EnvironmentalBioengineering (1).pdf
EmilianoRodriguezTll
 
勉強会資料_An Image is Worth More Than 16x16 Patches
NABLAS株式会社
 
Inventory management chapter in automation and robotics.
atisht0104
 
Precedence and Associativity in C prog. language
Mahendra Dheer
 
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
Water resources Engineering GIS KRT.pptx
Krunal Thanki
 
ENSA_Module_7.pptx_wide_area_network_concepts
RanaMukherjee24
 
4 Tier Teamcenter Installation part1.pdf
VnyKumar1
 
STUDY OF NOVEL CHANNEL MATERIALS USING III-V COMPOUNDS WITH VARIOUS GATE DIEL...
ijoejnl
 
Online Cab Booking and Management System.pptx
diptipaneri80
 
All chapters of Strength of materials.ppt
girmabiniyam1234
 
Basics of Auto Computer Aided Drafting .pptx
Krunal Thanki
 
EVS+PRESENTATIONS EVS+PRESENTATIONS like
saiyedaqib429
 
filteration _ pre.pptx 11111110001.pptx
awasthivaibhav825
 
Advanced LangChain & RAG: Building a Financial AI Assistant with Real-Time Data
Soufiane Sejjari
 
MT Chapter 1.pptx- Magnetic particle testing
ABCAnyBodyCanRelax
 
Zero carbon Building Design Guidelines V4
BassemOsman1
 
Jual GPS Geodetik CHCNAV i93 IMU-RTK Lanjutan dengan Survei Visual
Budi Minds
 
22PCOAM21 Session 1 Data Management.pptx
Guru Nanak Technical Institutions
 

Breast Tissue Identification in Digital Mammogram Using Edge Detection Techniques

  • 1. Integrated Intelligent Research (IIR) International Journal of Data Mining Techniques and Applications Volume 5, Issue 1, June 2016, Page No.74-75 ISSN: 2278-2419 74 Enabling Cloud Storage Auditing with Key Exposure Resistance S.Santhiya1 , R. Arun2 1 PG Scholar, 2 Assistant Professor Department of ECE, Archana Institute of Technology, Sri Venkateswaraa College of Technology Abstract - With cloud computing, users can remotely store their data into the cloud and use on-demand high-quality applications. Data outsourcing: users are relieved from the burden of data storage and maintenance When users put their data (of large size) on the cloud, the data integrity protection is challenging enabling public audit for cloud data storage security is important Users can ask an external audit party to check the integrity of their outsourced data. Purpose of developing data security for data possession at un-trusted cloud storage servers we are often limited by the resources at the cloud server as well as at the client. Given that the data sizes are large and are stored at remote servers, accessing the entire file can be expensive in input output costs to the storage server. Also transmitting the file across the network to the client can consume heavy bandwidths. Since growth in storage capacity has far outpaced the growth in data access as well as network bandwidth, accessing and transmitting the entire archive even occasionally greatly limits the scalability of the network resources. Furthermore, the input output to establish the data proof interferes with the on-demand bandwidth of the server used for normal storage and retrieving purpose. The Third Party Auditor is a respective person to manage the remote data in a global manner. I. INTRODUCTION Cloud Computing has been envisioned as the next-generation architecture of IT enterprise, due to its long list of unprecedented advantages in the IT history: on-demand self- service, ubiquitous network access, location independent resource pooling, rapid resource elasticity, usage-based pricing and transference of risk. As a disruptive technology with profound implications, Cloud Computing is transforming the very nature of how businesses use information technology. One fundamental aspect of this paradigm shifting is that data is being centralized or outsourced into the Cloud. From users’ perspective, including both individuals and enterprises, storing data remotely into the cloud in a flexible on-demand manner brings appealing benefits: relief of the burden for storage management, universal data access with independent geographical locations, and avoidance of capital expenditure on hardware, software, and personnel maintenances, etc . While these advantages of using clouds are unarguable, due to the opaqueness of the Cloud—as separate administrative entities, the internal operation details of cloud service providers (CSP) may not be known by cloud users—data outsourcing is also relinquishing user’s ultimate control over the fate of their data. II. PRIVACY-PRESERVING PUBLIC AUDITING Homomorphic authenticators are unforgeable verification metadata generated from individual data blocks, which can be securely aggregated in such a way to assure an auditor that a linear combination of data blocks is correctly computed by verifying only the aggregated authenticator. Overview to achieve privacy-preserving public auditing, we propose to uniquely integrate the homomorphic authenticator with random mask technique. In our protocol, the linear combination of sampled blocks in the server’s response is masked with randomness generated by a pseudo random function (PRF). Data Flow Diagram Figure 1: Data Flow Diagram Use Case Diagram User Cloud Server Registration View Updated Files Save the downloaded files Edit Profile Upload Files with secure secured Downloaded Files View Downloaded Files Figure 2: Use Case Diagram
  • 2. Integrated Intelligent Research (IIR) International Journal of Data Mining Techniques and Applications Volume 5, Issue 1, June 2016, Page No.74-75 ISSN: 2278-2419 75 Screen Shots Figure 3: Main Page Owner Login Figure 4: Owner Login Secret Key Mail Figure 5: Secret key mail Secret Key Login Figure 6 : Secret Key Login File Upload Figure 7: File Upload III. CONCLUSION We can further extend our privacy-preserving public auditing protocol into a multi-user setting, where TPA can perform the multiple auditing tasks in a batch manner, i.e., simultaneously. Extensive security and performance analysis shows that the proposed schemes are provably secure and highly efficient. We believe all these advantages of the proposed schemes will shed light on economies of scale for Cloud Computing. References [1] H. Abu-Libdeh, L. Princehouse, And H. Weatherspoon. Racs: A Case For Cloud Storage Diversity. In Proc. Of Acm Socc, 2010. [2] R. Ahlswede, N. Cai, S.-Y. R. Li, And R.W. Yeung. Network Information Flow. Ieee Trans. On Information Theory, 46(4):1204–1216, Jul 2000. [3] Amazon Elastic Compute Cloud. Http://Aws.Amazon.Com/Ec2/. [4] Amazon Simple Storage Service. Http://Aws.Amazon.Com/S3/. [5] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, And M. Zaharia. A View Of Cloud Computing. Communications Of The Acm, 53(4):50–58,